Splunk
Last updated
Was this helpful?
Last updated
Was this helpful?
Splunk is a data analytics and monitoring platform that ingests, indexes, and analyzes machine-generated data (logs, metrics, traces) for security (SIEM), IT operations (ITSM) .
Forwarder
Collects and forwards data (no processing).
Indexer
Parses, indexes, and stores data.
Search Head
Executes SPL queries and visualizes results.
Deployment Server
Manages configurations for forwarders.
1. Data Ingestion
Sources: Logs (files, APIs, syslog), metrics (CPU, memory), and streaming data (Kafka).
Forwarders: Lightweight agents (Splunk Universal Forwarder) collect and send data to Splunk.
2. Indexing
Parsing: Splunk extracts key fields (timestamps, hostnames, event types).
Indexing: Data is stored in time-series indexes for fast retrieval.
3. Search & Analysis
Search Processing Language (SPL): Splunk’s query language (e.g., index=“wazuh-alert” | stats count by src_ip
).
Correlation: Detects patterns (e.g., brute-force attacks).
4. Visualization & Alerts
Dashboards: Custom charts/tables in Splunk Web.
Alerts: Trigger actions (email, webhook) when thresholds are breached.
5. Storage & Retention
Hot/Warm/Cold Buckets: Automatically moves data to cheaper storage over time.
1. BASIC SEARCHES
2. BOOLEAN OPERATORS
3. FIELD EXTRACTION
4. STATISTICAL COMMANDS
5. TIME FILTERS
6. ADVANCED EXAMPLES
Security Alert (Brute Force):
Application Performance: