SlideShare a Scribd company logo
Copyright © 2015 Splunk Inc.
Getting Started with
Splunk Enterprise
Tour
Bjorn Graabek
Sr. Splunk Sales Engineer
2
Download Splunk Enterprise for your OS and Architecture.
3
Download tutorialdata.zip
4
Text
For OSX (from terminal):
mkdir /opt/splunk_live_sd
cd /opt/splunk_live_sd
Tar-xzvf ~/Downloads/splunk-
6.3.3-f44afce176d0-darwin-64.tgz
cd splunk/bin
For WIN: Install MSI
For OSX: Start Splunk via
./splunk start
For WIN: Services -> Splunk -> Start
5
Starting Splunk, Accept License.
6
Text
With Firefox, Chrome, or Safari – head to http://127.0.0.1:8000 . User=admin password=changeme
7
You’ve successfully installed Splunk, and logged in! Let’s add the tutorialdata.zip via “Add Data”
8
You can also “Add Data” from Settings at the top.
9
Click on upload.
10
Let’s drag tutorialdata.zip into “Drop your data file here”.
11
Click Next
12
Splunk can auto detect the sourcetype. Lets change host field to buttercup-web01, and then click Review.
13
Looks good, click Submit.
14
Let’s Start Searching our data.
15
We’re brought into a search with filters applied to search the data we just uploaded.
16
Let’s type “buttercupgames” in the search bar, and double click into a bar on the histogram.
17
Notice the time picker changed with our drill into the histogram bar.
18
Given that this data is web access, lets do a string search for 400, which is a “Bad Request” code.
Notice that there’s 188 events returned. (number will vary for you).
19
Lets also add 300 into the mix, and notice that my event count is higher now.
20
We can see the 400 status codes, but not 300’s. That’s because the string search of 300 doesn’t explicitly
search for status code of 300 – it’ll string match any event that contains “300”.
21
Lets explicitly search for status codes equaling values we want to see returned.
22
Great, we’re now returned all the events containing the two status codes we searched for.
Click on “Top values by time”, which will build out a timechart for us.
23
Notice how our search query changed, there’s a | (pipe), and a timechart command added.
The pipe followed by a command allows further operation on your filtered data set.
24
Let’s change our search to: buttercupgames status=*
And – drill into one bar on the histogram.
25
Click on “top values by time” under the status field on the left, which will produce the timechart above.
26
Let’s exclude 200 status codes by adding AND status!=200, and change Line to Column.
27
After changing from Line to Column, lets Stack the results (middle stack under Stack Mode). Much better!
28
Lets now save this to a dashboard, a place we can go to view this search without having to remember
what we had just searched for. Click Save AS -> Dashboard Panel. Fill in, and click Save. Then View dashboard.
29
Click on Search to get us back to our search bar, and lets key in: buttercupgames.
Development wants to know what web browsers are being used to access the site, but no fields currently
exist. No problem – lets extract the browser field.
Find an event that contains a value that you’re looking for, and click the “>” arrow just to the left of “Time”.
The event will expand with a down arrow, and Extract Fields will be under Event Actions. Click Extract Fields.
30
Click Regular Expression (Splunk will build a regular expression to extract our fields), and click next.
Highlight the value of the field you’d like to create, and lets name the field: browser_type
Click Add Extraction.
31
Let’s verify that the extracted field contains values that are indeed types of browsers.
Good, click next to proceed.
Now, open the permissions to “App” which will allow users of the App the ability to leverage this extraction.
Click Next.
32
Success, Let’s explore the fields just created in search, by clicking the link.
33
You’ll now be taken to search, with the filter set to the sourcetype that the field extraction has been applied
to. Note – field extractions are coupled to a sourcetype.
Click on “Top values”.
34
Notice how the search changed. And, instead of a bar graph, we want a pie chart, so drop down the “bar”
option and change it to Pie.
35
Lets add this search to our dashboard, and then view the dashboard.
Click Edit -> Edit Panels to drag the different panels to different positions.
36
Let’s go back to search, and search for buttercupgames AND status!=200 (we want to see events that aren’t successful. Add
the stats and where clause above, to return when there’s more than 100 unsuccessful status codes.
37
Let’s create an alert. Save As -> Alert. Fill out the Title, Scheduled, Earliest + Latest, and Cron Expression
(Instead of 48, change to minutes a few ahead of your current time. Ie. If it’s 9:00am, change to 05.
38
Add to Triggered Alerts, and Save.
39
You should see an alert trigger once your scheduled search runs at the cron expression you defined.
*Note – alerts will only work until the trial license expires.
40
Let’s go back to search and: buttercupgames status=* | iplocation clientip
We want to lookup the clientip values against the MaxMind database to pull in City, Country, State, Lat, Lon
of the IPs.
41
Now, business is interested in seeing plots on a map of web users and what they’re doing with the website.
Lets append a geostats command that counts the events by the values of the action field. Pretty cool! This is
definitely dashboard worthy! Lets add to dashboard.
42
Awesome! Now we have a single pane of glass that Operations, Development, and Business all care about –
from one data source! Talk about value!
Thank You

