The Essential Guide To Machine Data
The Essential Guide To Machine Data
0; Windows NT
317 27.160.0.0 - - [07/Jan 18:10:56:156] “GET /oldlink?item_id=EST-26&JSESSIONID=SD5SL9FF1ADFF3
1.1” 200 1318 “http://buttercup-shopping.com/cart.do?action=purchase&itemId=EST-26&product_id=K9-
” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)” 468 125.17.14.100
07/Jan 18:10:56:147] “POST /category.screen?category_id=SURPRISE&JSESSIONID=SD9SL4FF4ADFF7 HTTP
200 2423 “http://buttercup-shopping.com/cart.do?action=addtocart&itemId=EST-16&product_id=RP-
” “Opera/9.20 (Windows NT 6.0; U; en)” 564 130.253.37.97 - - [07/Jan 18:10:55:189] “GET /cart.
tion=changequantity&itemId=EST-18&product_id=AV-CB-01&JSESSIONID=SD5SL7FF6ADFF10 HTTP 1.1” 404
“http://buttercup-shopping.com/oldlink?item_id=EST-18” “Opera/9.20 (Windows NT 6.0; U; en)” 766
53.37.97 - - [07/Jan 18:10:55:187] “GET /oldlink?item_id=EST-6&JSESSIONID=SD10SL8FF2ADFF9 HTTP
THE ESSENTIAL
200 3865 “http://buttercup-shopping.com/cart.do?action=purchase&itemId=EST-6&product_id=AV-
MACHINE DATA
” “Opera/9.01 (Windows NT 5.1; U; en)” 553 62.216.64.19 - - [07/Jan 18:10:55:111] “GET /category.
n?category_id=FLOWERS&JSESSIONID=SD8SL8FF1ADFF6 HTTP 1.1” 200 3971 “http://buttercup-shopping.
art.do?action=remove&itemId=EST-15&product_id=FL-DSH-01” “Opera/9.01 (Windows NT 5.1; U; en)”
30.253.37.97 - - [07/Jan 18:10:55:108] “GET /category.screen?category_id=SURPRISE&JSESSIONID=SD-
F9ADFF9 HTTP 1.1” 404 474 “http://buttercup-shopping.com/oldlink?item_id=EST-21” “Mozilla/4.0
atible; MSIE 6.0; Windows NT 5.1)” 606 195.69.160.22 - - [07/Jan 18:10:54:192] “GET /cart.do?ac-
remove&itemId=EST-15&product_id=AV-SB-02&JSESSIONID=SD4SL1FF7ADFF7 HTTP 1.1” 200 205 “http://
rcup-shopping.com/cart.do?action=remove&itemId=EST-15&product_id=AV-SB-02” “Mozilla/4.0 (compati-
MSIE 6.0; Windows NT 5.1; SV1)” 163 131.178.233.243 - - [07/Jan 18:10:54:171] “GET /oldlink?item_
T-17&JSESSIONID=SD1SL9FF9ADFF1 HTTP 1.1” 200 1976 “http://buttercup-shopping.com/cart.do?ac-
GUIDE TO
purchase&itemId=EST-17&product_id=K9-CW-01” “Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_3;
) AppleWebKit/533.4 (KHTML, like Gecko) Chrome/5.0.375.38 Safari/533.4” 544 86.9.190.90 - - [07/
8:10:54:166] “POST /cart.do?action=addtocart&itemId=EST-7&product_id=FI-SW-01&JSESSIONID=SD10SL3F-
F4 HTTP 1.1” 404 2258 “http://buttercup-shopping.com/cart.do?action=addtocart&itemId=EST-7&prod-
d=FI-SW-01” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)” 189 82.245.228.36 - - [07/
8:10:54:165] “GET /category.screen?category_id=TEDDY&JSESSIONID=SD1SL1FF8ADFF2 HTTP 1.1” 200 488
://buttercup-shopping.com/cart.do?action=purchase&itemId=EST-27&product_id=FL-DLH-02” “Mozil-
0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)” 969 128.241.220.82 - - [07/
8:10:54:145] “GET /cart.do?action=view&itemId=EST-13&product_id=RP-SN-01&JSESSIONID=SD7SL8F-
F2 HTTP 1.1” 200 1901 “http://buttercup-shopping.com/cart.do?action=view&itemId=EST-13&product_
-SN-01” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)” 393 130.253.37.97 - - [07/Jan
:54:121] “GET /category.screen?category_id=BOUQUETS&JSESSIONID=SD10SL1FF4ADFF10 HTTP 1.1” 406 1437
://buttercup-shopping.com/cart.do?action=addtocart&itemId=EST-27&product_id=AV-SB-02” “Mozilla/5.0
ntosh; U; Intel Mac OS X 10_6_3; en-US) AppleWebKit/533.4 (KHTML, like Gecko) Chrome/5.0.375.38
i/533.4” 571 141.146.8.66 - - [07/Jan 18:10:53:118] “GET /category.screen?category_id=SURPRISE&-
IONID=SD7SL3FF9ADFF10 HTTP 1.1” 200 3814 “http://buttercup-shopping.com/category.screen?cate-
id=SURPRISE” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)” 932 141.146.8.66 - - [07/Jan
:53:104] “POST /category.screen?category_id=BOUQUETS&JSESSIONID=SD3SL1FF7ADFF2 HTTP 1.1” 200 2567
://buttercup-shopping.com/product.screen?product_id=AV-SB-02” “Mozilla/4.0 (compatible; MSIE 6.0;
ws NT 5.1)” 920 130.253.37.97 - - [07/Jan 18:10:52:182] “GET /category.screen?category_id=TED-
ESSIONID=SD8SL2FF5ADFF2 HTTP 1.1” 200 1649 “http://buttercup-shopping.com/category.screen?cat-
_id=TEDDY” “Googlebot/2.1 ( http://www.googlebot.com/bot.html) “ 302 125.17.14.100 - - [07/Jan
DIGITAL EXHAUST.
But some of the most important insights you can gain—across
IT and the business—are hidden in this data: where things went
wrong, how to optimize the customer experience, the fingerprints
TIME-SERIES DATA. of fraud. All of these insights can be found in the machine data
generated by the normal operations of your organization.
2 3
USING MACHINE DATA SOURCES
Order
MACHINE DATA
IN PRACTICE
Processing
Middleware
Error
1 2 3 Figure 1: Machine data can come from any number of sources, and at first
INGEST CORRELATE ANALYZE glance, can look like random text.
Care IVR
CUSTOMER ID
By defining the use cases you’re attempting to resolve – be it TWITTER ID CUSTOMER TWEET
Things – you can start to identify the data sources you should
COMPANY TWITTER ID
ingest and begin correlating.
Figure 2: The value of machine data is hidden in this text.
2. The customer called Support to try to resolve the issue Care IVR
CUSTOMER ID
3. After some time on hold, the customer sent a negative tweet TWITTER ID CUSTOMER TWEET
Twitter
about the company
COMPANY TWITTER ID
By linking together the machine data, the company can see the
Figure 3: By correlating different types of machine data together, you can start
original issue and get a full view of the customer experience. to gain real insight into what’s going on in your infrastructure, see security
threats or even use the insights to drive better business decisions.
