SlideShare ist ein Scribd-Unternehmen logo
1 von 96
Downloaden Sie, um offline zu lesen
Copyright	©	2014	Splunk	Inc.
Machine	Data	101:	
Turning	Data	into	Insight
Audience	Version
Agenda
§ Non-Traditional	Data	Sources
§ Data	Enrichment
§ Level	Up	on	Search	and	Reporting	Commands
§ Data	Models	and	Pivot
§ Advanced	Visualizations	and	the	Web	Framework
2
Non-Traditional
Data	Sources
Non-Traditional	Data	Sources
§ Network	Inputs
§ HTTP	Event	Collector
§ Log	Event	Alert	Action
§ Splunk	App	for	Stream
§ Scripted	Inputs
§ Database	Inputs
§ Splunk	ODBC	Driver
§ Modular	Inputs
§ zLinux Forwarder
§ MINT
§ Non-Splunk	Datastores
4
Traditional	Data	Sources
§ Captures	events	from			log	files			in	real	time
§ Runs	scripts	to	gather	system	metrics,	connect	
to	APIs	and	databases
§ Listens	to	syslog and	gathers	Windows	events	
§ Universally	indexes	any	data	format	so	it	
doesn’t	need	adapters
5
Windows
• Registry
• Event	logs
• File	system
• sysinternals
Linux/Unix
• Configurations
• Syslog
• File	system
• Ps,	iostat,	top
Virtualization
• Hypervisor
• Guest	OS
• Guest	Apps
Applications
• Web	logs
• Log4J,	JMS,	JMX
• .NET	events
• Code	and	scripts
Databases
• Configurations
• Audit/query	logs
• Tables
• Schemas
Network
• Configurations
• syslog
• SNMP
• netflow
Network	Inputs
§ Collect	data	over	any	UDP	or	TCP	port
§ Some	devices	only	send	data	over	a	network	port
§ Best	Practice:	use	syslog-ng or	rsyslog
§ Offers	persistence
§ Categorizes	data	by	host
6
HTTP	Event	Collector	(HEC)
§ Collect	data	over	HTTP	or	HTTPS	directly	to	Splunk
§ Application	Developer	focus	– few	lines	of	code	in	app	
to	send	data
§ HEC	Features	Include:
§ Token-based,	not	credential	based
§ Indexer	Acknowledgements	– guarantees	data	indexing
§ Raw	and	JSON	formatted	event	payloads
§ SSL,	CORS	(Cross	Origion access),	and	Network	Restrictions
7
Log	Event	Alert	Action
§ Use	Splunk	alerting	to	index	a	custom	log	event
§ Splunk	searchable	index	of	custom	alert	events
§ Configurable	Features	Include:
§ Host
§ Source
§ Sourcetype
§ Index
§ Event	text	– construct	the	exact	syntax	of	the	log	event,	
including	any	text,	tokens,	or	other	information
8
The	Splunk	App	for	Stream
Wire	Data	Enhances	the	Platform	for	
Operational	Intelligence
Efficient,	Cloud-ready	Wire	Data	Collection
Simple	Deployment	Supports	Fast	Time	to	Value
9
Stream	=	Better	Insights	for	*
Solution	Area Contextual	Data Wire	Data Enriched View
Application	
Management
application	logs,	
monitoring	data,	
metrics,	events
protocol	conversations	on	
database	performance,	DNS	
lookups,	client	data,	business	
transaction	paths…
Measure	application	response	
times,	deeper	insights	for	root-
cause	diagnostics,	trace	tx
paths,	establish	baselines…
IT Operations application	logs,	
monitoring	data,	
metrics,	events
payload	data	including	process	
times,	errors,	transaction	
traces,	ICA	latency,	SQL	
statements,	DNS	records…
Analyze	traffic	volume,	speed	
and	packets	to	identify	
infrastructure	performance	
issues,	capacity	constraints,	
changes;	establish	baselines…
10
Stream	=	Better	Insights	for	*
Solution	Area Contextual	Data Wire	Data Enriched View
Security app	+	infra	logs,	
monitoring	data,	
events
protocol	identification,	
protocol	headers,	content	
and	payload	information,	
flow	records
Build	analytics	and	context	for	
incident	response,	threat	
detection,	monitoring	and	
compliance
Digital	
Intelligence
website	activity,	
clickstream	data,	
metrics
browser-level	customer	
interactions
Customer	Experience – analyze	
website	and	application	bottlenecks	to	
improve	customer	experience	and	
online	revenues
Customer	Support	(online,	call	center)	
– faster	root	cause	analysis	and	
resolution	of	customer	issues	with	
website	or	apps
11
Scripted	Inputs
12
§ Send	data	to	Splunk	via	a	custom	script
§ Splunk	indexes	anything	written	to	stdout
§ Splunk	handles	scheduling
§ Supports	shell,	Python	scripts,	WIN	batch,	PowerShell
§ Any	other	utility	that	can	format	and	stream	data
Streaming	Mode
§ Splunk	executes	script	and	indexes	stdout
§ Checks	for	any	running	instances
Write	to	File	Mode
§ Splunk	launches	script	which	produces	
output	file,	no	need	for	external	scheduler
§ Splunk	monitors	output	file
Use	Cases	for	Scripted	Inputs
13
§ Alternative	to	file-base	or	network-based	inputs
§ Stream	data	from	command-line	tools,	such	as	vmstat and	iostat
§ Poll	a	web	service,	API	or	database	and	process	the	results
§ Reformat	complex	or	binary	data	for	easier	parsing	into	events	and	fields
§ Maintain	data	sources	with	slow	or	resource-intensive	startup	
procedures
§ Provide	special	or	complex	handling	for	transient	or	unstable	inputs
§ Scripts	that	manage	passwords	and	credentials
§ Wrapper	scripts	for	command	line	inputs	that	contain	special	characters
Database	Inputs
