Download presentation
Presentation is loading. Please wait.
Published byClinton Anderson Modified over 8 years ago
1
Splunk Enterprise Instructor: Summer Partain 3 Day Course
2
What is Splunk Enterprise? Software Platform: Search data Analyze data Visualize data Indexes data Create Reports Create Visualizations
3
Splunk Enterprise Features There are 7 main features: 1. Indexing – Splunk indexes machine data 2. Data Model – hierarchically-structured dataset 3. Pivot – data visualization using the Pivot Editor 4. Search – primary navigation of data 5. Alerts – trigger conditions that are met 6. Reports – saved searches and pivots 7. Dashboards – panels that contain a variety of data
4
Splunk Enterprise Users 5 Main Types of Users: 1. Administrator 2. Knowledge Manager 3. Search User 4. Pivot User 5. Developer
5
Splunk Enterprise and your IT Infrastructure Splunk can collect data from machines located anywhere Local Remote Cloud Hybrid Majority of users connect to Splunk Enterprise through the web Command-line interface is also available Supports a multi-user and distributed product architecture
6
Splunk Enterprise Components Apps Forwarder Indexer Receiver Search Head Search Peer
7
Start Splunk Enterprise and Launch Splunk Web If you run Splunk on a local Machine the Splunk Web Interface is at http://localhost:8000 You will automatically be brought to the home page If you use an Enterprise License, this login screen appears Username: admin Password: changeme
8
Navigating Splunk Web: Splunk Home You can do two actions on this panel: 1. Click the gear icon to view and manage apps 2. Click the plus icon to browse for more apps
9
Navigating Splunk Web: Splunk Bar Use the Splunk Bar to: 1. Switch Between Apps 2. Manage and edit your Splunk Configuration 3. View System-level messages 4. Monitor the progress of search jobs
10
Navigating Splunk Web Returning to Home: Click the Splunk logo on the Navigation Bar We can see the Settings menu to the right
11
Navigating Splunk Web The User Menu The Messages Menu
12
Navigating Splunk Web The Activity Menu The Help Menu
13
Navigating Splunk Web Use Find to search within your Splunk instance
14
Getting Data Into Splunk Enterprise Ways to categorize input sources: 1. Files and Directories 2. Network Events 3. Windows Sources 4. Other Sources
15
How to Specify Data Inputs How to define the input sources: 1. Splunk Web 2. Apps 3. Splunk’s CLI 4. The inputs.conf configuration file
16
Where Splunk Stores Data Index: Splunk Data Repository Indexing is also known as event processing Events are stored in the index as group files: 1. Rawdata 2. Index Files Files are located in directories Buckets are sets of directories
17
Getting tutorial data into Splunk Enterprise Download (do not uncompress) the tutorial data file here: http://docs.splunk.com/images/Tutorial/tutorialdata.zip To add the data into Splunk: 1. Make sure you are in Splunk Home 2. Explore Splunk Enterprise select Add Data
18
Getting tutorial data into Splunk Enterprise 3. How do you want to add data? 4. Click Upload 5. Select Source 6. Click Select File 7. Or you can drag and drop your file
19
Getting tutorial data into Splunk Enterprise 8. Click Next to continue to Input Settings 9. Modify the host settings to assign host names 10. Select Segment in path 11. Type in 1
20
Getting tutorial data into Splunk Enterprise 12. Click Review
21
Getting tutorial data into Splunk Enterprise 13. Click Submit
22
Getting tutorial data into Splunk Enterprise 14. Click Start Searching
23
Using Splunk Search Splunk Home Search & Reporting Apps
24
Using Splunk Search Use the search bar to run searches on Splunk Web Use the time range picker to retrieve events Use the “How to search” panel to see the Search Tutorial and Search Manual Use the “What to search” panel to see a summary of your data
25
Using Splunk Search
29
The Time Range Picker Use the time range picker to set time boundaries on searches
30
The Time Range Picker Presets
31
Custom Time Ranges
33
Search Actions and Modes
34
Change the search mode Save the results Other search actions
35
Search Results Tabs
36
Events
37
Patterns Patterns can be used to: View the number of events See the search that returns events with pattern Save the pattern search Create an alert based on pattern
38
Statistics
40
Visualizations
42
Searching the Data 1.Click Search in the navigation bar 2.Click Data Summary in the “What to Search” panel