4 5
Table of Contents
you should look for machine data and the value it can provide to CRM, ERP and Other............................ 18 Microsoft Azure.................................... 82
IT, security, business analytics and Internet of Things use cases. Business Applications VMware Server Logs,..........................84
Code Management..............................20 Configuration Data and
Performance Metrics
Many of the data sources listed in this book can support multiple Vulnerability Scanning....................... 22
use cases – this is a major part of what drives machine data’s Mail Server..............................................24 Physical Infrastructure
tremendous value. The use cases supported by each data source Test Coverage Tools............................26 & IoT Data............................................ 86
can be easily identified with the icons below. Automation, Configuration and...... 28 Physical Card Readers........................86
Deployment Tools (Platforms) Sensor Data............................................88
Build Systems (Platforms)................30 Server Logs........................................... 90
Binary Repositories............................. 32 Backup..................................................... 92
Container Logs & Metrics..................34 Storage.....................................................94
Mainframe...............................................96
Middleware Data.............................. 36
Patch Logs..............................................98
Middleware.............................................36
Telephony..............................................100
Web Server.............................................38
Point of Sale Systems....................... 102
SECURITY IT OPS, APP DELIVERY Application Server...............................42
& COMPLIANCE & DEVOPS RFID/NFC/BLE...................................104
Mobile Device Data.............................44
Smart Meters....................................... 106
Network Data..................................... 46 Transportation..................................... 108
SNMP........................................................46 Medical Devices................................... 110
Deep Packet Inspection Data..........48 Environmental Sensors......................112
DHCP........................................................50 Industrial Control Systems.............. 114
Endpoint.................................................. 52 Wearables.............................................. 116
Firewall.....................................................54
Additional Data Sources..............118
FTP............................................................56
Database.................................................118
Intrusion Detection/Prevention......58
Third-Party Lists................................. 120
INTERNET BUSINESS Load Balancer...................................... 60
OF THINGS ANALYTICS Social Media Feeds.............................122
DNS...........................................................62
Human Resources.............................. 124
Network Access Control (NAC)......64
Business Service Transaction &.... 126
Network Switches................................66
Business Service Performance Data
Network Routers..................................68
Network Protocols...............................70
6 7
USER DATA
AUTHENTICATION
DATA
Use Cases: Security & Compliance, IT Operations, Application Delivery
Examples: Active Directory, LDAP, Identity Management,
Single-Sign On
Authentication data provides insight into users and identity Use Cases:
activity. Common authentication data sources include:
IT Ops & Application Delivery: Authentication data supports
• Active Directory: a distributed directory in which organiza- IT operations teams as they troubleshoot issues related to
tions define user and group identities, security policies and authentication. For example, application support can be tied to
logins, enabling IT operations to see whether users are struggling
content controls.
to log in to applications. For IT operations teams that support
• LDAP: an open standard defined by the IETF and is typically Active Directory, logs can be used to troubleshoot and understand
used to provide user authentication (name and password). the health of Active Directory.
Virtual private networks (VPNs) are a way of building a secure Use Cases:
extension of a private network over an insecure, public one. VPNs
can be established either between networks, routing all traffic Security & Compliance: VPN logs help in analyzing users coming
between two sites, or between a client device and a network. onto the network. This information can be used in a number
Network-to-network VPNs typically are created using strong of ways, including situational awareness, monitoring foreign IP
credentials such as certificates on each end of the connection. subnets, and compliance monitoring of browsers and applications
Client-to-network VPNs rely on user authentication, which can of connected hosts. VPN data can also help identify:
be as simple as a username and password. VPNs use network
tunneling protocols such as IPSec, OpenVPN plus SSL or L2TP • Activities from different locations, such as changes in location
with cryptographically strong algorithms to scramble information within a given amount of time
in transit and ensure end-to-end data integrity.
• Access from risky countries or locations
10 11
APPLICATION DATA
ANTIVIRUS
Use Cases: Security & Compliance
Examples: Kaspersky, McAfee, Norton Security, F-Secure, Avira,
Panda, Trend Micro
12 13
APPLICATION DATA
APM
TOOL LOGS
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: Dynatrace, New Relic, App Dynamics, MMSoft Pulseway,
LogicMonitor, Stackify, Idera, Ipswitch
14 15
APPLICATION DATA
CUSTOM APPLICATION
& DEBUG LOGS
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: Custom applications
Best practices for application developers require the inclusion of Use Cases:
debugging code in applications that can be enabled to provide
minute details of application state, variables and error conditions IT Ops & Application Delivery: Debug output can expose
or exceptions. Debug output is typically logged for later analysis application behavior that causes inefficient use of system
that can expose the cause of application crashes, memory leaks, resources or application failures that can be addressed by
performance degradation and security holes. Furthermore, since developers and operations teams. Debug output is useful for
the events causing a security or performance problem may be unraveling the internal state of an application that exhibits
spaced over time, logs—along with the problem software—can performance problems or has been shown to have security
help correlate and trace temporally separated errors to show how vulnerabilities, and the data can be helpful in identifying
they contribute to a larger problem. root cause
Application debug logs provide a record of program behavior Security & Compliance: Security breaches are often the result of
that is necessary to identify and fix software defects, security improper handling of unexpected inputs, such as buffer overflow
vulnerabilities or performance bottlenecks. While test logs record exploits or data injection used in cross-site scripting attacks.
the output results of application usage, debug logs provide This type of low-level vulnerability is almost impossible to detect
information about an application’s internal state, including the without logging the internal state of various application variables
contents of variables, memory buffers and registers; a detailed and buffers.
record of API calls; and even a step-by-step trace through a
particular module or subroutine. Due to the performance overhead Similar to APM logs, custom application and debug logs can be
and amount of data produced, debug logs typically are enabled used to correlate security indications between the system and
only when a problem can’t be identified via test or event logs. application activities. It also helps to identify SQL/API calls/CMD
made in relation to suspicious activity, or abnormal amounts of
sessions or CPU load in relation to security activity.
16 17
APPLICATION DATA
CRM, ERP AND OTHER
BUSINESS APPLICATIONS
Use Cases: Application Delivery, Security & Compliance, Business Analytics, IoT
Examples: SAP, SFDC, SugarCRM, Oracle, Microsoft Dynamics
Business Applications can create a wealth of data as part of tion across back-end digital business processes. ERP systems
normal operations. Two examples are CRM and ERP applications: are typically built on a relational database management sys-
tem with a variety of modules and customizations for specific
• Customer relationship management (CRM) systems have
functions such as supplier relationship management or supply
become an essential part of every organization, providing a
chain management. Due to their complexity, ERP systems
central database of all customer contact information, commu-
often are installed and managed by product specialists.
nications and transaction details. CRM systems have evolved
from simple contact management systems to platforms for
Use Cases:
customer support and engagement by providing personalized
Application Delivery: CRM databases can provide a complete
sales and support information. The same customer support
record of all information and events leading up to a customer
data repository can be used to develop customized marketing
escalation. When combined with other data sources, CRM can
messages and sales promotions. CRM systems are also useful provide indicators of deeper issues.
for application support and enhancement by recording details
Like other application records, ERP logs are necessary when
about customer problems with a particular system or applica-
debugging performance and reliability problems due to
tion along with their eventual solution—details that can inform
the complex interactions between many systems in an ERP
future application or service updates. implementation. Logs are also useful in capacity planning.
