Course: Searching & Reporting with Splunk 6
Benefits : This course focuses on Splunk's search and reporting commands. At the end of this course Students will be able to use search and reporting commands in Splunk to build braoder & more complex searches to analyze Big Data in an enterprise.
Agenda : This course prepares System & Security administrators to configure and manage Splunk searches and reports. Topics include Search Fundamentals; Transforming Commands ; Deriving Statistics ; Creating Visualizations ; Enriching Visualizations ; Manipulating and Filtering Results; Correlating Events
Target Audience: System Administrators, Security Administrators, Security Analysts, Data Analysts
Pre-Requisites : Knowledge of Using Splunk, Windows & Linux/Unix OS Administration
Lab Access & Lab Guide : Not Included
Review basic search commands and general search practices.
Examine the anatomy of a search.
Use the following commands to perform searches:
– rex .
Use the following commands and their functions:
· addtotals .
Explore the available visualizations.
Create a basic chart.
Split values into multiple series.
Omit null and other values from charts.
Create a timechart .
Chart multiple values on the same timeline.
Apply statistical functions.
Explain when to use each type of reporting command .
Use the eval and fieldformat commands to:
· Perform calculations!.
· Convert values.
· Round values.
· Format values.
· Use conditional statements.
Use the search and where commands to filter calculated results
Group events using fields.
Group events using fields and time.
Search with transactions.
Report on transactions.
Determine when to use transaction vs. stats .
Examine a lookup file example.
Create a lookup table.
Define a lookup.
Configure an automatic lookup.
Use the lookup in searches and reports
Information Security organization focusing on enabling skills and competency in the domain of Information Security across multiple practices including Governance, Risk Management, Compliance Management, Identity and Access Management, data Security, Application Security, SAP Security, Managed Security Services, Infrastructure Security and Device Management.
Our mission and vision is to bring hands on training on training in the domain of Information Security tools and technologies to every individual wanting to make a career in this domain by making it more affordable, self intuitive and tailored to the skills required.