43
Search Assistant 1.Type “buttercupgames” into the search bar 2.The Search Assistant will open 3.Click the Auto Open option to turn the Search Assistant off
44
Retrieve events from the index 1. Type in keywords to find errors or failures and use Boolean operators “AND” “OR” “NOT”
45
Use Fields to Search Fields help to specify exactly which events you want to retrieve from the index
46
What are fields? A value or a name and value pair A single value to each field name A field can be multivalued Searchable name and value pairings that distinguish one event from another Examples of fields: Clientip for IP addresses _time for the timestamp Host for domain name Email address fields
47
Extracted Fields Processed when the data is indexed Splunk extracts different sets of fields when you run a search Use the Field Extractor to create custom fields
48
Find and Select Fields To search for fields use this syntax: fieldname=“fieldvalue” For this example, type in: sourcetype=“access_*”
49
Find and Select Fields Scroll through the list of events
50
Find and Select Fields You can also hide and show the fields sidebar
51
Find and Select Fields Click All Fields to see the Select Fields dialog box opens
52
Find and Select Fields
53
Click the action field under Selected Fields
54
Find and Select Fields Click on the arrow next to an event to see a list of all fields in that event
55
Run more targeted searches Example 1: To search for successful purchases sourcetype=access_* status=200 action=purchase Example 2: To search for failed purchases sourcetype=access_* status!=200 action=purchase Example 3: To search for general errors (error OR fail* OR severe) OR (status=404 OR status=500 OR status=503) Example 4: To search for how many simulation games were purchased yesterday sourcetype=access_* status=200 action=purchase categoryId=simulation
56
Use the Search Language Previously we ran a search to see how many simulation games were purchased: sourcetype=access_* status=200 action=purchase categoryId=simulation In order to find this number for the days of the previous week we have to run it against the data for each day To see which products are more popular than the other, we have to run the search for each of the categoryId values
57
Learn with search assistant Click back on the Search Dashboard and restrict search to Yesterday: sourcetype=access_* status=200 action=purchase
58
Learn with search assistant 1. Type a pipe character: | into the search bar 2. Click top under “common next commands”
59
Learn with search assistant
60
1. Type the categoryId field into the search bar to complete your search: sourcetype=access_* status=200 action=purchase | top categoryId 2. Run the search
61
View Reports in the Statistics Tab The results of the top command appear in the Statistics tab
62
View and Format Reports in the Visualization Tab 1. Click the Visualization tab 2. Click Column to open the Visualization type selector
63
View and Format Reports in the Visualization Tab Select Pie
64
View and Format Reports in the Visualization Tab Hover your mouse over each part of the pie to see various values for that categoryId
65
View and Format Reports in the Visualization Tab Click on “Strategy” in the Pie
66
Use a subsearch: Example 1 Without a subsearch A subsearch is a search with a search pipeline as an argument sourcetype=access_* status=200 action=purchase | top limit=1 clientip
67
Use a subsearch: Example 1 Without a subsearch Use the stats command to count the VIP customer’s purchases: sourcetype=access_* status=200 action=purchase clientip=87.194.216.51 | stats count, dc(productId) by clientip
68
Use a subsearch: Example 2 With a subsearch sourcetype=access_* status=200 action=purchase [search sourcetype=access_* status=200 action=purchase | top limit=1 clientip | table clientip] | stats count, dc(productId), values(productId) by clientip
69
Use a subsearch: Example 2 With a subsearch Rename the columns to make the information more understandable sourcetype=access_* status=200 action=purchase [search sourcetype=access_* status=200 action=purchase | top limit=1 clientip | table clientip] | stats count AS "Total Purchased", dc(productId) AS "Total Products", values(productId) AS "Products ID" by clientip | rename clientip AS "VIP Customer"
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.