• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/227

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

227 Cards in this Set

  • Front
  • Back
"case(X,"Y",…)"
Takes pairs of arguments X and Y, where X arguments are Boolean expressions. When evaluated to TRUE, the arguments return the corresponding Y argument.

You can stack these in series to have multiple x and y comparisons in one - ex. (x, y, x, z, ....)

… | lookup usertogroup user output group
For each event, use the lookup table usertogroup to locate the matching “user” value from the event. Output the group field value to the event
3 Key Splunk Functional Components
Search Head (SH) - Indexer - Data Inputs
3 main methods to create viusalizations
1. Select field from fileds sidebar 2. Use Pivot interface 3. use SPL in search bar with Statistica and Visualizations tabs
4 Primary Indexes
Main - _audit - _internal - _thefishbucket
A knowledge object that enables you to search for events that contain particular field values
Tag
Addcoltotals
| addcoltotals adds row/column totals - Example |addtotals labelfield=product_name col=true
Add-on
data feed - modular inputs - scripts or other mechanism for data colleciton - does not include UI
Alias
Alternate name you assign to FIELD. You can use field aliasing to normalize field names
App
Sets of Dashboards - views - searches used to support a particular buiness need or to solve a particular use case or type of problem
Benefits of Index Clustering
Data Availability - Data Fidelity - Data Recovery
Best way to improve search performance
Limit Time
Bloom Filter
Splunk Enterprise uses bloom filters to decrease the time it requires to retrieve events from the index
Boolean Operators are case sensitive
TRUE
Calculated Fields
Calculated field operations are in the middle of the search-time operation sequence so they cannot reference lookups, event types or tags.
Can be a text document, a configuration file, an entire stack trace, and so on.
Event
Can represent a multi-step business-related activity, such as all events related to a single customer session on a retail website.
Transaction
Can you apply aliases to field lookups?
Yes
Clauses used with Top Command
limit - countfield - percentfield - showcount -showperc - useother - otherStr
Coalesce function
If you do not want the calculated field to override existing fields when the eval statement returns null
Command adds fields based on looking at the value in an event, referencing a lookup table, and adding the fields in matching rows in the lookup table to your event.
lookup
Command calculates aggregate statistics over a dataset, similar to SQL aggregation.
stats
Command calculates the value of a new field based on other fields, whether numerically, by concatenation, or through Boolean logic
eval command
Command can be used to create new fields by using regular expressions to extracting patterned data in other fields.
rex
Command creates tabular data output suitable for charting
chart command
Comparison Operators
=

=!


<


>

Config to receive content from Deployment Server
deploymentclient.conf
Configuration Files
System Settings - Authentication - Index Mapping - Deployment & Cluster Configs - Knowledge Object and save searches
Configure inputs - forwarders - file monitoring
inputs.conf
Configure regex-based host & source overrides
transforms.conf
Create Report 2 ways
Search and Pivot
Data Classification
Alerts - events types - transactions
Data Enrichment
Lookups - Reports - Transforms - Views - Workflows - Data Normalization - Data Models
Data Enrichment
Lookups and workflow actions
Data Inputs
Files and Directories - Network Events - Windows Sources - Scripted Inputs - Modular Inputs
Data Interpretation
fields - fields extractions - macros - search commands
Data Interpretation
Fields and Field Extraction
Data Layer
C/C++ Server - accesses and processes and indexes streaming data and handles searches
Data Models
Make use of lookups - transactions - search time field extractions
Data Models
Encode domain knowledge needed for specialized searches
Data Models
Representation of datasets wich drive the pivot tool
Data Models
A data model is a hierarchically structured search-time mapping of semantic knowledge about one or more datasets. Data models drive the Pivot tool. They enable users of Pivot to create compelling reports and dashboards without designing the searches that generate them.
Data Models
Representative of 1 or more Datasets
Dataset
a collection of data that you define and maintain for a specific business purpose. It is represented as a table, with fields for columns and field values for cells.
Dataset constraints
filter out events that aren't relevant to the dataset.
Default Search Mode
Smart
Default Selected Search Fields
Host - Source - SourceType
Determines how a forwarder sends data to receiving Splunk instance
outputs.conf
Distributed Search
Horizontal scaling by distributing the indexing and searching load across multiple indexers - makes possible searching large volumes
Django Bindings
Provides DJango tags to create Splunk Views and Search Managers
endswith
Form transaction that ends with specific terms or field values or events
erex
Builds regex for you
Eval
The eval command calculates an expression and puts the resulting value into a destination field. If this destination field matches a field name that already exists, it overwrites the existing field value with the results of the eval expression. The eval command evaluates mathematical, string, and boolean expressions.
Eval Command
Arithmetic - Concatenation - Boolean Example stats sume(sc_bytes) as Bytes by usage |eval bandwidth=Bytes/1024/1024 This creates a new field named "bandwidth"
Eval Command IF Function
Takes 3 arguments - if(x y z)

