How is the syntax used in the Search editor To better explain the syntax of a search is by using the following diagram The components of the Search Search Terms –> What you are looking[…]
Category: Splunk – Fundamentals 1
Splunk Series: Field searches
Fields are searchable key/value pairs in your event data Fields can be searched by their name, for example: area_code=404 action=purchase status=200 When you look for multiple items in the editor an implied AND will be[…]
Splunk Series: Saving Search Jobs
Every search is also a job, which can be paused, stopped, saved and exported. Here are some interesting things you need to know about Search jobs: Jobs are available for 10 Minutes (By Default) Jobs[…]
Splunk Series: Basic Search
Basic search The search assistant provides a nice way to begin looking up for something in particular. At this stage, you can determine a few different search criteria, such as a term in particular or[…]
Splunk Series: Feeding Data to Splunk
Splunk Index Time Process Data ingestion for Splunk is broken down into 3 different phases Input Phase – Data is handled at the source and is usually done by a forwarder Parsing Phase – Handled[…]
Splunk Series: Splunk Deployments
Addition Splunk Components There are additional components for a Splunk deployment, here is a list Deployment Server Cluster Master License Master Standalone Deployment This deployment is only in 1 server, and all functions needed for[…]
Splunk Series: Components
Splunk – Indexer This is the engine that is in charge of processing machine data, stores the results in indexes as events. This is what allows enabling fast searches and analysis As data is indexed,[…]
Splunk Series: Overview of Splunk
What is Splunk Splunk is many things to different groups in an organization, but mostly is an engine that looks you to visualize data in a way that could be understood by the business, what[…]