Book Image

Data Analytics Using Splunk 9.x

By : Dr. Nadine Shillingford
5 (1)
Book Image

Data Analytics Using Splunk 9.x

5 (1)
By: Dr. Nadine Shillingford

Overview of this book

Splunk 9 improves on the existing Splunk tool to include important features such as federated search, observability, performance improvements, and dashboarding. This book helps you to make the best use of the impressive and new features to prepare a Splunk installation that can be employed in the data analysis process. Starting with an introduction to the different Splunk components, such as indexers, search heads, and forwarders, this Splunk book takes you through the step-by-step installation and configuration instructions for basic Splunk components using Amazon Web Services (AWS) instances. You’ll import the BOTS v1 dataset into a search head and begin exploring data using the Splunk Search Processing Language (SPL), covering various types of Splunk commands, lookups, and macros. After that, you’ll create tables, charts, and dashboards using Splunk’s new Dashboard Studio, and then advance to work with clustering, container management, data models, federated search, bucket merging, and more. By the end of the book, you’ll not only have learned everything about the latest features of Splunk 9 but also have a solid understanding of the performance tuning techniques in the latest version.
Table of Contents (18 chapters)
1
Part 1: Getting Started with Splunk
5
Part 2: Visualizing Data with Splunk
10
Part 3: Advanced Topics in Splunk

Creating event types and tagging

An event type is a way of categorizing data to make it easier to search. For example, we might want to get all authentication-type events from multiple log sources or we may tag all error messages with an error tag. In this section, we will explore event types for our BOTS Dataset v1.

An event type is a Splunk query. It is similar to the queries that we have executed so far in this chapter. Let’s look at an example. Suppose we wanted to get all authentication logs from our BOTS Dataset v1. Where would we find those logs?

  1. We can search our dataset by using the tag keyword. Enter the following Splunk query in the search bar:
    index=botsv1 earliest=0 tag=authentication
  2. Click on the sourcetype field in Interesting fields on the left of the page. We will see that most of the authentication events come from the Windows logs (see Figure 3.27):
Figure 3.27 – Using tag=authentication in a search of the botsv1 data

Figure 3.27 – Using tag=authentication in a search of the...