More Related Content

PPTX
Splunk Ninjas: New Features, Pivot, and Search Dojo
PPTX
Splunk Dynamic lookup
PDF
Nationwide Splunk Ninjas!
PPTX
Splunk Ninjas Breakout Session
PPTX
Splunk Ninjas: New features, pivot, and search dojo
PPTX
Splunk live! ninjas_break-out
PDF
Headaches and Breakthroughs in Building Continuous Applications
PPTX
SplunkLive! Detroit April 2013 - Domino's Pizza
Splunk Ninjas: New Features, Pivot, and Search Dojo
Splunk Dynamic lookup
Nationwide Splunk Ninjas!
Splunk Ninjas Breakout Session
Splunk Ninjas: New features, pivot, and search dojo
Splunk live! ninjas_break-out
Headaches and Breakthroughs in Building Continuous Applications
SplunkLive! Detroit April 2013 - Domino's Pizza

What's hot (20)

PPTX
SplunkLive! Presentation - Data Onboarding with Splunk
PPTX
Hunk - Unlocking the Power of Big Data
PPTX
Splunk's Hunk: A Powerful Way to Visualize Your Data Stored in MongoDB
PDF
AI-Powered Streaming Analytics for Real-Time Customer Experience
PPTX
Hunk - Unlocking The Power of Big Data Breakout Session
PDF
Unifying Streaming and Historical Telemetry Data For Real-time Performance Re...
PPTX
December 2013 HUG: Hunk - Splunk over Hadoop
PDF
Distributing Queries the Citus Way | PostgresConf US 2018 | Marco Slot
PDF
Monitoring Postgres at Scale | PostgresConf US 2018 | Lukas Fittl
PDF
Cloud Experience: Data-driven Applications Made Simple and Fast
PDF
Spark Summit - Stratio Streaming
PDF
Distributed Point-in-Time Recovery with Postgres | PGConf.Russia 2018 | Eren ...
PDF
Five Data Models for Sharding | Nordic PGDay 2018 | Craig Kerstiens
PPTX
Azure Data Explorer deep dive - review 04.2020
PDF
Real-Time Analytics and Actions Across Large Data Sets with Apache Spark
PPTX
SplunkLive! Beginner Session
PPTX
Eagle from eBay at China Hadoop Summit 2015
PDF
New Developments in the Open Source Ecosystem: Apache Spark 3.0, Delta Lake, ...
PDF
Spark Summit East 2015 Keynote -- Databricks CEO Ion Stoica
PDF
Real-Time Anomoly Detection with Spark MLib, Akka and Cassandra by Natalino Busa
SplunkLive! Presentation - Data Onboarding with Splunk
Hunk - Unlocking the Power of Big Data
Splunk's Hunk: A Powerful Way to Visualize Your Data Stored in MongoDB
AI-Powered Streaming Analytics for Real-Time Customer Experience
Hunk - Unlocking The Power of Big Data Breakout Session
Unifying Streaming and Historical Telemetry Data For Real-time Performance Re...
December 2013 HUG: Hunk - Splunk over Hadoop
Distributing Queries the Citus Way | PostgresConf US 2018 | Marco Slot
Monitoring Postgres at Scale | PostgresConf US 2018 | Lukas Fittl
Cloud Experience: Data-driven Applications Made Simple and Fast
Spark Summit - Stratio Streaming
Distributed Point-in-Time Recovery with Postgres | PGConf.Russia 2018 | Eren ...
Five Data Models for Sharding | Nordic PGDay 2018 | Craig Kerstiens
Azure Data Explorer deep dive - review 04.2020
Real-Time Analytics and Actions Across Large Data Sets with Apache Spark
SplunkLive! Beginner Session
Eagle from eBay at China Hadoop Summit 2015
New Developments in the Open Source Ecosystem: Apache Spark 3.0, Delta Lake, ...
Spark Summit East 2015 Keynote -- Databricks CEO Ion Stoica
Real-Time Anomoly Detection with Spark MLib, Akka and Cassandra by Natalino Busa
Ad

