Splunk Course Notes
Splunk Course Notes
Start - 30/11/2021
Intro:
4. Next
Tab
Use stats command as per below define a count on specific fields from
multiple visuals
Under visualisations, you can also opt for ‘SINGLE VALUE’ which is a
Status=error
So you can edit the theme on the dashboard etc, save / refresh and so on
SPLUNK COMPONENTS
- Ingests data
- Forwarder
2 types of forwarders:
to target
- Indexer
Management Components:
- Monitoring console
- Deployment server
MANAGEMENT INTERFACE
validate licencing
matter of Configuration?
LICENCE MANAGEMENT IN SPLUNK
>
Licence Types:
data stored
STANDARD licence:
ENTERPRISE TRIAL
Installs with the product – limited to 5oomb per day. Valid for 60days
SALES TRIAL
Setup a POC – SO THEY CAN SIZE A TEMP LICENCE AND SEE HOW
DEV TEST
FREE LICENCE
INDUSTRIAL IOT
FORWARDER
From version 6.5 – Enterprise version does not disable search if you
DISTRIBUTED LICENCING:
Ideally:
- Setup a licence master – then have all of your splunk instances talk
STACK
Licence POOLS are created from the licence STACKS. Stacks are made
pool
of (1) licence group, and only (1) group can be active at a point in time
You can have multiple conf files (even with the same name), which
Inputs.conf
Can set host values for source, which indexers to use to store
events
Props.conf
/bin – binaries and commands which you can execute from the CLI
/var /lib /splunk contain index files and other important splunky stuff
apps/users
precedence
Whats inside a conf file?
Indexes are a repository of Events which come built in, OR you can
1. EVENT
2. METRICS
- COLD – moved from warm – can have many – cold data is data
GLOBAL:
PER INDEX:
See admin/Indexesconf document for all options regarding these settings
PER PROVIDER:
Family values take precedence if the same options are specified in PER
PROVIDER
(demo notes) –
- Settings/Index/New Index
Authentication Mgmt
3 types of authentication
LDAP defines the protocol to authenticate to, access and update objects
Example:
LDAP integration can be done via Splunk web OR edit the
authentication.conf file
controller
USER settings
User base DN
Username Attrib
Email attrib
GROUP settings
Group base DN
There is also the Splunk native authenticatin steps where you create a
user group, then add capability and then link this to a user
do. 4 types of roles in splunk. Roles can be edited etc using the GUI or
ELSE
Add Users
metadata like hostname/type etc – It does not actually look at the data
at this stage
- FIFO queues
- Scripted inputs – e.g. from apis
- Modular inputs
- Through an app
- Splunk Web
wizard
and transforms)
onto disk
- Start the UF
To configure receiving
- SEARCH HEADS
below
Scaling Options
By adding components to each tier we can scale horizontally
installed on all
Notes:
- Firewalls setup
MEMBER
1. Setup deployer
Locate/edit server.conf file in Program files/splunk/etc/system/local
directory
STAGING DATA
Windows sources
metadata
capability
2. CLI
3. Config files
4. Deployment server
INTERMEDIATE FORWARDERS
forwarder
MULTIPLE PIPELINE SETS
- Save
Add new
Host = add the DNS or IP for the search head instance like this:
192.168.1.149:<port>9997
Save
Click review
Click submit
You can also tell forwarder to index data locally
DEPLOYMENT servers:
- Indexer clusters – you can use DS to update the master node only
below
DEPLOYMENT APPS
DEPLOYMENT CLIENTS
3 options available
MONITOR
locally
MONITORNOHANDLE
UPLOAD
Restrictions:
BATCH will ingest the file, index, then delete the file
Selection type of file to monitor e.g. files & Directories – browse and
For remote monitoring – it can be done via the heavy forwarder using
- TCP is recommended
- SPLUNK CLOUD will only accept data from forwarders with SSL
certificate
Scripted Inputs
- Click Next
- Select source type = syslog
- Review/Submit
You have some default scripts or you can choose ‘New Local script’
- Event logs
- PerfMon
- Registry
- WMI
- Active Directory
Set up for Windows – can use splunk app for Windows named INF
HTTP EVENT COLLECTOR (HEC)
Like below command using curl: Notes on the token value are on next
page
Setting up the HEC:
Click Next
Make changes as per next screenshot before clicking ‘Review’ & Submit
You then get a token value
username/password
Remember the next settings changes: Select allowed Indexes e.g. main
Quiz note:
All of the above is the answer
Quiz notes:
data in an event
- What is the default host value – it is the DNS name of the machine
How does Splunk determine event bouncaries – how does it split data
4 steps:
Last resort is current system time, at the point of indexing, for each
event
USING DATA PREVIEW – just lets you view events as they are created
content
2 main methods to
- Transform
- Route
- Mask
Heres an example
See regexr.com – useful for helping build regex commands
masking parameters
- need edits to
(REGEX)
transforms.conf