• Enterprise resource planning (ERP) applications are a critical Security & Compliance: CRM records can help security teams
back-office IT service that provides systematic, automated unravel incidents that involve multiple customers and problem
collection and analysis of a variety of product, supply chain episodes over a long time span. They can also provide evidence
and logistics data. ERP is used in product planning, tracking of a breach, should records be modified outside normal business
purchases of components and supplies, inventory manage- processes. In addition, the data can be used to audit access
records of customer or internal user information.
ment, monitoring and regulating manufacturing processes,
managing logistics, warehouse inventory and shipping and to Business Analytics & IoT: CRM and ERP data is a crucial source of
monitor and measure the effectiveness of sales and market- referential and transactional data that helps drive much needed
ing campaigns. ERP software also integrates with CRM, HR, context to machine data in business use cases. For instance, when
combined with point-of-sale data and mobile application data
finance/accounting/payroll and asset management systems,
from loyalty applications, retailers can drive real-time 1:1 targeted
with bidirectional data flows that provide consistent informa-
marketing campaigns, and then use machine learning to predict
18 customer purchasing behavior and revenue trends. 19
APPLICATION DATA
CODE
MANAGEMENT
Use Cases: Application Delivery
For all but the most trivial implementations, application source Use Cases:
code is comprised of dozens if not hundreds of interrelated files.
The complexity and volatility of code—particularly when using Application Delivery: The version records of code management
agile development methodologies and changes are made daily— can help IT operations teams identify application changes that are
makes keeping track of it virtually impossible without a structured, causing system problems, such as excessive resource consumption
automated source code management and revision control system. or interference with other applications.
20 21
APPLICATION DATA
VULNERABILITY
SCANNING
Use Cases: Security & Compliance
Examples: ncircle IP360, Nessus
Systems often keep network services running by default, even • System misconfiguration causing security vulnerability
when they aren’t required for a particular server. These running, • Outdated patches
unmonitored services are a common means of external attack, • Unnecessary network service ports
as they may not be patched with the latest OS security updates.
• Misconfigured filesystems, users or applications
Broadscale vulnerability scans can reveal security holes that could
be leveraged to access an entire enterprise network. • Changes in system configuration
• Changes in various user, app or filesystem permissions
22 23
APPLICATION DATA
MAIL
SERVER
Use Cases: IT Operations, Security & Compliance
Examples: Exchange, Office 365
24 25
APPLICATION DATA
TEST COVERAGE
TOOLS
Use Cases: Application Delivery & DevOps
Examples: Static Analysis & Unit Testing logs (SonarQube, Tox, PyTest, RubyGem
MiniTest, Bacon, Go Testing), build server logs and performance metrics
26 27
APPLICATION DATA
AUTOMATION, CONFIGURATION,
DEPLOYMENT TOOLS (PLATFORMS)
Use Cases: Application Delivery & DevOps
Examples: Puppet Enterprise, Ansible Tower, Chef, SaltStack, Rundeck,
machine data ingested through APIs, webhooks or run logs
28 29
APPLICATION DATA
BUILD SYSTEMS
(PLATFORMS)
Use Cases: Application Delivery & DevOps
Examples: Jenkins, Bamboo, TravicCI, TeamCity, machine data ingested
through APIs, logs, webhooks
Build platforms, like Jenkins and Bamboo, enable a continuous Use Cases:
integration practice that allows application delivery teams—
including developers, DevOps practitioners, QA, and release Application Delivery and DevOps: Build systems monitoring
engineering—to build artifacts, trigger new builds and helps release managers, test and QA teams understand the health
environments, automate tests and more. of their build environment, the status of tests, get insights into
stack traces and build queues. This visibility helps remediate build
or test bottlenecks and increase the application delivery velocity
and quality.
30 31
APPLICATION DATA
BINARY
REPOSITORIES
Use Cases: Application Delivery & DevOps
Examples: Data from Nexus, Artifactory, delivered through APIs, webhooks; Yum,
Pacman and Aptly data delivered through logs
A binary repository is a tool for downloading and storing of binary Use Cases:
files used and created in software development. It’s used to store
software binary packages, artifacts and their corresponding Application Delivery and DevOps: Analyzing binary
metadata. They’re different than source code repositories, as repository data helps application delivery teams and release
binary repositories do not store source files. Searching through managers to ensure that the final deployment of code to
these repositories is possible by analyzing associated metadata. production is successful.
32 33
APPLICATION DATA
CONTAINER LOGS
AND METRICS
Use Cases: Application Delivery & DevOps
Examples: Docker
Container logs are an efficient way to acquire logs generated by Use Cases:
applications running inside a container. By utilizing logging drivers,
output that is usually logged is redirected to another target. Since Application Delivery and DevOps: Acquiring container log files
logging drivers start and stop when containers start and stop, this gives developers and operations teams insight on errors, issues
is the most effective way of capturing machine data, given the and availability of applications running inside containers. Logs
often limited lifespan of a container. and metrics at the container level also call attention to containers
whose performance is outside of expected parameters. As a result,
admins can “kill” or “stop” a container instance and “run” a new
Container metrics contain details related to CPU, memory, I/O and
container in its place.
network metrics generated by a container. By capturing this data,
you have the opportunity to spot specific containers that appear
to consume more resources than others – enabling faster, more
precise troubleshooting.
34 35
MIDDLEWARE DATA
MIDDLEWARE
Use Cases: IT Operations, Application Delivery, Security & Compliance,
Business Analytics
Examples: Tibco, Software AG
36 37
MIDDLEWARE DATA
WEB SERVER
Use Cases: IT Operations, Application Delivery, Security & Compliance,
Business Analytics
Examples: Java J2EE, Apache, Application Usage Logs, IIS logs, nginx
Web servers are the backend application behind every website • Application Usage Logs: Like Apache web logs, collecting
that delivers all content seen by browser clients. Web servers application usage logs can provide valuable information
access static HTML pages and run application scripts in a variety to multiple stakeholders including developers, IT, sales and
of languages that generate dynamic content and call other
marketing. Depending on how granular the measurement,
applications such as middleware.
usage tracking can assist developers in identifying application
Web servers can vary widely, and can include: features that are most and seldom used, those that users have
• Java – J2EE: Java is the most popular programming language trouble with and areas for future enhancement. For custom-
due to its versatility, relative ease of use and rich ecosystem of er-facing applications, usage logs provide sales and marketing
developer tools. Via the J2EE platform, which includes APIs, teams insight into the effectiveness of online and app-based
protocols, SDKs and object modules, Java is widely used for sales channels and promotions, data about sell-through and
enterprise apps including web applets, middle-tier business transaction abandonment, and information for potential cross-
logic and graphic front ends. Java is also used for native sales promotions.