x = Boolean


y = is the if value and must be in quotes if not a number


z = else value

Event
Single Record within the data
Event types
Data Classificaiton
Event types can have tags
TRUE
Events Types
Group together sets of events discovered through searches
Example Search Clause
as
Example Search Command
stats
Example Search Function
Sum()
Example Search Term
sourcetype=acc* status=503
Exlcude Fields in Search by
using "fields" followed by field names or "-fieldname"

By listing field names, you are excluding all other fields.


By using -fieldname you are excluding only those "-" listed fields.

Extracted Fields
Good for rarely used fields
Facilitate event categorization using the full power of the search command, meaning you can use Boolean expressions, wildcards, field values, phrases, and so on.
event types
Field Extraction
Allow you to include/exclude specific fields
Fields are case sensitive
TRUE
Fields Format Command
Formats values without changing the underlying value characteristics - same function as eval
fillnul Command
replace null values with zero or specified value - for example "|fillnull values="nothing to see here" would replace null value with "nothing to see here"
Filtering command returns the first count results. permits a search to stop retrieving events from disk when it finds the desired number of results.
head
Groups events that meet various constraints into transactions—collections of events, possibly from multiple sources.
Transaction
head/tail
Returns the first/last N results
Heat map
Highlights outstanding values
High and low values
Highlights max and min of non zero values
Host
Hostname or IP address from where the data originates
How are Interesting Values identified?
Value is in at least 20% of the searched events
How do you interface with Splunk?
REST API
How do you monitor Windows Performance?
Forwarder or WMI
How many reports are available for character feilds?
3 - 1. Top Values 2. Top Values by Time 3. Rare Values
How to get data into Splunk
1. Splunk Settings 2. Apps 3. CLI 4. Editing Config Files
HTML and JavaScript
Convert Simple XML to HTML and JavaScript that accesses the SplunkJS Stack - Provides full layout control
inputlookup in search
|inputlookup http_status.csv
Is an argument to a command that runs its own search, returning those results to the parent command as the argument value.
subsearch
Keyword arguments to the search command are case-sensitive
FALSE
Let you quickly visualize a data pattern without creating a separate line chart.
sparkline
Makes your data more understandable and less ambiguous
Tags
Manipulate field values at search time using

Eval Commands

maxpause
max total time between events
maxspan
max total time between earlist and latest events
MultiKV
Used to extract fields from table formated events
Normalization
Assign tags to field values . Alias - assign to exisiting field name
Phase 1
Collect and Index
Phase 2
Search and Investigate
Phase 3
Add Knowledge
Phase 4
Monitor and Alert
Phase 5
Report and Analyze
Pivot Table requires a data model first
True - You need a data model first or Instant Pivot will create one for you.
Power User Role
Create KOs and Share Data
Provides a way to scale your deployment by separating the search management and presentation layer from the indexing and search retrieval layer
Distributed Search
Rare Search Term
Same as Top
Refers to the table, chart, or other visualization you create
Pivot
Regex
Python or Perl Style Expression
Rename Command
Rename Arguement Field Name. Example -Rename IP as HostName
Report
Views - Provide access to and displays data using search boxes fields and charts
Report Definition
At minimum, a report definition includes the search string and the time range associated with the search (expressed in terms of relative time modifiers).
REST API
Used to Configure and Manage Splunk Instance - Create and Run Searches - Create Applications
REST API
Address endpoint such as Apps - Users - Searches - Jobs - Indexes - Inputs - more
Returns a table of results where each row represents a single unique combination of the values of the group-by fields"

