Splunk:
- Splunk is a Log
Analyzing and Monitoring tool which communicates with the different
log files and stores file’s data in the form of events into local
Indexes
- Splunk has the
capability to show data in different forms of dashboard which is
useful for the application users and higher leadership
Components of
Splunk:
- Universal
Forwarder (UF)
- Heavy Forwarder
(HF)
- Indexer (IDX)
- Search Head (SH)
- Deployment Server
(DS)
- License Master
(LM)
Splunk
Features:
- Reporting
- Monitoring
- Log Analysis
- Alerting
- Dashboard
Splunk
Enterprise:
- Splunk Enterprise
collects, analyzes and acts on the value of the data generated by
technology infrastructure, security and business applications
- It gives the
insights to drive operational performance and business results
Splunk Cloud:
- Splunk cloud
delivers all the features of Splunk Enterprise, as a cloud-based
service
- The platform
provides access to Splunk Enterprise Security and the Splunk App for
AWS and it enables centralized visibility across cloud, hybrid and
on-premises environments
Splunk Light:
- Splunk Light is a
solution for small IT environments that automates log search and
analysis.
- It speeds
troubleshooting by gathering real-time log data from your distributed
applications and infrastructure in one place to enable powerful
searches, dynamic dashboards, alerts and reporting for real-time
analysis all at an attractive price well within the budget
Four stages of
splunk include,
– Accepts any text
data as input
– Parses the data
into events [rows in the database tables]
– Stores events in
indexes [table in the relational DB format]
– Searches and
reports
{Forwarder}
– Collects data
from data source & forwards to indexer
{Indexer}
– Receives data
from data source and do indexes the data
– It validates the
license before indexing
{Search Head}
– Do searching the
data from indexers and provides a report
Best practices:-
– Do not run
splunk as super-user
– Create a user
account that is used to run splunk
+ For input, splunk
must be able to access data sources
+ On *Nix, non-root
accounts cannot access port < 1024
+ On Windows,
– Use a domain
account if splunk has to connect to other servers
– Otherwise, use
a local machine account that can run services
+ Make sure the
splunk account can access scripts used for inputs and alerts
– Splunk searches
depend on accurate time
+ Correct event
time stamping is essential
– It is imperative
that your splunk indexer and production servers have standardized
time configuration
+ Clock skew
between hosts can affect search results
--------------------------------------------------------------------------------------------------------------------
SPLUNK SCALES:
Data processing:-
Input:- →
Indexer/HF/UF
- Data from
network/file/scripted input
- Data broken into
64k blocks
- Annotation of each
block with host/source/source type/character encoding
Parsing:- →
Indexer/HF
- Event line
breaking
- Aggregation for
multiline event
- Regex replacement
- Event wise
host/source/source type annotation
- Time stamping
events
Indexing:- →
Indexer
- Parsed event data
written into disk/index
Search:- →
Indexer/SH
- Search on indexed
data using SPL
- Knowledge object
binding
No comments:
Post a Comment