SlideShare a Scribd company logo
1 of 406
Download to read offline
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 1 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk 6.4 Administration
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 2 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Document Usage Guidelines
Y Should be used only for enrolled students
Y Not meant to be a self-paced document, an instructor is needed
Y Do not distribute
7 July 2016
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 3 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Course Prerequisites
Y Required:
– Using Splunk
– SplunkArchitecture Overview (eLearning)
Y Strongly Recommended:
– Searching and Reporting with Splunk
– Creating Splunk Knowledge Objects
Note
In order to receive credit for this
course, you must complete all lab
exercises.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 4 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Course Goals
Y Build and manage a production Splunk environment
Y Create and maintain Splunk indexes
Y Manage users, roles, and authentication options
Y Deploy forwarders with Forwarder Management
Y Configure common Splunk data inputs
Y Customize the input parsing process
Y Configure a distributed search environment
Y Monitor a Splunk instance with Management Console
Y Configure system alerts
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 5 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Course Outline
SettingupaSplunk Enterprise Environment
–  Mod1:SettingupSplunk
–  Mod2:LicenseManagement
–  Mod3:SplunkApps
–  Mod4:SplunkConfigurationFiles
–  Mod5:SplunkIndexManagement
–  Mod6:Users,Roles,andAuthentication
BuildingaBasicProduction Environment
–  Mod7:UniversalForwarders
–  Mod8:ForwarderManagement
SplunkInputs
–  Mod9:GettingDataIn
–  Mod10:MonitorInputs
–  Mod11:NetworkandScriptedInputs
–  Mod12:WindowsandAgentlessInputs
–  Mod13:Fine-tuningInputs
ParsingandSearching
–  Mod14:ParsingPhaseandDataPreview
–  Mod15:ManipulatingRawData
–  Mod16:SupportingKnowledgeObjects
–  Mod17:DistributedSearch
SplunkResourceManagement
–  Mod18:BasicPerformanceTuning
–  Mod19:ProblemIsolationOverview
–  Mod20:IntroductiontoLarge-scaleDeployment
–  CourseWrap-up
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 6 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module 1:
Setting up Splunk
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 7 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module Objectives
Y Describe the Splunk installation options
Y Identify Splunk instance types
Y Identify Splunk hardware requirements
Y List steps to install Splunk
Y Perform post-installation configuration tasks
Y Start, stop, and restart Splunk
Y Enable Distributed Management Console (DMC)
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 8 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Y Splunk can be deployed in a variety of configurations
Y Scales from a single server to a distributed infrastructure
–  Acceptsanytext data as input
–  Parsestheinputs into events
–  Storesevents in indexes
–  Searchesand reports
–  Authenticates users
Splunk Overview
DB
Servers
Networks Servers Web
Services
Mobile
Devices
Custom
Apps
Security
Any Text Data
Searching
Users
Input
Parsing
Indexing
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 9 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk Deployment – Standalone
Y Single Server
– All functions in a single instance of
Splunk
– For testing, proof of concept,
personal use, and learning
– This is what you get when you
download Splunk and install with
default settings
Y Recommendation
– Have at least one test/development
setup at your site
Parsing
Indexing
Input
Searching
Note
This is the initial configuration in
class.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 10 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk Deployment – Basic
Y Splunk server
– Similar to server in standalone
configuration
– Manage deployment of forwarder
configurations
Y Forwarders
– Forwarders collect data and send it
to Splunk servers
– Install forwarders at data source
(usually production servers)
Parsing
Indexing
Input
Searching
Forwarder
Management
Note
Your lab environment will evolve to
include a separate forwarder.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 11 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk Deployment – Distributed
Y Splunk can be distributed and scaled
in a variety of ways
–  Moreindexerstohandlemoreinput
–  MoreindexersANDsearchheadsto
handlemoresearching
Y Manage forwarder configurations
from a dedicated Deployment Server
Parsing
Indexing
Input
Searching
Search Head
Indexers
(Search peers)
Forwarders
Deployment
Server
Forwarder
Management
Note
You will add a single search peer
to your environment in a later lab
exercise.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 12 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Y Included in the Splunk Enterprise software package
Y Included in the Universal Forwarder software package
What Software Do You Install?
Indexer
(Search peer)
Search Head Heavy
Forwarder
Universal Forwarder
Deployment
Server
License
Master
Cluster
Master
Search Head
Cluster
Deployment Client
Splunk Enterprise
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 13 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Reference Servers
Y Hardware requirements and sizing are discussed in detail in
– Architecting and Deploying Splunk class
– docs.splunk.com/Documentation/Splunk/latest/Capacity/Referencehardware
Indexer Search Head
OS Linux or Windows 64-bit distribution
Network 1Gb Ethernet NIC
Optional second NIC for a management network
Memory 12 GB RAM
CPU Intel 64-bit chip architecture
12 CPU cores
Running at 2+ GHz
Intel 64-bit chip architecture
4 CPUs, quad-core per CPU
Running at 2+ GHz
Disk Disk subsystem capable of 800 IOPS 2 x 10K RPM 300GB SAS drives - RAID 1
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 14 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Further Reading: Hardware and Virtualization
Y System requirements
docs.splunk.com/Documentation/Splunk/latest/Installation/Systemrequirements#Recommended_hardware
Y Hardware capacity planning (Dimensions of a Splunk deployment)
docs.splunk.com/Documentation/Splunk/latest/Capacity/DimensionsofaSplunkEnterprisedeployment
Y Summary of performance recommendations
docs.splunk.com/Documentation/Splunk/latest/Capacity/Summaryofperformancerecommendations
Y Virtualization tech brief
www.splunk.com/web_assets/pdfs/secure/Splunk_and_VMware_VMs_Tech_Brief.pdf
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 15 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk Installation Overview
Y Pre-installation Checklist
– Start-up account
– Time synchronization
– Splunk ports
– Linux setting recommendations
Y Installation
– Splunk directory structure
Y Post-installation configuration
– Run Splunk at boot
– Configure system settings
– Optionally, enable Distributed Management Console
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 16 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Start-up Account
Y Best practice: Do not run Splunk as super-user
– For example, root on *NIX, administrator on Windows
Y  Create a user account that is used to run Splunk
– For input, Splunk must be able to access data sources
ê  On *NIX, /var/log is not typically open to non-root accounts
– On *NIX, non-root accounts cannot access ports < 1024
– On Windows
ê  Use a domain account if Splunk has to connect to other servers
ê  Otherwise, use a local machine account
– Make sure the Splunk account can access scripts used for inputs and alerts
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 17 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Time Synchronization
Y Best practice: Use a time synchronization service such as NTP
Y Splunk searches depend on accurate time
– Correct event timestamping is essential
Y It is imperative that your Splunk indexer and production servers have
standardized time configuration
– Clock skew between hosts can affect search results
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 18 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk Ports
Usage Splunk Enterprise Universal Forwarder
splunkd 8089	 8089
Splunk Web	 8000	 -
Web app-server proxy	 8065 -
KV Store	 8191 -
S2S receiving port(s)	 No default -
Any network/http input(s)	 No default No default
Index replication port(s)	 Optional (no default) -
Search replication port(s)	 Optional (no default) -
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 19 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Linux Setting Recommendations
Y Increase ulimit settings
– The following OS parameters need to be increased to allow for a large number of
buckets/forwarders/users
docs.splunk.com/Documentation/Splunk/latest/Troubleshooting/ulimitErrors
Y Turn Transparent Huge Pages (THP) off on Splunk Enterprise servers
docs.splunk.com/Documentation/Splunk/latest/ReleaseNotes/SplunkandTHP
ulimit -a
ulimit -c 1073741824 (1 GB) (unlimited)
ulimit -n 48 x default (48 x 1024 = 49,152) (65536)
ulimit -u 12 x default (12 x 1024 = 12,288) (258048)
core file size
open files
max user processes
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 20 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Installation
Y Download Splunk Enterprise from www.splunk.com/download
Y Installation: (as account running Splunk)
– *NIX – un-compress the .tar.gz file in the path you want Splunk to run from
– Windows – execute the .msi installer and follow the wizard steps
Y Complete installation instructions at:
docs.splunk.com/Documentation/Splunk/latest/Installation/Chooseyourplatform
Y After installation:
– Splunk starts automatically on Windows
– Splunk must be manually started on *NIX until boot-start is enabled
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 21 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Run Splunk at Boot
Y *NIX
– Splunk on *NIX does not auto-start at boot time (default)
– To enable boot-start, run as root:
– This modifies the *NIX boot-up configuration
ê  Modifies /etc/init.d depending on your *NIX flavor
– Pass the -user parameter to start Splunk as the correct user
Y Windows
ê  Runs as splunkd service and starts child processes
ê  The service starts and stops like any Windows services
#	./splunk	enable	boot-start	-user	splunker	
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 22 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk Directory Structure
Note
$SPLUNK_HOME depicted in the
documentation is not an exported
environment variable. It is used as
a placeholder for "the top directory
where Splunk is installed.”
SPLUNK_HOME is used in this
training.
SPLUNK_HOME
bin etc var
system apps users
search launcher <custom app>
lib
splunk
executables licenses, configs
indexes
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 23 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk Processes
splunkd
Y Runs on port 8089 (default) using SSL
Y Spawns and controls Splunk child
processes (helpers):
– Splunk Web proxy, KV store, and
Introspection services
– Each search, scripted input, or
scripted alert
Y Accesses, processes, and indexes
incoming data
Y Handles all search requests and
returns results
Splunk Web
Y Splunk browser-based user interface
– Provides both a search and
management front end for splunkd
process
Y Runs on port 8000 by default
– http://<server_name>:<port>	
Y Initial default login:
– Username: admin	
– Password: changeme
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 24 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk Web - Server Settings
Y Administrators can select Settings > Server settings > General settings
1
2
3
-  Overall server configuration
-  Used to set server options
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 25 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Describing General Settings
docs.splunk.com/Documentation/Splunk/latest/Security/
AboutsecuringyourSplunkconfigurationwithSSL
Identifies this server to
other Splunk servers
SPLUNK_HOME
Splunkd port
Default host name
assigned to events
from this server
Change if indexes are
on a different volume
Set minimum free space
- Prevents the file system from being filled by Splunk
- Splunk data loss can occur if this value is reached
Changes require a restart of Splunk
6
5
4
3
2
1
7
6
5
4
3
2
1
7
8191
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 26 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Restarting the Server from Splunk Web
1
2
3
Note
Any changes to General settings
generates a message. Clicking the
indicator opens a message
prompting you to restart.
You can also restart by selecting
Settings > Server controls or
from the CLI. (splunk	restart)
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 27 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
The Splunk Command Line Interface (CLI)
Y splunk is the program in the bin directory to run the CLI
– Same syntax on all supported platforms
Command Operation
splunk	help	 Display a usage summary
splunk	help	<object>	 Display the details of a specific object
splunk	[start	|	stop	|	restart]	 Manages the Splunk processes
splunk	start	–-accept-license	 Automatically accept the license without prompt
splunk	status	 Display the Splunk process status
splunk	show	splunkd-port	 Show the port that the splunkd listens on
splunk	show	web-port	 Show the port that Splunk Web listens on
splunk	show	servername	 Show the servername of this instance
splunk	show	default-hostname	 Show the default host name used for all data inputs
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 28 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Distributed Management Console (DMC)
Y Splunk collects a lot of data about itself
Y DMC is a Splunk admin-only app that lets you monitor and investigate
Splunk performance, resource usage, and more
Note
You will use DMC to monitor your
activities as you learn more about
Splunk components.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 29 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Enabling DMC in Standalone Mode
Y DMC runs un-configured in standalone mode by default
Y To enable, click Settings > General Setup >Apply Changes
3
2
1
The default server roles
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 30 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
More Resources
Y Splunk Documentation: http://docs.splunk.com/Documentation
Y SplunkApp Repository: https://splunkbase.splunk.com/
Y SplunkAnswers: http://answers.splunk.com/
Y Splunk Blogs: http://blogs.splunk.com/
Y Splunk Wiki: http://wiki.splunk.com/
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 31 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Lab Exercise 1 – Configure Splunk
Time: 15 - 20 minutes
Tasks:
– Log into Splunk Web
– Change your Splunk server name
– Restart Splunk
– Enable DMC and check the system overview
– Access your environment with SSH (Linux) or Remote Desktop Connection (Windows)
– Use Splunk CLI to confirm the status and changes
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 32 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Lab Exercise 1 – Configure Splunk (cont.)
ssh	{EIP}	
RDC	{EIP}	
Provision:
Go to Splunk Web with your browser
using the external IP address
(xxx.xxx.xxx.xxx:8000)
Verification:
Linux:
1.  Connect to your indexer via SSH
2.  Execute Splunk CLI
Windows:
1.  Connect to your indexer via RDC
2.  Run cmd to execute Splunk CLI
http://{EIP}:8000	
OR
Your
Computer
Your
Computer
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 33 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module 2:
License Management
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 34 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module Objectives
Y Identify license types
Y Describe license violations
Y Add and remove licenses
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 35 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Managing Licenses
Select Settings > Licensing
Change license group
Add a license
Check license alerts and violations
View stacks
Edit and add pools
Designate the license server type
– Master or slave
6
1
2
3
4
5
6
5
4
3
2
1
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 36 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk License Types
Y Enterprise trial license
– Downloads with product
– Features same as Enterprise except for 500mb per day limit
– Only valid for 60 days, after which one of the other 3 license types must be
activated
– Sales trial license is a trial Enterprise license of varying size and duration
Y Enterprise license
– Purchased from Splunk
– Full functionality for indexing, search head, deployment server, etc.
– Sets the daily indexing volume
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 37 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk License Types (cont.)
Y Free license
– Disables alerts, authentication, clustering, distributed search, summarization, and
forwarding to non-Splunk servers
– Allows 500mb/day of indexing and forwarding to other Splunk instances
– After 60 days on enterprise trial license, you'll be automatically prompted to convert to
this license type
ê  Canbeactivatedbefore60daysbychanginglicensetype
Y Forwarder license
– Sets the server up as a heavy forwarder
– Applies to non-indexing forwarders
– Allows authentication, but no indexing
Y Splunk license comparison: www.splunk.com/view/SP-CAAAE8W
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 38 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Adding a License
Y CanuseCLI,upload,orcopy&paste
–  Licensegroupchangerequiresarestart
Y Licensesarestoredunder
SPLUNK_HOME/etc/licenses	
Y Canaddmultiplelicenses(stacked)
splunk add licenses <path_to_file>
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 39 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
License Warnings and Violations
Y If the indexing exceeds the allocated daily quota in a pool, an alert is raised
– The daily license quota resets at midnight and you have until then to fix
Y If you don't correct the situation, the alert becomes a warning
– The warning message persists for 14 days
Y The fifth warning in a rolling 30-day period causes violation
– Search is disabled for all non-internal indexes
– All other features remain functional, such as indexing and forwarding
– Violation remains in effect for 30 days
– Free license gets only three warnings
Y To unlock the license and enable searching, contact Splunk Support or
Sales
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 40 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
What Counts As Daily License Quota?
Y All data that is indexed, regardless of source, sourcetype, or host
– About how much data you index each day
– Not about how much data you store in Splunk
Y What does not count as daily quota?
– Data that is replicated in a cluster
ê  Data is metered once; the copies do not count
– Summary indexes, using a summarization technique
– Splunk internal logs that are stored in _internal, _audit, etc.
– Data that is eliminated during the parsing process
– Metadata fields, search terms, etc.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 41 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Viewing Alerts
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 42 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Change to Slave
Change an instance to slave by
entering the master license server URI
License Master
with a license stack
All instances collectively share the stack entitlement
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 43 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Y Pools allow licenses to be subdivided and assigned to a group of indexers
– Can be created for a given stack
– Warnings and violations occur per pool
Y Example: Master has a stack for a total of 500GB
License Pooling
Default Pool
500 GB Shared Entitlement
Enterprise Stack with Single Pool
(Most common)
Pool 2
(200GB Entitlement)
Pool 3
(200GB Entitlement)
Default Pool
(100GB Entitlement)
Enterprise Stack with Multiple Pools
(Multi-tenant environment)
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 44 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Managing Soft License Warnings
Y DO NOT ignore license warnings
Y Proactively monitor the consumption of your Splunk license
– DMC provides a couple of alerts
– If possible, give yourself wiggle room by rearrange license pools
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 45 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Lab Exercise 2 –Add and Configure Splunk Licenses
Y Time: 15 – 20 minutes
Y Tasks:
– Add a license with Splunk Web UI (optionally with CLI)
– Enable DMCAlert -Total License Usage Near Daily Quota
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 46 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module 3:
Splunk Apps
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 47 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module Objectives
Y Describe Splunk apps and add-ons
Y Install an app on a Splunk instance
Y Manage app accessibility and permissions
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 48 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
.
.
.
What is an App?
Y An app is an independent collection of:
– Configuration files
ê  Defininginputs,indexes,sourcetypes,field
extractions,transformations
ê  Providingeventtypes,tags,reports,dashboards
andotherknowledgeobjects
– Scripts, web assets, etc.
Y  Most apps are focused on:
–  Aspecific type of data from a vendor, operating
system, or industry
–  Aspecific business need
Y  Apps may be installed on any Splunk instance
Y  Splunk includes a number default apps
app.conf	
tags.conf	
mylookup.csv	
indexes.conf	
myviews.xml	
default.meta	
transforms.conf	
props.conf	
inputs.conf	
App B
App A
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 49 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
View All Installed Apps
Y From the Search app, select Apps > ManageApps
Y Or, from the Home view, click
Y Apps can be Visible or hidden
– Several apps are installed by default that are hidden or disabled
ê  Internal apps used by Splunk should not be modified
ê  Legacy apps
ê  Sample apps
Y Apps are installed under SPLUNK_HOME/etc/apps	
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 50 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Managing Apps
Controls who can
use/modify an app
Enable or disable
an app
Add more apps
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 51 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Installing an App from splunkbase.splunk.com
Y From the Apps page, click Browse more apps
Y Or, click Apps > Find MoreApps
– Splunk Web will try to access splunkbase.splunk.com
– Search and browse to find the app you want
– Select Install (most apps are free)
ê  You must provide your Splunk.com user ID and password
ê  The app is installed into a sub-directory below SPLUNK_HOME/etc/apps	
ê  Some apps may require a restart
Y Or, go directly to splunkbase.splunk.com and download the app as a file
Note
Anyone can sign up for a user
account in Splunk.com.
A support contract is not required.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 52 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Installing an App From a File
Y Download the file for the app from splunkbase.splunk.com
– The file may be a .tar.gz, .tgz, .zip, or .spl file
Y Install the app:
– From Splunk Web, click Install app from file
– Using the CLI
splunk	install	app	path-to-appfile	
– Or extract the app in the proper location
cd	SPLUNK_HOME/etc/apps	
tar	–xf	path-to-appfile	
Y Some apps may require a restart
Y Configure the app after the install according to its documentation
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 53 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Apps on Forwarders?
Y Universal forwarders don't have a web interface, but they can still benefit
from an app
Y An add-on is a subset of an app
– Usually contains data collection but no GUI (reports or dashboards)
Y To install an add-on or app on a forwarder
– Run the CLI command described earlier, or
– Deploy it using a deployment server
ê  deployment server is discussed in a later module
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 54 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Deleting an App
Y When you delete an app, all of its related configurations and scripts are
removed from a Splunk server
– User’s private app artifacts remain untouched
Y To remove an app:
– splunk	remove	app	<app_folder>
– Or, navigate to SPLUNK_HOME/etc/apps and delete the app's folder and all its
contents
– Restart the Splunk server
Y It can be reinstalled later
Y Alternatively, either disable it or move it to another (backup) location
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 55 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
App Permissions
Y Users with read permission can see the
app and use it
Y Users with write permission can add/
delete/modify knowledge objects used in
the app
– By default, the user role does not have write
permissions within the search app
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 56 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Lab Exercise 3 -- Install an App
Y Time: 5 - 10 minutes
Y Tasks:
– Download an app
– Install the app
– Change the app permission
– Verify if the app's dashboard displays reports
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 57 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module 4:
Splunk Configuration Files
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 58 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module Objectives
Y Describe Splunk configuration directory structure
Y Understand configuration layering process
– Index-time process
– Search-time process
Y Use btool to examine configuration settings
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 59 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Y Each configuration file governs a particular aspect of Splunk functionality
Y All configuration changes are saved in .conf files under SPLUNK_HOME/etc/...	
– .conf files are text files using a simple stanza
and name/value (attribute) format
– The syntax is case-sensitive
Y You can change settings using Splunk Web, CLI, SDK,
app install, and/or direct edit
Y All .conf files have documentation and examples:
– SPLUNK_HOME/etc/system/README	
ê  *.conf.spec	
ê  *.conf.example
ê  Splunkdocumentation: docs.splunk.com
Splunk Configuration Files
[default]
host=www
[monitor:///var/log/httpd]
sourcetype = access_common
ignoreOlderThan = 7d
index = web
Splunk Web
CLI SDK
inputs.conf
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 60 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Configuration Directories
SPLUNK_HOME
etc
system apps users
joe mary admin
search
unix
local
local
default local unix
default local
search
default local
Out-of-the-box
Custom
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 61 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Default vs. Local Configuration
Y Splunk ships with default .conf files
– Stored in the default directories
Y Add all configurations and edits to the
local directory
– Most configurations apply to only one app
Y Avoid storing configurations in
SPLUNK_HOME/etc/system
– Use the Searching and Reporting app
as the default location for storing your
configurations that are not app-specific
default local
Shipped with
Splunk or the app
Y Overwritten on
update
Y Do not modify
Your specific
configuration
changes
Y Preserved on
update
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 62 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Index time vs. Search time
Y The priority of layered configurations are based on the context
– Global context: a network input to collect syslog data
– App/User context: Mary's private report in the Search app
Y For a list of configuration files and their context, go to:
docs.splunk.com/Documentation/Splunk/latest/Admin/Wheretofindtheconfigurationfiles
Index time Global context User-independent and background tasks
such as inputs, parsing, indexing, etc.
Search time App/User context User-related activity, such as searching
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 63 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
default
SPLUNK_HOME
etc
system apps
default local unix
default local
search
local
Index-Time Precedence
1.  etc/system/local
2.  etc/apps/search/local
3.  etc/apps/unix/local
4.  etc/apps/search/default
5.  etc/apps/unix/default
6.  etc/system/default
6 1
5 3 4 2
Server is performing
non-user background
processing
Note
If two or more apps at the same
level of precedence have conflicts
between them, the conflicts are
resolved in ASCII order by app
directory name.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 64 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
SPLUNK_HOME
etc
system apps users
joe mary admin
search
unix
local
local
default local unix
default local
search
default local
Search Time Precedence Order
7
1
3 2 5 4
Example:
user mary working in
the unix app context
6
Note
Splunk evaluates and if
objects from the app are exported
globally with .meta file setting.
5
4
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 65 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Runtime Merging of Configurations
Y When Splunk starts, configuration files are merged together into a single
run-time model for each file type
– Regardless of the number of inputs.conf files in various apps or the system
path, only one master inputs configuration model exists in memory at runtime
Y If there are no duplicate stanzas or common settings between the files, the
result is the union of all files
Y If there are conflicts, the setting with the highest precedence is used
– Remember that local always takes precedence over default	
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 66 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Example of Runtime Merging (No Conflict)
[a]	
x=1	
y=2	
	
