SlideShare a Scribd company logo
Copyright	©	2014	Splunk	Inc.
Machine	Data	101
Gary	Burgett
Sr.	SE
11/1/2016
What	Does	Machine	Data	Look	Like?
Sources
Order	Processing
Twitter
Care	IVR
Middleware	
Error
2
Machine	Data	Contains	Critical	Insights
Customer	ID Order	ID
Customer’s	Tweet	
Time	Waiting	On	Hold
Twitter	ID
Product	ID
Company’s	Twitter	ID
Customer	IDOrder	ID
Customer	ID
Sources
Order	Processing
Twitter
Care	IVR
Middleware	
Error
3
Machine	Data	Contains	Critical	Insights
Order	ID
Customer’s	Tweet	
Time	Waiting	On	Hold
Product	ID
Company’s	Twitter	ID
Order	ID
Customer	ID
Twitter	ID
Customer	ID
Customer	ID
Sources
Order	Processing
Twitter
Care	IVR
Middleware	
Error
4
Structured
RDBMS
SQL Search
Schema	at	Write Schema	at	Read
Traditional Splunk
Splunk	Approach	to	Machine	Data
Copyright © 2014 Splunk Inc.
5
ETL Universal	Indexing
Volume Velocity Variety
Unstructured
Splunk:	The	Platform	for	Machine	Data
6
Developer
Platform
Report	
and	
analyze
Custom	
dashboards
Monitor	
and	alert
Ad	hoc	
search
Online	
Services
Web	
Proxy
Data	Loss	
Prevention
Storage Desktops
Packaged	
Applications
Custom
Applications
Databases
Call	Detail	
Records
Smartphones	
and	Devices
Firewall
Authentication
File	
servers
Endpoint
Threat
Intelligence
Asset	
&	CMDB
Employee	/	
HR	Info
Data
Stores
Applications
External	Lookups
Badging	
records
Email	
servers
VPN
Any	amount,	any	location,	any	source
Schema-
on-the-fly
Universal	
indexing
No	
back-end	
RDBMS
No	need	
to	filter	
data
Platform	for	Operational	Intelligence
The	Splunk	Portfolio
Rich	Ecosystem	of
Apps	&	Add-Ons
Splunk	Premium
Solutions
Mainframe
Data
Relational
Databases
MobileForwarders Syslog/TCP
IoT
Devices
Network
Wire	Data
Hadoop
Agenda
§ Non-Traditional	Data	Sources
§ Data	Enrichment
§ Level	Up	on	Search	and	Reporting	Commands
§ Data	Models	and	Pivot
§ Advanced	Visualizations	and	the	Web	Framework
8
Workshop	Setup
Non-Traditional
Data	Sources
Non-Traditional	Data	Sources
§ Network	Inputs
§ HTTP	Event	Collector
§ Log	Event	Alert	Action
§ Splunk	App	for	Stream
§ Scripted	Inputs
§ Database	Inputs
§ Splunk	ODBC	Driver
§ Modular	Inputs
§ zLinux Forwarder
§ MINT
§ Non-Splunk	Datastores
11
Traditional	Data	Sources
§ Captures	events	from			log	files			in	real	time
§ Runs	scripts	to	gather	system	metrics,	connect	
to	APIs	and	databases
§ Listens	to	syslog and	gathers	Windows	events	
§ Universally	indexes	any	data	format	so	it	
doesn’t	need	adapters
12
Windows
• Registry
• Event	logs
• File	system
• sysinternals
Linux/Unix
• Configurations
• Syslog
• File	system
• Ps,	iostat,	top
Virtualization
• Hypervisor
• Guest	OS
• Guest	Apps
Applications
• Web	logs
• Log4J,	JMS,	JMX
• .NET	events
• Code	and	scripts
Databases
• Configurations
• Audit/query	logs
• Tables
• Schemas
Network
• Configurations
• syslog
• SNMP
• netflow
Network	Inputs
§ Collect	data	over	any	UDP	or	TCP	port
§ Some	devices	only	send	data	over	a	network	port
§ Best	Practice:	use	syslog-ng or	rsyslog
§ Offers	persistence
§ Categorizes	data	by	host
13
HTTP	Event	Collector	(HEC)
§ Collect	data	over	HTTP	or	HTTPS	directly	to	Splunk
§ Application	Developer	focus	– few	lines	of	code	in	app	
to	send	data
§ HEC	Features	Include:
§ Token-based,	not	credential	based
§ Indexer	Acknowledgements	– guarantees	data	indexing
§ Raw	and	JSON	formatted	event	payloads
§ SSL,	CORS	(Cross	Origion access),	and	Network	Restrictions
14
Log	Event	Alert	Action
§ Use	Splunk	alerting	to	index	a	custom	log	event
§ Splunk	searchable	index	of	custom	alert	events
§ Configurable	Features	Include:
§ Host
§ Source
§ Sourcetype
§ Index
§ Event	text	– construct	the	exact	syntax	of	the	log	event,	
including	any	text,	tokens,	or	other	information
15
The	Splunk	App	for	Stream
Wire	Data	Enhances	the	Platform	for	
Operational	Intelligence
Efficient,	Cloud-ready	Wire	Data	Collection
Simple	Deployment	Supports	Fast	Time	to	Value
16
Stream	=	Better	Insights	for	*
Solution	Area Contextual	Data Wire	Data Enriched View
Application	
Management
application	logs,	
monitoring	data,	
metrics,	events
protocol	conversations	on	
database	performance,	DNS	
lookups,	client	data,	business	
transaction	paths…
Measure	application	response	
times,	deeper	insights	for	root-
cause	diagnostics,	trace	tx
paths,	establish	baselines…
IT Operations application	logs,	
monitoring	data,	
metrics,	events
payload	data	including	process	
times,	errors,	transaction	
traces,	ICA	latency,	SQL	
statements,	DNS	records…
Analyze	traffic	volume,	speed	
and	packets	to	identify	
infrastructure	performance	
issues,	capacity	constraints,	
changes;	establish	baselines…
17
Stream	=	Better	Insights	for	*
Solution	Area Contextual	Data Wire	Data Enriched View
Security app	+	infra	logs,	
monitoring	data,	
events
protocol	identification,	
protocol	headers,	content	
and	payload	information,	
flow	records
Build	analytics	and	context	for	
incident	response,	threat	
detection,	monitoring	and	
compliance
Digital	
Intelligence
website	activity,	
clickstream	data,	
metrics
browser-level	customer	
interactions
Customer	Experience – analyze	
website	and	application	bottlenecks	to	
improve	customer	experience	and	
online	revenues
Customer	Support	(online,	call	center)	