Viewers also liked (20)

PPTX
Guidelines to implement OER in adult education
PDF
Scaffolding ePortfolio use (workshop handout)
PDF
UX Australia 2014 Conference Sketchnotes
PDF
May 25 Maskwacis community bbq
PDF
Brahmin knew many_language
DOCX
Rogers beautifully simple gifts price list
PDF
Adult Ed Winter Brochure 2016 1.4
PDF
Thinkcentre m91&m91p
PPTX
The Basics of Kicking Ass on the Social Web
PDF
Agile UX 2015 Conference
PDF
O ESTADO DO FUTURO - 2015/16 E O FUTURO DO TRABALHO 2050
DOC
Resume
PPTX
Program Level Design Using Eportfolios: Getting the Big Picture - Sherrie Lov...
PPTX
Envelhecimento Activo
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PDF
Networked Scholars, or, Why on earth do academics use social media and why ...
PDF
SplunkLive Wellington 2015 - New Features, Pivot and Search Dojo
PDF
Intermedia Customer Presentation
PDF
SplunkLive Wellington 2015 - Splunk for Security
PPTX
SplunkLive! Paris 2015 - Auchan
Guidelines to implement OER in adult education
Scaffolding ePortfolio use (workshop handout)
UX Australia 2014 Conference Sketchnotes
May 25 Maskwacis community bbq
Brahmin knew many_language
Rogers beautifully simple gifts price list
Adult Ed Winter Brochure 2016 1.4
Thinkcentre m91&m91p
The Basics of Kicking Ass on the Social Web
Agile UX 2015 Conference
O ESTADO DO FUTURO - 2015/16 E O FUTURO DO TRABALHO 2050
Resume
Program Level Design Using Eportfolios: Getting the Big Picture - Sherrie Lov...
Envelhecimento Activo
Splunk for Enterprise Security featuring User Behavior Analytics
Networked Scholars, or, Why on earth do academics use social media and why ...
SplunkLive Wellington 2015 - New Features, Pivot and Search Dojo
Intermedia Customer Presentation
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive! Paris 2015 - Auchan
Ad

Similar to SplunkLive! London 2016 Getting started with Splunk (20)

PPTX
Getting Started with Splunk Enterprise Hands-On
PPTX
Getting Started with Splunk Enterprise Hands-On
PPTX
Getting Started Getting Started With Splunk Enterprise
PPTX
SplunkLive! Zurich 2017 - Getting Started with Splunk Enterprise
PDF
Getting Started with Splunk Enterprise Hands-On
PDF
Getting Started with Splunk Enterprise Hands-On
PPTX
Splunk bsides
PPTX
Getting Started with Splunk Break out Session
DOCX
Getting Started with Splunk Enterprise - Demo
PPTX
Getting started with Splunk - Break out Session
PPTX
Getting started with Splunk
PPT
Splunk .conf2011: Search Language: Beginner
PPTX
SplunkLive! London: Splunk ninjas- new features and search dojo
PPTX
SplunkLive! Getting Started with Splunk Enterprise
PDF
SplunkLive! Washington DC May 2013 - Search Language Beginner
PPTX
Splunk live beginner training nyc
PPTX
SplunkLive! Zürich 2014 Beginner Workshop: Getting started with Splunk
PPTX
Splunk Ninjas: New Features, Pivot, and Search Dojo
PPTX
Splunk Ninjas: New Features and Search Dojo
PDF
Machine Data 101
Getting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-On
Getting Started Getting Started With Splunk Enterprise
SplunkLive! Zurich 2017 - Getting Started with Splunk Enterprise
Getting Started with Splunk Enterprise Hands-On
Getting Started with Splunk Enterprise Hands-On
Splunk bsides
Getting Started with Splunk Break out Session
Getting Started with Splunk Enterprise - Demo
Getting started with Splunk - Break out Session
Getting started with Splunk
Splunk .conf2011: Search Language: Beginner
SplunkLive! London: Splunk ninjas- new features and search dojo
SplunkLive! Getting Started with Splunk Enterprise
SplunkLive! Washington DC May 2013 - Search Language Beginner
Splunk live beginner training nyc
SplunkLive! Zürich 2014 Beginner Workshop: Getting started with Splunk
Splunk Ninjas: New Features, Pivot, and Search Dojo
Splunk Ninjas: New Features and Search Dojo
Machine Data 101