[b]	
j=1	
k=2	
[b]	
p=1	
q=1	
	
[c]	
s=1	
t=2	
[a]	
x=1	
y=2	
	
[b]	
j=1	
k=2	
p=1	
q=1	
	
[c]	
s=1	
t=2	
SPLUNK_HOME/etc/
system/local/
example.conf
SPLUNK_HOME/etc/
apps/search/local/
example.conf
Runtime
example.conf
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 67 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Example of Runtime Merging (Conflict)
[a]	
x=1	
y=2	
	
[b]	
x=0	
z=2	
[b]	
x=1	
y=1	
	
[c]	
x=1	
y=2	
[a]	
x=1	
y=2	
	
[b]	
x=0	
y=1	
z=2	
	
[c]	
x=1	
y=2	
SPLUNK_HOME/etc/
system/local/
example.conf
SPLUNK_HOME/etc/
apps/search/local/
example.conf
Runtime
example.conf
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 68 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Configuration Validation Command
Y splunk	btool	conf-name	list	[options]	
– Shows on-disk configuration for requested file
– Useful for checking the configuration scope and permission rules
ê  Use--debugtodisplaytheexact .conffilelocation
ê  Add--user=<user>--app=<app>toseetheuser/appcontextlayering 	
Y Examples:
–  splunk	help	btool	
–  splunk	btool	check	
–  splunk	btool	inputs	list	
–  splunk	btool	inputs	list	monitor:///var/log	
–  splunk	btool	inputs	list	monitor:///var/log	--debug	
docs.splunk.com/Documentation/Splunk/latest/Troubleshooting/Usebtooltotroubleshootconfigurations
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 69 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Scenario: Where are the /var/log/secure.log input configurations specified?
btool Example
>	splunk	btool	inputs	list	monitor:///var/log/secure.log	--debug	
	
		etc/apps/search/local/inputs.conf					[monitor:///var/log/secure.log]	
		etc/system/local/inputs.conf										host	=	myIndexer	
		etc/system/default/inputs.conf								index	=	default	
		etc/apps/search/local/inputs.conf					sourcetype	=	linux_secure	
	
[monitor:///var/log/secure.log]	
host=myIndexer	
	
[monitor:///var/log/secure.log]	
sourcetype=linux_secure	
host=webserver	
etc/system/local/inputs.conf etc/apps/search/local/inputs.conf
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 70 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Overriding Defaults
Y There are default settings in SPLUNK_HOME/etc/system/default and
SPLUNK_HOME/etc/apps/search/default	
Y The correct method to override these settings, if needed, is to do so in the
local directory at the same scope
– Only add the items you are overriding—not a whole copy of the default conf file
Y Example:
– To disable a default attribute TRANSFORMS for [syslog]:
#	etc/system/default/props.conf	
[syslog]	
TRANSFORMS	=	syslog-host	
REPORT-syslog	=	syslog-extractions	
...	
#	etc/system/local/props.conf	
[syslog]	
TRANSFORMS	=	
	
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 71 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Reloading Configuration Files After Edit
Y Changes made using Splunk Web or the CLI do not require restart
– Amessage appears if restart is required (i.e. changing server settings)
Y Changes made manually are not automatically detected
Y To force reload, go to http://servername:webport/debug/refresh	
– Reloads many of the configurations, including inputs.conf, but not all
Y To reload all configurations, restart Splunk
– Splunk Web: Settings > Server controls > Restart Splunk
– CLI: splunk	restart	
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 72 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Lab Exercise 4 – Configuration Files
Y Time: 15 – 20 minutes
Y Tasks:
– Run the same search as different users
– Check the search results and compare
– Use the btool command to investigate the configurations
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 73 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module 5:
Splunk Index
Management
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 74 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module Objectives
Y Understand index structure and buckets
Y Create new indexes
Y Apply a data retention policy
Y Monitor indexes with DMC
Y Enable index integrity check
Y Reset monitor input checkpoints
Y Delete data from an index
Y Back up and restore frozen data
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 75 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Y Splunk stores events in indexes under
SPLUNK_HOME/var/lib/splunk		
–  SetinSettings > Server Settings
–  Canoverride on a per-index basis
Y The main index is
–  Usedwhenan input does not specifyanindex
–  Agoodexampleofahighvolumeindex
–  Locatedindefaultdbdirectory
Y Splunk users can explicitly specify which
index(es) to search
What are Indexes?
index=web	action=purchase	
main web
[Input	X]	
[Input	Y]	
index	=	web	
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 76 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Preconfigured Indexes
Splunk ships with several indexes already set up besides main:
summary – default index for summary indexing system
_internal – Splunk indexes its own logs and metrics from its processing here
_audit – Splunk stores its audit trails and other optional auditing information
_introspection – tracks system performance and Splunk resource usage data
_thefishbucket – contains checkpoint information for file monitoring inputs
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 77 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Why Create Your Own Indexes?
Y Access control – segregate data into separate indexes to limit access by
Splunk role
Y More use cases are discussed inArchitecting and Deploying Splunk class
Web Team
Security Team
Web Index
web data
Security Index
security data
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 78 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Y Retention
– Retention is set on a per-index basis
– Separate data into different indexes based on retention time
– Splunk data retention can be managed by data age and/or by size
Proxy Inputs
Why Create Your Own Indexes? (cont.)
Security Inputs
Web Inputs
Keep for 6 weeks
Keep for 12 months
Keep for 6 months Purge
Archive
Purge
web
security
proxy
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 79 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Buckets
Y Internally, an index stores events in
buckets
Y Abucket is a directory containing a
set of rawdata and indexing data
Y Buckets have a maximum data size
and a time span
– Both can be configured
wiki.splunk.com/Deploy:UnderstandingBuckets
$SPLUNK_DB	
Buckets restored
from archive
Hot & warm buckets
Cold buckets
Indexes
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 80 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Index
Data Flow Through an Index
Y Hot:These are the newest buckets– still open for write
Y Warm: Recent data, buckets are closed (read only)
Y Cold: Oldest data still in the index (read only)
Y Frozen: No longer searchable; buckets either get archived or deleted
Archive
Delete
or
Inputs
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 81 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Hot – Building Buckets
Y After data is read and parsed, it goes through the license meter and the
event is written into a hot bucket
Y All buckets are implemented as directories
– Hot buckets have a name that begins with hot_
– All buckets have unique identifiers within an index
Y When hot buckets reach their max size or time span, they are closed and
converted to warm status
– Hot buckets also roll to warm automatically when the indexer is restarted
– Hot and warm buckets are stored in the db directory for the index
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 82 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Warm and Cold Bucket Names
Y Hot buckets are renamed when they roll to warm
– Bucket names identify the time range for the data they contain
– When a warm bucket rolls to cold, the entire bucket directory is moved
Y At search time, Splunk scans the time range on a bucket directory name to
determine whether or not to open the bucket and search inside
db_1389230491_1389230488_5	
db_1390579247_1390579086_18	
Youngest event in the
bucket
Oldest event in the bucket
Unique ID
Note
When clustering is used, index
replication adds further identifiers
to the directory name.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 83 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Freezing: Data Expiration
Y The oldest bucket is deleted from the index when:
– The index's maximum overall size is reached
– The bucket's age exceeds the retention time limit
ê  All the events in the bucket have expired
Y Splunk will never exceed the maximum overall size of an index
– Therefore, buckets can be deleted even if they have not reached the time limit
Y You can optionally configure the frozen path
–  Splunk copies the bucket's rawdata to this location before deletion
– Once frozen, buckets are not searchable
Y Frozen data can be brought back (thawed) into Splunk if needed
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 84 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Index
Storing Buckets in a Separate Volume
Y Best Practice: Use a single high performance file system to store indexes
– The time span of the buckets and their storage type can affect search performance
Y However, you can use multiple volume partitions for index data
– Specify a separate volume for hot/warm and cold buckets during index creation
– Hot and warm buckets should be on the fastest partition and are searched first
– Cold can be located on a slower, cheaper storage (or SAN/NAS)
Y wiki.splunk.com/Deploy:BucketRotationAndRetention
On Fast SSD:
From -90d to Now
On Slower SAN/NAS
Older than -90d
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 85 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Estimating Index Growth Rate
Y Splunk compresses raw data as it is indexed
– Index data is then added to each bucket
ê  If your data has many searchable terms, the index data is larger
ê  If the data contains fewer searchable terms and less variety, the index is smaller
Y Best practice: get a good growth estimate
– Input your data in a test/dev environment over a sample period
ê  You should index more than one bucket of data
– Examine the size of the index's db directory compared to the input
ê  DMC: Indexing > Indexes and Volumes > Index Detail: Instance
http://docs.splunk.com/Documentation/Splunk/latest/Capacity/Estimateyourstoragerequirements
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 86 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Calculating Index Storage
Y Limiting size on disk is the most common method of controlling index growth
Y Allocate disk space to meet data retention needs
– Daily Rate * Compression Factor * Retention Period (in days) + Padding
Y Example: 5 GB/day of security data searchable for 6 months (with compression factor of .5)
– 900 GB (5 GB x 180 days) * .5 (CF) + 50 GB (padding) = 500 GB
– On average, data moves to frozen in this index after ~6 months
500
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 87 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Managing Indexes with Splunk Web
Select Settings > Indexes
Click New to create a new index
Custom indexes can be enabled/disabled or deleted
Click an index name to edit it
Displays the app the index is
configured in and its home path
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 88 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Adding an Index With Splunk Web
Specifynameforthenewindex
–  MustbeASCIIcharactersandcannotstartwithan“_”or“-”
Leaveblanktousethedefaultlocations
–  Default=$SPLUNK_DB/soc/[db|colddb|thaweddb]	
–  Tousecustomlocations,specifyfullindexpaths
Enabledataintegritycheck(optional)
Setmaximumindexsize(default=500GB)
–  Thissettingoverridesallothersizeandretentionsettings
Setmaxsizeofabucket(default=auto(750MB))
–  Useauto_high_volume whendailyvolumeis >10GB
–  Or,provideaspecificsize
Specifythepathtoarchivetherawdatabuckets
Selectwheretheindexes.conffileshouldbesaved
300	
soc	
	