38 39
MIDDLEWARE DATA
WEB SERVER
(Continued)
• Application usage logs can help IT operations teams with Business Analytics: Web logs are crucial to understanding the
infrastructure capacity planning, optimization, load balanc- interaction between a company’s customers and the overall
ing and usage-based billing by providing detailed records of journey they’re taking across multiple channels of the business.
This data can help companies understand what customers are
resource consumption.
looking for, where they are spending time, or what they were
looking for before they called your call center for help. When
Security & Compliance: Web logs record error conditions such as
correlated with CRM and point-of-sale data, companies can gain a
a request to access a file without appropriate permissions and also
better overall understanding of customer journeys, driving higher
track user activity that can flag security attacks such as attempted
conversions from browse to act, and act to purchase.
unauthorized entry or DDoS. It can also help to identify SQL
injections and support correlating fraudulent transactions.
40 41
MIDDLEWARE DATA
APPLICATION
SERVER
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: log4j, log4php
42 43
MIDDLEWARE DATA
MOBILE DEVICE
DATA
Use Cases: IT Operations, Application Delivery,
Security & Compliance
Given the array of always-active sensors on mobile devices, they Use Cases:
are veritable gushers of data that can include:
IT Ops & Application Delivery: Since mobile apps invariably
• Physical parameters such as location, network MAC ID, device connect to one or more backend services, data from the client’s
GUID, device type and OS version point of view can provide insight into the app’s condition and
state when investigating issues such as crashes, performance
• Network settings such as address, AP or cell-base station degradation or security leaks. Mobile data shows the sequence of
location, link performance events and the application conditions leading up to and during
a problem. If the source of the problem is the mobile application
• Application-specific telemetry such as time in app, features itself, getting insight on mobile application data can help
used and internal state and debug parameters similar to those developers deliver a better performing mobile app.
provided by conventional application servers
Security & Compliance: Security teams can expand the threat
landscape by monitoring mobile device data for abnormal activity
in regards to authentication, location and application usage.
44 45
NETWORK DATA
SNMP
Use Cases: IT Operations, Security & Compliance
Examples: LogicMonitor, ManageEngine, Spiceworks,
Ruckus Idera, Ipswitch
The simple network management protocol (SNMP) is one of the Use Cases:
oldest, most flexible and broadly adopted IP protocols used for
managing or monitoring networking devices, servers and virtual IT Ops: SNMP data can provide current information about
appliances. This includes network devices such as routers and performance, configuration and current state. This allows the
switches, as well as non-networking equipment such as server monitoring of the “normal” state of the environment, which is vital
hardware or disk arrays. when using a service-level approach to monitoring of health of any
environment. This could include current speed of all of the ports
SNMP supports two different methods of obtaining data. on a switch, the number of bytes sent (per port or in aggregate)
through a router, the CPU temperature of a server, and any other
• SNMP Traps are essentially alerts, set to send an alert on a
information made available by the vendor per the SNMP MIBs for
state change, critical threshold, hardware failure and more. that device.
Traps are initiated by the SNMP device, and the trap is sent to
Many environments rely on SNMP traps for alerting when a critical
an SNMP collector.
state is reached (e.g., CPU temperature is critical) or when a failure
• SNMP Polling is an interactive query/response approach. Un- occurs (e.g., RAID disk failure). SNMP traps are not only sent by
devices to monitoring systems, in some environments SNMP traps
like traps, polling is initiated by the SNMP collector in the form
are the de-facto method for multiple monitoring and alerting
of a request for certain—or all—SNMP data available on the
systems to aggregate errors to a single console.
SNMP device.
Although many now provide vendor-specific APIs for remote Security & Compliance: SNMP traps and alerts from network
management and data collection, SNMP is still valuable in devices can help security teams identify abnormal activity over
troubleshooting due to its ubiquity (nearly every device supports the network. SNMP Polling helps a security analyst to see the
it) and inherently centralized design (a single instance of SNMP data transmission rates for a network-connected device that is
management software can collect data from every device on an suspected of malicious activity.
internal network, even across route domains).
The data can also help identify abnormal amounts of traffic to
a certain site or domain, an abnormal amount of specific SNMP
traps from a certain host, and an abnormal number of unique
SNMP traps from hosts compared to normal profiles.
46 47
NETWORK DATA
DEEP PACKET
INSPECTION DATA
Use Cases: IT Operations, Security & Compliance
Examples: Stream, PCAP, bro
48 49
NETWORK DATA
DHCP
Use Cases: IT Operations, Security & Compliance
Examples: DHCP Insight, Linux DHCP
DHCP is the network protocol most client devices use to associate Use Cases:
themselves with an IP network. Implemented via a DHCP server,
which could be standalone or embedded in a router or other IT Ops: DHCP logs can be used when troubleshooting a client
network appliance, DHCP provides network clients with critical device that is having network problems since it provides a
network parameters including IP address, subnet mask, network definitive record of the device’s primary IP parameters. The data
gateway, DNS servers, WINS or other name servers, time servers may show the DHCP server itself is at fault; for example, by not
(NTP), a host and domain name and the address of other optional properly vending addresses, renewing IP leases or giving the same
network services. address to two separate devices.
50 51
NETWORK DATA
ENDPOINT
Use Cases: Security & Compliance
Examples: McAfee ePO, Symantec SEP
52 53
NETWORK DATA
FIREWALL
Use Cases: IT Operations, Security & Compliance
Examples: Palo Alto, Cisco, Check Point
• Lateral movement
• Command and Control traffic
• DDoS traffic
• Malicious domain traffic
• Unknown domain traffic
• Unknown locations traffic
54 55
NETWORK DATA
FTP
Use Cases: IT Operations, Security & Compliance
Examples: OSSEC, Getwatchlist, UTBox, Security Onion,
iSeries - AS400, Traffic Ray
FTP is one of the oldest and most rudimentary network protocols Use Cases:
for copying data from one system to another. Before websites
and HTTP, FTP was the best way to move large files across the IT Ops: FTP traffic logs record the key elements of a file
internet. FTP is still used in organizations that need reliable, transmission, including source (client) name and address and
deterministic internet file transfer. remote user name if the destination is password-protected. This
and other data are crucial when troubleshooting FTP problems,
regardless of the application.
56 57
NETWORK DATA
INTRUSION
DETECTION/PREVENTION
Use Cases: Security & Compliance
Examples: Tipping Point, Juniper IDP, Netscreen Firewall, Juniper NSM IDP,
Juniper NSM, Snort, McAfee IDS
IDS and IPS are complementary, parallel security systems that Use Cases:
supplement firewalls – IDS by exposing successful network and
server attacks that penetrate a firewall, and IPS by providing more Security & Compliance: IDS logs provide security teams detailed
advanced defenses against sophisticated attacks. IDS is typically records of attacks including the type, source, destination and
placed at the network edge, just inside a perimeter firewall, port(s) used that provide an overall attack signature. Special
although some organizations also put a system outside the firewall signatures may trigger alarms or other mitigating actions. IPS
to provide greater intelligence about all attacks. Likewise, IPS is provide the same set of attack signature data, but also may
typically placed at the network perimeter, although it also may be include a threat analysis of bad network packets and detection of
used in layers at other points inside the network or on individual lateral movement. This data can also detect command and control
servers. IPS usually works by dropping packets, resetting network traffic, DDoS traffic, and malicious or unknown domain traffic.
connections and blacklisting specific IP addresses or ranges.
