northben's blog

Quick tip when working with stats command


When you're working with the stats command, it's often nice to rename the fields to drop the aggregatation type:

| makeresults count=3 | streamstats count | eval foo="bar" | stats latest(foo) as foo latest(count) as count

This gets annoying because of all the extra typing involved, and it violates the DRY principal.

Instead, try this next time:

| makeresults count=3 | streamstats count | eval foo="bar" | stats latest(foo) latest(count) | rename latest(*) as *

Splunk Tip: Regex Extractions in Props.conf


When you create an extraction in props.conf (a search-time field), you specify the name of the new field through a named capture group in the regular expression. For example:

EXTRACT-foo =  (?P<foo>\w+)

This configuration will create a field "foo" with a value of the first word found in the _raw field. You can also specify a field besides _raw in your extraction:

EXTRACT-foo =  (?P<foo>\w+) in host

VirtualBox bridged networking doesn't work (OS X 10.11 El Capitan)


If you are having trouble getting a Linux (Ubuntu, in my case) guest OS to get a network address using "bridged networking", make sure you have installed "virtualbox-guest-additions-iso".

You can install this package through apt-get:

apt-get install virtualbox-guest-additions-iso

As soon as I installed this package, my Ubuntu 15.10 Server guest received a DHCP address and was connected to my network!

An Open Source Economy


Indulge me for just a moment, and consider a future in which you choose a bank just as easily as you choose a gas station. Where banks charge competitive fees for the useful commodity services that they actually provide. Where the banks don't hold a monopoly on access to the financial system. Where individuals like you and I can autonomously contribute to the development and improvement of the financial system.

How to Monitor Splunk Index Growth Over Time

Although you can use the Splunk on Splunk app to monitor Splunk index sizes (and many other things!), you might be interested to monitor index growth over time as well. I'll show you how to do that.

Just for demonstration purposes, you can run this search to see the kind of data that we will collect. This uses the rest command to collect the current index metadata from the Splunk REST API. As you can see, I renamed a few fields just for asthetic reasons.

How to Delete Splunk Events When Using a Transforming Command


Recently, I needed to delete some events that matched certain summary conditions. For example, where the event count exceeds a certain threshold:

Example showing event search with stats criteria

Now, if you try to delete the events by appending | delete, you'll receive an error:

Error in 'delete' command: This command cannot be invoked after the non-streaming command 'stats'


Subscribe to RSS - northben's blog