Splunk Fundamentals 2 - Lab Exercises: Production Environment. Screenshots Approximate What You Should See
Splunk Fundamentals 2 - Lab Exercises: Production Environment. Screenshots Approximate What You Should See
NOTE: This is a lab environment driven by data generators with obvious limitations. This is not a
production environment. Screenshots approximate what you should see.
NOTE: If at any point you do not see results, check your search syntax and/or expand your time range.
Questions
Examine these searches. Which searches would not return results?
1. index=security sourcetype=linux_secure
2. index=web Sourcetype=access_combined
3. index=web sourcetype=AcceSS_Combined
4. index=security sourcetype=linux_se%
Identify the 3 Selected Fields that Splunk returns by default for every event.
Steps
Task 1: Log into Splunk on the classroom server.
Task 2: Make the CLASS: Fundamentals 2 your default app and change your account time zone setting
to reflect your local time.
3. Click your login name on the navigation bar and select Account Settings.
4. In the Full name field, type your full name and click Save.
5. Click the refresh button on your browser and ensure that your name now appears in the Splunk bar.
6. Click your name on the navigation bar and select Preferences.
7. From the Time zone dropdown, select your local time zone.
8. From the Default app dropdown, select CLASS: Fundamentals 2.
NOTE: CLASS: Fundamentals 2 is a custom app designed specifically for this training course. It
contains custom menu options, such as the Presentation menu, which contains all of the search
strings used in the slides. Only searches saved in this app count towards completing the class.
When you're in the CLASS: Fundamentals 2 app, it will be indicated on the right side of the app
navigation bar at the top of your screen.
NOTE: Do not copy and paste text from the lab document except when instructed to do so, as quotes
and double quotes may not copy as intended.
10. Navigate to the CLASS: Fundamentals 2 app. (Perform all your searches in this app. Starting with Lab
Exercise 2, you will also save your searches in this app.)
11. Search for index=web sourcetype=access_combined productid=* over the last 15 minutes. Be
sure to type exactly as shown, retaining case (i.e., lower case rather than upper case).
Are any results returned? _______
12. Click Job > Inspect Job to open the Search Job Inspector and inspect the results.
13. Now, search for index=web sourcetype=access_combined productId=* over the last 15
minutes. Be sure to retain case.
Are any results returned? _______
14. Open the Search Job Inspector again and inspect the results.
Scenario: IT wants to check for issues with customer purchases in the online store.
16. Search for index=web sourcetype=access_combined over the last 30 days using the Verbose
search mode, then open the Job Inspector (Job > Inspect Job). How much time did it take for the search
to complete? __________
17. Run the same search using the Fast search mode. How much time did it take for the search job to
complete? __________
18. Switch the default search mode back to Smart Mode.
NOTE: Given the small amount of data in our lab environment, the difference between Fast mode and
Smart mode completion times probably won’t be significant.
Description
In this lab exercise, you use the chart and timechart commands.
Steps
Task 1: Report the top ten completed events on the web server during the last 24 hours and add it to a
new security dashboard as a column chart.
1. Search the web server [sourcetype=linux_secure] for events where the [vendor_action] is not
equal to “session opened” during the last 24 hours.
Results Example:
2. Using the chart command, display a count for each of these actions by IP [src_ip].
3. Click on the Visualization tab and make sure Column Chart is selected.
Results Example:
4. As you can see, there is an OTHER column at the end of the Failed results that overwhelms all the other
data on the chart, making the other data difficult to see. Set the useother option to f in order to remove
this column.
Results Example:
5. Click Format; in the General section, set the Stack Mode to Stacked.
Results Example:
13. Click the More actions icon on the top right of the panel.
14. Click Edit Drilldown.
15. In the Drilldown Editor, choose Link to search from the On click dropdown menu.
16. Click Apply.
17. Click Save to save the dashboard.
18. Mouse over your column chart and click one of the bars. Notice that the drilldown feature is now activated.
19. Use your browser’s Back button to return to your dashboard. (This is the easiest way to return to the
dashboard from a drilldown.)
Task 2: Chart by country the five best selling products for the vendors in North America during the last
7 days.