58 59
NETWORK DATA
LOAD BALANCER
Use Cases: IT Operations
Examples: Local Traffic Manager, Cisco Load Balancer, Citrix,
Kemp Technologies, Radware AppDirector OnDemand
Load balancers allocate external network traffic bound for Use Cases:
a particular server or application across multiple redundant
instances. There are two categories of load balancer: local, in IT Ops: Load balancer logs provide operations teams with a record
which all resources in a load-balanced pool are on the same of overall traffic to systems or particular applications and provide
subnet; and global or distributed, where the resource pool is indicators of each system’s traffic-handling capacity and health,
spread across multiple sites. Load balancers use several user- along with the status and health of the load balancer itself.
selectable algorithms to allocate traffic including:
60 61
NETWORK DATA
DNS
Use Cases: IT Operations, Security & Compliance
Examples: BIND, PowerDNS, Unbound, Dnsmasq, Erl-DNS
The domain name system (DNS) is the internet’s phone book, Use Cases:
providing a mapping between system or network resource names
and IP addresses. DNS has a hierarchical name space that typically IT Ops: DNS server logs provide operations teams with a record
includes three levels: a top-level domain (TLD) such as .com, .edu of traffic, the type of queries, how many are locally resolved either
or .gov; a second-level domain such as “google” or “whitehouse;” from an authoritative server or out of cache, and a picture of
and a system level such as “www” or “mail.” DNS nameservers overall system health.
operate in this hierarchy either by acting as authoritative sources
for particular domains, such as a company or government agency, Security & Compliance: Security teams can use DNS logs to
or by acting as caching servers that store DNS query results for investigate client address requests such as correlating lookups
subsequent lookup by users in a specific location or organization; with other activity, whether requests are made for inappropriate
for example, a broadband provider caching addresses for its or otherwise suspicious sites and relative popularity of individual
customers. sites or domains. Since DNS servers are a frequent target of DDoS
attacks, logs can reveal an unusually high number of requests
from external sources. Likewise, since compromised DNS servers
themselves are often used to initiate DDoS attacks against other
sites, DNS logs can reveal whether an organization’s servers have
been compromised. DNS data can also provide detection of
unknown domains, malicious domains and temporary domains.
62 63
NETWORK DATA
NETWORK ACCESS
CONTROL (NAC)
Use Cases: Security & Compliance
Examples: Aruba ClearPass, Cisco ACS
64 65
NETWORK DATA
NETWORK SWITCHES
Use Cases: IT Operations, Security & Compliance
Examples: Ethernet Switch, Virtual Switches
Switches are network intersections, places where packets move Use Cases:
from one network segment to another. In their purest form,
switches work within a particular IP subnet and can’t route Layer IT Ops: Operations teams use switch logs to see the state of traffic
3 packets to another network. Modern data center designs flow, such as source and destination, class of service and causes
typically use a two-tier switch hierarchy: top-of-rack (ToR) of congestion. Logs can show traffic statistics in the aggregate,
switches connecting servers and storage arrays at the edge, by port and by client, and whether particular ports are congested,
and aggregation or spine switches connecting to the network failing or down.
core. Although ethernet switches are far more widespread, some
organizations also use fiber channel or infiniband for storage Security & Compliance: Switch data, often captured as NetFlow
area networks or HPC interconnects, each of which has its own records, is a critical data source for flagging advanced persistent
type of switch. threats, analyzing traffic flows for unusual activity and identifying
potential data exfiltration. As a wire-level data source, switch
statistics are almost impossible to spoof and thus a crucial source
of security data. This data can also be used to correlate users or IP
addresses to a physical network location.
66 67
NETWORK DATA
NETWORK ROUTERS
Use Cases: IT Operations, Security & Compliance
Examples: Routers from Cisco, Juniper, Linksys, Arista,
Extreme Networks, Avaya
If switches are network intersections, then routers are the signal Use Cases:
lights and traffic cops—the devices responsible for ensuring
that traffic goes to the right network segment. Unlike switches IT Ops: Network engineers use router logs and statistics to
that operate at Layer 2, routers work at Layer 3, directing traffic monitor traffic flow and ensure that traffic is being correctly
based on TCP/IP address and protocol (port number). Routers forwarded between network segments. Data from routing
are responsible for particular Layer 3 address spaces and manage protocol updates can show whether your routers are appropriately
traffic using information in routing tables and configured policies. exchanging route tables with other locations, that external traffic
Routers exchange information and update their forwarding tables can reach you, and that internal traffic is correctly forwarded to
using dynamic routing protocols. external routers.
68 69
NETWORK DATA
NETWORK PROTOCOLS
Use Cases: IT Operations, Security & Compliance
Examples: HTTP, Cisco NetFlow, Ntop, Flow-tools, FlowScan,
EHNT, BPFT
Network protocols describe the structure of data that flows Use Cases:
through networks. In most cases, network ports are assigned to
specific protocols for both security and performance reasons. IT Ops: Network protocol traffic analysis can help determine
Some protocols operate at a lower level of the computing stack the network’s role in overall availability and performance of
and are used to direct packet routing, such as TCP, UDP or IP. critical services. Application traffic can be monitored for usage,
Other protocols, such as HTTP, HTTPS and TNS describe how performance and availability, and can provide visibility into
packets are structured for applications – such as web services, specific user data. For applications that cannot be instrumented
databases and a wide range of client-based applications. By on the servers, network traffic may be the only way to acquire
capturing, decrypting and analyzing network protocol data, performance data.
you can better understand the kinds of applications, their
usage, performance and even payload (content of the data) Security & Compliance: Network protocols are an important
of applications. Since this data can be gathered directly from source for identifying advanced persistent threats, analyzing
a network tap, or with specialized software, it provides a traffic flows for unusual activity and identifying potential data
perspective on applications and how they interoperate that may exfiltration. Aggregating and analyzing flow records also can
not be otherwise available. show anomalous traffic patterns and flow destinations that
are indicative of a breach, such as an APT phoning home to a
command and control server for instructions, additional malware
code, or copying large amounts of data to an attacker’s system.
The data can also be used to detect traffic related to DDoS,
malicious domains, and unknown domains or locations.
70 71
NETWORK DATA
PROXIES
Use Cases: IT Operations, Security & Compliance
Examples: Blue Coat, Fortinet, Juniper IDP, Netscreen Firewall,
Palo Alto Networks, nginx
72 73
NETWORK DATA
VoIP
Use Cases: IT Operations, Security & Compliance
Examples: Asterisk CDR, Asterisk event, Asterisk messages
Voice over IP refers to several methods for transmitting real-time Use Cases:
audio and video information over an IP-based data network. Unlike
traditional phone systems using dedicated, point-to-point circuits, IT Ops: VoIP logs provide troubleshooting and usage data
VoIP applications use packet-based networks to carry real-time similar to that of other network applications. Details include
audio streams that are interspersed with other ethernet data source, destination, time and duration of calls, call quality metrics
traffic. Since TCP packets may be delivered out of order due to (e.g., packet loss, latency, audio fidelity/bit rate) and any error
data loss and retransmission, VoIP includes features to buffer and conditions. Integrating VoIP source/destination records with an
reassemble a stream. Similarly, VoIP packets are usually tagged employee database such as AD or LDAP and a DHCP database
with quality of service (QoS) headers to prioritize their delivery allows linking call records to actual people and IP addresses to
through the network. physical locations; information that can assist in troubleshooting
and billing.