stats

rex
Regex - Regular Expression built by user
Runs its own search and returns the results to the parent command as the argument value
Subsearch
Search Best Practice
Be as specific as possible
Search Best Practice
Exclusion is better than inclusion
Search Best Practice
Filter Early
Search Best Practices
Filter out results as soon as possible before calculations. Use field-value pairs, before the first pipe. Filter out unnecessary fields as soon as possible in the search. Postpone commands that process over the entire result set (non streaming commands) as late as possible in your search. Some of these commands are: dedup, sort, and stats.Use post processing searches in dashboards. Use summary indexing, and report and data model acceleration features.
Search Boolean Operators
NOT - OR - AND
Search Events Listing is in what order?
Reverse Chronological (newest first)
Search Events Result time is based o what?
User Time Zone
Search Mode - Fast
Speeds up searches by limiting the types of data returned by the search.
Search Mode - Smart
The default setting, toggles search behavior based on whether your search contains transforming commands. For transforming searches, it behaves like Fast mode. For searches without transforming commands, it behaves like Verbose mode.
Search Mode - Verbose
Returns as much event information as possible, at the expense of slower search performance.
Search Modes
1. Fast 2. Smart 3. Verbose
Search Terms are Case Sensitive
FALSE
Server Layer
Python & DJango - Use Splunk SDK for Python to directly write code
Shows details about your search, such as the execution costs of your search, debug messages, and search job properties.
Job Inspector
Simple XML
Default Dashboards - Chart Customization - Dynaminc Drilldowns - Access to custom CSS and JavaScript files - Custom behaviors & visualizations using SplunkJS stack libraries
SImple XML Extensions
Customize the layout of dashboards - new visualizations - dashbaord behaviors
Source
Name of file - stream or data input
Sourcetype
Type of data
Sourcetype is not required
FALSE - sourcetype must be defined
SPL Filtering Results
search, where, dedup, head, tail
SPL Filtering, Modifying, and Adding Fields
fields, replace, eval, rex, lookup
SPL Grouping Results
Transaction
SPL Reporting Results
top/rare,estats, chart, timechart
SPL Search Components
Search Terms+Commands+Functions+Arguments+Clauses
SPL Sorting Results
sort
Splunk Index
raw data + Index Files
Splunk Web Architecture
Client Layer - Server Layer - Data Layer
startswith
Form transaction that start with specific terms or field values or events
Static Functions are case sensitive
FALSE
Stats Command
Count - DistinctCount - Sum - avg - list - Values
Stats Count Command
| stats count(action) as ActionEvents for example - stats count as "Total Sales by vendors" by product_name
Stats List
|stats list(Asset) as "Company Assets" by Employee - Returns a row for each employee and a list of their assets
Stats Sparkline
|stats sparkline(count, 24h) as "Page Hits" by uri
Stats Sum
|stats sum(price) as "Gross Sales" by product_name
Steps to create lookup
Add lookup file then add lookup definition - Add Automatic Lookup to make searching easier
Stores saved searches
savedsearches.conf
Summary indexing
A method of search acceleration. The results from a summary-indexing optimized search are stored in a special format that cannot be modified before the final transformation is performed.
Table Command
Builds table made up from fields used in argument list
Tag
Enable you to assign names to specific field and value combinations
The subsearch is run first
TRUE
This command removes subsequent results that match specified criteria
dedup
TImestamp
date/time of the event
TImestamp recognition - event segmentation - host & source mathcing
props.conf
Top Command
Returns count or percent
tostring function
Converts numerical values to string. For example - |eval totoal_list_price = "$" + tostring(to_list_price)
transaction
Groups search results into transactions
Transaction Command
Allows you to correlate related events on a field or list of fields that span time
Transaction vs Stats
Transactions correlates events or when events need to be grouped on start and end values (think "time") while Stats used when you want to see the results of a calculation and group events on field value
Transactions
are collections of conceptually-related events that span time
Transforming Commands
Create Statics and Visualizations

(think "transforming data into something visual")

Two interfaces to manage data
1. Home App 2. Splunk Settings
Two primary ways that Splunk helps with categorizing data
tagging and event types
Two ways to gather Windows Inputs
WMI or Forwarder
Use CIM to ensure
Common Information Model - Multiple Apps can co-exist on a single Splunk Deployment. Object Permissions can be set to global for use of mutliple apps. Easier and more effecient correlation of data from different sources and source types
Used to send content to indexeers to sync SH
Deployment Server
Uses POST - GET - DELETE over HTTPS
REST API
Verify lookup using what
inputlookup - "| inputlookup yourlookupname"
What 2 fields do Transaction Commands creates
duration and event count
What are 3 permissions
Private - Shared in App - Global
What are table headers?
Field Names
What are table results
Values
What does each row in a table represent?
An event
What does the "#" represent next to the field?
Number Value
What does the "a" represent next to the field?
String Value
What is a lookup
Static CSV or Python Script
What is always extracted unless removed?
_raw and _time
What search mode is "TOP" command executed in?
SMART Search Mode
What search panel shows which files (or other sources) your data came from?
Sources
When are aliases applied
After field extraction but before lookups