— VendorID:
— 1000-2999 USA
— 3000-3999 Canada
— 4000-4999 Caribbean, Central & South America
— 5000-6999 Europe and the Middle East
— 7000-8999 Asia and Pacific Region
— 9000-9900 Africa
— 9901-9999 Outliers, such as the South Pole
20. Search for retail store events [vendor_sales] from North America (United States and Canada) during the
last 7 days.
21. Using the chart command, count the events over VendorCountry.
Results Example:
22. To see the count of each product sold in each country, add a by clause to further split the data by
product_name.
Results Example:
23. Use the limit option to include only the 5 best-selling products.
NOTE: Splunk automatically calculates the top products by totaling each column and taking the top n
results (n being the number you specify in your limit).
Results Example:
25. Switch to the Visualization tab and, if a column chart was not automatically shown, set the chart type to
Column Chart.
Results Example:
Results Example:
27. Use the Format option to change the scale of the Y axis from linear to logarithmic (Log).
Results Example:
Results Example:
NOTE: Visualization formatting options persist until you turn them off or change them. So, the next time
you do a visualization, by default, it will appear as a line chart with the Trellis option, because
that’s what you chose previously. And if that’s not what you want, just change the options—turn
off the Trellis option, choose a different type of visualization, etc.
CHALLENGE Exercise:
Display and compare online and vendor sales during the last 24 hours.
42. Search for successful online purchase events [access_combined] during the last 24 hours and enclose
the entire search string in parentheses. (As you continue to modify this search string in the upcoming lab
steps, the parentheses will be helpful.)
Steps
Task 1: Display user authentication failures during the last 7 days in a timechart with a trendline.
Final Example:
1. Search for failed password attempts on the web server [linux_secure] during the last 7 days.
Results Example:
2. Using timechart, count the events for each day and rename this new column as failures.
3. Change the visualization to Line Chart.
Results Example:
4. Find the trendline of failures using a simple moving average (sma2) and name the field as trend.
Results Example:
Task 2: Display the sales count of strategy games per day at Buttercup Games physical sales locations
(i.e., not online) during the previous week, and display the sales count and trend for the
previous day.
6. Search for retail sales [vendor_sales] of strategy games [categoryId=”STRATEGY”] during the
previous week.
NOTE: Since the categoryId comes from a lookup, the value being matched is case-sensitive.
Therefore, be sure to type “STRATEGY” in all uppercase.
Results Example:
Results Example
Results Example
Task 3: Display a choropleth map of United States retail sales during the last 7 Days.
Results Example:
12. Using the chart command, count the events over VendorStateProvince.
Results Example:
13. To display the data as a choropleth map, use the geom command to map VendorStateProvince to the
geo_us_states KMZ file (geom geo_us_states featureIdField=VendorStateProvince).
14. Click the Visualization tab.
22. Find successful online purchases [access_combined] during the Previous week.
Hint: You can use the Fields sidebar to narrow your search results. From action, select purchase and
from status, 200.
Results Example:
Results Example:
Task 5: Count the retail sales units sold by country and include a grand total row.
26. Count the number of retail store purchases [vendor_sales] by VendorCountry during the last 4 hours
and rename the new column to “Units Sold.”
Results Example:
Results Example:
Description
In this lab exercise, you use eval, search, and where commands.
Steps
Task 1: Chart the total daily volume (in MB) of the web servers during the previous week.
Results Example:
5. Switch to the Visualization tab and display the data as a Line Chart. Set the X-axis label to Day. Notice
that the bytes field still displays.
Results Example:
Results Example:
Task 2: Calculate the ratio of GET requests to POST requests for each web server.
8. Search for all events in the online store [access_combined] during the last 24 hours.
9. Use chart to count events over host by method.
Results Example:
10. Use eval to create a new column called Ratio, which divides GET by POST.
Results Example:
Task 3: Identify users with more than 3 failed logins during the last 60 minutes and sort in descending
order.
13. Search the web server [linux_secure] for failed password attempts during the last 60 minutes.
Results Example:
14. Use stats to count the number of failed password attempts by user.
Results Example:
15. Using the search command, filter the results to include only users with more than three failures and sort
in descending order.
