Book Image

Splunk Best Practices

Book Image

Splunk Best Practices

Overview of this book

This book will give you an edge over others through insights that will help you in day-to-day instances. When you're working with data from various sources in Splunk and performing analysis on this data, it can be a bit tricky. With this book, you will learn the best practices of working with Splunk. You'll learn about tools and techniques that will ease your life with Splunk, and will ultimately save you time. In some cases, it will adjust your thinking of what Splunk is, and what it can and cannot do. To start with, you'll get to know the best practices to get data into Splunk, analyze data, and package apps for distribution. Next, you'll discover the best practices in logging, operations, knowledge management, searching, and reporting. To finish off, we will teach you how to troubleshoot Splunk searches, as well as deployment, testing, and development with Splunk.
Table of Contents (16 chapters)

Anatomy of a Splunk search


There are three basic components to a Splunk search, and all of them have an effect on how quickly the data itself is rendered in your search panel.

Root search

This is the portion of the search that defines where the data itself is located within Splunk. It consists of any one of the four core Splunk fields. Index, sourcetype, source, and host are the core Splunk fields that can only be aliased; it usually not advisable to write them.

Calculation/evaluation

This is the portion of the search where we leverage some statistical functions, eval functions, or multi-value field functions in order to prepare the data we are searching for and the way we want to present it. The order of functions is very critical in this section of the query and is usually the largest portion of a search.

Presentation/action

This is the portion of the search where we present our search in either a chart or a table, and we let Splunk render the data as we asked it to. This is the last portion...