SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
Index any Event. Ask any Question.
IT systems generate massive amounts of data every second, every day.
Operating systems, servers, applications, virtual machines, firewalls, network
routers, switches, messaging systems – constantly logging and generating
events. Correlating these events and understanding which are relevant is a
technical challenge. Splunk provides a unique technical approach for
correlating complex events to deliver operational visibility across all your IT
systems.
Finding the answers to questions like,“how far apart in time did a specific set
events occur?”or“what’s the total amount of time it took for a transaction to
take place?”require complex correlation of multiple data sources beyond the
capability of most data collection systems. What’s more, machine-generated
data formats vary widely from structured Syslog to SNMP to unstructured
multi-line application data. To discover relationships in data, most data
collection systems allow you to perform simple text searches and apply
Boolean operators such as“AND”,“OR”,“less than”,”greater than”or“equal to”, to
perform a search on the data. While this action may create a filtered view, the
user still has to export the search results into another tool, re-format the data,
and perform other manual work to find correlations.
Correlating data from large and widely varied data sources to discover
meaningful information and relationships requires much more than Boolean
operators.
Splunk scales to ingest terabytes of data per day, can support structured and
unstructured data in whatever environment it’s located – physical, virtual
and cloud, and features a built-in search language containing over 80
analytical commands. These analytical commands support correlation in
ways not possible in other data collection systems. For example, searching
for patterns of activity across multiple sources of machine-generated data.
Easily automated, the results of correlations can generate alerts or support
business metrics, leading to better business decisions and operational
intelligence.
Splunk Supports Five Correlation Types
‣ Time based – Identify relationships based on time proximity or
distance from each other
‣ Transaction based – Track a series of related events together and
display a single event and produce a‘duration’and/or‘event count’
‣ Sub-searches – Taking the results of one search and using them in
another
‣ Lookups – Correlations of data to external sources
‣ Joins – Support for ‘SQL-like’inner and outer joins
Time based – allow you to see all or any subset of events that take place
over a given time period. This basic correlation allows you to view events
that have taken place over the last year, a second, or any time period in
between and is key to any security or operations investigation. This
capability is available to the user from the Splunk UI.
Transaction based – allow you to track a series of related events as a single
transaction. These events can come from any number of separate IT systems
and data sources.
For example, a key metric for credit card clearing organizations is the time it
takes for a credit card purchase transaction to be authorized. The credit card
transaction time represents the amount of time a transaction takes
to work its way through the IT infrastructure and the amount of the
anxiety a credit card holder feels waiting for the transaction to be
authorized. Business metrics around the speed of business
processes are important for capacity planning. Reviewing these
metrics over time can help the business understand where
additional resources may be needed to improve performance.
Sub-searches – take the results of one search and use them in
another to create if/then conditions (Figure 1). Using a sub-search
allows users to see the results of a search only if a set of other
conditions are met (or not). Security Event Management Systems
operate on this
premise. Example, I
may be only interested
in viewing one event if
the threshold for
another event is met in
a given time period.
Lookups – can be
used to enhance,
enrich, validate, or add
context to data
collected in Splunk.
Correlating intrusion
detection data (IDS) with
data from an asset management system can reduce IDS false-
positives. An attack based on a Windows OS vulnerability seen by an
IDS, could be correlated with data from an asset management.
system that indicates the host being attacked runs the AIX OS.
Joins – are similar in concept to‘Joins’ in an SQL database. Inner and
outer joins are supported. ‘Join’as part of a search string can link one
data set to another based one or more common fields. Two
completely different data sets could be linked together based on a
user name or event ID field presenting the results in a single view.
Summary
The analytical commands in Splunk can be used in combinations
that create operational metrics and business insights from machine-
generated data. Results from any correlation can be displayed
visually in a dashboard or report to support better decision-making.
Splunk correlation commands can work together in the same search
command to provide functionality similar to sophisticated event
management or correlation systems. In addition to‘Join’and
‘Transaction’, figure 2 lists of other commands that can prove useful
when correlating data. Additional information on Splunk
commands can be found at: http://www.splunk.com/base/
Documentation/4.1.4/SearchReference/ListOfSearchCommands
Copyright 2009, Splunk Inc. All rights reserved. www.splunk.com +1.866.GET.SPLUNK
Event Correlation: Move from Search to Operational Intelligence
Tech Brief
Figure 1
!