Results Example:
Scenario: Evaluate and classify the number of bytes associated with each web server event during
the last 24 hours as a pie chart. (Event sizes should be categorized as follows: Small, <
2000 bytes; Medium, from 2000 to 2500 bytes; Large, from 2500 to 3000 bytes; Extra Large,
over 3000 bytes.)
17. Search online transactions [access_combined] during the last 24 hours and—using the case function
of the eval command—classify the size (bytes) of events into a field called dataSize. If the event is
less than 2,000 bytes, classify it as Small; if 2,000 or more but less than 2,500 bytes, classify as Medium;
finally, if 2,500 or more but less than 3,000 bytes, classify as Large. Include a default value of Extra Large
for all events where the bytes value is 3,000 or greater.
Results example:
CHALLENGE Exercise:
Classify and report employee web traffic by content type during the previous business week.
20. Search web appliance data [cisco_wsa_squid] during the previous business week.
21. Use stats or chart to count events by the http_content_type field.
NOTE: In this case, stats and chart are interchangeable—they use the same syntax and return the
same results.
Results Example:
Hint: Use the LIKE operator and the % wildcard to define the expression as follows:
http_content_type LIKE "image%"
Results Example:
23. Use another stats or chart command to sum the count column by the type field. Rename the sum of
the count calculation to total.
Results Example:
Results Example:
CHALLENGE Exercise:
Report which one-hour periods over the last 24 hours have seen the number of Buttercup Games
online sales twice as numerous as the number of sales in retail stores.
26. Search online sales data [access_combined] and retail sales data [vendor_sales] for successful
purchases during the last 24 hours.
27. Use timechart to count the sales events by index using a sampling interval of 1 hour.
Results Example:
28. Use a where command to keep only rows where the number of web sales are more than twice the number
of retail sales.
Results Example:
Description
Use the transaction command to correlate events.
Steps
Task 1: Analyze transactions in the online store during the last 60 minutes.
1. Search for all events in the online store [access_combined] during the last 60 minutes.
2. Display a table that shows the _time, clientip, JSESSIONID, and the action. Note that the actions
are listed in reverse chronological order (most to least recent.)
Results Example:
3. Modify your search to only include events with a value in the action field.
Results Example:
5. Modify your search to display the transactions in a table. Include JSESSIONID, clientip, and action.
Results Example:
NOTE: By default, the values in the action column are ordered alphabetically, ignoring duplicates.
6. View only transactions that contain at least one purchase event. Use the search command to find
transactions containing a purchase.
NOTE: The search command must be downstream from the transaction command.
Results Example:
Results Example:
13. Modify your search to find data where the durationMinutes is greater than one minute. Adjust the table
to display only JSESSIONID, clientip, action, durationMinutes, and eventcount, in that order.
Results Example:
15. Search for all events from the online store [access_combined] in the last 60 minutes and correlate the
events based on clientip.
16. Use the startswith and endswith options of the transaction command to display transactions that
begin with an addtocart action and end with a purchase action.
CHALLENGE Exercise:
Report common HTTP status errors that occurred during the last 30 days on the online sales web
servers and the internal web appliance within a proximity of 5 minutes or less. Only include days with
more than 5 common errors.
1. Search HTTP status error events from the online sales web servers [access_combined] and the web
appliance [cisco_wsa_squid] during the last 30 days. For best performance, limit extracted fields to
only sourcetype and status.
2. Create transactions based on status field values and limit the span to 5 minutes.
Results Example:
Results Example:
6. Remove the Total column and display the data as a Line chart.
Results Example:
Steps
Scenario: Access to the Linux server needs to be monitored.
Task 1: Use the Field Extractor (FX) to extract the IP address and port fields using the Regular
Expression method.
1. Search for all events in the last 24 hours for the linux_secure sourcetype that contain the keyword
port.
2. View the event details to see all the extracted fields. Click the > arrow under the icon in the first event
that contains an IP address value.
