Splunk Quick Reference Guide

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/157

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

158 Terms

1
New cards

Event

A set of values associated with a timestamp. A single entry of data and can have one or multiple lines.

2
New cards

Examples of Events

Text document, configuration file, entire stack trace, etc

3
New cards

Transaction

Group of related activities

4
New cards

Metric Data Point

consists of a timestamp and one or more measurements. Could also contain dimensions

5
New cards

Measurement

metric name and corresponding numeric value

6
New cards

Host

name of the physical or virtual device where an event originates

7
New cards

Source

name of the file, directory, data stream, or other input from which a particular event originates

8
New cards

Examples of Sources

HTTP web server logs and Windows event logs

9
New cards

T/F Events with the same source can come from different sourcetypes

True: events from the same source can have different sourcetypes

10
New cards

Fields

searchable name and value pairings that distinguish one event from another

11
New cards

T/F: All events have the same fields and field values

False, fields allow for the writing of tailored searches to get specific events that we want

12
New cards

What are the two Splunk software process time events?

Index-time and Search-time

13
New cards

What does the Field Extractor tool do?

allows for the automatic generation and validation of field extractions at search-time using regular expressions or delimiters (spaces, commas, etc)

14
New cards

Tag

knowledge object that enables you to search for events that contain particular field values

15
New cards

Index-time processing - what data is read and where does it go?

data is read from a source on a host and is classified into a source type.

16
New cards

What is extracted in Index-time processing? Where is it written to?

Timestamps and other data is parsed into individual events. It is written to an index on disk, where the event is later retrieved with a search request

17
New cards

What is search-time and when does it occur?

The time it takes for a search event to process. Search starts, indexed events are retrieved from the disk, fields are extracted from the raw text for the event

18
New cards

Index - Process of how indexes are populated

The storage of events that the Splunk software gets from parsing the data into individual events, extracting the timestamp, applying line-breaking rules, and storing the events into the “indexes”

19
New cards

What is the primary way users navigate data in Splunk Software?

Search

20
New cards

What does SPL stand for?

Splunk Process Language

21
New cards

Reports

Saved searches

22
New cards

Different types of Reports

Ad hoc basis, scheduled reports to run on regular interval, or set scheduled report to generate alerts when results meet certain conditions

23
New cards

Can reports be added to dashboards?

Yes, as dashboard panels

24
New cards

Dashboards

panels that contain modules such as search boxes, fields, and data visualizations

25
New cards

Different Types of Datasets

Lookups, data models, table datasets

26
New cards

Table datasets

Focused, curated collections of event data that designed for specific purpose. Uses Table Views, a tool that translates search commands into UI editor interactions

27
New cards

Data Model

hierarchically-organized collection of datasets

28
New cards

Apps

collection of configurations, knowledge objects, and customer designed views and dashboards

29
New cards

Distributed Search

provides a way to scale the deployment by separating the search management and presentation layer from the indexing and search retrieval layer

30
New cards

Forwarders

A Splunk instance that forwards data to another Splunk instance

31
New cards

Indexer

Splunk instance that indexes data. The indexer transforms raw data into events and stores the evens into an index. Also searches indexed data in response to search requests.

32
New cards

Who searches through indexed data during search query?

Indexer

33
New cards

Who gives the search requests?

Search Head

34
New cards

Search Head

Splunk instance that directs search requests to a set of search peers and merges the results back to the user

35
New cards

Dedicated Search Head

Does only search, not indexing

36
New cards

At the start of a search pipeline, there is an implied __________ command to retrieve events from the index

Search

37
New cards

The ________ operator is implied between search terms

AND

38
New cards

What does this SPL command do?: sourcetype=access_combined error | top 5 uri

Retrieves web activity events that contain the term error and returns the top 5 most common URI values

39
New cards

What are the two in-line time modifiers?

Earliest, latest

40
New cards

The snap to time unit rounds _____

Down

41
New cards

@w1 is what snap time?

Snap down to Monday

42
New cards

seconds, minutes, hours, days, weeks, months, quarters, years in time ranges

43
New cards

Current time is 15:45, and we use earliest=-h@h, what time do we snap to?