§ Create	value	with	structured	data
§ Enrich	search	results	with	additional	
business	context
§ Easily	import	data	for	deeper	analysis
§ Integrate	multiple	DBs	concurrently
§ Simple	set-up,	non-invasive	and	secure
DB	Connect	provides	reliable,	scalable,	
real-time	integration	between	Splunk	
and	traditional	relational	databases
14
Configure	Database	Inputs
15
§ DB	Connect	App
§ Real-time,	scalable	integration	with	relational	DBs
§ Browse	and	navigate	schemas	and	tables	before	data	import
§ Reliable	scheduled	import
§ Seamless	installation	and	UI	configuration
§ Supports	connection	pooling	and	caching
§ “Tail”	tables	or	import	entire	tables
§ Detect	and	import	new/updated	rows	using	timestamps	or	unique	IDs
§ Supports	many	RDBMS	flavors
§ AWS	RDS	Aurora,	AWS	RedShift,	IBM	DB2	for	Linux,	Informix,	MemSQL,	MS	SQL,	MySQL,	
Oracle,	PostgreSQL,	SAP	SQL	Anywhere	(aka	Sybase	SA),	Sybase	ASE	and	IQ,	Teradata
Splunk	ODBC	Driver
16
§ Interact	with,	manipulate	and	visualize	machine	data	in	
Splunk	Enterprise	using	business	software	tools
§ Leverage	analytics	from	Splunk	alongside	Microsoft	Excel,	
Tableau	Desktop	or	Microstrategy Analytics	Desktop
§ Industry-standard	connectivity	to	Splunk	Enterprise
§ Empowers	business	users	with	direct	and	secure	access	
to	machine	data
§ Combine	machine	data	with	structured	data	for	better	
operational	context
ODBC:	How	it	Works
17
Modular	Inputs
18
§ Create	your	own	custom	inputs
§ Scripted	input	with	structure	and	intelligence
§ First	class	citizen	in	the	Splunk	management	interface
§ Appears	under	Settings	>	Data	Inputs
§ Benefits	over	simple	scripted	input
§ Instance	control:	launch	a	single	or	multiple	instances
§ Input	validation
§ Support	multiple	platforms
§ Stream	data	as	text	or	XML
§ Secure	access	to	mod	input	scripts	via	REST	endpoints
Example	Modular	Inputs
19
Twitter
§ Stream	JSON	data	from	a	Twitter	source	to	Splunk	using	Tweepy
Amazon	S3	Online	Storage
§ Index	data	from	the	Amazon	S3	online	storage	web	service
Java	Messaging	Service	(JMS)
§ Poll	message	queues	and	topics	through	JMS	Messaging	API
§ Talks	to	multiple	providers:	MQSeries (Websphere MQ),	ActiveMQ,	
TibcoEMS,	HornetQ,	RabbitMQ,	Native	JMS,	WebLogic JMS,	Sonic	MQ
Splunk	Windows	Inputs
§ Retrieve	WIN	event	logs,	registry	keys,	perfmon counters
More	Modular	Inputs
20
zLinux Forwarder
21
§ Easily	collect	and	index	data	on	IBM	mainframes
§ Collect	application	and	platform	data
§ Download	as	new	Forwarder	distribution	for	s390x	Linux
Extend	Operational	Intelligence	to	Mobile	Apps
22
Deliver	Better	
Performing,	More	
Reliable	Apps	
Deliver	Real-Time	
Omni-Channel	
Analytics
End-to-End	
Performance	and	
Capacity	Insights
Monitor	App	Usage	and	Performance
• Improve	user	retention	by	quickly	
identifying	crashes	and	
performance	issues
• Establish	whether	issues	are	
caused	by	an	app	or	the	network(s)	
• Correlate	app,	OS	and	device	type	
to	diagnose	crash	and	network	
performance	issues	
23
Integrated	Analytics	Platform	for	Diverse	Data	Stores
Full-featured,	
Integrated	
Product
Fast	Insights	
for	Everyone
Works	with	
What	You	
Have	Today
Explore Visualize Dashboard
s
ShareAnalyze
Hadoop	Clusters NoSQL	and	Other	Data	Stores
Hadoop Client	Libraries Streaming	Resource	Libraries
Bi-directional	
Integration	
with	Hadoop
Connect	to	NoSQL	and	Other	Data	Stores
• Build	custom	streaming	resource	
libraries
• Search	and	analyze	data	from	
other	data	stores	in	Hunk
• In	partnership	with	leading	
NoSQL	vendors
• Use	in	conjunction	with	DB	
Connect	for	relational	database	
lookups
Virtual	Indexes
§ Enables	seamless	use	of	
almost	the	entire	Splunk	
stack	on	data
§ Automatically	handles	
MapReduce
§ Technology	is	patent	
pending
Data	Enrichment
Agenda
§ Tags – categorize	and	add	meaning	to	data
§ Field	Aliases – simplify	search	and	correlation
§ Calculated	Fields – shortcut	complex/repetitive	computations
§ Event	Types – group	common	events	and	share	knowledge
§ Lookups – augment	data	with	additional	external	fields
28
§ Adds	inline	meaning/context/specificity	to	raw	data
§ Used	to	normalize	metadata	or	raw	data
§ Simplifies	correlation	of	multiple	data	sources
§ Created	in	Splunk
§ Transferred	from	external	sources
What	is	Data	Enrichment?
29
§ Add	meaning/context/specificity	to	raw	data
§ Labels	describing	team,	category,	platform,	geography
§ Applied	to	field-value	combination
§ Multiple	tags	can	be	applied	for	each	field-value
§ Case	sensitive
Tags
30
Create	Tags
31
§ Search	events	with	tag	in	any	field
§ Search	events	with	tag	in	a	specific	field
§ Search	events	with	tag	using	wildcards
Find	the	Web	Servers
Tags	in	Action
32
tag=webserver
tag::host=webserver
tag=web*
§ Tag	the	host	as	
webserver
§ Tag	the	sourcetype	
as	web
1
2
3
4
5