74 75
OPERATING SYSTEM DATA
SYSTEM LOGS
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: Unix, Windows, Mac OS
76 77
OPERATING SYSTEM DATA
SYSTEM PERFORMANCE
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: PERFMON, Windows Events Logs, sar, vmstat, iostat
Measures of system activity such as CPU load, memory and disk Use Cases:
usage, and I/O traffic are the IT equivalent of EKGs to a doctor:
the vital signs that show system health. Recording these measures IT Ops & Application Delivery: Performance logs provide a
provides a record of system activity over time that shows normal, real-time indication of system health by showing resource usage
baseline levels and unusual events. By registering myriad system that, when compared with historical norms, flags performance
parameters, performance logs also can highlight mismatches problems. When measurements deviate from standard or typical
between system capacity and application requirements, such parameters, it’s a warning for IT admins to do further investigation.
as a database using all available system memory and frequently
swapping to disk. Security & Compliance: While primarily used for keeping
infrastructure up and running, monitoring system performance can
also be used to uncover potential security incidents by detecting
abnormal activity in performance. One example is abnormal
system resource usage in correlation with a security indication.
78 79
VIRTUAL INFRASTRUCTURE DATA
AMAZON WEB
SERVICES
Use Cases: IT Operations, Security & Compliance
Examples: CloudTrail, CloudWatch, Config, S3
AWS is the largest and most widely used public cloud Use Cases:
infrastructure, providing on-demand compute, storage, database,
big data and application services with consumption-based IT Ops: AWS services provide similar types of system and
pricing. AWS can be used to replace traditional enterprise virtual service data as traditional IT infrastructure, much of which is
server infrastructure in which software runs on individual virtual consolidated by the CloudWatch service. These include service
machines (VM) or to host cloud-native applications built from monitoring, alarms and dashboards for metrics, logs, and events
a collection of AWS services. AWS includes a host of service generated by other AWS resources and applications. Typical
management, automation, security, network and monitoring events and measures include when instances are instantiated
services used to deploy, scale, decommission, audit and administer and decommissioned, CPU usage, network traffic and storage
one’s AWS environment, subscriptions and hosted applications. consumption.
80 81
VIRTUAL INFRASTRUCTURE DATA
MICROSOFT AZURE
Use Cases: IT Operations, Security & Compliance
Examples: WADLogs, WADEventLogs, WADPerformanceCounter,
WADDiagnostInfrastructure
Azure is a popular and widely used public cloud infrastructure, Use Cases:
providing on-demand compute, storage, database, big data and
application services with consumption-based pricing. Azure IT Ops: Azure services provide detailed logs for monitoring one’s
can be used to replace traditional enterprise virtual server infrastructure across entire technology stack, VMs, containers,
infrastructure in which software runs on individual VMs, or to host storage and application services. The data is useful in maintaining
cloud-native applications built from a collection of Azure services. application delivery quality and service levels, measuring user
Azure includes a host of service management, automation, behavior, resource utilization and for capacity planning and cost
security, network and monitoring services used to deploy, scale, management.
decommission, audit and administer one’s Azure environment,
subscriptions and hosted applications. Security & Compliance: Security teams can use Azure service
logs to audit and attest to compliance with established policies.
Log data also is invaluable for incident forensic analysis, such
as identifying unauthorized access attempts from access
logs, tracking resources and configuration change events and
identifying vulnerabilities in hosts or firewalls.
82 83
VIRTUAL INFRASTRUCTURE DATA
VMware SERVER LOGS,
CONFIGURATION DATA AND
PERFORMANCE METRICS
Use Cases: IT Operations, Security & Compliance
Examples: vCenter, ESXi
VMware vSphere ESXi is the most commonly used enterprise and over 100 other metrics fall into this category. As with the
server virtualization platform. The VMware management inventory information, this information is not present in the
platform, whether one of the vSphere products, vCloud or log files and must be viewed through the vSphere client or
standalone hypervisor, produce a variety of data, fall into four
polled through the vSphere API.
main categories:
84 85
PHYSICAL INFRASTRUCTURE & IoT DATA
PHYSICAL CARD
READERS
Use Cases: Security & Compliance
86 87
PHYSICAL INFRASTRUCTURE & IoT DATA
SENSOR DATA
Use Cases: IT Operations, Security, Business Analytics, Internet of Things
Examples: Binary and numeric values including switch state, temperature,
pressure, frequency, flow, from MQTT, AMQP and CoAP brokers,
HTTP event collector
Industrial equipment, sensors and other devices often have Use Cases:
embedded processors and networking that allows them
to record and transmit a vast array of information about IT Ops: Some of the most important parameters for operations
operating conditions. Regardless of device, their data provides teams to monitor are environmental conditions such as
unprecedented detail about performance parameters and temperature, humidity, airflow and voltage regulation in a data
anomalies that can indicate larger problems—for example, a center. Similar readings are available from individual servers and
device ready to fail or issues with another system. Aggregating network equipment that, when correlated, can highlight problems
and correlating data from multiple devices and subsystems in the facility or equipment ready to fail.
provides a complete picture of equipment, system, factory or
building performance. Security & Compliance: Sensor data can help protect mission-
critical assets and industrial systems against cybersecurity threats
by providing visibility into system performance or set points that
could put machines or people at risk. Data can also be used to
satisfy compliance reporting requirements.
Internet of Things:
88 89
PHYSICAL INFRASTRUCTURE & IoT DATA
SERVER LOGS
Use Cases: IT Operations, Security & Compliance, Application Delivery
90 91
PHYSICAL INFRASTRUCTURE & IoT DATA
BACKUP
Use Cases: IT Operations
Despite the use of data replication to mirror systems, databases Use Cases:
and file stores, data backup remains an essential IT function by
providing for long-term, archival storage of valuable information, IT Ops: Backup systems routinely log activity and system
much of which has legal and regulatory requirements regarding conditions, recording information such as job history, error
its preservation. Backups also can be used to store multiple conditions, backup target and a detailed manifest of copied files
versions of system images and data, allowing organizations to or volumes. This data allows operations teams to monitor the
reverse changes, accidental deletions or corrupted data quickly, health of backup systems, software and jobs; triggers alerts in the
restoring the system or database to a known good state. Backup case of errors; and assists in debugging backup failures. It also
software can use different types of storage media depending on allows teams to locate where specific data may be stored, when a
the likelihood of needing the data: external disks or virtual tape recovery is required.
libraries for active data and tape, optical disks or a cloud service
for long-term storage.