/mnt/ssd/soc/db	
	
volume:raid/soc/colddb	
6
5
4
3
2
1
6
5
4
3
2
1
auto_high_volume	
7
7
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 89 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Index Data Integrity Check
Y Provides an ability to validate that data has not been tampered with after indexing
docs.splunk.com/Documentation/Splunk/latest/Security/Dataintegritycontrol
Y When enabled, produces calculated hash files for auditing and legal purposes
– Works on index level (including clustering)
– Not for inflight data from forwarders
– To prevent data loss, use the indexer acknowledgment capability (useACK)
Y To verify the integrity of an index/bucket:
– splunk	check-integrity	-bucketPath	[bucket_path]	[verbose]	
– splunk	check-integrity	-index	[index]	[verbose]	
Y To re-generate hash files:
– splunk	generate-hash-files	[-bucketPath|-index]	[bucket_path|index]	
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 90 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
indexes.conf
Y Many advanced/optional attributes are not available in Splunk Web
– The index stanza is created in local/indexes.conf of the selected app
[volume:raid]
path = /datastore/splunk
[soc]
homePath = /mnt/ssd/soc/db
coldPath = volume:raid/soc/colddb
thawedPath = $SPLUNK_DB/soc/thaweddb
maxDataSize = auto_high_volume
maxTotalDataSizeMB = 307200
enableDataIntegrityControl = 0
Index name in
square brackets
You must specify
home, cold, and
thawed paths,
even when using
the defaults
Size of bucket set
to 10 GB
Setting the total
size of the index at
300 GB
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 91 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Lab Exercise 5a – Add Indexes
Y Time: 5 - 10 minutes
Y Tasks:
– Create two new indexes: securityops and itops	
– Add a file monitor input to send events to the securityops index.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 92 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Customizing Index Retention Policies
Y To set more advanced/specific options, edit the stanza in indexes.conf
Y New indexes default to 3 hot buckets at a time
– If it is likely that an index will receive events that are not in
time-sequence order, increase the number of available
hot buckets
Y High-volume indexes should have up to 10 hot buckets
– Set with the maxHotBuckets key
Y Best practice for high-volume indexes:
– Examine and copy settings of main index stanza and adjust for your case
Warning
Inappropriate retention settings
can cause premature bucket
rotation and even stop Splunk.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 93 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
indexes.conf Options
Number of Hot buckets
(maxHotBuckets=3)
Age
(maxHotSpanSecs=7776000)
Bucket size
(maxDataSize	=	auto)
db directory size
(homepath.maxDataSizeMB=0)
Number of Warm buckets
(maxWarmDBCount=300)
Maximum Index Size (maxTotalDataSizeMB=500000)
Age (frozenTimePeriodInSecs=188697600)
Create Rename Move Delete or Archive
colddb directory size
(coldPath.maxDataSizeMB=0)
[itops]
frozenTimePeriodInSecs = 31536000
maxHotSpanSecs = 86400
homePath.maxDataSizeMB = 100000
coldPath.maxDataSizeMB = 400000
...
Note
Values in parenthesis
are the defaults.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 94 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Strict Time-based Retention Policies
Y Example: Purge HR data when it is more than 90 days old, but no sooner
Y Issues to consider:
– Splunk freezes entire buckets, not individual events
– If a bucket spans more than one day, you can't meet the 90 day requirement
Y Configuration option:
frozenTimePeriodInSecs=7776000 (90 days)	
maxHotSpanSecs	=	86400	
ê  Automatically "snaps" the span to the beginning of the time period
ê  For 86400 (24 hours), hot buckets roll at midnight
ê  Consider increasing max. number of hot buckets: maxHotBuckets	=	10	
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 95 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Volume-based Retention Policies
Y Example: Prevent data bursts in one index from triggering indexing issues
elsewhere in the same volume
Y Issues to consider:
– Splunk in itself cannot determine the maximum size for non-local volumes
– Hot/warm and cold buckets can be in different volumes
– If the volume runs out space, buckets roll to frozen before frozenTimePeriodInSecs	
Y Configuration Options: Use volume reference if a retention based on size is desired
[volume:fast]	
path	=	/mnt/ssd/	
maxVolumeDataSizeMB	=	500000	
[volume:slow]	
path	=	/mnt/raid/	
maxVolumeDataSizeMB	=	4000000	
[soc]	
homePath	=	volume:fast/soc/db	
homePath.maxDataSizeMB	=	50000	
coldPath	=	volume:slow/soc/colddb	
coldPath.maxDataSizeMB	=	200000	
	
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 96 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Viewing Indexing Activity and Health
Y Distributed Management Console
– Provides comprehensive indexing activity details
– Snapshot shows averages over the previous 15 minutes
– Historical exposes trending and possible decaying health
Y  Queue fill-ratio
Y  Indexing rate
Y  CPU activity
Y  Volume usage per index
Y  Index size over time
Y  Detailed Indexing status
Y  Retention policies
Y  Bucket configuration details
Displays the usage vs. capacity,
if the volume-based retention is
used (maxVolumeDataSizeMB)
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 97 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Inspecting Bucket Details
Y Search command: |	dbinspect	[index=name]	[span|timeformat]
– Returns information like status, number of events, timestamps of oldest and
newest events, total bucket size, filepath, etc.
– docs.splunk.com/Documentation/Splunk/latest/SearchReference/Dbinspect
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 98 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
What to Back Up
Y Indexed event data – the Splunk index
– SPLUNK_HOME/var/lib/splunk/	
– Or the directories where you placed your indexes (see indexes.conf for details)
Y (Optional) the source log data for additional redundancy
Y SPLUNK_HOME/etc for config and other important files
apps	
users		
system/local	
licenses	
init.d		
passwd	
andmore
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 99 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Backup Recommendation
Y Use the incremental backup of your choice
– Warm and cold buckets of your indexes
– Configuration files
– User files
Y Hot buckets cannot be backed up without stopping Splunk
– Use the snapshot capability of underlying file system to take a snapshot of hot,
then back up the snapshot
– Schedule multiple daily incremental backups of warm
ê  Works best for high data volumes
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 100 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Moving an Entire Index
1. Stop Splunk
2. Copy the entire index directory to new location while preserving
permissions and all subdirectories
– *NIX: cp	-rp	<source>	<target>	
– Windows: xcopy	<source>	<target>	/s	/e	/v	/o	/k	(or, robocopy)
3. If this is a global change, unset the SPLUNK_DB environment variable and
update SPLUNK_HOME/etc/splunk-launch.conf	
4. Edit indexes.conf to indicate the new location
5. Start Splunk
6. After testing and verifying new index, the old one can be deleted
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 101 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Removing Indexed Data
Y Sometimes you have unwanted data in an index
– There are no index editors
– First, you should change your configuration to omit the data in the future
Y What are your options for the data already in the index?
– Let the data age-out normally
– Use the delete command to make the unwanted data not show up in searches
– Run splunk	clean command to delete all data from the index
– Delete the index
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 102 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Deleting Events
Y Assign users to the can_delete role
– Specifically set up for deletions
– NOTrecommended to give this capability to other roles
ê  By default, even the admin role does not have the ability
Y Delete CANNOT be undone:
– Log into Splunk Web as a user of the can_delete role
– Create a specific search that identifies the data you want to delete
ê  Double check that the search ONLYincludes the data to delete
ê  Pay special attention to which index you are using and the time range
– After you are certain you’ve targeted only the data you want to delete,
pipe the delete command
Note
This is a "virtual" delete. Splunk
marks the events as deleted and
they never show in searches
again. However, they continue to
take up space on disk.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 103 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Cleaning Out an Index
Y To flush indexed data and reset an index, use the CLI clean command
– DATAWILLBE PERMANENTLYDESTROYED
– Typically used on test/dev systems, not for production systems
Y Command syntax:
splunk	clean	[eventdata|userdata|all]	[-index	name]	
ê  eventdata – delete indexed events and metadata on each event
ê  userdata – delete user accounts
ê  all – everything - including users, saved searches, and alerts
– ALWAYS SPECIFYAN INDEXTOAVOIDTEARS
ê  If no index is specified, the default is to clean all indexes
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 104 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
The Fishbucket
Y The fishbucket index stores the checkpoint data for monitor inputs
Y To reset the individual input checkpoint, use the btprobe command:
Y Requires stopping the forwarder or indexer
Y Other options:
– splunk	clean	eventdata	_thefishbucket	
ê  Force re-indexing of all file monitors in the indexer
– rm	-r	~/splunkforwarder/var/lib/splunk/fishbucket	
ê  Manually delete the fishbucket on forwarders	
splunk	cmd	btprobe	–d	SPLUNK_HOME/var/lib/splunk/	
fishbucket/splunk_private_db	--file	<source>	--reset
Note
Resetting the monitor checkpoint
re-indexes the data, resulting in
more license usage.
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 105 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Restoring a Frozen Bucket
Y To thaw an archived bucket:
– Copy the bucket directory from the archive to the index's thaweddb directory
– Stop Splunk
– Run	splunk	rebuild	<path	to	bucket	directory>	
ê  Also works to recover a corrupted directory
ê  Does not count against license
– Start Splunk
Y Data in thaweddb is searchable along with other data, is not frozen, and does not
count against index total size
– Delete the bucket directory when no longer needed and restart Splunk
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 106 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Index Replication
Y Splunk indexers can function as a cluster
– Indexers in a cluster can be configured to replicate buckets amongst themselves
Y Index replication allows for rapid failure recovery
Y Fully configurable replication allows you to balance speed of recovery and
overall disk usage
Y Index replication requires additional disk space
Y Discussed in detail in Splunk ClusterAdministration class
Y Basic indexer cluster concepts:
– http://docs.splunk.com/Documentation/Splunk/latest/Indexer/Basicconcepts
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 107 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Further Reading
Y docs.splunk.com/Documentation/Splunk/latest/Indexer/
HowSplunkstoresindexes
Y docs.splunk.com/Documentation/Splunk/latest/Indexer/
Setlimitsondiskusage
Y docs.splunk.com/Documentation/Splunk/latest/Indexer/Automatearchiving
Y wiki.splunk.com/Deploy:BucketRotationAndRetention
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 108 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Lab Exercise 5b –Configure Retention Policies
Y Time: 15 - 20 minutes
Y Tasks:	
– Configure a more strict time-based retention policy for securityops
– Configure a volume-based retention policy for itops
– Use DMC to monitor indexing activities and retention settings
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 109 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module 6:
Users, Roles, and
Authentication
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 110 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module Objectives
Y Describe user roles in Splunk
Y Create a custom role
Y Integrate Splunk with LDAP or SAML
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 111 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Managing Users and Roles
Y Users and roles define user privileges
Y To have access to a Splunk instance, a
user must have:
– ASplunk user account
– Assignment to one or more Splunk roles
Y User accounts can be assigned to:
– Native Splunk accounts
– LDAPorActive Directory
– SAML
– Scripted access to PAM, RADIUS, or other
user account systems
Select Settings > Access controls
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 112 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Identifying Roles
Y Five built-in user roles:
– admin, power, and user	
ê  Users can be assigned these roles	
– can_delete
ê  Will be discussed separately
– splunk-system-role	
ê  Special role that allows system services to
run without a defined user context
Y Administrators can add custom user
roles
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 113 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Defining Custom User Roles
Give the role a name and
select a default app
Optional
Restrict searches on
certain fields, sources,
hosts, etc
Default is -1
(no restriction)
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 114 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Defining Custom User Roles (cont.)
Optional user-level and role-level limits
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 115 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Describing Role Inheritance
Y Anew role can be based on one or more existing roles
Y The new role inherits both capabilities and index access
Y You cannot turn off inherited capabilities or access
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 116 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Implications of Inheritance
Y If you create a new role that inherits from another role—such as, user:
– The new role has all the capabilities of the inherited role
ê  For example, "run real-time searches"
– The new role inherits the index settings (both default and allowed)
– In the new role, you cannot turn off capabilities or index access that were
inherited from the original role
Y If you want a role that is "like" user but with some capabilities turned off:
– Make a new role that does not inherit from any other role
– Turn on all of the same capabilities as in User, except those you want turned off
– Assign the appropriate indexes to the new role
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 117 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Defining Role Capabilities
Add or remove capabilities (authorize.conf.spec)
docs.splunk.com/Documentation/Splunk/latest/Admin/authorizeconf
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 118 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
edit_roles_grantable Capability
Y Example: I want to separate and delegate administration tasks between
sys-admins and data admins without granting full admin role
Y Issues to consider:
– With edit_roles and edit_user capabilities, users can promote self to full
admin role
– Want to restrict grantable capabilities only to the level sub-admins currently have
Y Configuration option:
– Add the edit_roles_grantable capability to the sub-admin role
ê  Can only create roles with subset of the capabilities that the current user role has
ê  Must use in conjunction with the edit_user capability
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 119 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Example: edit_roles_grantable Capability
Add new role user_admin	
Y Inheritance:
Y  power	
Y  user	
Y Capabilities:
Y  edit_roles_grantable	
Y  edit_user	
admin		 acurry		
Assign acurry to the user_admin role acurry can only assign limited roles to users
New users
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 120 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Defining Role Index Search Options
Y You can specify which indexes are searched if the user does
not specify "index=<index_name>"
– Usually, this should match the Indexes setting
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 121 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Defining Role Index Access Options
Y Most important index setting
–  Controlswhichindexestheusersinthisrolecanaccess
–  Ifnotselected,userscannotsearchorevenseethisindex
Y Inherited indexes are still available even when they are not listed
Y The default is All non-internal indexes
–  Revisitaccesscontroleachtimeanewindexhasbeenadded
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 122 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk Authentication Options
Y You need the change_authentication Splunk capability to configure
Y Saves the settings in authentication.conf
– Splunk native
– LDAP
– SAML2.0
– Scripted SSO
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 123 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk Native Authentication
Y You can create user accounts directly in Splunk
– Example: the default admin user
Y Passwords are stored in SPLUNK_HOME/etc/passwd	
Y Use a blank passwd file to completely disable native authentication BUT
– In all authentication scenarios, best practice is to keep a failsafe account here
with a VERYstrong password
Y You can have a mix of Splunk and LDAP or other users
– Splunk native authentication always takes precedence over others
Y Select Settings >Access Controls > Users to manage all users and to
create Splunk user accounts
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 124 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Managing Users in Splunk
Y Splunk native users can be edited or deleted
Y Only time zone and default app can be changed on LDAPor other users
Add new Splunk user
Click to edit the user settings
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 125 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk Native Authentication: Add Users
Y Required:
– Username and password
Y Optional:
– Full name and email address (defaults to
none)
– Time zone (defaults to search head time zone)
– Default app (defaults to role default app, or
home if no role default app)
– Role(s)
ê  Defaults to user
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 126 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Directory Server Integration
Y Best practice: integrate Splunk with a directory server
– Works with multiple LDAPservers, including OpenLDAPandActive Directory
– You can configure from Splunk Web settings
Y User accounts are stored in directory server
– Enforce the same user account and password policy
– Users use the same user name and password in Splunk that they use elsewhere
– Optionally, the groups in the directory server can be mapped to Splunk roles
ê  Or, this can be done manually in Splunk
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 127 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
LDAPAuthentication
LDAP maintains the user credentials - user ID and password, plus other
information - centrally and handles all authentication
Log user in Splunk
Web
Client
LDAP
Server
Splunk
Request Splunk login
Authentication granted
Check authentication
Create user session
Check group mapping
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 128 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Creating an LDAP Strategy
1.  SelectLDAP
2.  ClickConfigure Splunk touse LDAP
–  Thelistofcurrent LDAPstrategies
displays
–  Astrategyisaconnectiontooneor
moreLDAPnodes on an LDAPserver
–  Candefinemultiple LDAPservers
3.  ClickNewtoaddanewLDAPstrategy
–  Namethestrategy and fillout the form
1
2
3
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 129 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
LDAP Strategy Settings
Y Normally the configuration is based on
the information given to you by the
LDAPadministrators
– LDAPconnection settings
– User settings
ê  DeterminewhichpartoftheLDAP
directorystoresSplunkusers
– Group settings & Dynamic group
settings
ê  Determinewhichnodeinthedirectory
containsyourgroupdefinitions
– Advanced settings
host	=	10.0.0.150	
port	=	389	
SSLEnabled	=	0	
bindDN	=	adsuser@buttercupgames.local	
bindDNpassword	=	<some_hashed_pw>	
	
userBaseDN	=	OU=splunk,DC=buttercupgames,DC=local	
userNameAttribute	=	samaccountname	
realNameAttribute	=	displayname	
	
groupBaseDN	=	OU=splunk,DC=buttercupgames,DC=local	
groupNameAttribute	=	cn	
groupMemberAttribute	=	member	
nestedGroups	=	0	
groupMappingAttribute	=	dn	
	