More from Splunk (20)

PDF
Splunk Leadership Forum Wien - 20.05.2025
PDF
Splunk Security Update | Public Sector Summit Germany 2025
PDF
Building Resilience with Energy Management for the Public Sector
PDF
IT-Lagebild: Observability for Resilience (SVA)
PDF
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
PDF
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
PDF
Praktische Erfahrungen mit dem Attack Analyser (gematik)
PDF
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
PDF
Security - Mit Sicherheit zum Erfolg (Telekom)
PDF
One Cisco - Splunk Public Sector Summit Germany April 2025
PDF
.conf Go 2023 - Data analysis as a routine
PDF
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
PDF
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
PDF
.conf Go 2023 - Raiffeisen Bank International
PDF
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
PDF
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
PDF
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
PDF
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
PDF
.conf go 2023 - De NOC a CSIRT (Cellnex)
PDF
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)
Splunk Leadership Forum Wien - 20.05.2025
Splunk Security Update | Public Sector Summit Germany 2025
Building Resilience with Energy Management for the Public Sector
IT-Lagebild: Observability for Resilience (SVA)
Nach dem SOC-Aufbau ist vor der Automatisierung (OFD Baden-Württemberg)
Monitoring einer Sicheren Inter-Netzwerk Architektur (SINA)
Praktische Erfahrungen mit dem Attack Analyser (gematik)
Cisco XDR & Splunk SIEM - stronger together (DATAGROUP Cyber Security)
Security - Mit Sicherheit zum Erfolg (Telekom)
One Cisco - Splunk Public Sector Summit Germany April 2025
.conf Go 2023 - Data analysis as a routine
.conf Go 2023 - How KPN drives Customer Satisfaction on IPTV
.conf Go 2023 - Navegando la normativa SOX (Telefónica)
.conf Go 2023 - Raiffeisen Bank International
.conf Go 2023 - På liv og død Om sikkerhetsarbeid i Norsk helsenett
.conf Go 2023 - Many roads lead to Rome - this was our journey (Julius Bär)
.conf Go 2023 - Das passende Rezept für die digitale (Security) Revolution zu...
.conf go 2023 - Cyber Resilienz – Herausforderungen und Ansatz für Energiever...
.conf go 2023 - De NOC a CSIRT (Cellnex)
conf go 2023 - El camino hacia la ciberseguridad (ABANCA)

Recently uploaded (20)

PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Cloud computing and distributed systems.
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
A Presentation on Artificial Intelligence
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Machine learning based COVID-19 study performance prediction
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Approach and Philosophy of On baking technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Encapsulation_ Review paper, used for researhc scholars
Spectral efficient network and resource selection model in 5G networks
NewMind AI Monthly Chronicles - July 2025
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
A Presentation on Artificial Intelligence
Unlocking AI with Model Context Protocol (MCP)
Machine learning based COVID-19 study performance prediction
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Network Security Unit 5.pdf for BCA BBA.
20250228 LYD VKU AI Blended-Learning.pptx
Approach and Philosophy of On baking technology