92 93
PHYSICAL INFRASTRUCTURE & IoT DATA
STORAGE
Use Cases: IT Operations
Examples: EMC, Netapp, IBM
Data center storage is provisioned in two general ways: built into Use Cases:
servers and shared using various network storage protocols, or
via a dedicated storage array that consolidates capacity for use IT Ops: Shared storage logs record overall system health (both
by multiple applications that access it using either a dedicated hardware and software), error conditions (such as a failed
storage area network (SAN) or ethernet LAN file-sharing controller, network interface or disks) and usage (both capacity
protocol. The activity of internal, server-based storage is typically used per volume and file or volume accesses). Collectively, the
recorded in system logs, however storage arrays have internal information can alert operations teams to problems, the need for
controllers/storage processors that run a storage-optimized more capacity and performance bottlenecks.
OS and log a plethora of operating, error and usage data. Since
many organizations have several such arrays, the logs often are
consolidated by a storage management system that can report on
the aggregate activity and capacity.
94 95
PHYSICAL INFRASTRUCTURE & IoT DATA
MAINFRAME
Use Cases: IT Operations, Security & Compliance
Mainframes are the original business computer: large, centralized Use Cases:
systems housing multiple processors, system memory (RAM)
and I/O controllers. Despite their 60-year legacy, mainframes IT Ops: Like other servers, mainframes measure and log numerous
still are widely used for mission-critical applications, particularly system parameters that show their current status, configuration
transaction processing. Although they usually run a proprietary and overall health. Since most mainframe subsystems are
OS, mainframes also can be virtualized to run Unix and Linux or, redundant, system logs also show non-disruptive hardware failures
with add-on processor cards, Windows Server. Mainframes are or anomalous behavior that is predictive of an impending failure.
valued for their bulletproof reliability and security, using highly Due to their use for critical applications, mainframes often record
redundant hardware and resilient, stringently tested software. application performance data such as memory usage, I/O and
As such, they appeal to organizations wanting to consolidate transaction throughput, processor utilization and network activity.
workloads onto a small number of systems and that need the
added reliability and versatility. Security & Compliance: Mainframes contain critical operational
data. In a security context, mainframe data is treated like any
other enterprise data that requires visibility and monitoring for
data confidentiality and integrity, compliance and audits with
regulatory requirements, and for access monitoring.
96 97
PHYSICAL INFRASTRUCTURE & IoT DATA
PATCH LOGS
Use Cases: IT Operations, Security & Compliance
Keeping operating systems and applications updated with the Use Cases:
latest bug fixes and security patches is an essential task that can
prevent unplanned downtime, random application crashes and IT Ops: Operations teams use patch logs to verify the timely and
security breaches. Although commercial apps and operating correct application of scheduled patches, identify unpatched
systems often have embedded patching software, some systems and applications, and alert to errors in the patching
organizations use independent patch management software process. Correlating errors to patch logs can indicate when an
to consolidate patch management and ensure the consistent error is due to a patch.
application of patches across their software fleet and to build
patch jobs for custom, internal applications. Security & Compliance: Security teams can use patch logs to
monitor system updates and determine which assets could be at
Patch management software keeps a patch inventory using a risk, due to failed or out-of-date patches.
database of available updates and can match these against an
organization’s installed software. Other features include patch
scheduling, post-install testing and validation and documentation
of required system configurations and patching procedures.
98 99
PHYSICAL INFRASTRUCTURE & IoT DATA
TELEPHONY
Use Cases: IT Operations
Examples: Cisco Unified Communications Manager, Shoretel, Twilio
100 101
PHYSICAL INFRASTRUCTURE & IoT DATA
POINT-OF-SALE SYSTEMS
(POS)
Use Cases: Internet of Things, Business Analytics, Security & Compliance
Examples: IBM, LightSpeed, NCR, Revel Systems, Square, Toshiba, Vend
Point-of-sale (POS) systems are most often associated with Business Analytics: POS system contain information about what’s
transactions generated at a retail outlet. However, thanks to the sold, how it’s paid for, as well as the pace at which it’s being sold.
rise of mobile POS solutions, many of these systems are starting to Organizations can use this data to monitor revenue in real time,
be deployed in temporary locations, such as a community fair or a which can feed into how to better market 1:1 against customers,
high school event. track product placement and sales in a store, or detect potentially
fraudulent transactions in real time. This type of real-time big
The typical POS system incorporates a cash register based on data analysis can have profound impact on cross- and up-sell
a PC or embedded system, monitor, receipt printer, display, opportunities. POS data also delivers visibility into the customer
barcode scanner and debit/credit card reader. Machine data experience, such as which coupons are most popular or the
generated by POS systems provides organizations with real-time combinations of products that are selling together. When enriched
insight into everything from what’s sold, to the amount of cash with geolocation data, it can also drive valuable insights into
being generated per transaction, to what payment methods are location-based analytics.
being used.
Security & Compliance: POS systems are typically used for
financial transactions and are often targeted since they contain
Use Cases: account, payment and financial information. Because the POS
transaction information is highly sought after for its value to
Internet of Things: Historically, POS systems were either not
attackers, and the POS can be used as an entry point to the
connected or managed on a dedicated private network. Thanks
network, it’s critical to protect these systems. Furthermore, POS
to the rise of the Internet of Things (IoT), these systems are
systems are usually unmanned, run an underlying operating
being connected directly to cloud platforms that make remotely
system, and versioning/monitoring typically fall outside of IT’s
administering these devices from a central location much simpler.
purview – adding additional complexity to their security. Visibility
There’s no longer a need to dispatch IT personnel to manually
and analysis of POS systems and data can provide insights that
update each system. This is critical because a POS failure can
are critical to protecting financial information, detecting fraud and
result in longer lines that inconvenience customers and potentially
securing vulnerabilities.
lead to lost revenue. A negative customer experience can easily
translate to customers opting to shop somewhere else in a retail
industry that is intensely competitive.
102 103
PHYSICAL INFRASTRUCTURE & IoT DATA
RFID/NFC/BLE
Use Cases: Internet of Things, Business Analytics
Examples: Alien Technology, BluVision, Check Point Systems, Gimbal, MonsoonRF,
Radius Networks, STMicroelectronics, TAGSYS RFID, ThingMagic
RFID, NFC and BLE are the three primary wireless methods Use Cases:
organizations use today to keep track of objects and interact with
customers in retail stores. NFC is a subset of RFID and is designed Internet of Things: RFID is arguably one of the first instances
to be a more secure form of data exchange, and allows devices of an Internet of Things (IoT) application. Deployed in place of
to communicate peer-to-peer. Common use cases of RFID are traditional barcode readers, RFID tags are used in everything from
asset tracking, inventory management, even attendee tracking. shipping to keeping track of farm animals. IoT deployments make
NFC is commonly used for contact-less payments, exchanging it possible to capture RFID data in way that makes it simpler to
information between two parties (such as smartphones), and even track events involving anything that has an attached RFID tag.
badge readers that unlock doors. Data insights from RFID can help improve overall supply chain,
order processing and inventory management.