– faster	root	cause	analysis	and	
resolution	of	customer	issues	with	
website	or	apps
18
Scripted	Inputs
19
§ Send	data	to	Splunk	via	a	custom	script
§ Splunk	indexes	anything	written	to	stdout
§ Splunk	handles	scheduling
§ Supports	shell,	Python	scripts,	WIN	batch,	PowerShell
§ Any	other	utility	that	can	format	and	stream	data
Streaming	Mode
§ Splunk	executes	script	and	indexes	stdout
§ Checks	for	any	running	instances
Write	to	File	Mode
§ Splunk	launches	script	which	produces	
output	file,	no	need	for	external	scheduler
§ Splunk	monitors	output	file
Use	Cases	for	Scripted	Inputs
20
§ Alternative	to	file-base	or	network-based	inputs
§ Stream	data	from	command-line	tools,	such	as	vmstat and	iostat
§ Poll	a	web	service,	API	or	database	and	process	the	results
§ Reformat	complex	or	binary	data	for	easier	parsing	into	events	and	fields
§ Maintain	data	sources	with	slow	or	resource-intensive	startup	
procedures
§ Provide	special	or	complex	handling	for	transient	or	unstable	inputs
§ Scripts	that	manage	passwords	and	credentials
§ Wrapper	scripts	for	command	line	inputs	that	contain	special	characters
Database	Inputs
§ Create	value	with	structured	data
§ Enrich	search	results	with	additional	
business	context
§ Easily	import	data	for	deeper	analysis
§ Integrate	multiple	DBs	concurrently
§ Simple	set-up,	non-invasive	and	secure
DB	Connect	provides	reliable,	scalable,	
real-time	integration	between	Splunk	
and	traditional	relational	databases
21
Configure	Database	Inputs
22
§ DB	Connect	App
§ Real-time,	scalable	integration	with	relational	DBs
§ Browse	and	navigate	schemas	and	tables	before	data	import
§ Reliable	scheduled	import
§ Seamless	installation	and	UI	configuration
§ Supports	connection	pooling	and	caching
§ “Tail”	tables	or	import	entire	tables
§ Detect	and	import	new/updated	rows	using	timestamps	or	unique	IDs
§ Supports	many	RDBMS	flavors
§ AWS	RDS	Aurora,	AWS	RedShift,	IBM	DB2	for	Linux,	Informix,	MemSQL,	MS	SQL,	MySQL,	
Oracle,	PostgreSQL,	SAP	SQL	Anywhere	(aka	Sybase	SA),	Sybase	ASE	and	IQ,	Teradata
Splunk	ODBC	Driver
23
§ Interact	with,	manipulate	and	visualize	machine	data	in	
Splunk	Enterprise	using	business	software	tools
§ Leverage	analytics	from	Splunk	alongside	Microsoft	Excel,	
Tableau	Desktop	or	Microstrategy Analytics	Desktop
§ Industry-standard	connectivity	to	Splunk	Enterprise
§ Empowers	business	users	with	direct	and	secure	access	
to	machine	data
§ Combine	machine	data	with	structured	data	for	better	
operational	context
ODBC:	How	it	Works
24
Modular	Inputs
25
§ Create	your	own	custom	inputs
§ Scripted	input	with	structure	and	intelligence
§ First	class	citizen	in	the	Splunk	management	interface
§ Appears	under	Settings	>	Data	Inputs
§ Benefits	over	simple	scripted	input
§ Instance	control:	launch	a	single	or	multiple	instances
§ Input	validation
§ Support	multiple	platforms
§ Stream	data	as	text	or	XML
§ Secure	access	to	mod	input	scripts	via	REST	endpoints
Example	Modular	Inputs
26
Twitter
§ Stream	JSON	data	from	a	Twitter	source	to	Splunk	using	Tweepy
Amazon	S3	Online	Storage
§ Index	data	from	the	Amazon	S3	online	storage	web	service
Java	Messaging	Service	(JMS)
§ Poll	message	queues	and	topics	through	JMS	Messaging	API
§ Talks	to	multiple	providers:	MQSeries (Websphere MQ),	ActiveMQ,	
TibcoEMS,	HornetQ,	RabbitMQ,	Native	JMS,	WebLogic JMS,	Sonic	MQ
Splunk	Windows	Inputs
§ Retrieve	WIN	event	logs,	registry	keys,	perfmon counters
More	Modular	Inputs
27
zLinux Forwarder
28
§ Easily	collect	and	index	data	on	IBM	mainframes
§ Collect	application	and	platform	data
§ Download	as	new	Forwarder	distribution	for	s390x	Linux
Extend	Operational	Intelligence	to	Mobile	Apps
29
Deliver	Better	
Performing,	More	
Reliable	Apps	
Deliver	Real-Time	
Omni-Channel	
Analytics
End-to-End	
Performance	and	
Capacity	Insights
Monitor	App	Usage	and	Performance
• Improve	user	retention	by	quickly	
identifying	crashes	and	
performance	issues
• Establish	whether	issues	are	
caused	by	an	app	or	the	network(s)	
• Correlate	app,	OS	and	device	type	
to	diagnose	crash	and	network	
performance	issues	
30
Integrated	Analytics	Platform	for	Diverse	Data	Stores
Full-featured,	
Integrated	
Product
Fast	Insights	
for	Everyone
Works	with	
What	You	
Have	Today
Explore Visualize Dashboard
s
ShareAnalyze
Hadoop	Clusters NoSQL	and	Other	Data	Stores
Hadoop Client	Libraries Streaming	Resource	Libraries
Bi-directional	
Integration	
with	Hadoop
Connect	to	NoSQL	and	Other	Data	Stores
• Build	custom	streaming	resource	
libraries
• Search	and	analyze	data	from	
other	data	stores	in	Hunk
• In	partnership	with	leading	
NoSQL	vendors
• Use	in	conjunction	with	DB	
Connect	for	relational	database	
lookups
Virtual	Indexes
§ Enables	seamless	use	of	
almost	the	entire	Splunk	
stack	on	data
§ Automatically	handles	
MapReduce
§ Technology	is	patent	
pending
Data	Enrichment
Agenda
§ Tags – categorize	and	add	meaning	to	data
§ Field	Aliases – simplify	search	and	correlation
§ Calculated	Fields – shortcut	complex/repetitive	computations
§ Event	Types – group	common	events	and	share	knowledge
§ Lookups – augment	data	with	additional	external	fields
35
§ Adds	inline	meaning/context/specificity	to	raw	data
§ Used	to	normalize	metadata	or	raw	data