SplunkLive! London 2016 Getting started with Splunk

  • 1. Copyright © 2015 Splunk Inc. Getting Started with Splunk Enterprise Tour Bjorn Graabek Sr. Splunk Sales Engineer
  • 2. 2 Download Splunk Enterprise for your OS and Architecture.
  • 4. 4 Text For OSX (from terminal): mkdir /opt/splunk_live_sd cd /opt/splunk_live_sd Tar-xzvf ~/Downloads/splunk- 6.3.3-f44afce176d0-darwin-64.tgz cd splunk/bin For WIN: Install MSI For OSX: Start Splunk via ./splunk start For WIN: Services -> Splunk -> Start
  • 6. 6 Text With Firefox, Chrome, or Safari – head to http://127.0.0.1:8000 . User=admin password=changeme
  • 7. 7 You’ve successfully installed Splunk, and logged in! Let’s add the tutorialdata.zip via “Add Data”
  • 8. 8 You can also “Add Data” from Settings at the top.
  • 10. 10 Let’s drag tutorialdata.zip into “Drop your data file here”.
  • 12. 12 Splunk can auto detect the sourcetype. Lets change host field to buttercup-web01, and then click Review.
  • 15. 15 We’re brought into a search with filters applied to search the data we just uploaded.
  • 16. 16 Let’s type “buttercupgames” in the search bar, and double click into a bar on the histogram.
  • 17. 17 Notice the time picker changed with our drill into the histogram bar.
  • 18. 18 Given that this data is web access, lets do a string search for 400, which is a “Bad Request” code. Notice that there’s 188 events returned. (number will vary for you).
  • 19. 19 Lets also add 300 into the mix, and notice that my event count is higher now.
  • 20. 20 We can see the 400 status codes, but not 300’s. That’s because the string search of 300 doesn’t explicitly search for status code of 300 – it’ll string match any event that contains “300”.
  • 21. 21 Lets explicitly search for status codes equaling values we want to see returned.
  • 22. 22 Great, we’re now returned all the events containing the two status codes we searched for. Click on “Top values by time”, which will build out a timechart for us.
  • 23. 23 Notice how our search query changed, there’s a | (pipe), and a timechart command added. The pipe followed by a command allows further operation on your filtered data set.
  • 24. 24 Let’s change our search to: buttercupgames status=* And – drill into one bar on the histogram.
  • 25. 25 Click on “top values by time” under the status field on the left, which will produce the timechart above.
  • 26. 26 Let’s exclude 200 status codes by adding AND status!=200, and change Line to Column.
  • 27. 27 After changing from Line to Column, lets Stack the results (middle stack under Stack Mode). Much better!
  • 28. 28 Lets now save this to a dashboard, a place we can go to view this search without having to remember what we had just searched for. Click Save AS -> Dashboard Panel. Fill in, and click Save. Then View dashboard.
  • 29. 29 Click on Search to get us back to our search bar, and lets key in: buttercupgames. Development wants to know what web browsers are being used to access the site, but no fields currently exist. No problem – lets extract the browser field. Find an event that contains a value that you’re looking for, and click the “>” arrow just to the left of “Time”. The event will expand with a down arrow, and Extract Fields will be under Event Actions. Click Extract Fields.
  • 30. 30 Click Regular Expression (Splunk will build a regular expression to extract our fields), and click next. Highlight the value of the field you’d like to create, and lets name the field: browser_type Click Add Extraction.
  • 31. 31 Let’s verify that the extracted field contains values that are indeed types of browsers. Good, click next to proceed. Now, open the permissions to “App” which will allow users of the App the ability to leverage this extraction. Click Next.
  • 32. 32 Success, Let’s explore the fields just created in search, by clicking the link.
  • 33. 33 You’ll now be taken to search, with the filter set to the sourcetype that the field extraction has been applied to. Note – field extractions are coupled to a sourcetype. Click on “Top values”.
  • 34. 34 Notice how the search changed. And, instead of a bar graph, we want a pie chart, so drop down the “bar” option and change it to Pie.
  • 35. 35 Lets add this search to our dashboard, and then view the dashboard. Click Edit -> Edit Panels to drag the different panels to different positions.
  • 36. 36 Let’s go back to search, and search for buttercupgames AND status!=200 (we want to see events that aren’t successful. Add the stats and where clause above, to return when there’s more than 100 unsuccessful status codes.
  • 37. 37 Let’s create an alert. Save As -> Alert. Fill out the Title, Scheduled, Earliest + Latest, and Cron Expression (Instead of 48, change to minutes a few ahead of your current time. Ie. If it’s 9:00am, change to 05.
  • 38. 38 Add to Triggered Alerts, and Save.
  • 39. 39 You should see an alert trigger once your scheduled search runs at the cron expression you defined. *Note – alerts will only work until the trial license expires.
  • 40. 40 Let’s go back to search and: buttercupgames status=* | iplocation clientip We want to lookup the clientip values against the MaxMind database to pull in City, Country, State, Lat, Lon of the IPs.
  • 41. 41 Now, business is interested in seeing plots on a map of web users and what they’re doing with the website. Lets append a geostats command that counts the events by the values of the action field. Pretty cool! This is definitely dashboard worthy! Lets add to dashboard.
  • 42. 42 Awesome! Now we have a single pane of glass that Operations, Development, and Business all care about – from one data source! Talk about value!