14:00

44
New cards

Sunday Time modifiers

w0 or w7

45
New cards

earliest=-mon@mon latest=@mon

Starts at beginning of previous month and ends at start of current month

46
New cards

April 28th search is run at 14:05, when do the searches start?:

  1. earliest=-2d

  2. earliest=-2d@d

  1. 14:05 April 26th

  2. 0:00 April 26th

47
New cards

What is earliest=1

UNIX epoch time, UTC January 1, 1970 at 12:00:01 AM

48
New cards

Subsearch

Runs its own search and returns the results to the parent command as the argument value

49
New cards

Subsearch special conditions

Is run first, contained in square brackets

50
New cards

Common Optimization Methods

  • Limit data needs to be pulled off of disk

  • Partition data into separate indexes

  • Limit time range to only what is needed

  • Search specifically

  • Use post-processing searches in dashboards

  • Use summary-indexing and report and data model acceleration features

51
New cards

Chart

Returns results in a tabular output (2 inputs valid)

52
New cards

Timechart

A chart (returns results in tabular output) but with time as x-axis (1 input valid)

53
New cards

dedup

removes subsequent results that match a specified criterion

54
New cards

eval

calculates an expression

55
New cards

fields

removes fields from search results (fields -)

56
New cards

head/tail

returns the first/last N results

57
New cards

lookup

adds field values from an external source

58
New cards

rename

renames a field

59
New cards

What is a wildcard?

Allows specification of multiple fields (ex. fail*)

60
New cards

rex

Specifies regular expression named groups to extract fields

61
New cards

search

filters result to those that match the search expression

62
New cards

sort

sorts the search results by specified fields

63
New cards

stats

provides statistics grouped optionally by fields

64
New cards

mstats

stats for metrics instead of events

65
New cards

table

specifies fields to keep in the result set

66
New cards

top/rare

displays the most/least common values of a field

67
New cards

where

filters search results using eval expressions. Used to compare two different fields

68
New cards

case(X, “Y”, …)

takes pair of arguments X and Y, where X arguments are Boolean and if True, returns Y argument

69
New cards

cidrmatch(“X”, Y)

Identifies IP addresses that belong to particular subnet

70
New cards

coalesce(X, …)

returns first values that isn’t NULL

71
New cards

if(X, Y, Z)

If X evaluaes to True, result is Y, if false, result is Z

72
New cards

in(field, value-list)

returns true if a value in value-list matches a value in “field” (must use inside if function

73
New cards

mvcount(X)

returns number of values of X

74
New cards

mvfilter(X)

filters multi-valued field based on Boolean expression X

75
New cards

now()

returns the current time, represented in Unix time

76
New cards

round(X,Y)

returns X rounded to the amount of decimal places specified by Y (default is round to int)

77
New cards

strftime(X,Y)

returns epochtime value X rendered using format given by Y (ex. strftime(_time, “%H:M”))

78
New cards

count vs dc

count returns the number of occurrences of field X.

dc returns the count of distinct values of the field X.

79
New cards

values(X)

returns the list of all distinct values of the field X as a multi-value entry. the order of the values is alphabetical

80
New cards

head/tail X

first/last X values

81
New cards

span=1m/h/etc

spans a timechart

82
New cards

____ by _____

does something based on an event

83
New cards

| fields + host

| fields - host

keep only host field

remove host field from result

84
New cards

%Y or %y

Year (2021) or year without century (21)

85
New cards

%M or %m

Minute or month number (01-12)

86
New cards

%d

day of month (01-31)

87
New cards

Transforming commands

Commands that create statistics and visualizations (eg. top, rare, stats, chart, timechart, trendline)

88
New cards

By default, how long is a search job active?

10 minutes

89
New cards

Shared search job active for how long?

7 days

90
New cards

Can export results in what formats?

Raw, CSV, XML, JSON

91
New cards

Three search modes and their differences

Fast: field discovery off

Smart: toggle behavior based on search

Verbose: all much data as possible

92
New cards

Events in search are returned in what order?

Reverse chronological order

93
New cards

Selected fields

“Selected fields”, normally host, source, and sourcetype

94
New cards

as

stores result AS whatever you want to call it

95
New cards

What fields are extracted at index time?

Index, source, host, sourcetype

96
New cards

Calculated fields are added to data in ______ time

Search

97
New cards

Default top value

10

98
New cards

Interesting fields appear in what percentage of events?

20%

99
New cards

a in fields sidebar versus #

string, numeral

100
New cards

What is case sensitive in searches?

Field names (values are not)