§ Simplifies	correlation	of	multiple	data	sources
§ Created	in	Splunk
§ Transferred	from	external	sources
What	is	Data	Enrichment?
36
§ Add	meaning/context/specificity	to	raw	data
§ Labels	describing	team,	category,	platform,	geography
§ Applied	to	field-value	combination
§ Multiple	tags	can	be	applied	for	each	field-value
§ Case	sensitive
Tags
37
Create	Tags
38
SHOW
§ Search	events	with	tag	in	any	field
§ Search	events	with	tag	in	a	specific	field
§ Search	events	with	tag	using	wildcards
Find	the	Web	Servers
Tags	in	Action
39
tag=webserver
tag::host=webserver
tag=web*
§ Tag	the	host	as	
webserver
§ Tag	the	sourcetype	
as	web
1
2
3
4
5
SHOW
Back	to	
Slides
§ Normalize	field	labels	to	simplify	search	and	correlation
§ Apply	multiple	aliases	to	a	single	field
§ Example:	Username	|	cs_username |	User	à user
§ Example:	c_ip |	client	|	client_ip à clientip
§ Processed	after	field	extractions	+	before	lookups
§ Can	apply	to	lookups
§ Aliases	appear	alongside	original	fields
Field	Aliases
40
Re-Label	Field	to	Intuitive	Name
Create	Field	Alias
41
1
2
3
SHOW
§ Create	field	alias	of	clientip	=	customer
§ Search	events	in	last	15	minutes,	find	
customer	field
§ Field	alias	(customer)	and	original	field	
(clientip)	are	both	displayed
Search	using	an	Intuitive	Field	Name
Field	Alias	in	Action
42
1
3
2
sourcetype=access_combined
SHOW
§ Shortcut	for	performing	
repetitive/long/complex	
transformations	using	
eval	command
§ Based	on	extracted	or	
discovered	fields	only
§ Do	not	apply	to	lookup	or	
generated	fields
Calculated	Fields
43
Compute	Kilobytes	from	Bytes
Create	Calculated	Field
44
1
2
1
2
3
SHOW
§ Create	kilobytes	=	bytes/1024
§ Search	events	in	last	15	minutes	for	
kilobytes	and	bytes
Search	Using	Kilobytes	instead	of	Bytes
Calculated	Fields	in	Action
45
1
2
sourcetype=access_combined
SHOW
Back	to	
Slides
§ Classify	and	group	common	events
§ Capture	and	share	knowledge
§ Based	on	search
§ Use	in	combination	with	fields	and	tags	to	define	
event	topography
Event	Types
46
§ Best	Practice:	Use	punct	field
§ Default	metadata	field	describing	event	structure
§ Built	on	interesting	characters:	",;-#$%&+./:=?@'|*nr"(){}<>[]^! »
§ Can	use	wildcards	
Create	Event	Types
47
event punct
####<Jun	3,	2014	5:38:22	PM	MDT>	<Notice>	
<WebLogicServer>	<bea03>	<asiAdminServer>	
<WrapperStartStopAppMain>	<>WLS	Kernel<>	<>	
<BEA-000360>	<Server	started	in	RUNNING	mode>
####<_,__::__>_<>_<>_<>_<>_<>_
172.26.34.223	- - [01/Jul/2005:12:05:27	-0700]	
"GET	/trade/app?action=logout	HTTP/1.1"	200	2953
..._-_-_[:::_-]_"_?=_/."__
§ Show	punct	for	sourcetype=access_combined
§ Pick	a	punct,	then	wildcard	it	after	the	timestamp
§ Add	NOT	status=200
§ Save	as	“bad”	event	type	+	Color:red	+	Priority:1	(shift	
reload	in	browser	to	show	coloring)
Classify	Events	as	Known	Bad
Create	Event	Type
48
eventtype=bad
sourcetype="access_combined" punct="..._-_-_[//_:::]*" NOT status=200
1
2
3
4
SHOW
Back	to	
Slides
Lookups	to	Enrich	Raw	Data
LDAP
AD
Watch
Lists
CRM/
ERP
CMDB
External	Data	Sources
Insight	comes	out
Data	goes	inCreate	additional	fields	
from	the	raw	data	with	
a	lookup	to	an	external	
data	source
§ Augment	raw	events	with	additional	fields
§ Provide	context	or	supporting	details
§ Translate	field	values	to	more	descriptive	data
§ Example:	add	text	descriptions	for	error	codes,	IDs
§ Example:	add	contact	details	to	user	names	or	IDs
§ Example:	add	descriptions	to	HTTP	status	codes
§ File-based	or	scripted	lookups
Lookups
50
51
1.	Upload/create	table
2.	Assign	table	to	lookup	object
3.	Map	lookup	to	data	set
Convert a Code into a Description
Configure a Static Lookup
SHOW
§ Get	the	lookup	from	the	Splunk	Wiki	(save	to	.csv file)
http://wiki.splunk.com/Http_status.csv
§ Lookup	table	files	>	Add	new
§ Name:	http_status.csv (must	have	.csv file	extension)
§ Upload:	<path	to	.csv>
§ Verify	lookup	was	created	successfully
1.	Create	HTTP	Status	Table
52
SHOW
| inputlookup http_status.csv
1
2
3
§ Lookup	definitions	>	Add	new
§ Name:	http_status
§ Type:	File-based
§ Lookup	file:	http_status.csv
§ Invoke	the	lookup	manually
2.	Add	Lookup	Definition
53
SHOW
1
2
sourcetype=access_combined | lookup
http_status status OUTPUT status_description
§ Automatic	lookups	>	Add	new
§ Name:	http_status (cannot	have	spaces)
§ Lookup	table:	http_status
§ Apply	to:	sourcetype	=	access_combined
§ Lookup	input	field:	status
§ Lookup	output	field:	status_description
§ Verify	lookup	is	invoked	automatically
3.	Configure	Automatic	Lookup
54
SHOW
1
2
sourcetype=access_combined
Back	to	
Slides
§ Temporal	lookups	for	time-based	lookups
§ Example:	Identify	users	on	your	network	based	on	their	IP	address	
and	the	timestamp	in	DHCP	logs
§ Use	search	results	to	populate	a	lookup	table
§ … | outputlookup <tablename|filename>
§ Call	an	external	command	or	script
§ Python	scripts	only
§ Example:	DNS	lookup	for	IP	ßà Host
§ Create	a	lookup	table	using	a	relational	database
§ Review	matches	against	a	database	column	or	SQL	query
Fancy	Lookups
55
§ Creating	and	Managing	Alerts	(Job	Inspector)
§ Macros
§ Workflow	Actions
More	Data	Enrichment
56
Level	Up	on	Search	&
Reporting	Commands
Agenda
§ Doing	more	with	basic	search	commands
§ Advanced	search	commands
§ Doing	more	with	basic	reporting	commands
58
Search	Syntax	Components
59
Anatomy	of	a	Search
60
Disk
§ top	– limit
§ rare	– same	options	as	top
§ timechart	– parameters
§ stats	– functions	(sum,	avg,	list,	values,	sparkline)
§ sort	– inline	ascending	or	descending
§ addcoltotals
§ addtotals
Doing	More	with	Basic	Search	Commands
61
Workshop	Notes	for	Presenter
Tip	#5:	In	the	next	section,	after	each	search,	have	the	
participants	save	the	search	as	a	dashboard	panel.	At	the	end	
of	the	workshop,	they	will	have	a	living	document	of	the	
workshop	exercises	to	reference	later.
A	complete	version	of	this	dashboard	is	packaged	as	an	app.		
It	is	uploaded	to	the	Box	folder	as	a	leave	behind.
62
§ Commands	have	parameters	or	qualifiers
§ top	and	rare	have	similar	syntax
§ Each	search	command	has	its	own	syntax	– show	inline	help
Find	Most	and	Least	Active	Customers
Using	the	top	+	rare	Commands
... | top limit=20 clientip
... | rare limit=20 clientip
IPs	with	the	
most	visits
IPs	with	the	
least	visits
SHOW
§ Sort	inline	descending	or	ascending
64
... | stats count by clientip | sort - count
... | stats count by clientip | sort + count
Number	of	requests	by	
customer	- descending
Number	of	requests	by	
customer	- ascending
Sort	the	Number	of	Customer	Requests
Using	the	sort	Command
SHOW
§ Show	Search	Command	Reference	Docs
§ Functions	for	eval	+	where
§ Functions	for	stats	+	chart	and	timechart
§ Invoke	a	function
§ Rename	inline
65
... | stats sum(bytes) by clientip | sort - sum(bytes)
... | stats sum(bytes) as totalbytes by clientip | sort - totalbytes
Total	payload	by	
customer	- descending
Total	payload	by	
customer	- ascending
Determine	Total	Customer	Payload
Using	functions	+	rename	command
SHOW
§ List	all	values	of	a	field
§ List	only	distinct	values	of	a	field
66
... | stats values(action) by clientip
... | stats list(action) by clientip
Activity	by	customer
Distinct	actions	by	
customer
Observe	Customer	Activity
Using	the	list	+	values	Functions
SHOW
§ Show	distinct	actions	and	cardinality	of	each	action
67
sourcetype=access_combined
| stats count(action) as value by clientip, action
| eval pair=action + " (" + value + ")"
| stats list(pair) as values by clientip
Analyze	Customer	Activity
Combine	list	+	values	Functions
SHOW
§ Add	columns
§ Sum	specific	columns
68
... | stats count by clientip, action
2	cols:	clientip +	action
... | stats sum(bytes) as totalbytes, avg(bytes) as avgbytes,
count as totalevents by clientip | addcoltotals totalbytes,
totalevents
Sum	totalbytes	and	
totalevents	colums
Building	a	Table	of	Customer	Activity
Add	Columns	and	Sum	Columns
SHOW
69
... | stats sum(bytes) as totalbytes, sum(other) as totalother
by clientip | addtotals fieldname=totalstuff
For	each	row,	add	
totalbytes	+	totalother
A	better	example:
physical	memory	+	virtual	memory	=	
total	memory
Building	a	Table	of	Customer	Activity
Sum	Across	Rows
SHOW
70
... | stats sparkline(count) as trendline by clientip
In	context	of	
larger	event	set	
... | stats sparkline(count) as trendline sum(bytes) by clientip
Inline	in	tables
Trend	Individual	Customer	Activity
Sparklines	in	Action
SHOW
Back	to	
Slides
Advanced	Search	Commands
Command Short	Description Hints
transaction Group	events	by	a	common	field	value. Convenient,	but resource	intensive.
cluster Cluster	similar	events	together.	 Can	be	used	on	_raw	or	field.
associate Identifies	correlations	between	fields. Calculates	entropy	btn field	values.
correlate Calculates	the	correlation	between	
different	fields.	
Evaluates	relationship	of all	fields	in	
a	result	set.
contingency Builds	a	contingency	table	for	two	fields.	 Computes	co-occurrence,	or	%	two	
fields	exist	in	same	events.
anomalies Computes	an	unexpectedness	score	for	
an	event.
Computes	similarity	of	event	(X)	to	a	
set	of	previous	events	(P).
anomalousvalue Finds	and	summarizes	irregular,	or	
uncommon,	search	results.
Considers frequency	of	occurrence	
or	number	of	stdev from	the	mean
§ Sew	events	together	+	creates	duration	+	eventcount
§ Sparklines	inline	in	tables
72
... | transaction JSESSIONID | table JSESSIONID, action, product_id
Group	by	
JSESSIONID
View	Customer	Activity	by	Session
Using	the	transaction	Command
SHOW
§ Intelligent	group	(creates	cluster_count	and	cluster_label)
§ Sparklines	inline	in	tables
Cluster
73
SHOW
... | cluster showcount=1 | table _raw, cluster_count, cluster_label
Back	to	
Slides
§ Predict	over	time
§ Chart	Overlay	with	and	without	streamstats
§ Maps	with	iplocation	+	geostats
§ Single	value
§ Metered	visuals	with	gauge
Doing	More	with	Basic	Reporting	Commands
74
§ Predict	future	values	using	lower/upper	bounds	– single	and	multiple	series
75
... | timechart count as traffic | predict traffic
Predict	Website	Traffic
Using	the	predict	Command
SHOW
76
sourcetype=access_combined (action=view OR action=purchase)
| timechart span=10m count(eval(action="view")) as Viewed,
count(eval(action="purchase")) as Purchased
Compare	Browsing	vs.	Buying	Activity
Simple	Chart	Overlay
SHOW
77
... | iplocation clientip | geostats count by clientip
Combine	IP	lookup	
with	geo	mapping
Map	Customer	Activity Geographically
Geolocation in	Action
SHOW
78
... | stats count