104 105
PHYSICAL INFRASTRUCTURE & IoT DATA
SMART METERS
Use Cases: Internet of Things, Business Analytics
Examples: ABB, GE, Google, eMeter, IBM, Itron, Schneider Electric, Siemens
106 107
PHYSICAL INFRASTRUCTURE & IoT DATA
TRANSPORTATION
Use Cases: Internet of Things, Business Analytics
Examples: Boeing, BMW, Ford, GE, General Motors, Daimler-Benz,
John Deere, Volkswagen
Vehicles of all sizes and types generate massive amounts of Use Cases:
machine data. This data can be used to gain real-time visibility into
the health and performance of the vehicle and to drive predictive Internet of Things: Vehicle manufacturers are attaching sensors to
maintenance applications. Armed with that data, an airplane or every mechanical and electronic component they use. This allows
automobile manufacturer can follow a maintenance regime that is companies to gain a unified view of assets to quickly identify
more data driven than driven “by the book.” and diagnose operational issues and to monitor, track and avoid
unplanned asset downtime. This helps to ensure that equipment
is operating as intended. Manufacturers can also detect anomalies
That information can then be used to improve availability and
and deviations from normal behavior to take corrective action –
reliability, and extend the lifecycle of a vehicle that has not been
improving uptime, asset reliability and longevity.
extensively used or, conversely, replace components that have
seen extensive wear and tear sooner.
Business Analytics: With access to machine data, vehicle
manufacturers are applying analytics in ways that fundamentally
change their business models. Instead of selling a vehicle,
manufacturers increasingly prefer to lease vehicles based on
actual usage. The longer that vehicle can be used between repairs,
the more profitable that leasing service becomes. The key to
providing this type of service economically is advanced analytics,
which are applied to all the aggregate data that’s collected.
108 109
PHYSICAL INFRASTRUCTURE & IoT DATA
MEDICAL DEVICES
Use Cases: Internet of Things, Business Analytics, Security & Compliance
Examples: Abbot Laboratories, Apple, Baxter, Boston Scientific, GE,
Siemens, St. Jude Medical
110 111
PHYSICAL INFRASTRUCTURE & IoT DATA
ENVIRONMENTAL
SENSORS
Use Cases: Internet of Things, Business Analytics
Examples: Bosch Sensortec, Mouser Electronics, Raritan, Schneider Electric,
TSI, Vaisala
112 113
PHYSICAL INFRASTRUCTURE & IoT DATA
INDUSTRIAL CONTROL
SYSTEMS (ICS)
Use Cases: Internet of Things, Business Analytics, Security & Compliance
Examples: ABB, Emerson Electric, GE, Hitachi, Honeywell, Rockwell Automation,
Siemens, Toshiba
114 115
PHYSICAL INFRASTRUCTURE & IoT DATA
WEARABLES
Use Cases: Internet of Things, Business Analytics
Examples: ARM, Intel, Lenovo, Microsoft, Samsung
116 117
ADDITIONAL DATA SOURCES
DATABASE
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: MySQL, Postgres, Other Relational Databases
118 119
ADDITIONAL DATA SOURCES
THIRD-PARTY LISTS
Use Cases: Security & Compliance
Examples: Threat Lists, OS Blacklist, IP Blacklists, Vulnerability Lists,
Google Analytics
One of the methods that IT security vendors use to detect and Use Cases:
flag security problems is one or more database of known threats
and vulnerabilities. These include malware code signatures, OS Security & Compliance: By aggregating data from users around
and application patch versions, the source IP address of previous the world, third-party security lists provide security teams with
attacks and spam and reputation databases using real-time real-time information about nascent threats and vulnerabilities
aggregation of malware, spam and compromised websites that allow updating security policies, firewall rules and vulnerable
collected from millions of users. Third-party lists provide an early- software before an attack. Lists also are used to identify known
warning system for new methods or sources of attack. sources of spam, both commercial and malware-infested, to
improve the effectiveness of filters on internal email systems.
120 121
ADDITIONAL DATA SOURCES
SOCIAL MEDIA FEEDS
Use Cases: IT Operations
Social networks are some of the most heavily trafficked sites Use Cases:
on the internet. By allowing users to communicate and share
information among friends and colleagues, social media has IT Ops: Due to their interactivity, convenience and ubiquity,
become an important outlet for news, entertainment, photo- social media feeds provide organizations with an unfiltered and
sharing and real-time reaction to public events. As such, social instantaneous view of customer opinion. By analyzing feeds from
media feeds are an increasingly effective advertising medium and the most popular sites, organizations can quickly identify potential
source of customer contact, feedback and support. problems with a product or service, mishandled customer support
incidents or other sources of customer dissatisfaction about an
organization’s products or online presence. Proactively addressing
these online complaints allows the organization to turn unhappy
and potentially lost customers into delighted and loyal ones.
122 123
ADDITIONAL DATA SOURCES
HUMAN RESOURCES
Use Cases: Security & Compliance
Examples: BambooHR, Fairsail HRMS, Namely, Zenefits
124 125
ADDITIONAL DATA SOURCES
BUSINESS SERVICE
TRANSACTION & BUSINESS
SERVICE PERFORMANCE DATA
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: Payments Status, Batch Upload Status, Customer Order Status
Transaction records provide an auditable trail of activity for every Use Cases:
part of every business process. Whether for financial transactions
such as payments and orders, or tasks such as customer support IT Ops & Application Delivery: IT can use process logs to identify
and service calls, business process logs are required to verify flaws in their support or admin processes, or problems that have
activity in case of disputes, to certify compliance with regulations fallen through gaps in existing process flows.
and terms of service, and to provide detailed evidence of business
transactions. A technique called business process mining uses Security & Compliance: Hackers are good at covering their tracks
sophisticated software to analyze logs and identify process, by altering common log files, but business process logs that track
control, data, organizational and social structures. These might activity across multiple systems used in a particular process can
include mapping the flow of patients through a hospital or highlight anomalies that may indicate security issues.
customer problems through a support organization to optimize
process flow, measure performance and identify outlier incidents
for further investigation.
126 127
p-shopping.com/category.screen?category_id=GIFTS” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
317 27.160.0.0 - - [07/Jan 18:10:56:156] “GET /oldlink?item_id=EST-26&JSESSIONID=SD5SL9FF1ADFF3
1.1” 200 1318 “http://buttercup-shopping.com/cart.do?action=purchase&itemId=EST-26&product_id=K9-
” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)” 468 125.17.14.100
07/Jan 18:10:56:147] “POST /category.screen?category_id=SURPRISE&JSESSIONID=SD9SL4FF4ADFF7 HTTP
BK-Splunk-Essential-Guide-to-Machine-Data-101
© 2017 Splunk Inc. All rights reserved. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data,Splunk Cloud, Splunk
200 2423 “http://buttercup-shopping.com/cart.do?action=addtocart&itemId=EST-16&product_id=RP-
” “Opera/9.20 (Windows NT 6.0; U; en)” 564 130.253.37.97 - - [07/Jan 18:10:55:189] “GET /cart.
tion=changequantity&itemId=EST-18&product_id=AV-CB-01&JSESSIONID=SD5SL7FF6ADFF10 HTTP 1.1” 404
“http://buttercup-shopping.com/oldlink?item_id=EST-18” “Opera/9.20 (Windows NT 6.0; U; en)” 766
Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries.
53.37.97 - - [07/Jan 18:10:55:187] “GET /oldlink?item_id=EST-6&JSESSIONID=SD10SL8FF2ADFF9 HTTP