3. Click Event Actions > Extract Fields.
4. Select the Regular Expression method and click Next.
5. Highlight the IP address value in the sample event.
6. In the Field name box, type src.
7. Click Add Extraction.
8. Scroll down to the Preview section and verify that the correct information is being extracted. You may see
that “::” is extracted as a src value. But within this particular set of data, “::” actually represents an invalid
IP address. You’ll remove this value in the Validate process (Steps 12-13).
9. Highlight the port value.
10. In the Field name box, type port.
11. Click Add Extraction and click Next.
12. In the Validate step, click on the src tab. You may see “::” listed as a valid value. In the filter field, type
src=:: and click Apply.
13. If applicable, click the “x” next to the highlighted value of “::” for the src field. (It doesn’t matter which event
you choose.) The event sample will now show that “::” is an invalid value for the src field.
NOTE: Depending on what events you choose as examples, Splunk may not be able to generate the
regex for both field extractions at once. If you encounter difficulties, try creating two separate
extractions, one for each field.
16. Wait for about a minute, then search for events in the linux_secure sourcetype in the last 24 hours.
List the top ports by IP address.
NOTE: It may take a few moments for the newly extracted fields to appear in the search because the
training environment uses an index cluster, and it takes a minute for knowledge objects to
replicate across the cluster. (For details, attend the Splunk Cluster Administration course.) This
is also true of all the other knowledge objects you’ll create in Fundamentals 2. In general, it’s
best to wait about a minute after object creation before submitting your search.
Results Example:
Scenario: The engineering team launched the beta of a new game called SimCube. To make
improvements to the game, engineers want to see how users are playing the game.
However, the log file doesn’t contain headers and the fields are not automatically
extracted.
17. Search for all events in the last 30 days for the SimCubeBeta sourcetype in the games index.
18. View the event details to see which fields are extracted.
19. In the Fields sidebar, underneath the Interesting Fields section, click + Extract New Fields.
20. Click the first event to select it as a sample event.
21. Click Next.
NOTE: Be sure to capture all the characters between the single quotes, but not the single quotes
themselves. Some versions of Internet Explorer actually won’t allow you to exclude the single
quotes. If you’re using IE and you encounter this problem, you must switch to another browser
in order to complete the exercise.
28. While still on the Select fields step (before the validation stage), click on Non-Matches to see whether
any relevant events are being excluded. (If no events display when you click Non-Matches, proceed to
step 32.)
29. Hover your cursor over any excluded event that you want to include and click + Add sample event.
30. Highlight each relevant value in the sample event and click Select a Field. For each value, choose the
field name you want associated with that value and click Add Extraction.
31. Repeat steps 28 – 29 for each excluded event until there are no more Non-Matches.
32. Click Next to proceed to the Validate step.
33. When you’re satisfied with your result, click Next.
NOTE: Be sure to thoroughly check your results. It’s important to ensure you’ve captured all characters
inside the single quotes for the fields you’ve extracted.
34. Accept the prefilled Extractions Name and click Finish> to save.
35. Wait for about a minute, then run your search again and check that all expected fields appear.
Results Example:
Steps
Scenario: The IT Ops team runs reports for all employee access but the user name field is not
consistent across the different source types.
1. Search for all events in the cisco_wsa_squid sourcetype over the last 7 days.
2. Note the cs_username field values.
3. Go to Settings > Fields > Field aliases. Create a field alias with the following values:
— Destination app: class_Fund2
— Name: cisco_wsa_squid_aliases
— Apply to: sourcetype
— Named: cisco_wsa_squid
— Field aliases: cs_username = user
4. Click Save.
5. Return to the CLASS: Fundamentals 2 app. Re-run your search and examine the user field and values.
Results Example:
6. Search for all events in the cisco_firewall sourcetype over the last 30 days.
7. Note the Username field values.
8. Create another field alias for sourcetype cisco_firewall with the following values:
— Destination app: class_Fund2
— Name: cisco_firewall_aliases
— Apply to: sourcetype
— Named: cisco_firewall
— Field aliases: Username = user
9. Perform the following search: index=network sourcetype=cisco* user=* over the last 30 days.
Do you receive results from the cisco_wsa_squid and cisco_firewall sourcetypes?