Display	a	Simple	Count	of	Events
Single	Value	in	Action
SHOW
Display	Counts	Using	Gauges
Single	Value,	Radial	and	Filler	Gauges	in	Action
79
... | stats count | gauge count 10000 20000 30000 40000 50000
SHOW
Back	to	
Slides
Data	Model	and	Pivot
Agenda
§ What	is	a	data	model?
§ Build	a	data	model
§ Pivot	Interface
§ Accelerate	a	data	model
81
Powerful	Analytics	Anyone	Can	Use
Enables	non-technical	users	to	build	complex	
reports	without	the	search	language
Provides	more	meaningful	representation	
of	underlying	raw	machine	data
Acceleration	technology	delivers	up	to	
1000x	faster	analytics	over	Splunk	5
82
Pivot
Data	
Model
Analytics
Store
Define	Relationships	in	Machine	Data
Data	Model
• Describes	how	underlying	
machine	data	is	represented	
and	accessed
• Defines	meaningful	
relationships	in	the	data	
• Enables	single	authoritative	
view	of	underlying	raw	data
Hierarchical	object	view	of	underlying	data
Add	constraints	to	
filter	out	events
Transparent	Acceleration
• Automatically	collected
– Handles	timing	issues,	
backfill…
• Automatically	maintained
– Uses	acceleration	window
• Stored	on	the	indexers
– Peer	to	the	buckets
• Fault	tolerant	collection
Time	window	of	data	
that	is	accelerated
Check	to	enable	
acceleration	of	
data	model	
High	Performance	
Analytics	Store
Easy-to-Use	Analytics
• Drag-and-drop	interface	
enables	any	user	to	analyze	
data	
• Create	complex	queries	and	
reports	without	learning	
search	language
• Click	to	visualize	any	chart	
type;	reports	dynamically	
update	when	fields	change
Select	fields	from	
data	model
Time	window
All	chart	types	available	in	the	chart	toolbox
Save	report	
to	share
Pivot
§ Defines	least	common	denominator	for	a	
data	domain
§ Standard	method	to	parse,	categorize,	
normalize	data	
§ Set	of	field	names	and	tags	by	domain
§ Packaged	as	a	Data	Models	in	a	Splunk	App
§ Domains:	security,	web,	inventory,	JVM,
performance,	network	sessions,	and	more
§ Minimal	setup	to	use	Pivot	interface
Common	Information	Model	(CIM)	App
86
§ Apps	>	Find	More	Apps	>
§ Search:	“Common	Information	Model”
§ Install	free
§ Show	fields	for	web	+	Web	Data	Model
Download	CIM	App
87
SHOW
1
2
3
4
Back	to	
Slides
Data	Model	&	Pivot	Tutorial
http://docs.splunk.com/Documentation/Splunk/latest/PivotTuto
rial/WelcometothePivotTutorial
88
Custom	Visualizations	
and	the	Web	
Framework	Toolkit
Agenda
§ Developer	Platform
§ Web	Framework	Toolkit	(WFT)
§ REST	API	and	SDKs
§ Get	a	Flying	Start
90
Optimizing	the	Analytics	Process
91
Focus	on	the	data	– intuitive	tools	
to	enable	the	analyst
No	single	visualization	exists	to	
handle	all	data	sets.	
Never	lose	sight	of	the	raw	data
Splunk
Analytics
Explore
Context
Visualize
Algorithms
6.0	+	6.1:	Simple,	Interactive,	and	Extensible
92
VISUALIZATION	
EXPLORATION
CUSTOMIZABLE	
FRAMEWORK
POWERFUL	
ANALYTICS
Pivot
Data	Models
Interactive	Forms
Contextual	Drilldown
Dashboard	Editor
Web	Framework
The	Splunk	Enterprise	Platform
Collection
Indexing
Search	Processing	Language
Core	Functions
Inputs,	Apps,	Other	Content
SDKContent
Core	Engine
User	and	Developer	Interfaces
Web	Framework
REST	API
What’s	Possible	with	the	Splunk	Enterprise	Platform?
Power	
Mobile	
Apps
Log	
Directly
Extract	
Data
Customer	
Dashboards
Integrate	
BI	Tools
Integrate	
Platform
Services
Developer Platform
Powerful	Platform	for	Enterprise	Developers
Developers Can Customize and Extend
REST	API
Build	Splunk	Apps Extend	and	Integrate	Splunk
Simple	XML
JavaScript
HTML5
Web	
Framework
Java
JavaScript
Python
Ruby
C#
PHP
Data	Models
Search	Extensibility
Modular	Inputs
SDKs
Splunk	Software	for	Developers
Gain	
Application	
Intelligence
Build	Splunk	
Apps
Integrate	and	
Extend	Splunk
A	Wealth	of	Splunk Apps
Over	1,100	apps	available	on	the	Splunk	apps	site
API
SDKs UI
Server, Storage,
Network
Server
Virtualization
Operating
Systems
Custom
Applications
Business
Applications
Cloud Services
App Performance
Monitoring
Ticketing/ and Other
Web	Intelligence
Mobile
Applications
Stream
§ Interactive,	cut/paste	examples	from	popular	
source	repositories:	D3,	GitHub,	jQuery
§ Splunk	6.x	Dashboard	Examples	App
https://apps.splunk.com/app/1603
§ Custom	SimpleXML Extensions	App
https://apps.splunk.com/app/1772
§ Splunk	Web	Framework	Toolkit	App
https://apps.splunk.com/app/1613
Example	Advanced	Visualizations
98
99
http://www.d3js.org
Add	a	D3	Bubble	Chart
100
1. Go	to	Find	More	Apps	and	Install	the
Splunk	6.x	Dashboard	Examples	App
2. Enter	the	App
3. Go	to	Examples	>	Custom	Visualizations	>
D3	Bubble	Chart
4. Copy	autodiscover.js (file)	+	components/bubblechart (dir)
from:	$SH/etc/apps/simple_xml_examples/appserver/static
to:		$SH/apps/search/appserver/static
5. Copy	and	paste	simple	XML	to	new	dashboard
SHOW
Back	to	
Slides
Resources
Splunk	Documentation
102
• http://docs.splunk.com
• Official	Product	Docs
• Wiki	and	community	topics
• Updated	daily
• Can	be	printed	to	.PDF
Splunk	Answers
103
• http://answers.splunk.com
• Community	driven
• Splunk	supported
• Knowledge	exchange
• Q	&	A
Splunk	Education
104
• Recommended	for	Users
– Using	Splunk
– Searching	&	Reporting
• Recommended	for	UI/Dashboard	Developers
– Developing	Apps
• Instructor-Led	Courses
– Web
– Onsite