§ Normalize	field	labels	to	simplify	search	and	correlation
§ Apply	multiple	aliases	to	a	single	field
§ Example:	Username	|	cs_username |	User	à user
§ Example:	c_ip |	client	|	client_ip à clientip
§ Processed	after	field	extractions	+	before	lookups
§ Can	apply	to	lookups
§ Aliases	appear	alongside	original	fields
Field	Aliases
33
Re-Label	Field	to	Intuitive	Name
Create	Field	Alias
34
1
2
3
§ Create	field	alias	of	clientip	=	customer
§ Search	events	in	last	15	minutes,	find	
customer	field
§ Field	alias	(customer)	and	original	field	
(clientip)	are	both	displayed
Search	using	an	Intuitive	Field	Name
Field	Alias	in	Action
35
1
3
2
sourcetype=access_combined
§ Shortcut	for	performing	
repetitive/long/complex	
transformations	using	
eval	command
§ Based	on	extracted	or	
discovered	fields	only
§ Do	not	apply	to	lookup	or	
generated	fields
Calculated	Fields
36
Compute	Kilobytes	from	Bytes
Create	Calculated	Field
37
1
2
1
2
3
§ Create	kilobytes	=	bytes/1024
§ Search	events	in	last	15	minutes	for	
kilobytes	and	bytes
Search	Using	Kilobytes	instead	of	Bytes
Calculated	Fields	in	Action
38
1
2
sourcetype=access_combined
§ Classify	and	group	common	events
§ Capture	and	share	knowledge
§ Based	on	search
§ Use	in	combination	with	fields	and	tags	to	define	
event	topography
Event	Types
39
§ Best	Practice:	Use	punct	field
§ Default	metadata	field	describing	event	structure
§ Built	on	interesting	characters:	",;-#$%&+./:=?@'|*nr"(){}<>[]^! »
§ Can	use	wildcards	
Create	Event	Types
40
event punct
####<Jun	3,	2014	5:38:22	PM	MDT>	<Notice>	
<WebLogicServer>	<bea03>	<asiAdminServer>	
<WrapperStartStopAppMain>	<>WLS	Kernel<>	<>	
<BEA-000360>	<Server	started	in	RUNNING	mode>
####<_,__::__>_<>_<>_<>_<>_<>_
172.26.34.223	- - [01/Jul/2005:12:05:27	-0700]	
"GET	/trade/app?action=logout	HTTP/1.1"	200	2953
..._-_-_[:::_-]_"_?=_/."__
§ Show	punct	for	sourcetype=access_combined
§ Pick	a	punct,	then	wildcard	it	after	the	timestamp
§ Add	NOT	status=200
§ Save	as	“bad”	event	type	+	Color:red	+	Priority:1	(shift	
reload	in	browser	to	show	coloring)
Classify	Events	as	Known	Bad
Create	Event	Type
41
eventtype=bad
sourcetype="access_combined" punct="..._-_-_[//_:::]*" NOT status=200
1
2
3
4
Lookups	to	Enrich	Raw	Data
LDAP
AD
Watch
Lists
CRM/
ERP
CMDB
External	Data	Sources
Insight	comes	out
Data	goes	inCreate	additional	fields	
from	the	raw	data	with	
a	lookup	to	an	external	
data	source
§ Augment	raw	events	with	additional	fields
§ Provide	context	or	supporting	details
§ Translate	field	values	to	more	descriptive	data
§ Example:	add	text	descriptions	for	error	codes,	IDs
§ Example:	add	contact	details	to	user	names	or	IDs
§ Example:	add	descriptions	to	HTTP	status	codes
§ File-based	or	scripted	lookups
Lookups
43
44
1.	Upload/create	table
2.	Assign	table	to	lookup	object
3.	Map	lookup	to	data	set
Convert a Code into a Description
Configure a Static Lookup
§ Get	the	lookup	from	the	Splunk	Wiki	(save	to	.csv file)
http://wiki.splunk.com/Http_status.csv
§ Lookup	table	files	>	Add	new
§ Name:	http_status.csv (must	have	.csv file	extension)
§ Upload:	<path	to	.csv>
§ Verify	lookup	was	created	successfully
1.	Create	HTTP	Status	Table
45
| inputlookup http_status.csv
1
2
3
§ Lookup	definitions	>	Add	new
§ Name:	http_status
§ Type:	File-based
§ Lookup	file:	http_status.csv
§ Invoke	the	lookup	manually
2.	Add	Lookup	Definition
46
1
2
sourcetype=access_combined | lookup
http_status status OUTPUT status_description
§ Automatic	lookups	>	Add	new
§ Name:	http_status (cannot	have	spaces)
§ Lookup	table:	http_status
§ Apply	to:	sourcetype	=	access_combined
§ Lookup	input	field:	status
§ Lookup	output	field:	status_description
§ Verify	lookup	is	invoked	automatically
3.	Configure	Automatic	Lookup
47
1
2
sourcetype=access_combined
§ Temporal	lookups	for	time-based	lookups
§ Example:	Identify	users	on	your	network	based	on	their	IP	address	
and	the	timestamp	in	DHCP	logs
§ Use	search	results	to	populate	a	lookup	table
§ … | outputlookup <tablename|filename>
§ Call	an	external	command	or	script
§ Python	scripts	only
§ Example:	DNS	lookup	for	IP	ßà Host
§ Create	a	lookup	table	using	a	relational	database
§ Review	matches	against	a	database	column	or	SQL	query
Fancy	Lookups
48
§ Creating	and	Managing	Alerts	(Job	Inspector)
§ Macros
§ Workflow	Actions
More	Data	Enrichment
49
Level	Up	on	Search	&
Reporting	Commands
Agenda
§ Doing	more	with	basic	search	commands
§ Advanced	search	commands
§ Doing	more	with	basic	reporting	commands
51
Search	Syntax	Components
52
Anatomy	of	a	Search
53
Disk
§ top	– limit
§ rare	– same	options	as	top
§ timechart	– parameters
§ stats	– functions	(sum,	avg,	list,	values,	sparkline)
§ sort	– inline	ascending	or	descending
§ addcoltotals
§ addtotals
Doing	More	with	Basic	Search	Commands
54
