Splunk Fundamentals 1 Flashcards
Each splunk event has:
1) timestamp
2) host
3) source
4) sourcetype
5) index
Options to display search results:
- Raw
- List
- Table
@
rounds down to the nearest specified time unit
Lifetime of a search job
- Default is 10 minutes
- Can be extended to 7 days
- Schedule a report to keep search results longer
Share link to Job
- Gives everyone read permissions
- Extends result retention to 7 days
- More efficient than each running search separately
Export search results formats
- Raw events (text file)
- CSV
- XML
- JSON
Phases of Index Time Process
- Input phase
- Parsing phase
- Indexing phase
Input phase
- handled at the source (usually forwarder)
- the data sources are being opened and read
- data is handled as streams and any configuration settings are applied to the entire stream
Parsing phase
- handled by indexers (or heavy forwarders)
2. data is broken up into events and advanced processing can be performed
Indexing phase
- License meter runs as data and is initially written to disk, prior to compression
- After data is written to disk, it cannot be changed
How to add data inputs
- Apps and add-ons from Splunkbase
- Splunk Web
- CLI
- Directly editing inputs.conf
Metadata setting
- metadata is applied to the entire source
- applies default if not specified
- can be overwritten at input time
Upload file from my computer
- local files only get indexed once
2. does not create inputs.conf
Monitor (add data option)
- one-time or continuous monitoring of files, directories, http events, network ports of data gathering scripts located on Splunk Enterprese instances
- useful for testing inputs
Forward option (add data)
- Main source of input in prod
2. Remote machine gather and forward data to indexes over a receiving port
Index once
does not create a stanza in inputs.conf
Set source type
- splunk automatically determines the source type for major data types when there is enough data
- you can choose a different source type form the dropdown list
- you can create a new type name for specific source
Input configurations is saved in:
SPLUNK_HOME/etc/apps/search/local
When are indexes events are available?
- immediately after search
2. might take a minute for Splunk to start indexing the data
Splunk Enterprise Install Package
- Indexer (search peer)
- Search Head
- Deployment Server
- License Master
- Heavy Forwarder
- Cluster Master
- Search Head Cluster
Required Splunk Ports
- splunkweb: 8000
- splunkd
- forwarder
Splunk Deployments
- Splunk Enterprise
- Splunk Cloud
- Splunk Light
Splunk Apps
- Collections of files containing data inputs, UI elements, and/or knowledge objects
- Allows multiple workspaces for different use cases/user roles to co-exist on a single Splunk instance
Splunk Enhanced Solutions
- Splunk IT Service Intelligence (ITSI)
- Splunk Enterprise Security (ES)
- Splunk User Behavior Analytics (UBA)
Host
Unique identifier of where the events originated (host name, IP address, etc. )
Source
Name of the file, stream or other input
Sourcetype
Specific data type or data format
Splunk Compotents
- Indexer
- Search Head
- Forwarder
Splunk Deployments
- Standalone
- Basic
- Multi-Instance
- Increasing Capacity
- Index Cluster
Additional Splunk Components
- Deployment Server
- Cluster Master
- License Master