Searching In Splunk - Concepts






As you can see in the above screenshot, there are default fields (Host, Source, Sourcetype and Time) which gets added after indexing. Let us understand these default fields:



  1. Host: Host is a machine or an appliance IP address name from where the data comes. In the above screenshot, My-Machine is the host.
  2. Source: Source is where the host data comes from. It is the full pathname or a file or directory within a machine.
    For example: C:Splunkemp_data.txt 
  3. Sourcetype: Sourcetype identifies the format of the data, whether it is a log file, XML, CSV or a thread field. It contains the data structure of the event.
    For example: employee_data
  4. Index: It is the name of the index where the raw data is indexed. If you don’t specify anything, it goes into a default index.
  5. Time: It is a field which displays the time at which the event was generated. It is barcoded with every event and cannot be changed. You can rename or slice it for a period of time in order to change its presentation.
    For example: 5/3/20 4:47:40 represents the timestamp of a particular event.












example of dashboard
Why Should You Use Splunk for Log Analysis ? | TO THE NEW Blog
















Searching In Splunk - Concepts Searching In Splunk - Concepts Reviewed by ohhhvictor on May 08, 2020 Rating: 5

No comments:

 photo imagen120.jpg
Theme images by 5ugarless. Powered by Blogger.