§ Commands	have	parameters	or	qualifiers
§ top	and	rare	have	similar	syntax
§ Each	search	command	has	its	own	syntax	– show	inline	help
Find	Most	and	Least	Active	Customers
Using	the	top	+	rare	Commands
... | top limit=20 clientip
... | rare limit=20 clientip
IPs	with	the	
most	visits
IPs	with	the	
least	visits
§ Sort	inline	descending	or	ascending
56
... | stats count by clientip | sort - count
... | stats count by clientip | sort + count
Number	of	requests	by	
customer	- descending
Number	of	requests	by	
customer	- ascending
Sort	the	Number	of	Customer	Requests
Using	the	sort	Command
§ Show	Search	Command	Reference	Docs
§ Functions	for	eval	+	where
§ Functions	for	stats	+	chart	and	timechart
§ Invoke	a	function
§ Rename	inline
57
... | stats sum(bytes) by clientip | sort - sum(bytes)
... | stats sum(bytes) as totalbytes by clientip | sort - totalbytes
Total	payload	by	
customer	- descending
Total	payload	by	
customer	- ascending
Determine	Total	Customer	Payload
Using	functions	+	rename	command
§ List	all	values	of	a	field
§ List	only	distinct	values	of	a	field
58
... | stats values(action) by clientip
... | stats list(action) by clientip
Activity	by	customer
Distinct	actions	by	
customer
Observe	Customer	Activity
Using	the	list	+	values	Functions
§ Show	distinct	actions	and	cardinality	of	each	action
59
sourcetype=access_combined
| stats count(action) as value by clientip, action
| eval pair=action + " (" + value + ")"
| stats list(pair) as values by clientip
Analyze	Customer	Activity
Combine	list	+	values	Functions
§ Add	columns
§ Sum	specific	columns
60
... | stats count by clientip, action
2	cols:	clientip +	action
... | stats sum(bytes) as totalbytes, avg(bytes) as avgbytes,
count as totalevents by clientip | addcoltotals totalbytes,
totalevents
Sum	totalbytes	and	
totalevents	colums
Building	a	Table	of	Customer	Activity
Add	Columns	and	Sum	Columns
61
... | stats sum(bytes) as totalbytes, sum(other) as totalother
by clientip | addtotals fieldname=totalstuff
For	each	row,	add	
totalbytes	+	totalother
A	better	example:
physical	memory	+	virtual	memory	=	
total	memory
Building	a	Table	of	Customer	Activity
Sum	Across	Rows
62
... | stats sparkline(count) as trendline by clientip
In	context	of	
larger	event	set	
... | stats sparkline(count) as trendline sum(bytes) by clientip
Inline	in	tables
Trend	Individual	Customer	Activity
Sparklines	in	Action
Advanced	Search	Commands
Command Short	Description Hints
transaction Group	events	by	a	common	field	value. Convenient,	but resource	intensive.
cluster Cluster	similar	events	together.	 Can	be	used	on	_raw	or	field.
associate Identifies	correlations	between	fields. Calculates	entropy	btn field	values.
correlate Calculates	the	correlation	between	
different	fields.	
Evaluates	relationship	of all	fields	in	
a	result	set.
contingency Builds	a	contingency	table	for	two	fields.	 Computes	co-occurrence,	or	%	two	
fields	exist	in	same	events.
anomalies Computes	an	unexpectedness	score	for	
an	event.
Computes	similarity	of	event	(X)	to	a	
set	of	previous	events	(P).
anomalousvalue Finds	and	summarizes	irregular,	or	
uncommon,	search	results.
Considers frequency	of	occurrence	
or	number	of	stdev from	the	mean
§ Sew	events	together	+	creates	duration	+	eventcount
§ Sparklines	inline	in	tables
64
... | transaction JSESSIONID | table JSESSIONID, action, product_id
Group	by	
JSESSIONID
View	Customer	Activity	by	Session
Using	the	transaction	Command
§ Intelligent	group	(creates	cluster_count	and	cluster_label)
65
... | cluster showcount=1 | table _raw, cluster_count, cluster_label
Automatically	Group	Customer	Activity
Using	the	cluster	Command
§ Predict	over	time
§ Chart	Overlay	with	and	without	streamstats
§ Maps	with	iplocation	+	geostats
§ Single	value
§ Metered	visuals	with	gauge
Do	More	with	Basic	Reporting	Commands
66
§ Predict	future	values	using	lower/upper	bounds	– single	and	multiple	series
67
... | timechart count as traffic | predict traffic
Predict	Website	Traffic
Using	the	predict	Command
68
sourcetype=access_combined (action=view OR action=purchase)
| timechart span=10m count(eval(action="view")) as Viewed,
count(eval(action="purchase")) as Purchased
Compare	Browsing	vs.	Buying	Activity
Simple	Chart	Overlay
69
... | iplocation clientip | geostats count by clientip
Combine	IP	lookup	
with	geo	mapping
Map	Customer	Activity Geographically
Geolocation in	Action
70
... | stats count
Display	a	Simple	Count	of	Events
Single	Value	in	Action
Display	Counts	Using	Gauges
Single	Value,	Radial	and	Filler	Gauges	in	Action
71
... | stats count | gauge count 10000 20000 30000 40000 50000
Data	Model	and	Pivot
Agenda
§ What	is	a	data	model?
§ Build	a	data	model
§ Pivot	Interface
§ Accelerate	a	data	model
73
Powerful	Analytics	Anyone	Can	Use
Enables	non-technical	users	to	build	complex	
reports	without	the	search	language
Provides	more	meaningful	representation	
of	underlying	raw	machine	data
Acceleration	technology	delivers	up	to	
1000x	faster	analytics	over	Splunk	5
74
Pivot
Data	
Model
Analytics
Store
Define	Relationships	in	Machine	Data
Data	Model
• Describes	how	underlying	
machine	data	is	represented	
and	accessed
• Defines	meaningful	
relationships	in	the	data	
• Enables	single	authoritative	
view	of	underlying	raw	data
Hierarchical	object	view	of	underlying	data
Add	constraints	to	
filter	out	events
Transparent	Acceleration
• Automatically	collected
– Handles	timing	issues,	
backfill…
• Automatically	maintained
– Uses	acceleration	window
• Stored	on	the	indexers
– Peer	to	the	buckets
• Fault	tolerant	collection
Time	window	of	data	
that	is	accelerated
Check	to	enable	
acceleration	of	
data	model	
High	Performance	
Analytics	Store
Easy-to-Use	Analytics
• Drag-and-drop	interface	
enables	any	user	to	analyze	
data	
• Create	complex	queries	and	
reports	without	learning	
search	language
• Click	to	visualize	any	chart	
type;	reports	dynamically	
update	when	fields	change
Select	fields	from	
data	model
Time	window
All	chart	types	available	in	the	chart	toolbox
Save	report	
to	share
Pivot
§ Defines	least	common	denominator	for	a	
data	domain
§ Standard	method	to	parse,	categorize,	
normalize	data	
§ Set	of	field	names	and	tags	by	domain
§ Packaged	as	a	Data	Models	in	a	Splunk	App
§ Domains:	security,	web,	inventory,	JVM,
performance,	network	sessions,	and	more
§ Minimal	setup	to	use	Pivot	interface
Common	Information	Model	(CIM)	App
78
§ Apps	>	Find	More	Apps	>
§ Search:	“Common	Information	Model”
§ Install	free
§ Show	fields	for	web	+	Web	Data	Model
Download	CIM	App
79
1
2
3
4
Data	Model	&	Pivot	Tutorial
http://docs.splunk.com/Documentation/Splunk/latest/PivotTuto
rial/WelcometothePivotTutorial
80
Custom	Visualizations	
and	the	Web	
Framework	Toolkit
Agenda
§ Developer	Platform
§ Web	Framework	Toolkit	(WFT)
§ REST	API	and	SDKs
§ Get	a	Flying	Start
82
Optimizing	the	Analytics	Process
83
Focus	on	the	data	– intuitive	tools	
to	enable	the	analyst
No	single	visualization	exists	to	
handle	all	data	sets.	
Never	lose	sight	of	the	raw	data
Splunk
Analytics
Explore
Context
Visualize
Algorithms
6.0	+	6.1:	Simple,	Interactive,	and	Extensible
84
VISUALIZATION	
EXPLORATION
CUSTOMIZABLE	
FRAMEWORK
POWERFUL	
ANALYTICS
Pivot
Data	Models
Interactive	Forms
Contextual	Drilldown
Dashboard	Editor
Web	Framework
The	Splunk	Enterprise	Platform
Collection
Indexing
Search	Processing	Language
Core	Functions
Inputs,	Apps,	Other	Content
SDKContent
Core	Engine
User	and	Developer	Interfaces
Web	Framework
REST	API
What’s	Possible	with	the	Splunk	Enterprise	Platform?
Power	
Mobile	
Apps
Log	
Directly
Extract	
Data
Customer	
Dashboards
Integrate	
BI	Tools
Integrate	
Platform
Services
Developer Platform
Powerful	Platform	for	Enterprise	Developers
Developers	Can	Customize	and	Extend
REST	API
Build	Splunk	Apps Extend	and	Integrate	Splunk
Simple	XML
JavaScript
HTML5
Web	
Framework
Java
JavaScript
Python
Ruby
C#
PHP
Data	Models
Search	Extensibility
Modular	Inputs
SDKs
Splunk	Software	for	Developers
Gain	
Application	
Intelligence
Build	Splunk	
Apps
Integrate	and	
Extend	Splunk
A	Wealth	of	Splunk Apps
Over	1,100	apps	available	on	the	Splunk	apps	site
API
SDKs UI
Server, Storage,
Network
Server
Virtualization
Operating
Systems
Custom
Applications
Business
Applications
Cloud
Services
App Performance
MonitoringTicketing/ and
Other
Web	Intelligence
Mobile
Applications
Stream
§ Interactive,	cut/paste	examples	from	popular	
source	repositories:	D3,	GitHub,	jQuery
§ Splunk	6.x	Dashboard	Examples	App
https://apps.splunk.com/app/1603
§ Custom	SimpleXML Extensions	App
https://apps.splunk.com/app/1772
§ Splunk	Web	Framework	Toolkit	App
https://apps.splunk.com/app/1613
Example	Advanced	Visualizations
90
91
http://www.d3js.org
Add	a	D3	Bubble	Chart
92
1. Go	to	Find	More	Apps	and	Install	the
Splunk	6.x	Dashboard	Examples	App
2. Enter	the	App
3. Go	to	Examples	>	Custom	Visualizations	>
D3	Bubble	Chart
4. Copy	autodiscover.js (file)	+	components/bubblechart (dir)
from:	$SH/etc/apps/simple_xml_examples/appserver/static
to:		$SH/apps/search/appserver/static
5. Copy	and	paste	simple	XML	to	new	dashboard
Resources
Splunk	Documentation
94
• http://docs.splunk.com
• Official	Product	Docs
• Wiki	and	community	topics
• Updated	daily
• Can	be	printed	to	.PDF
Splunk	Answers
95
• http://answers.splunk.com
• Community	driven
• Splunk	supported
• Knowledge	exchange
• Q	&	A
Splunk	Education
96
• Recommended	for	Users
– Using	Splunk
– Searching	&	Reporting
• Recommended	for	UI/Dashboard	Developers
– Developing	Apps
• Instructor-Led	Courses
– Web
– Onsite