More Related Content

What's hot

SplunkLive! Utrecht - Splunk for Security - Monzy Merza
SplunkLive! Utrecht - Splunk for Security - Monzy MerzaSplunkLive! Utrecht - Splunk for Security - Monzy Merza
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
Splunk
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security Intelligence
Splunk
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
Shannon Cuthbertson
 
Best Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The EnteprriseBest Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The Enteprrise
Splunk
 
Gov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior AnalyticsGov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior Analytics
Splunk
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
Splunk
 
SplunkLive! München 2016 - Splunk für Security
SplunkLive! München 2016 - Splunk für SecuritySplunkLive! München 2016 - Splunk für Security
SplunkLive! München 2016 - Splunk für Security
Splunk
 
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
Splunk
 
Gov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior AnalyticsGov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior Analytics
Splunk
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
Gabrielle Knowles
 
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk
 
Enterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior AnalyticsEnterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior Analytics
Splunk
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
Splunk
 
Splunk for Security-Hands On
Splunk for Security-Hands OnSplunk for Security-Hands On
Splunk for Security-Hands On
Splunk
 
Splunk für Security
Splunk für SecuritySplunk für Security
Splunk für Security
Splunk
 
Splunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case StudySplunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case Study
Andrew Gerber
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
Splunk
 
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at IntuitSplunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Erin Sweeney
 
Splunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security SessionSplunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security Session
Splunk
 

What's hot (20)

SplunkLive! Utrecht - Splunk for Security - Monzy Merza
SplunkLive! Utrecht - Splunk for Security - Monzy MerzaSplunkLive! Utrecht - Splunk for Security - Monzy Merza
SplunkLive! Utrecht - Splunk for Security - Monzy Merza
 
Operationalizing Security Intelligence
Operationalizing Security IntelligenceOperationalizing Security Intelligence
Operationalizing Security Intelligence
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
 
Best Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The EnteprriseBest Practices For Sharing Data Across The Enteprrise
Best Practices For Sharing Data Across The Enteprrise
 
Gov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior AnalyticsGov Day Sacramento 2015 - User Behavior Analytics
Gov Day Sacramento 2015 - User Behavior Analytics
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
 
SplunkLive! München 2016 - Splunk für Security
SplunkLive! München 2016 - Splunk für SecuritySplunkLive! München 2016 - Splunk für Security
SplunkLive! München 2016 - Splunk für Security
 
SplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
 
SplunkLive! - Splunk for Security
SplunkLive! - Splunk for SecuritySplunkLive! - Splunk for Security
SplunkLive! - Splunk for Security
 
Gov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior AnalyticsGov & Education Day 2015 - User Behavior Analytics
Gov & Education Day 2015 - User Behavior Analytics
 
Splunk for Security
Splunk for SecuritySplunk for Security
Splunk for Security
 
Splunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk TrafficSplunk Stream - Einblicke in Netzwerk Traffic
Splunk Stream - Einblicke in Netzwerk Traffic
 
Enterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior AnalyticsEnterprise Sec + User Bahavior Analytics
Enterprise Sec + User Bahavior Analytics
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
 
Splunk for Security-Hands On
Splunk for Security-Hands OnSplunk for Security-Hands On
Splunk for Security-Hands On
 
Splunk für Security
Splunk für SecuritySplunk für Security
Splunk für Security
 
Splunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case StudySplunk for Security: Background & Customer Case Study
Splunk for Security: Background & Customer Case Study
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
 
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at IntuitSplunk .conf2011: Splunk for Fraud and Forensics at Intuit
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
 
Splunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security SessionSplunk Discovery Day Hamburg - Security Session
Splunk Discovery Day Hamburg - Security Session
 

Viewers also liked

Machine Data 101
Machine Data 101Machine Data 101
Machine Data 101
Splunk
 
Field Extractions: Making Regex Your Buddy
Field Extractions: Making Regex Your BuddyField Extractions: Making Regex Your Buddy
Field Extractions: Making Regex Your Buddy
Michael Wilde
 
Webinar: Was ist neu in Splunk Enterprise 6.5
Webinar: Was ist neu in Splunk Enterprise 6.5Webinar: Was ist neu in Splunk Enterprise 6.5
Webinar: Was ist neu in Splunk Enterprise 6.5
Splunk
 
Splunk Enterprise for IT Troubleshooting Hands-On
Splunk Enterprise for IT Troubleshooting Hands-OnSplunk Enterprise for IT Troubleshooting Hands-On
Splunk Enterprise for IT Troubleshooting Hands-On
Splunk
 
Machine Learning + Analytics in Splunk
Machine Learning + Analytics in SplunkMachine Learning + Analytics in Splunk
Machine Learning + Analytics in Splunk
Splunk
 
Art of the Possible with Splunk Analytics
Art of the Possible with Splunk AnalyticsArt of the Possible with Splunk Analytics
Art of the Possible with Splunk Analytics
Splunk
 