(makes sense, you cannot assign an alias unless it has been extracted and why do you want to alias? to normalize your data to use later... ie lookups)

When are Fields extracted from the raw text for the event?
Search Time
When using the "TOP" command, where are results displayed?
Stats Tab
When you have a choice between Stats and Transactions, you should use which one?
Stats because stats is faster and more effecient
Who can create Data Models?
Admin and Power User Roles
Workflow Action
Interaction between fields and other apps or web
Workflow Action
Enable interactions between fields in your data and other applications or web resources
You can create your own sourcetype
TRUE - Automatic - Manual - or From a list
You cannot base an event type on a search that
Includes a pipe operator after a simple search. Includes a subsearch. Is defined by a simple search that uses the savedsearch command to reference a report name.
Fields and field extractions
Data interpretation

(You are making sense of the data index by identifying your data)

Event types
Data Classification

(You are making sense of events by giving them a name)

Lookups and workflow actions
Data Enrichment

(You are adding value to existing data)

Tags and aliases
Normalization

(You are standardizing your data for use)

CIM object permissiona can be used in multiple apps TRUE/FALSE
TRUE
Naming Conventions
FORMAT of the name: Group - Search Type - Platform - Category - Time Interval - Description
Lookup fields retrieved from the lookup file are the ____ fields.
Output
The lookup field from the event is the ____ field.
Input
What command is used to load lookup results?
inputlookup
What lookup command do you use when you do not want to overwrite existing fields?
OUTPUTNEW
The output lookup fields persist for all searches TRUE/FALSE
FALSE - They persist for the current search only
You can edit automatic lookups TRUE/FALSE
FALSE - You can only Edit Permissions, Clone, Delete or Move
When creating a field alias, what is the first "field aliases" value?
The value of the existing field
A new alias replaces the original field in the "interesting fields" side bar TRUE/FALSE
False - Both appear
You can edit Field Aliases TRUE/FALSE
FALSE - You can only Edit Permissions, Clone, Delete or Move
How do you use a Calculated Field?
Using the eval command
You can use calculated fields on output fields from lookup tables TRUE/FALSE
FALSE - They can only be used on extracted fields
You cannot edit Calculated Fields TRUE/FALSE
TRUE - You can only Edit Permissions, Clone, Delete or Move
What is used to manage extracted fields?
Field Extraction Manager
Two field extractor (FX) methods
Regex and Delimeter
3 Options to extract fields
1 Settings 2 Fields Sidebar 3 Event Actions
You cannot edit Tags TRUE/FALSE
FALSE - You can edit tags and even change the tag name
Data Models consists of what 3 types of objects?
Events, searches, transactions. This can be seen on the left panel when creating data models.
What are the Data Model Events Constraints?
Constraints are the search broken down into a hierarchy. You are building a hierarchy where each constraint inherits the parent search string.
What are the 3 Data Model Events
1. Event objects that contain constraints and attributes 2. Constraints are the search broken down into a hierarchy 3 Attributes are the fields and properties associated with the events
Data Model Event Object Attributes are inherited from parent objects TRUE/FALSE
TRUE
What are Data Model Event Object Attributes?
The fields you want to include in the object
What are Data Model Search Objects?
Searches that include transforming commands to define the dataset they represent
Can Data Model Search Objects have attributes?
Yes
What are the Data Model Transaction Objects?
Enable the creation of objects that represent transactions and use fields that have already been added to the model using search or event objects
What must you have when creating data models before you can start adding transaction objects?
At least one event or search

(hard to have transactions without events)

How can you use Data Model Attributes in a Pivot?
Splits for rows and columns or to filter events

(what are attributes? fields)

What Data Models cannot be accelerated?
Private Data Models
What Data Models cannot be edited
Accelerated Data Models

What are the 2 kinds of Splunk Searches?

RAW Event Searches and Transforming Searches

What are Transforming Searches

Transforming searches are searches that perform some type of statisticalcalculation against a set of results

When you use the timechart command, what do the X and Y axis represent?

X always = time


Y = other values

Withthe chart command, what keyword do you use to determine what field takes the x-axis?

over keyword


Example: sourcetype=access_* | chart avg(clientip) over date_wday.



date_wday is the x-axis

What search command can you use to split your results?

Use the "by" command. When you see the "by" command, think split by.


Example: sourcetype=access_* | chart count over ssl_type by host.


Where ssl_type is the x axis of a stacked bar chart split by host.