Weitere ähnliche Inhalte

Was ist angesagt?

SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunk
 
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at IntuitSplunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at IntuitErin Sweeney
 
SplunkLive! Warsaw 2016 - Getting started with Splunk
SplunkLive! Warsaw 2016 - Getting started with SplunkSplunkLive! Warsaw 2016 - Getting started with Splunk
SplunkLive! Warsaw 2016 - Getting started with SplunkSplunk
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityRobert Herjavec
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunk
 
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET Journal
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Networkijtsrd
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...Entrust Datacard
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideEntrust Datacard
 
CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacNCCOMMS
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsSplunk
 
Ransomware: Hard to Stop for Enterprises, Highly Profitable for Criminals
Ransomware: Hard to Stop for Enterprises, Highly Profitable for CriminalsRansomware: Hard to Stop for Enterprises, Highly Profitable for Criminals
Ransomware: Hard to Stop for Enterprises, Highly Profitable for CriminalsExtraHop Networks
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudZscaler
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is HereLancope, Inc.
 
SafeDNS for Internet and Mobile Service Providers
SafeDNS for Internet and Mobile Service ProvidersSafeDNS for Internet and Mobile Service Providers
SafeDNS for Internet and Mobile Service ProvidersSafeDNS
 
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsData Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsMelissa Lim
 
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalCMR WORLD TECH
 

Was ist angesagt? (20)

SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
 
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at IntuitSplunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
 
SplunkLive! Warsaw 2016 - Getting started with Splunk
SplunkLive! Warsaw 2016 - Getting started with SplunkSplunkLive! Warsaw 2016 - Getting started with Splunk
SplunkLive! Warsaw 2016 - Getting started with Splunk
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
LIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming SecurityLIFT OFF 2017: Transforming Security
LIFT OFF 2017: Transforming Security
 
SplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud DetectionSplunkLive! Splunk for Insider Threats and Fraud Detection
SplunkLive! Splunk for Insider Threats and Fraud Detection
 
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
IRJET- Authendication Permission Granting Algorithm for Transaction of Sensit...
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Remotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal NetworkRemotely Scanning Organization’s Internal Network
Remotely Scanning Organization’s Internal Network
 
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
IDENTITY PLATFORMS: How central, flexible, deployment of multiple authenticat...
 