Más contenido relacionado

Más de Greg Hanchin

Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Greg Hanchin
 
Administering splunk 43 course
Administering splunk 43 courseAdministering splunk 43 course
Administering splunk 43 courseGreg Hanchin
 
Using splunk43course
Using splunk43courseUsing splunk43course
Using splunk43courseGreg Hanchin
 
Using Splunk course outline
Using Splunk course outline Using Splunk course outline
Using Splunk course outline Greg Hanchin
 
Advanced Splunk Administration
Advanced Splunk AdministrationAdvanced Splunk Administration
Advanced Splunk AdministrationGreg Hanchin
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionGreg Hanchin
 
Administering Splunk course
Administering Splunk courseAdministering Splunk course
Administering Splunk courseGreg Hanchin
 
Splunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsSplunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsGreg Hanchin
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Greg Hanchin
 
Splunk forwarders tech_brief
Splunk forwarders tech_briefSplunk forwarders tech_brief
Splunk forwarders tech_briefGreg Hanchin
 
Splunk and map_reduce
Splunk and map_reduceSplunk and map_reduce
Splunk and map_reduceGreg Hanchin
 
Splunk for xen_desktop
Splunk for xen_desktopSplunk for xen_desktop
Splunk for xen_desktopGreg Hanchin
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_altoGreg Hanchin
 
Splunk for db_connect
Splunk for db_connectSplunk for db_connect
Splunk for db_connectGreg Hanchin
 
Splunk for active_directory
Splunk for active_directorySplunk for active_directory
Splunk for active_directoryGreg Hanchin
 
Splunk app for_windows
Splunk app for_windowsSplunk app for_windows
Splunk app for_windowsGreg Hanchin
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_securityGreg Hanchin
 

Más de Greg Hanchin (20)

Advanced searching and reporting 50 course
Advanced searching and reporting 50 course Advanced searching and reporting 50 course
Advanced searching and reporting 50 course
 
Administering splunk 43 course
Administering splunk 43 courseAdministering splunk 43 course
Administering splunk 43 course
 
Using splunk43course
Using splunk43courseUsing splunk43course
Using splunk43course
 
Using Splunk course outline
Using Splunk course outline Using Splunk course outline
Using Splunk course outline
 
Advanced Splunk Administration
Advanced Splunk AdministrationAdvanced Splunk Administration
Advanced Splunk Administration
 
Splunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class descriptionSplunk Advanced searching and reporting Class description
Splunk Advanced searching and reporting Class description
 
Administering Splunk course
Administering Splunk courseAdministering Splunk course
Administering Splunk course
 
Splunk Searching and Reporting Class Details
Splunk Searching and Reporting Class DetailsSplunk Searching and Reporting Class Details
Splunk Searching and Reporting Class Details
 
Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring Splunk FISMA for Continuous Monitoring
Splunk FISMA for Continuous Monitoring
 
Splunk forwarders tech_brief
Splunk forwarders tech_briefSplunk forwarders tech_brief
Splunk forwarders tech_brief
 
Splunk and map_reduce
Splunk and map_reduceSplunk and map_reduce
Splunk and map_reduce
 
Splunk for xen_desktop
Splunk for xen_desktopSplunk for xen_desktop
Splunk for xen_desktop
 
Splunk for palo_alto
Splunk for palo_altoSplunk for palo_alto
Splunk for palo_alto
 
Splunk for ibtrm
Splunk for ibtrmSplunk for ibtrm
Splunk for ibtrm
 
Splunk for fisma
Splunk for fismaSplunk for fisma
Splunk for fisma
 
Splunk for f5
Splunk for f5Splunk for f5
Splunk for f5
 
Splunk for db_connect
Splunk for db_connectSplunk for db_connect
Splunk for db_connect
 
Splunk for active_directory
Splunk for active_directorySplunk for active_directory
Splunk for active_directory
 
Splunk app for_windows
Splunk app for_windowsSplunk app for_windows
Splunk app for_windows
 
Splunk app for_enterprise_security
Splunk app for_enterprise_securitySplunk app for_enterprise_security
Splunk app for_enterprise_security
 

