全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

Independent Study of Splunk

DOI: 10.4236/oalib.1111496, PP. 1-16

Subject Areas: Technology, Information Management, Applications of Communication Systems

Keywords: Splunk, Customizable Dashboard, Data Source, Database, System Health, Performance

Full-Text   Cite this paper   Add to My Lib

Abstract

The paper’s objective is to easily search data and integrate all data sources or tools into one place for people to identify issues in visualizable ways based on correlating multiple data sources. On the other hand, we would use Splunk to build customized dashboards depending on critical success factors (CSF) and critical-to-quality (CTQ) from a single “pane of glass” that gives us a powerful search engine in root cause analysis, data analytics, and integration of multiple logs. In the paper, we introduce various methods to integrate all data sources or tools into one place for authorized users to access and view all of them from a single screen. Typical dashboards are designed based on monitoring log files, viewing the trend of hung threads of a server, or tracking recent changes and critical incidents. Furthermore, we offer customizable dashboard functionality for different technical departments to smoothly work on their complex daily tasks. To analyze huge data results from the Splunk searching tool, we could annotate the data stream with metadata keys including host, server, source, source type, and index. However, some limitations and disadvantages are in the Splunk tool. Therefore, we provide different scenarios that could make Splunk run slowly. Then, we not only discuss what root causes exist in Splunk itself or inside of companies themselves but also describe what aspects of Splunk still need to be improved. Finally, we could take advantage of Splunk to build various functional dashboards to get a quick view of overall system health, application performance, and end-user ramifications for fulfilling business purposes. Additionally, we summarize beneficiations using Splunk and discuss current related works on Splunk tool.

Cite this paper

Pan, X. (2024). Independent Study of Splunk. Open Access Library Journal, 11, e1496. doi: http://dx.doi.org/10.4236/oalib.1111496.

References

[1]  Fred Speece (2016) Detecting Penetration Testers on a Windows Network with Splunk. SANS Institute Information Security Reading Room Site.
[2]  Splunk Inc (2024) Splunk Enterprise Overview 7.3.0.
https://docs.splunk.com/Documentation/Splunk/7.3.0/Overview/AboutSplunkEnterprise
[3]  Splunk Inc (2021) Search Tutorial.
https://docs.splunk.com/Documentation/SplunkCloud/latest/SearchTutorial/Usethesearchlanguage
[4]  Splunk Inc (2023) Monitor Files and Directories with Inputs.Conf.
https://docs.splunk.com/Documentation/Splunk/9.2.0/Data/Monitorfilesanddirectorieswithinputs.conf
[5]  Splunk Inc (2023) Quick Tips for Optimization.
https://docs.splunk.com/Documentation/Splunk/7.3.1/Search/Quicktipsforoptimization
[6]  Splunk Inc (2018) Splunk Enterprise Distributed Search.
https://docs.splunk.com/Documentation/Splunk/7.3.0/DistSearch/Whatisdistributedsearch
[7]  Splunk Inc (2022) Splunk Enterprise Search Manual 7.3.1 about Search Normalization.
https://docs.splunk.com/Documentation/Splunk/7.3.1/Search/Searchnormalization
[8]  Cisco (2018) Cisco HyperFlex Systems for Splunk Enterprise.
https://www.cisco.com/c/dam/en/us/products/collateral/hyperconverged-systems/hyperflex-hx-series/solution-overview-c22-739511.pdf
[9]  Kidd, C. (2023) SIEM: Security Information and Event Management Explained.
https://www.splunk.com/en_us/blog/learn/siem-security-information-event-management.html
[10]  Siddiqui, L. (2024) The SaaS Security Guide: Best Practices for Securing SaaS.
https://www.splunk.com/en_us/blog/learn/saas-security.html
[11]  Hartley, J. (2015) Splunk and the Oracle ZFS Storage Appliance. Oracle Technical White Paper September 2015 Version 2.1.
[12]  Splunk White Paper (2017) Splunk Security Use Case Detecting Unknow Malware and Ransomware.
https://cyberoregon.com/wp-content/uploads/2017/11/White-Paper-Security-Use-Case-Detecting-Unknown-Malware.pdf

Full-Text


comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413