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration GuideSwitch to SHA-2 SSL - A Step-by-Step Migration Guide
Switch to SHA-2 SSL - A Step-by-Step Migration Guide
 
CSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha KranjacCSF18 - For Your Ears Only - Sasha Kranjac
CSF18 - For Your Ears Only - Sasha Kranjac
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
 
Ransomware: Hard to Stop for Enterprises, Highly Profitable for Criminals
Ransomware: Hard to Stop for Enterprises, Highly Profitable for CriminalsRansomware: Hard to Stop for Enterprises, Highly Profitable for Criminals
Ransomware: Hard to Stop for Enterprises, Highly Profitable for Criminals
 
Overcoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the CloudOvercoming the Challenges of Architecting for the Cloud
Overcoming the Challenges of Architecting for the Cloud
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is Here
 
SafeDNS for Internet and Mobile Service Providers
SafeDNS for Internet and Mobile Service ProvidersSafeDNS for Internet and Mobile Service Providers
SafeDNS for Internet and Mobile Service Providers
 
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsData Sheet_What Darktrace Finds
Data Sheet_What Darktrace Finds
 
SafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software VendorsSafeDNS for Networking Hardware Manufacturers and Software Vendors
SafeDNS for Networking Hardware Manufacturers and Software Vendors
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 

Andere mochten auch

Simple Log Analysis and Trending
Simple Log Analysis and TrendingSimple Log Analysis and Trending
Simple Log Analysis and TrendingMike Brittain
 
Splunk for ITOA Breakout Session
Splunk for ITOA Breakout SessionSplunk for ITOA Breakout Session
Splunk for ITOA Breakout SessionSplunk
 
Splunk MINT and Stream Breakout
Splunk MINT and Stream BreakoutSplunk MINT and Stream Breakout
Splunk MINT and Stream BreakoutSplunk
 
Monitoring Splunk: S.o.S, DMC, and Beyond Breakout Session
Monitoring Splunk: S.o.S, DMC, and Beyond Breakout SessionMonitoring Splunk: S.o.S, DMC, and Beyond Breakout Session
Monitoring Splunk: S.o.S, DMC, and Beyond Breakout SessionSplunk
 
Best Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The EnteprriseBest Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The EnteprriseSplunk
 
Splunk ITSI Sandbox Guidebook
Splunk ITSI Sandbox GuidebookSplunk ITSI Sandbox Guidebook
Splunk ITSI Sandbox GuidebookSplunk
 
Webinar: Splunk Enterprise Security Deep Dive: Analytics
Webinar: Splunk Enterprise Security Deep Dive: AnalyticsWebinar: Splunk Enterprise Security Deep Dive: Analytics
Webinar: Splunk Enterprise Security Deep Dive: AnalyticsSplunk
 
Taking Splunk to the Next Level - Architecture
Taking Splunk to the Next Level - ArchitectureTaking Splunk to the Next Level - Architecture
Taking Splunk to the Next Level - ArchitectureSplunk
 
Workshop threat-hunting
Workshop threat-huntingWorkshop threat-hunting
Workshop threat-huntingTripwire
 
Splunk Enterprise for IT Troubleshooting Hands-On
Splunk Enterprise for IT Troubleshooting Hands-OnSplunk Enterprise for IT Troubleshooting Hands-On
Splunk Enterprise for IT Troubleshooting Hands-OnSplunk
 
Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA Kai Wähner
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...Splunk
 
Log Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisLog Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisAnton Chuvakin
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
Introduction on Data Science
Introduction on Data ScienceIntroduction on Data Science
Introduction on Data ScienceEdureka!
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onSplunk
 

Andere mochten auch (17)

Simple Log Analysis and Trending
Simple Log Analysis and TrendingSimple Log Analysis and Trending
Simple Log Analysis and Trending
 
Splunk for ITOA Breakout Session
Splunk for ITOA Breakout SessionSplunk for ITOA Breakout Session
Splunk for ITOA Breakout Session
 
Splunk MINT and Stream Breakout
Splunk MINT and Stream BreakoutSplunk MINT and Stream Breakout
Splunk MINT and Stream Breakout
 
Monitoring Splunk: S.o.S, DMC, and Beyond Breakout Session
Monitoring Splunk: S.o.S, DMC, and Beyond Breakout SessionMonitoring Splunk: S.o.S, DMC, and Beyond Breakout Session
Monitoring Splunk: S.o.S, DMC, and Beyond Breakout Session
 
Best Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The EnteprriseBest Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The Enteprrise
 
Splunk ITSI Sandbox Guidebook
Splunk ITSI Sandbox GuidebookSplunk ITSI Sandbox Guidebook
Splunk ITSI Sandbox Guidebook
 
Webinar: Splunk Enterprise Security Deep Dive: Analytics
Webinar: Splunk Enterprise Security Deep Dive: AnalyticsWebinar: Splunk Enterprise Security Deep Dive: Analytics
Webinar: Splunk Enterprise Security Deep Dive: Analytics
 
Taking Splunk to the Next Level - Architecture
Taking Splunk to the Next Level - ArchitectureTaking Splunk to the Next Level - Architecture
Taking Splunk to the Next Level - Architecture
 
Workshop threat-hunting
Workshop threat-huntingWorkshop threat-hunting
Workshop threat-hunting
 
Splunk Enterprise for IT Troubleshooting Hands-On
Splunk Enterprise for IT Troubleshooting Hands-OnSplunk Enterprise for IT Troubleshooting Hands-On
Splunk Enterprise for IT Troubleshooting Hands-On
 
Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA Framework and Product Comparison for Big Data Log Analytics and ITOA
Framework and Product Comparison for Big Data Log Analytics and ITOA
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
 
Log Mining: Beyond Log Analysis
Log Mining: Beyond Log AnalysisLog Mining: Beyond Log Analysis
Log Mining: Beyond Log Analysis
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
Introduction on Data Science
Introduction on Data ScienceIntroduction on Data Science
Introduction on Data Science
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
Machine Data Analytics
Machine Data AnalyticsMachine Data Analytics
Machine Data Analytics
 

Ähnlich wie Machine Data 101

Machine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into InsightMachine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into InsightSplunk
 
Machine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into InsightMachine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into InsightSplunk
 