network_timeout	=	20	
sizelimit	=	1000	
timelimit	=	15	
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 130 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Mapping LDAP Groups to Roles
Select Map groups to define
relationships between LDAP
groups and Splunk roles
Click a LDAP group name to
map it to one or more Splunk
roles
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 131 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Mapping LDAP Groups to Roles (cont.)
Y Not all groups must be mapped
Y Mappings can be changed at any time
– The LDAPserver is rechecked each time a user logs into Splunk
Click one or more role names
to map them to to this group
After completing the mapping for
all LDAP groups, the mapped
roles are shown here
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 132 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Further Information about LDAP
Y Splunk caches user data from LDAP
Y New user data is cached the first time that user logs in
Y See docs for more details on setting up LDAPmapping:
docs.splunk.com/Documentation/Splunk/latest/Security/SetupuserauthenticationwithLDAP
Y Can also be done in config files: docs.splunk.com/Documentation/Splunk/latest/Admin/authenticationconf
Click this to force an
immediate reload
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 133 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
SAML 2.0 Single Sign On
Identity provider (IDP) maintains the user credentials and handles
authentication
Direct to default app
Web
Client
IDP
Splunk
Request Splunk login
Post Assertion (grant/deny)
Redirect authentication
Create session cookie
Validate assertion
Configured with trusted binding
Challenge for credentials
Check group mapping
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 134 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Configuring SAML
Y Configure this on a search head:
1.  Select SAML
2.  Click Configure Splunk to use
SAML
ê  The list of current SAMLgroups
displays
3.  Click SAMLConfiguration to
configure the trusted binding and
other connection details
4.  Click New Group to map the
roles
ê  Group-to-Role mapping is same
as LDAP
1
2
3 4
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 135 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Configuring SAML (cont.)
1.  Enter the following info and save: (provided by the IDPadministrator)
– Single Sign On (SSO) URL
– IDP's certificate file
– Entity ID
– Attribute query URL
– User / Password
2.  Export Splunk (Service Provider) metadata:
		http://<splunk_web>/saml/spmetadata	
– IDPadministrator imports it into its system and
configures its settings
– IDPadministrator exports its configured metadata
3.  Import IDPmetadata and update the SAML
configuration settings
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 136 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk
Single Sign On with Reverse Proxy
Y Splunk SSO allows you to use a web proxy to handle Splunk authentication
–  Authentication is moved to a web proxy,whichpassesalongauthenticationtoSplunkWeb
–  Webproxycanuseanymethodtoauthenticate(IDPinexample)
docs.splunk.com/Documentation/Splunk/latest/Security/HowSplunkSSOworks
Web
Client
Splunk request
Proxy passes request with user name
Proxy authorizes client
Proxy
Server
IDP
Splunk Web returns page to proxy
Proxy returns page
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 137 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Scripted Authentication
Y There are other types of authentication systems that Splunk can integrate
with using scripts
Y For the most up-to-date information on scripted authentication, see the
README file in:
SPLUNK_HOME/share/splunk/authScriptSamples/	
– The directory includes sample authentication scripts
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 138 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Lab Exercise 6 – Add Roles and Users
Y Time: 15 - 20 minutes
Y Tasks:
– Create a custom role
– Configure Splunk to use LDAPauthentication
– Map LDAPgroups to Splunk roles
– Verify the configurations
Y Lab notes:
– open.sesam3 is the password for all LDAPaccounts
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 139 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module 7:
Universal Forwarders
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 140 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Module Objectives
Y Install a universal forwarder
Y Configure the forwarder to connect to an indexer
Y Test the forwarder connection
Y Describe optional forwarder settings
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 141 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Forwarders and Indexers
Y In a production environment
– Splunk indexer(s) runs on dedicated
servers
– The data you want is on remote machines
Y Install Splunk forwarders on the remote
machines to
– Gather the data
– Send it across the network to the Splunk
indexer(s)
Y Indexers listen on a receiving port for
the forwarded data
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 142 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Splunk Universal Forwarder
Y Universal forwarder gathers data from a host and sends it to an indexer
Y Specifically designed to run on production servers
– Alightweight Splunk instance designed to run on a mission-critical system
– Minimal CPU and memory usage
– Output bandwidth constrained to 256 KBps by default
– No web interface
Y Aseparate installation binary
– Free built-in license, no limits
Y Best Practice: use the Universal Forwarder if possible
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 143 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Configuration Steps
1. Set up a receiving port on each indexer
– It is only necessary to do this once
2. Download and install Universal Forwarder
– Change password from changeme
3. Set up forwarding on each forwarder
4. Add inputs on forwarders, using one of the following:
– Forwarder management (discussed in the next module)
– CLI
– Manually
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 144 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Configure the Receiving Port on Each Indexer
Y In Splunk Web:
1.  Select Settings > Forwarding and receiving
2.  Next to Configure receiving, select Add new
3.  Enter a port number and click Save
Y  Or, with CLI:
splunk	enable	listen	<port>	
Y  The configuration is saved in
inputs.conf as:
[splunktcp://portNumber]	
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 145 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Installing Universal Forwarder Manually
Y *NIX: unpack the .tgz or .tgz.Z in the desired location
Y Windows: execute the .msi or use the command line
– Installed as a service
Y SPLUNK_HOME is the installation directory:
– /opt/splunkforwarder or c:Program	FilesSplunkUniversalforwarder	
Y Same splunk command-line interface in SPLUNK_HOME/bin	
– Same commands for start/stop, restart, etc.
– The initial admin account password is changeme	
ê  Use splunk	edit	user	admin	–password	newpassword
Y When installing large numbers of forwarders, use an automated method
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 146 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Using the Interactive Windows Installer
Y Most forwarder settings can be configured using the installer wizard
– Can run as a domain user without the domain user local administrator privileges
Y CLI installation is available for scripted installations
–  docs.splunk.com/Documentation/Splunk/latest/Forwarding/DeployaWindowsdfviathecommandline
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 147 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Forwarder Configuration Files
Y Forwarders require outputs.conf	
– outputs.conf points the forwarder to the receiver(s)
– Can specify additional options for load balancing, SSL, compression, alternate
indexers, and indexer acknowledgement
[tcpout:splunk_indexer]
server = 10.1.2.3:9997
Production Server with Forwarder
[splunktcp://9997]	
	
outputs.conf inputs.conf
Data feeds
from
inputs.conf
Receiver 10.1.2.3 (indexer)
TCP
stream to
port 9997
This stanza instructs the indexer to
listen on port 9997 for feeds from
Splunk forwarders
server includes one or more target receivers,
separated by commas
server can be IP or DNS name plus receiver port
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 148 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Defining Target Indexer on the Forwarder
Y Run: splunk	add	forward-server	indexer:receiving-port	
– For example, splunk	add	forward-server	10.1.2.3:9997
configures the outputs.conf as:
docs.splunk.com/Documentation/Splunk/latest/Forwarding/Configureforwarderswithoutputs.confd
[tcpout]
defaultGroup = default-group
[tcpout:default-group]
server = 10.1.2.3:9997
[tcpout-server://10.1.2.3:9997]
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 149 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Testing the Connection
Y After running splunk	add	forward-server, the forwarder should be
communicating with the indexer
– Splunk forwarder logs are automatically sent to the indexer's _internal index
Y To check for successful connection:
– On the indexer, search index=_internal	host=forwarder_hostname	
– On the indexer, run splunk	display	listen	
– On the forwarder, run splunk	list	forward-server	
Y To remove the target indexer setting:
– On the forwarder, run splunk	remove	forward-server	indexer:port	
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 150 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Troubleshooting Forwarder Connection
Y Is the forwarder sending data to the indexer?
– Check SPLUNK_HOME/var/log/splunk/splunkd.log on the forwarder
Y Does the indexer receive any data on the listening port?
– Search on indexer:
– To get the <uf>, run on the forwarder:
	
tail –f var/log/splunk/splunkd.log | egrep 'TcpOutputProc|TcpOutputFd'
index=_internal	sourcetype=splunkd	component=TcpInputConfig	OR		
(host=<uf>	component=StatusMgr)	
splunk	show	default-hostname
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 151 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Additional Forwarding Options
Y Compressing the feed
Y Securing the feed
Y Automatic load balancing to multiple indexers
Y Forwarder queue size
Y Indexer acknowledgement to forwarder
Y Selectively forwarding data to indexers
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 152 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Compressing the Feed
Receiving indexer 10.1.2.3
[tcpout:splunk_indexer]
server = 10.1.2.3:9997
compressed = true
	
Forwarders
[splunktcp:9997]	
compressed	=	true	
	
Set compression on both sides
(slightly increases CPU usage)
outputs.conf	 inputs.conf	
Compressed
stream
Non-compressed feeds for this
port are ignored
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Listen to your data.
Splunk 6.4 Administration
Listen to your data. 153 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016
Securing the Feed – SSL
Receiver 10.1.2.3
[tcpout:splunk_indexer]	
server	=	10.1.2.3:9997	
	
sslPassword	=	ssl_for_m3	
sslCertPath	=	SPLUNK_HOME/etc/auth/cert1/server.pem	
sslRootCAPath	=	SPLUNK_HOME/etc/auth/cert1/cacert.pem	
Forwarders
[splunktcp-ssl:9997]	
	
[ssl]	
password	=	ssl_for_m3	
serverCert	=	SPLUNK_HOME/etc/auth/cert1/server.pem	
rootCA	=	SPLUNK_HOME/etc/auth/cert1/cacert.pem	
	
outputs.conf	
inputs.conf	
Secure
Feed
SSL settings for all inputs in
dedicated SSL stanza
Turning on SSL:
Y  Can increase the CPU usage
Y  Automatically compresses the feed
Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf
Splunk 6.4 Administration.pdf

More Related Content

What's hot

Splunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaSplunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaEdureka!
 
Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2 Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2 Splunk
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability SessionSplunk
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALRisi Avila
 
SplunkLive 2011 Beginners Session
SplunkLive 2011 Beginners SessionSplunkLive 2011 Beginners Session
SplunkLive 2011 Beginners SessionSplunk
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information SecuritySplunk
 
ATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudMITRE ATT&CK
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior AnalyticsSplunk
 
Splunk Dashboarding & Universal Vs. Heavy Forwarders
Splunk Dashboarding & Universal Vs. Heavy ForwardersSplunk Dashboarding & Universal Vs. Heavy Forwarders
Splunk Dashboarding & Universal Vs. Heavy ForwardersHarry McLaren
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk OverviewSplunk
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You AreKatie Nickels
 
Splunk Enterprise Security
Splunk Enterprise Security Splunk Enterprise Security
Splunk Enterprise Security Md Mofijul Haque
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsSplunk
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunk
 
Data Onboarding
Data Onboarding Data Onboarding
Data Onboarding Splunk
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOCSplunk
 

What's hot (20)

Splunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | EdurekaSplunk Tutorial for Beginners - What is Splunk | Edureka
Splunk Tutorial for Beginners - What is Splunk | Edureka
 
Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2 Splunk Cloud and Splunk Enterprise 7.2
Splunk Cloud and Splunk Enterprise 7.2
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session.conf Go 2022 - Observability Session
.conf Go 2022 - Observability Session
 
Splunk-Presentation
Splunk-Presentation Splunk-Presentation
Splunk-Presentation
 
Splunk Architecture
Splunk ArchitectureSplunk Architecture
Splunk Architecture
 
PPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINALPPT-Splunk-LegacySIEM-101_FINAL
PPT-Splunk-LegacySIEM-101_FINAL
 
SplunkLive 2011 Beginners Session
SplunkLive 2011 Beginners SessionSplunkLive 2011 Beginners Session
SplunkLive 2011 Beginners Session
 
Using Splunk for Information Security
Using Splunk for Information SecurityUsing Splunk for Information Security
Using Splunk for Information Security
 
ATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudATT&CKING Containers in The Cloud
ATT&CKING Containers in The Cloud
 
Splunk for Enterprise Security and User Behavior Analytics
 Splunk for Enterprise Security and User Behavior Analytics Splunk for Enterprise Security and User Behavior Analytics
Splunk for Enterprise Security and User Behavior Analytics
 
Splunk Dashboarding & Universal Vs. Heavy Forwarders
Splunk Dashboarding & Universal Vs. Heavy ForwardersSplunk Dashboarding & Universal Vs. Heavy Forwarders
Splunk Dashboarding & Universal Vs. Heavy Forwarders
 
Splunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go KölnSplunk Security Session - .conf Go Köln
Splunk Security Session - .conf Go Köln
 
Splunk Overview
Splunk OverviewSplunk Overview
Splunk Overview
 
Putting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You ArePutting MITRE ATT&CK into Action with What You Have, Where You Are
Putting MITRE ATT&CK into Action with What You Have, Where You Are
 
Splunk Enterprise Security
Splunk Enterprise Security Splunk Enterprise Security
Splunk Enterprise Security
 
Enterprise Security and User Behavior Analytics
Enterprise Security and User Behavior AnalyticsEnterprise Security and User Behavior Analytics
Enterprise Security and User Behavior Analytics
 
SplunkLive! Splunk for Security
SplunkLive! Splunk for SecuritySplunkLive! Splunk for Security
SplunkLive! Splunk for Security
 
Data Onboarding
Data Onboarding Data Onboarding
Data Onboarding
 
Building an Analytics Enables SOC
Building an Analytics Enables SOCBuilding an Analytics Enables SOC
Building an Analytics Enables SOC
 

Similar to Splunk 6.4 Administration.pdf

Getting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-OnGetting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-OnSplunk
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionSplunk
 
Instrumentation with Splunk
Instrumentation with SplunkInstrumentation with Splunk
Instrumentation with SplunkDatavail
 
Using Splunk 6.3 - eLearning.pdf
Using Splunk 6.3 - eLearning.pdfUsing Splunk 6.3 - eLearning.pdf
Using Splunk 6.3 - eLearning.pdfllan47
 
Splunk 6.5.0-pivot tutorial (7)
Splunk 6.5.0-pivot tutorial (7)Splunk 6.5.0-pivot tutorial (7)
Splunk 6.5.0-pivot tutorial (7)Zoumana Diomande
 
Splunk best practices
Splunk best practicesSplunk best practices
Splunk best practicesJilali HARITI
 
Splunk User Group Edinburgh - September Event
Splunk User Group Edinburgh - September EventSplunk User Group Edinburgh - September Event
Splunk User Group Edinburgh - September EventHarry McLaren
 
Daten anonymisieren und pseudonymisieren in Splunk Enterprise
Daten anonymisieren und pseudonymisieren in Splunk EnterpriseDaten anonymisieren und pseudonymisieren in Splunk Enterprise
Daten anonymisieren und pseudonymisieren in Splunk Enterprisejenny_splunk
 
SplunkGettingStartedWorkshop.pptx
SplunkGettingStartedWorkshop.pptxSplunkGettingStartedWorkshop.pptx
SplunkGettingStartedWorkshop.pptxKhongHieu2
 
SplunkGettingStartedWorkshop.pptx
SplunkGettingStartedWorkshop.pptxSplunkGettingStartedWorkshop.pptx
SplunkGettingStartedWorkshop.pptxCazlp1
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseSplunk
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 
Splunk Ninjas: New Features, Pivot and Search Dojo
Splunk Ninjas: New Features, Pivot and Search DojoSplunk Ninjas: New Features, Pivot and Search Dojo
Splunk Ninjas: New Features, Pivot and Search DojoSplunk
 
Splunk Ninja: New Features, Pivot and Search Dojo
 Splunk Ninja: New Features, Pivot and Search Dojo Splunk Ninja: New Features, Pivot and Search Dojo
Splunk Ninja: New Features, Pivot and Search DojoSplunk
 
Splunk Ninjas: New Features, Pivot and Search Dojo
Splunk Ninjas: New Features, Pivot and Search DojoSplunk Ninjas: New Features, Pivot and Search Dojo
Splunk Ninjas: New Features, Pivot and Search DojoSplunk
 
Splunk Ninjas: New Features, Pivot and Search Dojo
Splunk Ninjas: New Features, Pivot and Search DojoSplunk Ninjas: New Features, Pivot and Search Dojo
Splunk Ninjas: New Features, Pivot and Search DojoSplunk
 
SplunkLive 2011 Advanced Session
SplunkLive 2011 Advanced SessionSplunkLive 2011 Advanced Session
SplunkLive 2011 Advanced SessionSplunk
 
Danfoss - Splunk for Vulnerability Management
Danfoss - Splunk for Vulnerability ManagementDanfoss - Splunk for Vulnerability Management
Danfoss - Splunk for Vulnerability ManagementSplunk
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionSplunk
 

Similar to Splunk 6.4 Administration.pdf (20)

Getting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-OnGetting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-On
 
Getting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout SessionGetting Started with Splunk Enterprise Hands-On Breakout Session
Getting Started with Splunk Enterprise Hands-On Breakout Session
 
Instrumentation with Splunk
Instrumentation with SplunkInstrumentation with Splunk
Instrumentation with Splunk
 
Using Splunk 6.3 - eLearning.pdf
Using Splunk 6.3 - eLearning.pdfUsing Splunk 6.3 - eLearning.pdf
Using Splunk 6.3 - eLearning.pdf
 
Splunk 6.5.0-pivot tutorial (7)
Splunk 6.5.0-pivot tutorial (7)Splunk 6.5.0-pivot tutorial (7)
Splunk 6.5.0-pivot tutorial (7)
 
Splunk best practices
Splunk best practicesSplunk best practices
Splunk best practices
 
Splunk User Group Edinburgh - September Event
Splunk User Group Edinburgh - September EventSplunk User Group Edinburgh - September Event
Splunk User Group Edinburgh - September Event
 
Daten anonymisieren und pseudonymisieren in Splunk Enterprise
Daten anonymisieren und pseudonymisieren in Splunk EnterpriseDaten anonymisieren und pseudonymisieren in Splunk Enterprise
Daten anonymisieren und pseudonymisieren in Splunk Enterprise
 
SplunkGettingStartedWorkshop.pptx
SplunkGettingStartedWorkshop.pptxSplunkGettingStartedWorkshop.pptx
SplunkGettingStartedWorkshop.pptx
 
SplunkGettingStartedWorkshop.pptx
SplunkGettingStartedWorkshop.pptxSplunkGettingStartedWorkshop.pptx
SplunkGettingStartedWorkshop.pptx
 
Getting Started with Splunk Enterprise
Getting Started with Splunk EnterpriseGetting Started with Splunk Enterprise
Getting Started with Splunk Enterprise
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Splunk Ninjas: New Features, Pivot and Search Dojo
Splunk Ninjas: New Features, Pivot and Search DojoSplunk Ninjas: New Features, Pivot and Search Dojo
Splunk Ninjas: New Features, Pivot and Search Dojo
 
Splunk Ninja: New Features, Pivot and Search Dojo
 Splunk Ninja: New Features, Pivot and Search Dojo Splunk Ninja: New Features, Pivot and Search Dojo
Splunk Ninja: New Features, Pivot and Search Dojo
 
Splunk Ninjas: New Features, Pivot and Search Dojo
Splunk Ninjas: New Features, Pivot and Search DojoSplunk Ninjas: New Features, Pivot and Search Dojo
Splunk Ninjas: New Features, Pivot and Search Dojo
 
Splunk Ninjas: New Features, Pivot and Search Dojo
Splunk Ninjas: New Features, Pivot and Search DojoSplunk Ninjas: New Features, Pivot and Search Dojo
Splunk Ninjas: New Features, Pivot and Search Dojo
 
SplunkLive 2011 Advanced Session
SplunkLive 2011 Advanced SessionSplunkLive 2011 Advanced Session
SplunkLive 2011 Advanced Session
 
Danfoss - Splunk for Vulnerability Management
Danfoss - Splunk for Vulnerability ManagementDanfoss - Splunk for Vulnerability Management
Danfoss - Splunk for Vulnerability Management
 
Getting Started with Splunk Breakout Session
Getting Started with Splunk Breakout SessionGetting Started with Splunk Breakout Session
Getting Started with Splunk Breakout Session
 
Zend2016 dba tutorial
Zend2016 dba tutorialZend2016 dba tutorial
Zend2016 dba tutorial
 

More from nitinscribd

eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...
eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...
eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...nitinscribd
 
OSC-Fall-Tokyo-2012-v9.pdf
OSC-Fall-Tokyo-2012-v9.pdfOSC-Fall-Tokyo-2012-v9.pdf
OSC-Fall-Tokyo-2012-v9.pdfnitinscribd
 
004 - Logging in the Cloud -- hide01.ir.pptx
004 - Logging in the Cloud  --  hide01.ir.pptx004 - Logging in the Cloud  --  hide01.ir.pptx
004 - Logging in the Cloud -- hide01.ir.pptxnitinscribd
 
003 - Billing -- hide01.ir.pptx
003 - Billing  --  hide01.ir.pptx003 - Billing  --  hide01.ir.pptx
003 - Billing -- hide01.ir.pptxnitinscribd
 
002 - Account Setup _ Primer -- hide01.ir.pptx
002 - Account Setup _ Primer  --  hide01.ir.pptx002 - Account Setup _ Primer  --  hide01.ir.pptx
002 - Account Setup _ Primer -- hide01.ir.pptxnitinscribd
 
001 - Get acquainted with the AWS platform -- hide01.ir.pptx
001 - Get acquainted with the AWS platform  --  hide01.ir.pptx001 - Get acquainted with the AWS platform  --  hide01.ir.pptx
001 - Get acquainted with the AWS platform -- hide01.ir.pptxnitinscribd
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPLnitinscribd
 

More from nitinscribd (8)

eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...
eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...
eu-15-Haken-Bypassing-Local-Windows-Authentication-To-Defeat-Full-Disk-Encryp...
 