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenWie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Splunk
 
Machine Data 101 Hands-on
Machine Data 101 Hands-onMachine Data 101 Hands-on
Machine Data 101 Hands-on
Splunk
 
Delivering business value from operational insights at ING Bank
Delivering business value from operational insights at ING BankDelivering business value from operational insights at ING Bank
Delivering business value from operational insights at ING Bank
Splunk
 
Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017
Splunk
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
Splunk
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
Splunk
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
Splunk
 
Using splunk6.2 labs
Using splunk6.2 labsUsing splunk6.2 labs
Using splunk6.2 labs
Jagadish a
 
Getting started with Splunk
Getting started with SplunkGetting started with Splunk
Getting started with Splunk
Sanjib Dhar
 
Power of SPL
Power of SPLPower of SPL
Power of SPL
Tian Chen
 
SplunkLive! Washington DC May 2013 - Search Language Beginner
SplunkLive! Washington DC May 2013 - Search Language BeginnerSplunkLive! Washington DC May 2013 - Search Language Beginner
SplunkLive! Washington DC May 2013 - Search Language Beginner
Splunk
 
Security Hands-On - Splunklive! Houston
Security Hands-On - Splunklive! HoustonSecurity Hands-On - Splunklive! Houston
Security Hands-On - Splunklive! Houston
Splunk
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
Splunk
 
City of San Diego Customer Presentation
City of San Diego Customer PresentationCity of San Diego Customer Presentation
City of San Diego Customer Presentation
Splunk
 

Viewers also liked (20)

Machine Data 101
Machine Data 101Machine Data 101
Machine Data 101
 
Field Extractions: Making Regex Your Buddy
Field Extractions: Making Regex Your BuddyField Extractions: Making Regex Your Buddy
Field Extractions: Making Regex Your Buddy
 
Webinar: Was ist neu in Splunk Enterprise 6.5
Webinar: Was ist neu in Splunk Enterprise 6.5Webinar: Was ist neu in Splunk Enterprise 6.5
Webinar: Was ist neu in Splunk Enterprise 6.5
 
Splunk Enterprise for IT Troubleshooting Hands-On
Splunk Enterprise for IT Troubleshooting Hands-OnSplunk Enterprise for IT Troubleshooting Hands-On
Splunk Enterprise for IT Troubleshooting Hands-On
 
Machine Learning + Analytics in Splunk
Machine Learning + Analytics in SplunkMachine Learning + Analytics in Splunk
Machine Learning + Analytics in Splunk
 
Art of the Possible with Splunk Analytics
Art of the Possible with Splunk AnalyticsArt of the Possible with Splunk Analytics
Art of the Possible with Splunk Analytics
 
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenWie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
 
Machine Data 101 Hands-on
Machine Data 101 Hands-onMachine Data 101 Hands-on
Machine Data 101 Hands-on
 
Delivering business value from operational insights at ING Bank
Delivering business value from operational insights at ING BankDelivering business value from operational insights at ING Bank
Delivering business value from operational insights at ING Bank
 
Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017Softcat Splunk Discovery Day Manchester, March 2017
Softcat Splunk Discovery Day Manchester, March 2017
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
Building a Security Information and Event Management platform at Travis Per...
 	Building a Security Information and Event Management platform at Travis Per... 	Building a Security Information and Event Management platform at Travis Per...
Building a Security Information and Event Management platform at Travis Per...
 
Threat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-onThreat Hunting with Splunk Hands-on
Threat Hunting with Splunk Hands-on
 
Using splunk6.2 labs
Using splunk6.2 labsUsing splunk6.2 labs
Using splunk6.2 labs
 
Getting started with Splunk
Getting started with SplunkGetting started with Splunk
Getting started with Splunk
 
Power of SPL
Power of SPLPower of SPL
Power of SPL
 
SplunkLive! Washington DC May 2013 - Search Language Beginner
SplunkLive! Washington DC May 2013 - Search Language BeginnerSplunkLive! Washington DC May 2013 - Search Language Beginner
SplunkLive! Washington DC May 2013 - Search Language Beginner
 
Security Hands-On - Splunklive! Houston
Security Hands-On - Splunklive! HoustonSecurity Hands-On - Splunklive! Houston
Security Hands-On - Splunklive! Houston
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
City of San Diego Customer Presentation
City of San Diego Customer PresentationCity of San Diego Customer Presentation
City of San Diego Customer Presentation
 

Similar to Machine Data 101

SplunkLive! Wien 2016 - Splunk für Einsteiger
SplunkLive! Wien 2016 - Splunk für EinsteigerSplunkLive! Wien 2016 - Splunk für Einsteiger
SplunkLive! Wien 2016 - Splunk für Einsteiger
Splunk
 
SplunkLive! Zürich 2016 - Getting Started
SplunkLive! Zürich 2016 - Getting StartedSplunkLive! Zürich 2016 - Getting Started
SplunkLive! Zürich 2016 - Getting Started
Splunk
 
SplunkLive! Warsaw 2016 - Getting started with Splunk
SplunkLive! Warsaw 2016 - Getting started with SplunkSplunkLive! Warsaw 2016 - Getting started with Splunk
SplunkLive! Warsaw 2016 - Getting started with Splunk
Splunk
 
Getting Started with Splunk Hands-on
Getting Started with Splunk Hands-onGetting Started with Splunk Hands-on
Getting Started with Splunk Hands-on
Splunk
 
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk - Verwandeln Sie Datensilos in Operational IntelligenceSplunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk
 
Client & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit SplunkClient & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit Splunk
Georg Knon
 
Client & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit SplunkClient & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit Splunk
Georg Knon
 
Using Big Data for Cybersecurity
Using Big Data for CybersecurityUsing Big Data for Cybersecurity
Using Big Data for Cybersecurity
Splunk
 
Novinky F5
Novinky F5Novinky F5
Virtual Gov Day - Application Delivery Breakout - Overview
Virtual Gov Day - Application Delivery Breakout - OverviewVirtual Gov Day - Application Delivery Breakout - Overview
Virtual Gov Day - Application Delivery Breakout - Overview
Splunk
 