Último

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Último (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Splunk event correlation_tech_brief

  • 1. Index any Event. Ask any Question. IT systems generate massive amounts of data every second, every day. Operating systems, servers, applications, virtual machines, firewalls, network routers, switches, messaging systems – constantly logging and generating events. Correlating these events and understanding which are relevant is a technical challenge. Splunk provides a unique technical approach for correlating complex events to deliver operational visibility across all your IT systems. Finding the answers to questions like,“how far apart in time did a specific set events occur?”or“what’s the total amount of time it took for a transaction to take place?”require complex correlation of multiple data sources beyond the capability of most data collection systems. What’s more, machine-generated data formats vary widely from structured Syslog to SNMP to unstructured multi-line application data. To discover relationships in data, most data collection systems allow you to perform simple text searches and apply Boolean operators such as“AND”,“OR”,“less than”,”greater than”or“equal to”, to perform a search on the data. While this action may create a filtered view, the user still has to export the search results into another tool, re-format the data, and perform other manual work to find correlations. Correlating data from large and widely varied data sources to discover meaningful information and relationships requires much more than Boolean operators. Splunk scales to ingest terabytes of data per day, can support structured and unstructured data in whatever environment it’s located – physical, virtual and cloud, and features a built-in search language containing over 80 analytical commands. These analytical commands support correlation in ways not possible in other data collection systems. For example, searching for patterns of activity across multiple sources of machine-generated data. Easily automated, the results of correlations can generate alerts or support business metrics, leading to better business decisions and operational intelligence. Splunk Supports Five Correlation Types ‣ Time based – Identify relationships based on time proximity or distance from each other ‣ Transaction based – Track a series of related events together and display a single event and produce a‘duration’and/or‘event count’ ‣ Sub-searches – Taking the results of one search and using them in another ‣ Lookups – Correlations of data to external sources ‣ Joins – Support for ‘SQL-like’inner and outer joins Time based – allow you to see all or any subset of events that take place over a given time period. This basic correlation allows you to view events that have taken place over the last year, a second, or any time period in between and is key to any security or operations investigation. This capability is available to the user from the Splunk UI. Transaction based – allow you to track a series of related events as a single transaction. These events can come from any number of separate IT systems and data sources. For example, a key metric for credit card clearing organizations is the time it takes for a credit card purchase transaction to be authorized. The credit card transaction time represents the amount of time a transaction takes to work its way through the IT infrastructure and the amount of the anxiety a credit card holder feels waiting for the transaction to be authorized. Business metrics around the speed of business processes are important for capacity planning. Reviewing these metrics over time can help the business understand where additional resources may be needed to improve performance. Sub-searches – take the results of one search and use them in another to create if/then conditions (Figure 1). Using a sub-search allows users to see the results of a search only if a set of other conditions are met (or not). Security Event Management Systems operate on this premise. Example, I may be only interested in viewing one event if the threshold for another event is met in a given time period. Lookups – can be used to enhance, enrich, validate, or add context to data collected in Splunk. Correlating intrusion detection data (IDS) with data from an asset management system can reduce IDS false- positives. An attack based on a Windows OS vulnerability seen by an IDS, could be correlated with data from an asset management. system that indicates the host being attacked runs the AIX OS. Joins – are similar in concept to‘Joins’ in an SQL database. Inner and outer joins are supported. ‘Join’as part of a search string can link one data set to another based one or more common fields. Two completely different data sets could be linked together based on a user name or event ID field presenting the results in a single view. Summary The analytical commands in Splunk can be used in combinations that create operational metrics and business insights from machine- generated data. Results from any correlation can be displayed visually in a dashboard or report to support better decision-making. Splunk correlation commands can work together in the same search command to provide functionality similar to sophisticated event management or correlation systems. In addition to‘Join’and ‘Transaction’, figure 2 lists of other commands that can prove useful when correlating data. Additional information on Splunk commands can be found at: http://www.splunk.com/base/ Documentation/4.1.4/SearchReference/ListOfSearchCommands Copyright 2009, Splunk Inc. All rights reserved. www.splunk.com +1.866.GET.SPLUNK Event Correlation: Move from Search to Operational Intelligence Tech Brief Figure 1 !