OSC-Fall-Tokyo-2012-v9.pdf
OSC-Fall-Tokyo-2012-v9.pdfOSC-Fall-Tokyo-2012-v9.pdf
OSC-Fall-Tokyo-2012-v9.pdf
 
soctool.pdf
soctool.pdfsoctool.pdf
soctool.pdf
 
004 - Logging in the Cloud -- hide01.ir.pptx
004 - Logging in the Cloud  --  hide01.ir.pptx004 - Logging in the Cloud  --  hide01.ir.pptx
004 - Logging in the Cloud -- hide01.ir.pptx
 
003 - Billing -- hide01.ir.pptx
003 - Billing  --  hide01.ir.pptx003 - Billing  --  hide01.ir.pptx
003 - Billing -- hide01.ir.pptx
 
002 - Account Setup _ Primer -- hide01.ir.pptx
002 - Account Setup _ Primer  --  hide01.ir.pptx002 - Account Setup _ Primer  --  hide01.ir.pptx
002 - Account Setup _ Primer -- hide01.ir.pptx
 
001 - Get acquainted with the AWS platform -- hide01.ir.pptx
001 - Get acquainted with the AWS platform  --  hide01.ir.pptx001 - Get acquainted with the AWS platform  --  hide01.ir.pptx
001 - Get acquainted with the AWS platform -- hide01.ir.pptx
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPL
 