Machine Data 101
Machine Data 101Machine Data 101
Machine Data 101Splunk
 
Machine Data 101 Workshop
Machine Data 101 Workshop Machine Data 101 Workshop
Machine Data 101 Workshop Splunk
 
Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101Splunk
 
Machine Data 101 Hands-on
Machine Data 101 Hands-onMachine Data 101 Hands-on
Machine Data 101 Hands-onSplunk
 
Workshop splunk 6.5-saint-louis-mo
Workshop splunk 6.5-saint-louis-moWorkshop splunk 6.5-saint-louis-mo
Workshop splunk 6.5-saint-louis-moMohamad Hassan
 
Splunk as a_big_data_platform_for_developers_spring_one2gx
Splunk as a_big_data_platform_for_developers_spring_one2gxSplunk as a_big_data_platform_for_developers_spring_one2gx
Splunk as a_big_data_platform_for_developers_spring_one2gxDamien Dallimore
 
SplunkLive! Getting Started with Splunk Enterprise
SplunkLive! Getting Started with Splunk EnterpriseSplunkLive! Getting Started with Splunk Enterprise
SplunkLive! Getting Started with Splunk EnterpriseSplunk
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochureRajDodiya4
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsSam Bowne
 
How to Get IBM i Security and Operational Insights with Splunk
How to Get IBM i Security and Operational Insights with SplunkHow to Get IBM i Security and Operational Insights with Splunk
How to Get IBM i Security and Operational Insights with SplunkPrecisely
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesSam Bowne
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesSam Bowne
 
Telco analytics at scale
Telco analytics at scaleTelco analytics at scale
Telco analytics at scaledatamantra
 
Machine Data 101
Machine Data 101Machine Data 101
Machine Data 101Splunk
 
Powering up on PowerShell - BSides Charleston - Nov 2018
Powering up on PowerShell - BSides Charleston - Nov 2018Powering up on PowerShell - BSides Charleston - Nov 2018
Powering up on PowerShell - BSides Charleston - Nov 2018Fernando Tomlinson, CISSP, MBA
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
PLNOG 17 - Elisa Jasinska - Network Automation - Design your Systems
PLNOG 17 - Elisa Jasinska - Network Automation - Design your SystemsPLNOG 17 - Elisa Jasinska - Network Automation - Design your Systems
PLNOG 17 - Elisa Jasinska - Network Automation - Design your SystemsPROIDEA
 

Ähnlich wie Machine Data 101 (20)

Machine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into InsightMachine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into Insight
 
Machine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into InsightMachine Data 101: Turning Data Into Insight
Machine Data 101: Turning Data Into Insight
 
Machine Data 101
Machine Data 101Machine Data 101
Machine Data 101
 
Machine Data 101 Workshop
Machine Data 101 Workshop Machine Data 101 Workshop
Machine Data 101 Workshop
 
Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101Splunk workshop-Machine Data 101
Splunk workshop-Machine Data 101
 
Machine Data 101 Hands-on
Machine Data 101 Hands-onMachine Data 101 Hands-on
Machine Data 101 Hands-on
 
Workshop splunk 6.5-saint-louis-mo
Workshop splunk 6.5-saint-louis-moWorkshop splunk 6.5-saint-louis-mo
Workshop splunk 6.5-saint-louis-mo
 
Splunk as a_big_data_platform_for_developers_spring_one2gx
Splunk as a_big_data_platform_for_developers_spring_one2gxSplunk as a_big_data_platform_for_developers_spring_one2gx
Splunk as a_big_data_platform_for_developers_spring_one2gx
 
SplunkLive! Getting Started with Splunk Enterprise
SplunkLive! Getting Started with Splunk EnterpriseSplunkLive! Getting Started with Splunk Enterprise
SplunkLive! Getting Started with Splunk Enterprise
 
Motadata brochure
Motadata brochureMotadata brochure
Motadata brochure
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating Applications
 
How to Get IBM i Security and Operational Insights with Splunk
How to Get IBM i Security and Operational Insights with SplunkHow to Get IBM i Security and Operational Insights with Splunk
How to Get IBM i Security and Operational Insights with Splunk
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise Services
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise Services
 
Powering up on PowerShell - BSides Greenville 2019
Powering up on PowerShell  - BSides Greenville 2019Powering up on PowerShell  - BSides Greenville 2019
Powering up on PowerShell - BSides Greenville 2019
 
Telco analytics at scale
Telco analytics at scaleTelco analytics at scale
Telco analytics at scale
 
Machine Data 101
Machine Data 101Machine Data 101
Machine Data 101
 
Powering up on PowerShell - BSides Charleston - Nov 2018
Powering up on PowerShell - BSides Charleston - Nov 2018Powering up on PowerShell - BSides Charleston - Nov 2018
Powering up on PowerShell - BSides Charleston - Nov 2018
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
PLNOG 17 - Elisa Jasinska - Network Automation - Design your Systems
PLNOG 17 - Elisa Jasinska - Network Automation - Design your SystemsPLNOG 17 - Elisa Jasinska - Network Automation - Design your Systems
PLNOG 17 - Elisa Jasinska - Network Automation - Design your Systems
 

Mehr von Splunk

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routineSplunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTVSplunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank InternationalSplunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College LondonSplunk
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSplunk
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability SessionSplunk
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - KeynoteSplunk
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform SessionSplunk
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 

Mehr von Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 

Kürzlich hochgeladen

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Kürzlich hochgeladen (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Machine Data 101