LNETM - Atsign - Privacy with Personal Data Services
LNETM - Atsign - Privacy with Personal Data ServicesLNETM - Atsign - Privacy with Personal Data Services
LNETM - Atsign - Privacy with Personal Data Services
Chris Swan
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
Eric Vétillard
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
BeyondTrust
 
ASMC 2017 - Martin Vliem - Security &lt; productivity &lt; security: syntax ...
ASMC 2017 - Martin Vliem -  Security &lt; productivity &lt; security: syntax ...ASMC 2017 - Martin Vliem -  Security &lt; productivity &lt; security: syntax ...
ASMC 2017 - Martin Vliem - Security &lt; productivity &lt; security: syntax ...
PlatformSecurityManagement
 
Implementing Big Data at the Speed of Business
Implementing Big Data at the Speed of BusinessImplementing Big Data at the Speed of Business
Implementing Big Data at the Speed of Business
DataWorks Summit
 
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Black Duck by Synopsys
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
Abdelhamid Limami
 
Data Onboarding Breakout Session
Data Onboarding Breakout SessionData Onboarding Breakout Session
Data Onboarding Breakout Session
Splunk
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
Splunk
 
Splunk for DevOps - Faster Insights - Better Code
Splunk for DevOps - Faster Insights - Better CodeSplunk for DevOps - Faster Insights - Better Code
Splunk for DevOps - Faster Insights - Better Code
Philipp Drieger
 

Similar to Machine Data 101 (20)

SplunkLive! Wien 2016 - Splunk für Einsteiger
SplunkLive! Wien 2016 - Splunk für EinsteigerSplunkLive! Wien 2016 - Splunk für Einsteiger
SplunkLive! Wien 2016 - Splunk für Einsteiger
 
SplunkLive! Zürich 2016 - Getting Started
SplunkLive! Zürich 2016 - Getting StartedSplunkLive! Zürich 2016 - Getting Started
SplunkLive! Zürich 2016 - Getting Started
 
SplunkLive! Warsaw 2016 - Getting started with Splunk
SplunkLive! Warsaw 2016 - Getting started with SplunkSplunkLive! Warsaw 2016 - Getting started with Splunk
SplunkLive! Warsaw 2016 - Getting started with Splunk
 
Getting Started with Splunk Hands-on
Getting Started with Splunk Hands-onGetting Started with Splunk Hands-on
Getting Started with Splunk Hands-on
 
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk - Verwandeln Sie Datensilos in Operational IntelligenceSplunk - Verwandeln Sie Datensilos in Operational Intelligence
Splunk - Verwandeln Sie Datensilos in Operational Intelligence
 
Client & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit SplunkClient & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit Splunk
 
Client & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit SplunkClient & Virtual User Experience Monitoring mit Splunk
Client & Virtual User Experience Monitoring mit Splunk
 
Using Big Data for Cybersecurity
Using Big Data for CybersecurityUsing Big Data for Cybersecurity
Using Big Data for Cybersecurity
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 
Virtual Gov Day - Application Delivery Breakout - Overview
Virtual Gov Day - Application Delivery Breakout - OverviewVirtual Gov Day - Application Delivery Breakout - Overview
Virtual Gov Day - Application Delivery Breakout - Overview
 
LNETM - Atsign - Privacy with Personal Data Services
LNETM - Atsign - Privacy with Personal Data ServicesLNETM - Atsign - Privacy with Personal Data Services
LNETM - Atsign - Privacy with Personal Data Services
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System CredentialsThe 5 Crazy Mistakes IoT Administrators Make with System Credentials
The 5 Crazy Mistakes IoT Administrators Make with System Credentials
 
ASMC 2017 - Martin Vliem - Security &lt; productivity &lt; security: syntax ...
ASMC 2017 - Martin Vliem -  Security &lt; productivity &lt; security: syntax ...ASMC 2017 - Martin Vliem -  Security &lt; productivity &lt; security: syntax ...
ASMC 2017 - Martin Vliem - Security &lt; productivity &lt; security: syntax ...
 
Implementing Big Data at the Speed of Business
Implementing Big Data at the Speed of BusinessImplementing Big Data at the Speed of Business
Implementing Big Data at the Speed of Business
 
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
Technical Due Diligence for M&A: A Perspective from Corporate Development at ...
 
Pentesting Android Apps
Pentesting Android AppsPentesting Android Apps
Pentesting Android Apps
 
Data Onboarding Breakout Session
Data Onboarding Breakout SessionData Onboarding Breakout Session
Data Onboarding Breakout Session
 
Splunk for IT Operations
Splunk for IT OperationsSplunk for IT Operations
Splunk for IT Operations
 
Splunk for DevOps - Faster Insights - Better Code
Splunk for DevOps - Faster Insights - Better CodeSplunk for DevOps - Faster Insights - Better Code
Splunk for DevOps - Faster Insights - Better Code
 

More from Splunk

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
Splunk
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
Splunk
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
Splunk
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
Splunk
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
Splunk
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
Splunk
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
Splunk
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
Splunk
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
Splunk
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
Splunk
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
Splunk
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
Splunk
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
Splunk
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
Splunk
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
Splunk
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
Splunk
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
Splunk
 

More from Splunk (20)

.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - Data analysis as a routine
 
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
 
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica).conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
 
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - Raiffeisen Bank International
 
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett .conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
 
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär).conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
 
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu....conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
 
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever....conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
 
.conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex).conf go 2023 - De NOC a CSIRT (Cellnex)
.conf go 2023 - De NOC a CSIRT (Cellnex)
 
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
 
Splunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11ySplunk - BMW connects business and IT with data driven operations SRE and O11y
Splunk - BMW connects business and IT with data driven operations SRE and O11y
 
Splunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go KölnSplunk x Freenet - .conf Go Köln
Splunk x Freenet - .conf Go Köln
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Data foundations building success, at city scale – Imperial College London
 Data foundations building success, at city scale – Imperial College London Data foundations building success, at city scale – Imperial College London
Data foundations building success, at city scale – Imperial College London
 
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
Splunk: How Vodafone established Operational Analytics in a Hybrid Environmen...
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote.conf Go Zurich 2022 - Keynote
.conf Go Zurich 2022 - Keynote
 
.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session.conf Go Zurich 2022 - Platform Session
.conf Go Zurich 2022 - Platform Session
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 

Recently uploaded

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

Machine Data 101