The process by which Splunk Enterprise extracts fields from event data and the results of that process, are referred to as extracted fields. Splunk Enterprise extracts a set of default fields for each event it indexes. Field extraction can take place either before event indexing (in the case of default fields and indexed fields) or after event indexing (in the case of search fields). You can also create custom fields by defining additional index-time and search-time field extractions, using search commands, the field extractor, or configuration files.
Set of events that you can base some dashboard panels on. Before you start building visualizations and constructing dashboard panels, make sure you have everything you need.
In this stage of the scenario you learn how to:
To build a dashboard that monitors failed login attempts. You would like to have the following panels:
-A set of panels that provide counts of failed login attempts.
-A panel that lists the top hackers by a count of failed login events they are responsible for.
-A panel that shows the users targeted by a specific hacker with counts of login attempts made by the hacker for each user.
Inclined to build a profession as Splunk Developer? Then here is the blog post on Splunk Training.
Now look at your events and think about what fields you will need to make these panels.
Panel concept | How will you implement it? | Are new fields required? |
---|---|---|
Counts of failed login attempts, broken out by valid and invalid accounts. | Use a | stats count operation to get an event count. |
No. We can use word searches to differentiate between valid and invalid accounts. |
Top hackers | Use a | top <fieldname> operation to list the top hackers. |
Yes. We can identify the hackers by the ip address in the event, so we need to extract the ip address values. |
Targeted users | Design a drilldown search that runs | stats count by <fieldname> for events with a specific ip address. |
Yes. We must extract the user name in each event. Also requires the ip address field mentioned above. |
Locate hackers on a world map | Use the iplocation andgeostats commands to convert the ip address value for a hacker into a plotted location on a map. |
No new fields other than the ip address field mentioned above. |
The stats
and top
commands used in the example searches above are examples of transforming commands. You use transforming commands to display statistical information in the form of tables, charts, and visualizations.
The search sourcetype=secure failed
, look at the fields sidebar. The fields sidebar displays two categories of extracted fields: Selected Fields and Interesting Fields. It does not always display every field that Splunk Enterprise has selected for the search.
There do not appear to be any fields that would have ip address or username values.
Click All Fields. This opens the Select Fields dialog, where you can see detail information about all of the fields extracted for this search, not just the ones that are selected or that Splunk Enterprise finds interesting.
A quick review of the Select Fields dialog proves that ip address and user name fields are not being extracted from these events. You have to extract these fields.
Click Extract New Fields in the Select Fields dialog to open the field extractor.
The field extractor opens on the Select Sample step, where you select a sample event for field extraction.
The field extractor indicates that you are extracting fields for the secure source type. All field extractions created by the field extractor must be associated with a source type. In this case the field extractor obtained the source type from your search. If your search did not contain a source type, you would have to provide one when you entered the field extractor.
-Click on an event to select it.
-Click Next to select the fields that you want to extract from the event.
Field extractions can also be associated with specific host and source values, but the field extractor only enables source type field extractions. Go here for more information about field extractions and field extraction configuration.
On the Select Fields step of the field extractor you highlight values in the sample event for the fields that you want to extract. You can extract multiple fields from the same event.
Highlight the word root
and indicate that it is a sample value of a new field called username
.
Click Add Extraction.
Highlight the ip address in the event as a value of a new clientip
field.
Click Add Extraction again.
After you have added both field extractions, your preview table should look something like this.
It appears that the fields have been extracted correctly.
Click Next to validate your field extractions and save them.
On the Validate Fields step of the field extractor you can validate your field extractions. You can investigate your field extraction success by toggling to the Matches and Non-Matches views, or by viewing the tabs that have been created for the username
and clientip
fields.
On this page you should not find errors, but if you do you can try to fix it by removing values in events that have been incorrectly highlighted.
Click Next to save the field extraction.
On the Save page the only thing you need to do is change Permissions to All apps.
Click Finish to save your extractions.
You are now ready to build a single value visualization.
For an Indepth knowledge on Splunk, click on below
You liked the article?
Like: 0
Vote for difficulty
Current difficulty (Avg): Medium
TekSlate is the best online training provider in delivering world-class IT skills to individuals and corporates from all parts of the globe. We are proven experts in accumulating every need of an IT skills upgrade aspirant and have delivered excellent services. We aim to bring you all the essentials to learn and master new technologies in the market with our articles, blogs, and videos. Build your career success with us, enhancing most in-demand skills in the market.