Recently uploaded

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 

Splunk 6.4 Administration.pdf

  • 1. Listen to your data. Splunk 6.4 Administration Listen to your data. 1 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk 6.4 Administration Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 2. Listen to your data. Splunk 6.4 Administration Listen to your data. 2 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Document Usage Guidelines Y Should be used only for enrolled students Y Not meant to be a self-paced document, an instructor is needed Y Do not distribute 7 July 2016 Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 3. Listen to your data. Splunk 6.4 Administration Listen to your data. 3 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Course Prerequisites Y Required: – Using Splunk – SplunkArchitecture Overview (eLearning) Y Strongly Recommended: – Searching and Reporting with Splunk – Creating Splunk Knowledge Objects Note In order to receive credit for this course, you must complete all lab exercises. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 4. Listen to your data. Splunk 6.4 Administration Listen to your data. 4 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Course Goals Y Build and manage a production Splunk environment Y Create and maintain Splunk indexes Y Manage users, roles, and authentication options Y Deploy forwarders with Forwarder Management Y Configure common Splunk data inputs Y Customize the input parsing process Y Configure a distributed search environment Y Monitor a Splunk instance with Management Console Y Configure system alerts Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 5. Listen to your data. Splunk 6.4 Administration Listen to your data. 5 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Course Outline SettingupaSplunk Enterprise Environment –  Mod1:SettingupSplunk –  Mod2:LicenseManagement –  Mod3:SplunkApps –  Mod4:SplunkConfigurationFiles –  Mod5:SplunkIndexManagement –  Mod6:Users,Roles,andAuthentication BuildingaBasicProduction Environment –  Mod7:UniversalForwarders –  Mod8:ForwarderManagement SplunkInputs –  Mod9:GettingDataIn –  Mod10:MonitorInputs –  Mod11:NetworkandScriptedInputs –  Mod12:WindowsandAgentlessInputs –  Mod13:Fine-tuningInputs ParsingandSearching –  Mod14:ParsingPhaseandDataPreview –  Mod15:ManipulatingRawData –  Mod16:SupportingKnowledgeObjects –  Mod17:DistributedSearch SplunkResourceManagement –  Mod18:BasicPerformanceTuning –  Mod19:ProblemIsolationOverview –  Mod20:IntroductiontoLarge-scaleDeployment –  CourseWrap-up Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 6. Listen to your data. Splunk 6.4 Administration Listen to your data. 6 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module 1: Setting up Splunk Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 7. Listen to your data. Splunk 6.4 Administration Listen to your data. 7 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module Objectives Y Describe the Splunk installation options Y Identify Splunk instance types Y Identify Splunk hardware requirements Y List steps to install Splunk Y Perform post-installation configuration tasks Y Start, stop, and restart Splunk Y Enable Distributed Management Console (DMC) Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 8. Listen to your data. Splunk 6.4 Administration Listen to your data. 8 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Y Splunk can be deployed in a variety of configurations Y Scales from a single server to a distributed infrastructure –  Acceptsanytext data as input –  Parsestheinputs into events –  Storesevents in indexes –  Searchesand reports –  Authenticates users Splunk Overview DB Servers Networks Servers Web Services Mobile Devices Custom Apps Security Any Text Data Searching Users Input Parsing Indexing Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 9. Listen to your data. Splunk 6.4 Administration Listen to your data. 9 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Deployment – Standalone Y Single Server – All functions in a single instance of Splunk – For testing, proof of concept, personal use, and learning – This is what you get when you download Splunk and install with default settings Y Recommendation – Have at least one test/development setup at your site Parsing Indexing Input Searching Note This is the initial configuration in class. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 10. Listen to your data. Splunk 6.4 Administration Listen to your data. 10 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Deployment – Basic Y Splunk server – Similar to server in standalone configuration – Manage deployment of forwarder configurations Y Forwarders – Forwarders collect data and send it to Splunk servers – Install forwarders at data source (usually production servers) Parsing Indexing Input Searching Forwarder Management Note Your lab environment will evolve to include a separate forwarder. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 11. Listen to your data. Splunk 6.4 Administration Listen to your data. 11 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Deployment – Distributed Y Splunk can be distributed and scaled in a variety of ways –  Moreindexerstohandlemoreinput –  MoreindexersANDsearchheadsto handlemoresearching Y Manage forwarder configurations from a dedicated Deployment Server Parsing Indexing Input Searching Search Head Indexers (Search peers) Forwarders Deployment Server Forwarder Management Note You will add a single search peer to your environment in a later lab exercise. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 12. Listen to your data. Splunk 6.4 Administration Listen to your data. 12 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Y Included in the Splunk Enterprise software package Y Included in the Universal Forwarder software package What Software Do You Install? Indexer (Search peer) Search Head Heavy Forwarder Universal Forwarder Deployment Server License Master Cluster Master Search Head Cluster Deployment Client Splunk Enterprise Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 13. Listen to your data. Splunk 6.4 Administration Listen to your data. 13 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Reference Servers Y Hardware requirements and sizing are discussed in detail in – Architecting and Deploying Splunk class – docs.splunk.com/Documentation/Splunk/latest/Capacity/Referencehardware Indexer Search Head OS Linux or Windows 64-bit distribution Network 1Gb Ethernet NIC Optional second NIC for a management network Memory 12 GB RAM CPU Intel 64-bit chip architecture 12 CPU cores Running at 2+ GHz Intel 64-bit chip architecture 4 CPUs, quad-core per CPU Running at 2+ GHz Disk Disk subsystem capable of 800 IOPS 2 x 10K RPM 300GB SAS drives - RAID 1 Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 14. Listen to your data. Splunk 6.4 Administration Listen to your data. 14 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Further Reading: Hardware and Virtualization Y System requirements docs.splunk.com/Documentation/Splunk/latest/Installation/Systemrequirements#Recommended_hardware Y Hardware capacity planning (Dimensions of a Splunk deployment) docs.splunk.com/Documentation/Splunk/latest/Capacity/DimensionsofaSplunkEnterprisedeployment Y Summary of performance recommendations docs.splunk.com/Documentation/Splunk/latest/Capacity/Summaryofperformancerecommendations Y Virtualization tech brief www.splunk.com/web_assets/pdfs/secure/Splunk_and_VMware_VMs_Tech_Brief.pdf Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 15. Listen to your data. Splunk 6.4 Administration Listen to your data. 15 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Installation Overview Y Pre-installation Checklist – Start-up account – Time synchronization – Splunk ports – Linux setting recommendations Y Installation – Splunk directory structure Y Post-installation configuration – Run Splunk at boot – Configure system settings – Optionally, enable Distributed Management Console Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 16. Listen to your data. Splunk 6.4 Administration Listen to your data. 16 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Start-up Account Y Best practice: Do not run Splunk as super-user – For example, root on *NIX, administrator on Windows Y  Create a user account that is used to run Splunk – For input, Splunk must be able to access data sources ê  On *NIX, /var/log is not typically open to non-root accounts – On *NIX, non-root accounts cannot access ports < 1024 – On Windows ê  Use a domain account if Splunk has to connect to other servers ê  Otherwise, use a local machine account – Make sure the Splunk account can access scripts used for inputs and alerts Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 17. Listen to your data. Splunk 6.4 Administration Listen to your data. 17 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Time Synchronization Y Best practice: Use a time synchronization service such as NTP Y Splunk searches depend on accurate time – Correct event timestamping is essential Y It is imperative that your Splunk indexer and production servers have standardized time configuration – Clock skew between hosts can affect search results Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 18. Listen to your data. Splunk 6.4 Administration Listen to your data. 18 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Ports Usage Splunk Enterprise Universal Forwarder splunkd 8089 8089 Splunk Web 8000 - Web app-server proxy 8065 - KV Store 8191 - S2S receiving port(s) No default - Any network/http input(s) No default No default Index replication port(s) Optional (no default) - Search replication port(s) Optional (no default) - Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 19. Listen to your data. Splunk 6.4 Administration Listen to your data. 19 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Linux Setting Recommendations Y Increase ulimit settings – The following OS parameters need to be increased to allow for a large number of buckets/forwarders/users docs.splunk.com/Documentation/Splunk/latest/Troubleshooting/ulimitErrors Y Turn Transparent Huge Pages (THP) off on Splunk Enterprise servers docs.splunk.com/Documentation/Splunk/latest/ReleaseNotes/SplunkandTHP ulimit -a ulimit -c 1073741824 (1 GB) (unlimited) ulimit -n 48 x default (48 x 1024 = 49,152) (65536) ulimit -u 12 x default (12 x 1024 = 12,288) (258048) core file size open files max user processes Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 20. Listen to your data. Splunk 6.4 Administration Listen to your data. 20 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Installation Y Download Splunk Enterprise from www.splunk.com/download Y Installation: (as account running Splunk) – *NIX – un-compress the .tar.gz file in the path you want Splunk to run from – Windows – execute the .msi installer and follow the wizard steps Y Complete installation instructions at: docs.splunk.com/Documentation/Splunk/latest/Installation/Chooseyourplatform Y After installation: – Splunk starts automatically on Windows – Splunk must be manually started on *NIX until boot-start is enabled Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 21. Listen to your data. Splunk 6.4 Administration Listen to your data. 21 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Run Splunk at Boot Y *NIX – Splunk on *NIX does not auto-start at boot time (default) – To enable boot-start, run as root: – This modifies the *NIX boot-up configuration ê  Modifies /etc/init.d depending on your *NIX flavor – Pass the -user parameter to start Splunk as the correct user Y Windows ê  Runs as splunkd service and starts child processes ê  The service starts and stops like any Windows services # ./splunk enable boot-start -user splunker Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 22. Listen to your data. Splunk 6.4 Administration Listen to your data. 22 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Directory Structure Note $SPLUNK_HOME depicted in the documentation is not an exported environment variable. It is used as a placeholder for "the top directory where Splunk is installed.” SPLUNK_HOME is used in this training. SPLUNK_HOME bin etc var system apps users search launcher <custom app> lib splunk executables licenses, configs indexes Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 23. Listen to your data. Splunk 6.4 Administration Listen to your data. 23 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Processes splunkd Y Runs on port 8089 (default) using SSL Y Spawns and controls Splunk child processes (helpers): – Splunk Web proxy, KV store, and Introspection services – Each search, scripted input, or scripted alert Y Accesses, processes, and indexes incoming data Y Handles all search requests and returns results Splunk Web Y Splunk browser-based user interface – Provides both a search and management front end for splunkd process Y Runs on port 8000 by default – http://<server_name>:<port> Y Initial default login: – Username: admin – Password: changeme Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 24. Listen to your data. Splunk 6.4 Administration Listen to your data. 24 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Web - Server Settings Y Administrators can select Settings > Server settings > General settings 1 2 3 -  Overall server configuration -  Used to set server options Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 25. Listen to your data. Splunk 6.4 Administration Listen to your data. 25 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Describing General Settings docs.splunk.com/Documentation/Splunk/latest/Security/ AboutsecuringyourSplunkconfigurationwithSSL Identifies this server to other Splunk servers SPLUNK_HOME Splunkd port Default host name assigned to events from this server Change if indexes are on a different volume Set minimum free space - Prevents the file system from being filled by Splunk - Splunk data loss can occur if this value is reached Changes require a restart of Splunk 6 5 4 3 2 1 7 6 5 4 3 2 1 7 8191 Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 26. Listen to your data. Splunk 6.4 Administration Listen to your data. 26 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Restarting the Server from Splunk Web 1 2 3 Note Any changes to General settings generates a message. Clicking the indicator opens a message prompting you to restart. You can also restart by selecting Settings > Server controls or from the CLI. (splunk restart) Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 27. Listen to your data. Splunk 6.4 Administration Listen to your data. 27 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 The Splunk Command Line Interface (CLI) Y splunk is the program in the bin directory to run the CLI – Same syntax on all supported platforms Command Operation splunk help Display a usage summary splunk help <object> Display the details of a specific object splunk [start | stop | restart] Manages the Splunk processes splunk start –-accept-license Automatically accept the license without prompt splunk status Display the Splunk process status splunk show splunkd-port Show the port that the splunkd listens on splunk show web-port Show the port that Splunk Web listens on splunk show servername Show the servername of this instance splunk show default-hostname Show the default host name used for all data inputs Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 28. Listen to your data. Splunk 6.4 Administration Listen to your data. 28 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Distributed Management Console (DMC) Y Splunk collects a lot of data about itself Y DMC is a Splunk admin-only app that lets you monitor and investigate Splunk performance, resource usage, and more Note You will use DMC to monitor your activities as you learn more about Splunk components. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 29. Listen to your data. Splunk 6.4 Administration Listen to your data. 29 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Enabling DMC in Standalone Mode Y DMC runs un-configured in standalone mode by default Y To enable, click Settings > General Setup >Apply Changes 3 2 1 The default server roles Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 30. Listen to your data. Splunk 6.4 Administration Listen to your data. 30 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 More Resources Y Splunk Documentation: http://docs.splunk.com/Documentation Y SplunkApp Repository: https://splunkbase.splunk.com/ Y SplunkAnswers: http://answers.splunk.com/ Y Splunk Blogs: http://blogs.splunk.com/ Y Splunk Wiki: http://wiki.splunk.com/ Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 31. Listen to your data. Splunk 6.4 Administration Listen to your data. 31 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Lab Exercise 1 – Configure Splunk Time: 15 - 20 minutes Tasks: – Log into Splunk Web – Change your Splunk server name – Restart Splunk – Enable DMC and check the system overview – Access your environment with SSH (Linux) or Remote Desktop Connection (Windows) – Use Splunk CLI to confirm the status and changes Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 32. Listen to your data. Splunk 6.4 Administration Listen to your data. 32 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Lab Exercise 1 – Configure Splunk (cont.) ssh {EIP} RDC {EIP} Provision: Go to Splunk Web with your browser using the external IP address (xxx.xxx.xxx.xxx:8000) Verification: Linux: 1.  Connect to your indexer via SSH 2.  Execute Splunk CLI Windows: 1.  Connect to your indexer via RDC 2.  Run cmd to execute Splunk CLI http://{EIP}:8000 OR Your Computer Your Computer Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 33. Listen to your data. Splunk 6.4 Administration Listen to your data. 33 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module 2: License Management Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 34. Listen to your data. Splunk 6.4 Administration Listen to your data. 34 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module Objectives Y Identify license types Y Describe license violations Y Add and remove licenses Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 35. Listen to your data. Splunk 6.4 Administration Listen to your data. 35 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Managing Licenses Select Settings > Licensing Change license group Add a license Check license alerts and violations View stacks Edit and add pools Designate the license server type – Master or slave 6 1 2 3 4 5 6 5 4 3 2 1 Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 36. Listen to your data. Splunk 6.4 Administration Listen to your data. 36 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk License Types Y Enterprise trial license – Downloads with product – Features same as Enterprise except for 500mb per day limit – Only valid for 60 days, after which one of the other 3 license types must be activated – Sales trial license is a trial Enterprise license of varying size and duration Y Enterprise license – Purchased from Splunk – Full functionality for indexing, search head, deployment server, etc. – Sets the daily indexing volume Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 37. Listen to your data. Splunk 6.4 Administration Listen to your data. 37 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk License Types (cont.) Y Free license – Disables alerts, authentication, clustering, distributed search, summarization, and forwarding to non-Splunk servers – Allows 500mb/day of indexing and forwarding to other Splunk instances – After 60 days on enterprise trial license, you'll be automatically prompted to convert to this license type ê  Canbeactivatedbefore60daysbychanginglicensetype Y Forwarder license – Sets the server up as a heavy forwarder – Applies to non-indexing forwarders – Allows authentication, but no indexing Y Splunk license comparison: www.splunk.com/view/SP-CAAAE8W Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 38. Listen to your data. Splunk 6.4 Administration Listen to your data. 38 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Adding a License Y CanuseCLI,upload,orcopy&paste –  Licensegroupchangerequiresarestart Y Licensesarestoredunder SPLUNK_HOME/etc/licenses Y Canaddmultiplelicenses(stacked) splunk add licenses <path_to_file> Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 39. Listen to your data. Splunk 6.4 Administration Listen to your data. 39 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 License Warnings and Violations Y If the indexing exceeds the allocated daily quota in a pool, an alert is raised – The daily license quota resets at midnight and you have until then to fix Y If you don't correct the situation, the alert becomes a warning – The warning message persists for 14 days Y The fifth warning in a rolling 30-day period causes violation – Search is disabled for all non-internal indexes – All other features remain functional, such as indexing and forwarding – Violation remains in effect for 30 days – Free license gets only three warnings Y To unlock the license and enable searching, contact Splunk Support or Sales Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 40. Listen to your data. Splunk 6.4 Administration Listen to your data. 40 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 What Counts As Daily License Quota? Y All data that is indexed, regardless of source, sourcetype, or host – About how much data you index each day – Not about how much data you store in Splunk Y What does not count as daily quota? – Data that is replicated in a cluster ê  Data is metered once; the copies do not count – Summary indexes, using a summarization technique – Splunk internal logs that are stored in _internal, _audit, etc. – Data that is eliminated during the parsing process – Metadata fields, search terms, etc. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 41. Listen to your data. Splunk 6.4 Administration Listen to your data. 41 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Viewing Alerts Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 42. Listen to your data. Splunk 6.4 Administration Listen to your data. 42 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Change to Slave Change an instance to slave by entering the master license server URI License Master with a license stack All instances collectively share the stack entitlement Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 43. Listen to your data. Splunk 6.4 Administration Listen to your data. 43 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Y Pools allow licenses to be subdivided and assigned to a group of indexers – Can be created for a given stack – Warnings and violations occur per pool Y Example: Master has a stack for a total of 500GB License Pooling Default Pool 500 GB Shared Entitlement Enterprise Stack with Single Pool (Most common) Pool 2 (200GB Entitlement) Pool 3 (200GB Entitlement) Default Pool (100GB Entitlement) Enterprise Stack with Multiple Pools (Multi-tenant environment) Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 44. Listen to your data. Splunk 6.4 Administration Listen to your data. 44 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Managing Soft License Warnings Y DO NOT ignore license warnings Y Proactively monitor the consumption of your Splunk license – DMC provides a couple of alerts – If possible, give yourself wiggle room by rearrange license pools Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 45. Listen to your data. Splunk 6.4 Administration Listen to your data. 45 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Lab Exercise 2 –Add and Configure Splunk Licenses Y Time: 15 – 20 minutes Y Tasks: – Add a license with Splunk Web UI (optionally with CLI) – Enable DMCAlert -Total License Usage Near Daily Quota Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 46. Listen to your data. Splunk 6.4 Administration Listen to your data. 46 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module 3: Splunk Apps Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 47. Listen to your data. Splunk 6.4 Administration Listen to your data. 47 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module Objectives Y Describe Splunk apps and add-ons Y Install an app on a Splunk instance Y Manage app accessibility and permissions Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 48. Listen to your data. Splunk 6.4 Administration Listen to your data. 48 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 . . . What is an App? Y An app is an independent collection of: – Configuration files ê  Defininginputs,indexes,sourcetypes,field extractions,transformations ê  Providingeventtypes,tags,reports,dashboards andotherknowledgeobjects – Scripts, web assets, etc. Y  Most apps are focused on: –  Aspecific type of data from a vendor, operating system, or industry –  Aspecific business need Y  Apps may be installed on any Splunk instance Y  Splunk includes a number default apps app.conf tags.conf mylookup.csv indexes.conf myviews.xml default.meta transforms.conf props.conf inputs.conf App B App A Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 49. Listen to your data. Splunk 6.4 Administration Listen to your data. 49 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 View All Installed Apps Y From the Search app, select Apps > ManageApps Y Or, from the Home view, click Y Apps can be Visible or hidden – Several apps are installed by default that are hidden or disabled ê  Internal apps used by Splunk should not be modified ê  Legacy apps ê  Sample apps Y Apps are installed under SPLUNK_HOME/etc/apps Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 50. Listen to your data. Splunk 6.4 Administration Listen to your data. 50 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Managing Apps Controls who can use/modify an app Enable or disable an app Add more apps Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 51. Listen to your data. Splunk 6.4 Administration Listen to your data. 51 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Installing an App from splunkbase.splunk.com Y From the Apps page, click Browse more apps Y Or, click Apps > Find MoreApps – Splunk Web will try to access splunkbase.splunk.com – Search and browse to find the app you want – Select Install (most apps are free) ê  You must provide your Splunk.com user ID and password ê  The app is installed into a sub-directory below SPLUNK_HOME/etc/apps ê  Some apps may require a restart Y Or, go directly to splunkbase.splunk.com and download the app as a file Note Anyone can sign up for a user account in Splunk.com. A support contract is not required. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 52. Listen to your data. Splunk 6.4 Administration Listen to your data. 52 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Installing an App From a File Y Download the file for the app from splunkbase.splunk.com – The file may be a .tar.gz, .tgz, .zip, or .spl file Y Install the app: – From Splunk Web, click Install app from file – Using the CLI splunk install app path-to-appfile – Or extract the app in the proper location cd SPLUNK_HOME/etc/apps tar –xf path-to-appfile Y Some apps may require a restart Y Configure the app after the install according to its documentation Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 53. Listen to your data. Splunk 6.4 Administration Listen to your data. 53 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Apps on Forwarders? Y Universal forwarders don't have a web interface, but they can still benefit from an app Y An add-on is a subset of an app – Usually contains data collection but no GUI (reports or dashboards) Y To install an add-on or app on a forwarder – Run the CLI command described earlier, or – Deploy it using a deployment server ê  deployment server is discussed in a later module Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 54. Listen to your data. Splunk 6.4 Administration Listen to your data. 54 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Deleting an App Y When you delete an app, all of its related configurations and scripts are removed from a Splunk server – User’s private app artifacts remain untouched Y To remove an app: – splunk remove app <app_folder> – Or, navigate to SPLUNK_HOME/etc/apps and delete the app's folder and all its contents – Restart the Splunk server Y It can be reinstalled later Y Alternatively, either disable it or move it to another (backup) location Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 55. Listen to your data. Splunk 6.4 Administration Listen to your data. 55 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 App Permissions Y Users with read permission can see the app and use it Y Users with write permission can add/ delete/modify knowledge objects used in the app – By default, the user role does not have write permissions within the search app Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 56. Listen to your data. Splunk 6.4 Administration Listen to your data. 56 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Lab Exercise 3 -- Install an App Y Time: 5 - 10 minutes Y Tasks: – Download an app – Install the app – Change the app permission – Verify if the app's dashboard displays reports Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 57. Listen to your data. Splunk 6.4 Administration Listen to your data. 57 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module 4: Splunk Configuration Files Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 58. Listen to your data. Splunk 6.4 Administration Listen to your data. 58 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module Objectives Y Describe Splunk configuration directory structure Y Understand configuration layering process – Index-time process – Search-time process Y Use btool to examine configuration settings Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 59. Listen to your data. Splunk 6.4 Administration Listen to your data. 59 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Y Each configuration file governs a particular aspect of Splunk functionality Y All configuration changes are saved in .conf files under SPLUNK_HOME/etc/... – .conf files are text files using a simple stanza and name/value (attribute) format – The syntax is case-sensitive Y You can change settings using Splunk Web, CLI, SDK, app install, and/or direct edit Y All .conf files have documentation and examples: – SPLUNK_HOME/etc/system/README ê  *.conf.spec ê  *.conf.example ê  Splunkdocumentation: docs.splunk.com Splunk Configuration Files [default] host=www [monitor:///var/log/httpd] sourcetype = access_common ignoreOlderThan = 7d index = web Splunk Web CLI SDK inputs.conf Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 60. Listen to your data. Splunk 6.4 Administration Listen to your data. 60 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Configuration Directories SPLUNK_HOME etc system apps users joe mary admin search unix local local default local unix default local search default local Out-of-the-box Custom Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 61. Listen to your data. Splunk 6.4 Administration Listen to your data. 61 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Default vs. Local Configuration Y Splunk ships with default .conf files – Stored in the default directories Y Add all configurations and edits to the local directory – Most configurations apply to only one app Y Avoid storing configurations in SPLUNK_HOME/etc/system – Use the Searching and Reporting app as the default location for storing your configurations that are not app-specific default local Shipped with Splunk or the app Y Overwritten on update Y Do not modify Your specific configuration changes Y Preserved on update Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 62. Listen to your data. Splunk 6.4 Administration Listen to your data. 62 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Index time vs. Search time Y The priority of layered configurations are based on the context – Global context: a network input to collect syslog data – App/User context: Mary's private report in the Search app Y For a list of configuration files and their context, go to: docs.splunk.com/Documentation/Splunk/latest/Admin/Wheretofindtheconfigurationfiles Index time Global context User-independent and background tasks such as inputs, parsing, indexing, etc. Search time App/User context User-related activity, such as searching Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 63. Listen to your data. Splunk 6.4 Administration Listen to your data. 63 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 default SPLUNK_HOME etc system apps default local unix default local search local Index-Time Precedence 1.  etc/system/local 2.  etc/apps/search/local 3.  etc/apps/unix/local 4.  etc/apps/search/default 5.  etc/apps/unix/default 6.  etc/system/default 6 1 5 3 4 2 Server is performing non-user background processing Note If two or more apps at the same level of precedence have conflicts between them, the conflicts are resolved in ASCII order by app directory name. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 64. Listen to your data. Splunk 6.4 Administration Listen to your data. 64 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 SPLUNK_HOME etc system apps users joe mary admin search unix local local default local unix default local search default local Search Time Precedence Order 7 1 3 2 5 4 Example: user mary working in the unix app context 6 Note Splunk evaluates and if objects from the app are exported globally with .meta file setting. 5 4 Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 65. Listen to your data. Splunk 6.4 Administration Listen to your data. 65 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Runtime Merging of Configurations Y When Splunk starts, configuration files are merged together into a single run-time model for each file type – Regardless of the number of inputs.conf files in various apps or the system path, only one master inputs configuration model exists in memory at runtime Y If there are no duplicate stanzas or common settings between the files, the result is the union of all files Y If there are conflicts, the setting with the highest precedence is used – Remember that local always takes precedence over default Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 66. Listen to your data. Splunk 6.4 Administration Listen to your data. 66 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Example of Runtime Merging (No Conflict) [a] x=1 y=2 [b] j=1 k=2 [b] p=1 q=1 [c] s=1 t=2 [a] x=1 y=2 [b] j=1 k=2 p=1 q=1 [c] s=1 t=2 SPLUNK_HOME/etc/ system/local/ example.conf SPLUNK_HOME/etc/ apps/search/local/ example.conf Runtime example.conf Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 67. Listen to your data. Splunk 6.4 Administration Listen to your data. 67 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Example of Runtime Merging (Conflict) [a] x=1 y=2 [b] x=0 z=2 [b] x=1 y=1 [c] x=1 y=2 [a] x=1 y=2 [b] x=0 y=1 z=2 [c] x=1 y=2 SPLUNK_HOME/etc/ system/local/ example.conf SPLUNK_HOME/etc/ apps/search/local/ example.conf Runtime example.conf Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 68. Listen to your data. Splunk 6.4 Administration Listen to your data. 68 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Configuration Validation Command Y splunk btool conf-name list [options] – Shows on-disk configuration for requested file – Useful for checking the configuration scope and permission rules ê  Use--debugtodisplaytheexact .conffilelocation ê  Add--user=<user>--app=<app>toseetheuser/appcontextlayering Y Examples: –  splunk help btool –  splunk btool check –  splunk btool inputs list –  splunk btool inputs list monitor:///var/log –  splunk btool inputs list monitor:///var/log --debug docs.splunk.com/Documentation/Splunk/latest/Troubleshooting/Usebtooltotroubleshootconfigurations Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 69. Listen to your data. Splunk 6.4 Administration Listen to your data. 69 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Scenario: Where are the /var/log/secure.log input configurations specified? btool Example > splunk btool inputs list monitor:///var/log/secure.log --debug etc/apps/search/local/inputs.conf [monitor:///var/log/secure.log] etc/system/local/inputs.conf host = myIndexer etc/system/default/inputs.conf index = default etc/apps/search/local/inputs.conf sourcetype = linux_secure [monitor:///var/log/secure.log] host=myIndexer [monitor:///var/log/secure.log] sourcetype=linux_secure host=webserver etc/system/local/inputs.conf etc/apps/search/local/inputs.conf Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 70. Listen to your data. Splunk 6.4 Administration Listen to your data. 70 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Overriding Defaults Y There are default settings in SPLUNK_HOME/etc/system/default and SPLUNK_HOME/etc/apps/search/default Y The correct method to override these settings, if needed, is to do so in the local directory at the same scope – Only add the items you are overriding—not a whole copy of the default conf file Y Example: – To disable a default attribute TRANSFORMS for [syslog]: # etc/system/default/props.conf [syslog] TRANSFORMS = syslog-host REPORT-syslog = syslog-extractions ... # etc/system/local/props.conf [syslog] TRANSFORMS = Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 71. Listen to your data. Splunk 6.4 Administration Listen to your data. 71 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Reloading Configuration Files After Edit Y Changes made using Splunk Web or the CLI do not require restart – Amessage appears if restart is required (i.e. changing server settings) Y Changes made manually are not automatically detected Y To force reload, go to http://servername:webport/debug/refresh – Reloads many of the configurations, including inputs.conf, but not all Y To reload all configurations, restart Splunk – Splunk Web: Settings > Server controls > Restart Splunk – CLI: splunk restart Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 72. Listen to your data. Splunk 6.4 Administration Listen to your data. 72 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Lab Exercise 4 – Configuration Files Y Time: 15 – 20 minutes Y Tasks: – Run the same search as different users – Check the search results and compare – Use the btool command to investigate the configurations Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 73. Listen to your data. Splunk 6.4 Administration Listen to your data. 73 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module 5: Splunk Index Management Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 74. Listen to your data. Splunk 6.4 Administration Listen to your data. 74 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module Objectives Y Understand index structure and buckets Y Create new indexes Y Apply a data retention policy Y Monitor indexes with DMC Y Enable index integrity check Y Reset monitor input checkpoints Y Delete data from an index Y Back up and restore frozen data Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 75. Listen to your data. Splunk 6.4 Administration Listen to your data. 75 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Y Splunk stores events in indexes under SPLUNK_HOME/var/lib/splunk –  SetinSettings > Server Settings –  Canoverride on a per-index basis Y The main index is –  Usedwhenan input does not specifyanindex –  Agoodexampleofahighvolumeindex –  Locatedindefaultdbdirectory Y Splunk users can explicitly specify which index(es) to search What are Indexes? index=web action=purchase main web [Input X] [Input Y] index = web Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 76. Listen to your data. Splunk 6.4 Administration Listen to your data. 76 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Preconfigured Indexes Splunk ships with several indexes already set up besides main: summary – default index for summary indexing system _internal – Splunk indexes its own logs and metrics from its processing here _audit – Splunk stores its audit trails and other optional auditing information _introspection – tracks system performance and Splunk resource usage data _thefishbucket – contains checkpoint information for file monitoring inputs Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 77. Listen to your data. Splunk 6.4 Administration Listen to your data. 77 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Why Create Your Own Indexes? Y Access control – segregate data into separate indexes to limit access by Splunk role Y More use cases are discussed inArchitecting and Deploying Splunk class Web Team Security Team Web Index web data Security Index security data Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 78. Listen to your data. Splunk 6.4 Administration Listen to your data. 78 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Y Retention – Retention is set on a per-index basis – Separate data into different indexes based on retention time – Splunk data retention can be managed by data age and/or by size Proxy Inputs Why Create Your Own Indexes? (cont.) Security Inputs Web Inputs Keep for 6 weeks Keep for 12 months Keep for 6 months Purge Archive Purge web security proxy Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 79. Listen to your data. Splunk 6.4 Administration Listen to your data. 79 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Buckets Y Internally, an index stores events in buckets Y Abucket is a directory containing a set of rawdata and indexing data Y Buckets have a maximum data size and a time span – Both can be configured wiki.splunk.com/Deploy:UnderstandingBuckets $SPLUNK_DB Buckets restored from archive Hot & warm buckets Cold buckets Indexes Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 80. Listen to your data. Splunk 6.4 Administration Listen to your data. 80 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Index Data Flow Through an Index Y Hot:These are the newest buckets– still open for write Y Warm: Recent data, buckets are closed (read only) Y Cold: Oldest data still in the index (read only) Y Frozen: No longer searchable; buckets either get archived or deleted Archive Delete or Inputs Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 81. Listen to your data. Splunk 6.4 Administration Listen to your data. 81 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Hot – Building Buckets Y After data is read and parsed, it goes through the license meter and the event is written into a hot bucket Y All buckets are implemented as directories – Hot buckets have a name that begins with hot_ – All buckets have unique identifiers within an index Y When hot buckets reach their max size or time span, they are closed and converted to warm status – Hot buckets also roll to warm automatically when the indexer is restarted – Hot and warm buckets are stored in the db directory for the index Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 82. Listen to your data. Splunk 6.4 Administration Listen to your data. 82 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Warm and Cold Bucket Names Y Hot buckets are renamed when they roll to warm – Bucket names identify the time range for the data they contain – When a warm bucket rolls to cold, the entire bucket directory is moved Y At search time, Splunk scans the time range on a bucket directory name to determine whether or not to open the bucket and search inside db_1389230491_1389230488_5 db_1390579247_1390579086_18 Youngest event in the bucket Oldest event in the bucket Unique ID Note When clustering is used, index replication adds further identifiers to the directory name. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 83. Listen to your data. Splunk 6.4 Administration Listen to your data. 83 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Freezing: Data Expiration Y The oldest bucket is deleted from the index when: – The index's maximum overall size is reached – The bucket's age exceeds the retention time limit ê  All the events in the bucket have expired Y Splunk will never exceed the maximum overall size of an index – Therefore, buckets can be deleted even if they have not reached the time limit Y You can optionally configure the frozen path –  Splunk copies the bucket's rawdata to this location before deletion – Once frozen, buckets are not searchable Y Frozen data can be brought back (thawed) into Splunk if needed Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 84. Listen to your data. Splunk 6.4 Administration Listen to your data. 84 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Index Storing Buckets in a Separate Volume Y Best Practice: Use a single high performance file system to store indexes – The time span of the buckets and their storage type can affect search performance Y However, you can use multiple volume partitions for index data – Specify a separate volume for hot/warm and cold buckets during index creation – Hot and warm buckets should be on the fastest partition and are searched first – Cold can be located on a slower, cheaper storage (or SAN/NAS) Y wiki.splunk.com/Deploy:BucketRotationAndRetention On Fast SSD: From -90d to Now On Slower SAN/NAS Older than -90d Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 85. Listen to your data. Splunk 6.4 Administration Listen to your data. 85 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Estimating Index Growth Rate Y Splunk compresses raw data as it is indexed – Index data is then added to each bucket ê  If your data has many searchable terms, the index data is larger ê  If the data contains fewer searchable terms and less variety, the index is smaller Y Best practice: get a good growth estimate – Input your data in a test/dev environment over a sample period ê  You should index more than one bucket of data – Examine the size of the index's db directory compared to the input ê  DMC: Indexing > Indexes and Volumes > Index Detail: Instance http://docs.splunk.com/Documentation/Splunk/latest/Capacity/Estimateyourstoragerequirements Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 86. Listen to your data. Splunk 6.4 Administration Listen to your data. 86 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Calculating Index Storage Y Limiting size on disk is the most common method of controlling index growth Y Allocate disk space to meet data retention needs – Daily Rate * Compression Factor * Retention Period (in days) + Padding Y Example: 5 GB/day of security data searchable for 6 months (with compression factor of .5) – 900 GB (5 GB x 180 days) * .5 (CF) + 50 GB (padding) = 500 GB – On average, data moves to frozen in this index after ~6 months 500 Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 87. Listen to your data. Splunk 6.4 Administration Listen to your data. 87 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Managing Indexes with Splunk Web Select Settings > Indexes Click New to create a new index Custom indexes can be enabled/disabled or deleted Click an index name to edit it Displays the app the index is configured in and its home path Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 88. Listen to your data. Splunk 6.4 Administration Listen to your data. 88 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Adding an Index With Splunk Web Specifynameforthenewindex –  MustbeASCIIcharactersandcannotstartwithan“_”or“-” Leaveblanktousethedefaultlocations –  Default=$SPLUNK_DB/soc/[db|colddb|thaweddb] –  Tousecustomlocations,specifyfullindexpaths Enabledataintegritycheck(optional) Setmaximumindexsize(default=500GB) –  Thissettingoverridesallothersizeandretentionsettings Setmaxsizeofabucket(default=auto(750MB)) –  Useauto_high_volume whendailyvolumeis >10GB –  Or,provideaspecificsize Specifythepathtoarchivetherawdatabuckets Selectwheretheindexes.conffileshouldbesaved 300 soc /mnt/ssd/soc/db volume:raid/soc/colddb 6 5 4 3 2 1 6 5 4 3 2 1 auto_high_volume 7 7 Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 89. Listen to your data. Splunk 6.4 Administration Listen to your data. 89 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Index Data Integrity Check Y Provides an ability to validate that data has not been tampered with after indexing docs.splunk.com/Documentation/Splunk/latest/Security/Dataintegritycontrol Y When enabled, produces calculated hash files for auditing and legal purposes – Works on index level (including clustering) – Not for inflight data from forwarders – To prevent data loss, use the indexer acknowledgment capability (useACK) Y To verify the integrity of an index/bucket: – splunk check-integrity -bucketPath [bucket_path] [verbose] – splunk check-integrity -index [index] [verbose] Y To re-generate hash files: – splunk generate-hash-files [-bucketPath|-index] [bucket_path|index] Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 90. Listen to your data. Splunk 6.4 Administration Listen to your data. 90 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 indexes.conf Y Many advanced/optional attributes are not available in Splunk Web – The index stanza is created in local/indexes.conf of the selected app [volume:raid] path = /datastore/splunk [soc] homePath = /mnt/ssd/soc/db coldPath = volume:raid/soc/colddb thawedPath = $SPLUNK_DB/soc/thaweddb maxDataSize = auto_high_volume maxTotalDataSizeMB = 307200 enableDataIntegrityControl = 0 Index name in square brackets You must specify home, cold, and thawed paths, even when using the defaults Size of bucket set to 10 GB Setting the total size of the index at 300 GB Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 91. Listen to your data. Splunk 6.4 Administration Listen to your data. 91 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Lab Exercise 5a – Add Indexes Y Time: 5 - 10 minutes Y Tasks: – Create two new indexes: securityops and itops – Add a file monitor input to send events to the securityops index. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 92. Listen to your data. Splunk 6.4 Administration Listen to your data. 92 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Customizing Index Retention Policies Y To set more advanced/specific options, edit the stanza in indexes.conf Y New indexes default to 3 hot buckets at a time – If it is likely that an index will receive events that are not in time-sequence order, increase the number of available hot buckets Y High-volume indexes should have up to 10 hot buckets – Set with the maxHotBuckets key Y Best practice for high-volume indexes: – Examine and copy settings of main index stanza and adjust for your case Warning Inappropriate retention settings can cause premature bucket rotation and even stop Splunk. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 93. Listen to your data. Splunk 6.4 Administration Listen to your data. 93 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 indexes.conf Options Number of Hot buckets (maxHotBuckets=3) Age (maxHotSpanSecs=7776000) Bucket size (maxDataSize = auto) db directory size (homepath.maxDataSizeMB=0) Number of Warm buckets (maxWarmDBCount=300) Maximum Index Size (maxTotalDataSizeMB=500000) Age (frozenTimePeriodInSecs=188697600) Create Rename Move Delete or Archive colddb directory size (coldPath.maxDataSizeMB=0) [itops] frozenTimePeriodInSecs = 31536000 maxHotSpanSecs = 86400 homePath.maxDataSizeMB = 100000 coldPath.maxDataSizeMB = 400000 ... Note Values in parenthesis are the defaults. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 94. Listen to your data. Splunk 6.4 Administration Listen to your data. 94 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Strict Time-based Retention Policies Y Example: Purge HR data when it is more than 90 days old, but no sooner Y Issues to consider: – Splunk freezes entire buckets, not individual events – If a bucket spans more than one day, you can't meet the 90 day requirement Y Configuration option: frozenTimePeriodInSecs=7776000 (90 days) maxHotSpanSecs = 86400 ê  Automatically "snaps" the span to the beginning of the time period ê  For 86400 (24 hours), hot buckets roll at midnight ê  Consider increasing max. number of hot buckets: maxHotBuckets = 10 Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 95. Listen to your data. Splunk 6.4 Administration Listen to your data. 95 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Volume-based Retention Policies Y Example: Prevent data bursts in one index from triggering indexing issues elsewhere in the same volume Y Issues to consider: – Splunk in itself cannot determine the maximum size for non-local volumes – Hot/warm and cold buckets can be in different volumes – If the volume runs out space, buckets roll to frozen before frozenTimePeriodInSecs Y Configuration Options: Use volume reference if a retention based on size is desired [volume:fast] path = /mnt/ssd/ maxVolumeDataSizeMB = 500000 [volume:slow] path = /mnt/raid/ maxVolumeDataSizeMB = 4000000 [soc] homePath = volume:fast/soc/db homePath.maxDataSizeMB = 50000 coldPath = volume:slow/soc/colddb coldPath.maxDataSizeMB = 200000 Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 96. Listen to your data. Splunk 6.4 Administration Listen to your data. 96 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Viewing Indexing Activity and Health Y Distributed Management Console – Provides comprehensive indexing activity details – Snapshot shows averages over the previous 15 minutes – Historical exposes trending and possible decaying health Y  Queue fill-ratio Y  Indexing rate Y  CPU activity Y  Volume usage per index Y  Index size over time Y  Detailed Indexing status Y  Retention policies Y  Bucket configuration details Displays the usage vs. capacity, if the volume-based retention is used (maxVolumeDataSizeMB) Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 97. Listen to your data. Splunk 6.4 Administration Listen to your data. 97 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Inspecting Bucket Details Y Search command: | dbinspect [index=name] [span|timeformat] – Returns information like status, number of events, timestamps of oldest and newest events, total bucket size, filepath, etc. – docs.splunk.com/Documentation/Splunk/latest/SearchReference/Dbinspect Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 98. Listen to your data. Splunk 6.4 Administration Listen to your data. 98 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 What to Back Up Y Indexed event data – the Splunk index – SPLUNK_HOME/var/lib/splunk/ – Or the directories where you placed your indexes (see indexes.conf for details) Y (Optional) the source log data for additional redundancy Y SPLUNK_HOME/etc for config and other important files apps users system/local licenses init.d passwd andmore Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 99. Listen to your data. Splunk 6.4 Administration Listen to your data. 99 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Backup Recommendation Y Use the incremental backup of your choice – Warm and cold buckets of your indexes – Configuration files – User files Y Hot buckets cannot be backed up without stopping Splunk – Use the snapshot capability of underlying file system to take a snapshot of hot, then back up the snapshot – Schedule multiple daily incremental backups of warm ê  Works best for high data volumes Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 100. Listen to your data. Splunk 6.4 Administration Listen to your data. 100 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Moving an Entire Index 1. Stop Splunk 2. Copy the entire index directory to new location while preserving permissions and all subdirectories – *NIX: cp -rp <source> <target> – Windows: xcopy <source> <target> /s /e /v /o /k (or, robocopy) 3. If this is a global change, unset the SPLUNK_DB environment variable and update SPLUNK_HOME/etc/splunk-launch.conf 4. Edit indexes.conf to indicate the new location 5. Start Splunk 6. After testing and verifying new index, the old one can be deleted Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 101. Listen to your data. Splunk 6.4 Administration Listen to your data. 101 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Removing Indexed Data Y Sometimes you have unwanted data in an index – There are no index editors – First, you should change your configuration to omit the data in the future Y What are your options for the data already in the index? – Let the data age-out normally – Use the delete command to make the unwanted data not show up in searches – Run splunk clean command to delete all data from the index – Delete the index Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 102. Listen to your data. Splunk 6.4 Administration Listen to your data. 102 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Deleting Events Y Assign users to the can_delete role – Specifically set up for deletions – NOTrecommended to give this capability to other roles ê  By default, even the admin role does not have the ability Y Delete CANNOT be undone: – Log into Splunk Web as a user of the can_delete role – Create a specific search that identifies the data you want to delete ê  Double check that the search ONLYincludes the data to delete ê  Pay special attention to which index you are using and the time range – After you are certain you’ve targeted only the data you want to delete, pipe the delete command Note This is a "virtual" delete. Splunk marks the events as deleted and they never show in searches again. However, they continue to take up space on disk. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 103. Listen to your data. Splunk 6.4 Administration Listen to your data. 103 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Cleaning Out an Index Y To flush indexed data and reset an index, use the CLI clean command – DATAWILLBE PERMANENTLYDESTROYED – Typically used on test/dev systems, not for production systems Y Command syntax: splunk clean [eventdata|userdata|all] [-index name] ê  eventdata – delete indexed events and metadata on each event ê  userdata – delete user accounts ê  all – everything - including users, saved searches, and alerts – ALWAYS SPECIFYAN INDEXTOAVOIDTEARS ê  If no index is specified, the default is to clean all indexes Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 104. Listen to your data. Splunk 6.4 Administration Listen to your data. 104 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 The Fishbucket Y The fishbucket index stores the checkpoint data for monitor inputs Y To reset the individual input checkpoint, use the btprobe command: Y Requires stopping the forwarder or indexer Y Other options: – splunk clean eventdata _thefishbucket ê  Force re-indexing of all file monitors in the indexer – rm -r ~/splunkforwarder/var/lib/splunk/fishbucket ê  Manually delete the fishbucket on forwarders splunk cmd btprobe –d SPLUNK_HOME/var/lib/splunk/ fishbucket/splunk_private_db --file <source> --reset Note Resetting the monitor checkpoint re-indexes the data, resulting in more license usage. Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 105. Listen to your data. Splunk 6.4 Administration Listen to your data. 105 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Restoring a Frozen Bucket Y To thaw an archived bucket: – Copy the bucket directory from the archive to the index's thaweddb directory – Stop Splunk – Run splunk rebuild <path to bucket directory> ê  Also works to recover a corrupted directory ê  Does not count against license – Start Splunk Y Data in thaweddb is searchable along with other data, is not frozen, and does not count against index total size – Delete the bucket directory when no longer needed and restart Splunk Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 106. Listen to your data. Splunk 6.4 Administration Listen to your data. 106 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Index Replication Y Splunk indexers can function as a cluster – Indexers in a cluster can be configured to replicate buckets amongst themselves Y Index replication allows for rapid failure recovery Y Fully configurable replication allows you to balance speed of recovery and overall disk usage Y Index replication requires additional disk space Y Discussed in detail in Splunk ClusterAdministration class Y Basic indexer cluster concepts: – http://docs.splunk.com/Documentation/Splunk/latest/Indexer/Basicconcepts Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 107. Listen to your data. Splunk 6.4 Administration Listen to your data. 107 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Further Reading Y docs.splunk.com/Documentation/Splunk/latest/Indexer/ HowSplunkstoresindexes Y docs.splunk.com/Documentation/Splunk/latest/Indexer/ Setlimitsondiskusage Y docs.splunk.com/Documentation/Splunk/latest/Indexer/Automatearchiving Y wiki.splunk.com/Deploy:BucketRotationAndRetention Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 108. Listen to your data. Splunk 6.4 Administration Listen to your data. 108 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Lab Exercise 5b –Configure Retention Policies Y Time: 15 - 20 minutes Y Tasks: – Configure a more strict time-based retention policy for securityops – Configure a volume-based retention policy for itops – Use DMC to monitor indexing activities and retention settings Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 109. Listen to your data. Splunk 6.4 Administration Listen to your data. 109 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module 6: Users, Roles, and Authentication Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 110. Listen to your data. Splunk 6.4 Administration Listen to your data. 110 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module Objectives Y Describe user roles in Splunk Y Create a custom role Y Integrate Splunk with LDAP or SAML Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 111. Listen to your data. Splunk 6.4 Administration Listen to your data. 111 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Managing Users and Roles Y Users and roles define user privileges Y To have access to a Splunk instance, a user must have: – ASplunk user account – Assignment to one or more Splunk roles Y User accounts can be assigned to: – Native Splunk accounts – LDAPorActive Directory – SAML – Scripted access to PAM, RADIUS, or other user account systems Select Settings > Access controls Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 112. Listen to your data. Splunk 6.4 Administration Listen to your data. 112 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Identifying Roles Y Five built-in user roles: – admin, power, and user ê  Users can be assigned these roles – can_delete ê  Will be discussed separately – splunk-system-role ê  Special role that allows system services to run without a defined user context Y Administrators can add custom user roles Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 113. Listen to your data. Splunk 6.4 Administration Listen to your data. 113 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Defining Custom User Roles Give the role a name and select a default app Optional Restrict searches on certain fields, sources, hosts, etc Default is -1 (no restriction) Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 114. Listen to your data. Splunk 6.4 Administration Listen to your data. 114 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Defining Custom User Roles (cont.) Optional user-level and role-level limits Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 115. Listen to your data. Splunk 6.4 Administration Listen to your data. 115 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Describing Role Inheritance Y Anew role can be based on one or more existing roles Y The new role inherits both capabilities and index access Y You cannot turn off inherited capabilities or access Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 116. Listen to your data. Splunk 6.4 Administration Listen to your data. 116 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Implications of Inheritance Y If you create a new role that inherits from another role—such as, user: – The new role has all the capabilities of the inherited role ê  For example, "run real-time searches" – The new role inherits the index settings (both default and allowed) – In the new role, you cannot turn off capabilities or index access that were inherited from the original role Y If you want a role that is "like" user but with some capabilities turned off: – Make a new role that does not inherit from any other role – Turn on all of the same capabilities as in User, except those you want turned off – Assign the appropriate indexes to the new role Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 117. Listen to your data. Splunk 6.4 Administration Listen to your data. 117 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Defining Role Capabilities Add or remove capabilities (authorize.conf.spec) docs.splunk.com/Documentation/Splunk/latest/Admin/authorizeconf Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 118. Listen to your data. Splunk 6.4 Administration Listen to your data. 118 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 edit_roles_grantable Capability Y Example: I want to separate and delegate administration tasks between sys-admins and data admins without granting full admin role Y Issues to consider: – With edit_roles and edit_user capabilities, users can promote self to full admin role – Want to restrict grantable capabilities only to the level sub-admins currently have Y Configuration option: – Add the edit_roles_grantable capability to the sub-admin role ê  Can only create roles with subset of the capabilities that the current user role has ê  Must use in conjunction with the edit_user capability Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 119. Listen to your data. Splunk 6.4 Administration Listen to your data. 119 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Example: edit_roles_grantable Capability Add new role user_admin Y Inheritance: Y  power Y  user Y Capabilities: Y  edit_roles_grantable Y  edit_user admin acurry Assign acurry to the user_admin role acurry can only assign limited roles to users New users Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 120. Listen to your data. Splunk 6.4 Administration Listen to your data. 120 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Defining Role Index Search Options Y You can specify which indexes are searched if the user does not specify "index=<index_name>" – Usually, this should match the Indexes setting Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 121. Listen to your data. Splunk 6.4 Administration Listen to your data. 121 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Defining Role Index Access Options Y Most important index setting –  Controlswhichindexestheusersinthisrolecanaccess –  Ifnotselected,userscannotsearchorevenseethisindex Y Inherited indexes are still available even when they are not listed Y The default is All non-internal indexes –  Revisitaccesscontroleachtimeanewindexhasbeenadded Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 122. Listen to your data. Splunk 6.4 Administration Listen to your data. 122 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Authentication Options Y You need the change_authentication Splunk capability to configure Y Saves the settings in authentication.conf – Splunk native – LDAP – SAML2.0 – Scripted SSO Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 123. Listen to your data. Splunk 6.4 Administration Listen to your data. 123 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Native Authentication Y You can create user accounts directly in Splunk – Example: the default admin user Y Passwords are stored in SPLUNK_HOME/etc/passwd Y Use a blank passwd file to completely disable native authentication BUT – In all authentication scenarios, best practice is to keep a failsafe account here with a VERYstrong password Y You can have a mix of Splunk and LDAP or other users – Splunk native authentication always takes precedence over others Y Select Settings >Access Controls > Users to manage all users and to create Splunk user accounts Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 124. Listen to your data. Splunk 6.4 Administration Listen to your data. 124 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Managing Users in Splunk Y Splunk native users can be edited or deleted Y Only time zone and default app can be changed on LDAPor other users Add new Splunk user Click to edit the user settings Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 125. Listen to your data. Splunk 6.4 Administration Listen to your data. 125 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Native Authentication: Add Users Y Required: – Username and password Y Optional: – Full name and email address (defaults to none) – Time zone (defaults to search head time zone) – Default app (defaults to role default app, or home if no role default app) – Role(s) ê  Defaults to user Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 126. Listen to your data. Splunk 6.4 Administration Listen to your data. 126 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Directory Server Integration Y Best practice: integrate Splunk with a directory server – Works with multiple LDAPservers, including OpenLDAPandActive Directory – You can configure from Splunk Web settings Y User accounts are stored in directory server – Enforce the same user account and password policy – Users use the same user name and password in Splunk that they use elsewhere – Optionally, the groups in the directory server can be mapped to Splunk roles ê  Or, this can be done manually in Splunk Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 127. Listen to your data. Splunk 6.4 Administration Listen to your data. 127 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 LDAPAuthentication LDAP maintains the user credentials - user ID and password, plus other information - centrally and handles all authentication Log user in Splunk Web Client LDAP Server Splunk Request Splunk login Authentication granted Check authentication Create user session Check group mapping Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 128. Listen to your data. Splunk 6.4 Administration Listen to your data. 128 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Creating an LDAP Strategy 1.  SelectLDAP 2.  ClickConfigure Splunk touse LDAP –  Thelistofcurrent LDAPstrategies displays –  Astrategyisaconnectiontooneor moreLDAPnodes on an LDAPserver –  Candefinemultiple LDAPservers 3.  ClickNewtoaddanewLDAPstrategy –  Namethestrategy and fillout the form 1 2 3 Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 129. Listen to your data. Splunk 6.4 Administration Listen to your data. 129 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 LDAP Strategy Settings Y Normally the configuration is based on the information given to you by the LDAPadministrators – LDAPconnection settings – User settings ê  DeterminewhichpartoftheLDAP directorystoresSplunkusers – Group settings & Dynamic group settings ê  Determinewhichnodeinthedirectory containsyourgroupdefinitions – Advanced settings host = 10.0.0.150 port = 389 SSLEnabled = 0 bindDN = adsuser@buttercupgames.local bindDNpassword = <some_hashed_pw> userBaseDN = OU=splunk,DC=buttercupgames,DC=local userNameAttribute = samaccountname realNameAttribute = displayname groupBaseDN = OU=splunk,DC=buttercupgames,DC=local groupNameAttribute = cn groupMemberAttribute = member nestedGroups = 0 groupMappingAttribute = dn network_timeout = 20 sizelimit = 1000 timelimit = 15 Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 130. Listen to your data. Splunk 6.4 Administration Listen to your data. 130 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Mapping LDAP Groups to Roles Select Map groups to define relationships between LDAP groups and Splunk roles Click a LDAP group name to map it to one or more Splunk roles Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 131. Listen to your data. Splunk 6.4 Administration Listen to your data. 131 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Mapping LDAP Groups to Roles (cont.) Y Not all groups must be mapped Y Mappings can be changed at any time – The LDAPserver is rechecked each time a user logs into Splunk Click one or more role names to map them to to this group After completing the mapping for all LDAP groups, the mapped roles are shown here Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 132. Listen to your data. Splunk 6.4 Administration Listen to your data. 132 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Further Information about LDAP Y Splunk caches user data from LDAP Y New user data is cached the first time that user logs in Y See docs for more details on setting up LDAPmapping: docs.splunk.com/Documentation/Splunk/latest/Security/SetupuserauthenticationwithLDAP Y Can also be done in config files: docs.splunk.com/Documentation/Splunk/latest/Admin/authenticationconf Click this to force an immediate reload Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 133. Listen to your data. Splunk 6.4 Administration Listen to your data. 133 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 SAML 2.0 Single Sign On Identity provider (IDP) maintains the user credentials and handles authentication Direct to default app Web Client IDP Splunk Request Splunk login Post Assertion (grant/deny) Redirect authentication Create session cookie Validate assertion Configured with trusted binding Challenge for credentials Check group mapping Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 134. Listen to your data. Splunk 6.4 Administration Listen to your data. 134 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Configuring SAML Y Configure this on a search head: 1.  Select SAML 2.  Click Configure Splunk to use SAML ê  The list of current SAMLgroups displays 3.  Click SAMLConfiguration to configure the trusted binding and other connection details 4.  Click New Group to map the roles ê  Group-to-Role mapping is same as LDAP 1 2 3 4 Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 135. Listen to your data. Splunk 6.4 Administration Listen to your data. 135 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Configuring SAML (cont.) 1.  Enter the following info and save: (provided by the IDPadministrator) – Single Sign On (SSO) URL – IDP's certificate file – Entity ID – Attribute query URL – User / Password 2.  Export Splunk (Service Provider) metadata: http://<splunk_web>/saml/spmetadata – IDPadministrator imports it into its system and configures its settings – IDPadministrator exports its configured metadata 3.  Import IDPmetadata and update the SAML configuration settings Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 136. Listen to your data. Splunk 6.4 Administration Listen to your data. 136 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Single Sign On with Reverse Proxy Y Splunk SSO allows you to use a web proxy to handle Splunk authentication –  Authentication is moved to a web proxy,whichpassesalongauthenticationtoSplunkWeb –  Webproxycanuseanymethodtoauthenticate(IDPinexample) docs.splunk.com/Documentation/Splunk/latest/Security/HowSplunkSSOworks Web Client Splunk request Proxy passes request with user name Proxy authorizes client Proxy Server IDP Splunk Web returns page to proxy Proxy returns page Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 137. Listen to your data. Splunk 6.4 Administration Listen to your data. 137 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Scripted Authentication Y There are other types of authentication systems that Splunk can integrate with using scripts Y For the most up-to-date information on scripted authentication, see the README file in: SPLUNK_HOME/share/splunk/authScriptSamples/ – The directory includes sample authentication scripts Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 138. Listen to your data. Splunk 6.4 Administration Listen to your data. 138 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Lab Exercise 6 – Add Roles and Users Y Time: 15 - 20 minutes Y Tasks: – Create a custom role – Configure Splunk to use LDAPauthentication – Map LDAPgroups to Splunk roles – Verify the configurations Y Lab notes: – open.sesam3 is the password for all LDAPaccounts Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 139. Listen to your data. Splunk 6.4 Administration Listen to your data. 139 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module 7: Universal Forwarders Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 140. Listen to your data. Splunk 6.4 Administration Listen to your data. 140 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Module Objectives Y Install a universal forwarder Y Configure the forwarder to connect to an indexer Y Test the forwarder connection Y Describe optional forwarder settings Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 141. Listen to your data. Splunk 6.4 Administration Listen to your data. 141 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Forwarders and Indexers Y In a production environment – Splunk indexer(s) runs on dedicated servers – The data you want is on remote machines Y Install Splunk forwarders on the remote machines to – Gather the data – Send it across the network to the Splunk indexer(s) Y Indexers listen on a receiving port for the forwarded data Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 142. Listen to your data. Splunk 6.4 Administration Listen to your data. 142 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Splunk Universal Forwarder Y Universal forwarder gathers data from a host and sends it to an indexer Y Specifically designed to run on production servers – Alightweight Splunk instance designed to run on a mission-critical system – Minimal CPU and memory usage – Output bandwidth constrained to 256 KBps by default – No web interface Y Aseparate installation binary – Free built-in license, no limits Y Best Practice: use the Universal Forwarder if possible Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 143. Listen to your data. Splunk 6.4 Administration Listen to your data. 143 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Configuration Steps 1. Set up a receiving port on each indexer – It is only necessary to do this once 2. Download and install Universal Forwarder – Change password from changeme 3. Set up forwarding on each forwarder 4. Add inputs on forwarders, using one of the following: – Forwarder management (discussed in the next module) – CLI – Manually Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 144. Listen to your data. Splunk 6.4 Administration Listen to your data. 144 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Configure the Receiving Port on Each Indexer Y In Splunk Web: 1.  Select Settings > Forwarding and receiving 2.  Next to Configure receiving, select Add new 3.  Enter a port number and click Save Y  Or, with CLI: splunk enable listen <port> Y  The configuration is saved in inputs.conf as: [splunktcp://portNumber] Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 145. Listen to your data. Splunk 6.4 Administration Listen to your data. 145 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Installing Universal Forwarder Manually Y *NIX: unpack the .tgz or .tgz.Z in the desired location Y Windows: execute the .msi or use the command line – Installed as a service Y SPLUNK_HOME is the installation directory: – /opt/splunkforwarder or c:Program FilesSplunkUniversalforwarder Y Same splunk command-line interface in SPLUNK_HOME/bin – Same commands for start/stop, restart, etc. – The initial admin account password is changeme ê  Use splunk edit user admin –password newpassword Y When installing large numbers of forwarders, use an automated method Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 146. Listen to your data. Splunk 6.4 Administration Listen to your data. 146 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Using the Interactive Windows Installer Y Most forwarder settings can be configured using the installer wizard – Can run as a domain user without the domain user local administrator privileges Y CLI installation is available for scripted installations –  docs.splunk.com/Documentation/Splunk/latest/Forwarding/DeployaWindowsdfviathecommandline Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 147. Listen to your data. Splunk 6.4 Administration Listen to your data. 147 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Forwarder Configuration Files Y Forwarders require outputs.conf – outputs.conf points the forwarder to the receiver(s) – Can specify additional options for load balancing, SSL, compression, alternate indexers, and indexer acknowledgement [tcpout:splunk_indexer] server = 10.1.2.3:9997 Production Server with Forwarder [splunktcp://9997] outputs.conf inputs.conf Data feeds from inputs.conf Receiver 10.1.2.3 (indexer) TCP stream to port 9997 This stanza instructs the indexer to listen on port 9997 for feeds from Splunk forwarders server includes one or more target receivers, separated by commas server can be IP or DNS name plus receiver port Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 148. Listen to your data. Splunk 6.4 Administration Listen to your data. 148 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Defining Target Indexer on the Forwarder Y Run: splunk add forward-server indexer:receiving-port – For example, splunk add forward-server 10.1.2.3:9997 configures the outputs.conf as: docs.splunk.com/Documentation/Splunk/latest/Forwarding/Configureforwarderswithoutputs.confd [tcpout] defaultGroup = default-group [tcpout:default-group] server = 10.1.2.3:9997 [tcpout-server://10.1.2.3:9997] Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 149. Listen to your data. Splunk 6.4 Administration Listen to your data. 149 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Testing the Connection Y After running splunk add forward-server, the forwarder should be communicating with the indexer – Splunk forwarder logs are automatically sent to the indexer's _internal index Y To check for successful connection: – On the indexer, search index=_internal host=forwarder_hostname – On the indexer, run splunk display listen – On the forwarder, run splunk list forward-server Y To remove the target indexer setting: – On the forwarder, run splunk remove forward-server indexer:port Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 150. Listen to your data. Splunk 6.4 Administration Listen to your data. 150 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Troubleshooting Forwarder Connection Y Is the forwarder sending data to the indexer? – Check SPLUNK_HOME/var/log/splunk/splunkd.log on the forwarder Y Does the indexer receive any data on the listening port? – Search on indexer: – To get the <uf>, run on the forwarder: tail –f var/log/splunk/splunkd.log | egrep 'TcpOutputProc|TcpOutputFd' index=_internal sourcetype=splunkd component=TcpInputConfig OR (host=<uf> component=StatusMgr) splunk show default-hostname Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 151. Listen to your data. Splunk 6.4 Administration Listen to your data. 151 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Additional Forwarding Options Y Compressing the feed Y Securing the feed Y Automatic load balancing to multiple indexers Y Forwarder queue size Y Indexer acknowledgement to forwarder Y Selectively forwarding data to indexers Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 152. Listen to your data. Splunk 6.4 Administration Listen to your data. 152 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Compressing the Feed Receiving indexer 10.1.2.3 [tcpout:splunk_indexer] server = 10.1.2.3:9997 compressed = true Forwarders [splunktcp:9997] compressed = true Set compression on both sides (slightly increases CPU usage) outputs.conf inputs.conf Compressed stream Non-compressed feeds for this port are ignored Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution
  • 153. Listen to your data. Splunk 6.4 Administration Listen to your data. 153 Copyright © 2016 Splunk, Inc. All rights reserved | 7 July 2016 Securing the Feed – SSL Receiver 10.1.2.3 [tcpout:splunk_indexer] server = 10.1.2.3:9997 sslPassword = ssl_for_m3 sslCertPath = SPLUNK_HOME/etc/auth/cert1/server.pem sslRootCAPath = SPLUNK_HOME/etc/auth/cert1/cacert.pem Forwarders [splunktcp-ssl:9997] [ssl] password = ssl_for_m3 serverCert = SPLUNK_HOME/etc/auth/cert1/server.pem rootCA = SPLUNK_HOME/etc/auth/cert1/cacert.pem outputs.conf inputs.conf Secure Feed SSL settings for all inputs in dedicated SSL stanza Turning on SSL: Y  Can increase the CPU usage Y  Automatically compresses the feed Generated for chandrika seela (chandrika.seela@accenture.com) (C) Splunk Inc, not for distribution