NOTE: It may take a minute before the field aliases are applied and appear in searches.
10. Search for all events in the last 7 days for the cisco_wsa_squid sourcetype.
11. Note the sc_bytes field. This field displays the amount of bytes used for that event.
12. Go to Settings > Fields > Calculated fields.
13. Create a calculated field named sc_megabytes that converts the value of sc_bytes to MB with the
following values:
— Destination app: class_Fund2
— Apply to: sourcetype
— Named: cisco_wsa_squid
— Name: sc_megabytes
— Eval expression: sc_bytes/(1024*1024)
—
14. Return to the CLASS: Fundamentals 2 app. Perform a search on the cisco_wsa_squid sourcetype
that shows the total bandwidth by usage.
Results Example:
Supplemental Exercise:
Scenario: The IT Ops team wants to correlate data from multiple source types using the http_action
and http_method fields. In the access_combined source type, these fields are currently
called action and method.
Task 1: Create two field aliases for the access_combined sourcetype called http_action and
http_method, based on the existing access_combined fields action and method.
Steps
Scenario: The IT Operations team needs to monitor failed login attempts made with any variation of
admin/administrator user accounts to their network devices. To avoid lengthy searches,
include all events with these user accounts and create tags.
1. Run a search over the Last 24 hours for all failed login attempts for any variation of the user admin under
the security index. You should see the following five users: admin, administrator, sysadmin, itmadmin, and
sapadmin.
NOTE: Only trailing wildcards make efficient use of indexes. For that reason, it’s generally a best
practice not to use wildcards at the beginning of a string, as such searches have to scan all
events within the specified time frame. However, doing a search with a wildcard at the
beginning of a string is possible and sometimes necessary in particular scenarios. Be advised,
however, that such searches are inefficient and, in general, should be avoided. Performing an
occasional inefficient ad hoc search shouldn’t have too much of a performance impact, but such
searches certainly shouldn’t be used in reports, dashboards, dataset constraints, etc.
2. Expand an event and find the row for the user field. Click the down arrow under the Actions column and
select Edit Tags.
Example:
Results example:
7. Search for all failed login attempts by privileged user accounts for the Last 7 days. You should see the
following five users: admin, administrator, sysadmin, itmadmin, sapadmin
Scenario: Customers are reporting issues trying to purchase items from the Buttercup
Games online store and internal users get errors trying to access the internet. IT Ops
wants an easy way to determine if there is any correlation when both systems encounter
problems.
Task 3: Create an event type for status errors greater than 500 on web servers/devices.
8. Search for all online sales and Web security appliance data with status error codes greater than 500 in the
last 7 days.
9. Select Save As > Event Type.
10. Name your event type: web_error
11. Leave the Priority set to 1 (Highest).
12. Click Save.
13. Perform a search for the web_error event type for the Last 7 days.
14. Expand an event and click the checkbox next to eventtype to add it to the Selected fields.
15. How many sourcetypes are returned?
NOTE: Depending upon add-ons or apps you have installed, additional event types may be displayed.
Steps
Scenario: The VP of Sales wants to run ad-hoc searches to determine the value of products sold in a
given month in various countries. He also wants to easily convert US Dollars to the same
value in another currency.
Task 1: Write a basic macro to create a table displaying the total sales of each product sold in
Europe.
1. Using the stats command, create a table showing the total retail sales for each product sold in Europe
(combining sales from Germany, France, and Italy) over the Last 30 days and rename the total sales
column as USD.
2. Using the eval command, convert the numeric values in the total sales column to strings and concatenate
them with a $ sign.
Hint: After typing this search string, you may want to copy it into a notepad, as you’ll be using it to create a
macro later in this exercise.
3. Navigate to Settings > Advanced search > Search macros.
4. Click New Search Macro.
5. Verify the Destination app is set to class_Fund2.
6. Name the macro: Europe_sales
7. In the Definition field, type or paste the search string from Step 2.
8. Save the macro.
Task 2: Use a basic macro.
NOTE: Remember to type the macro name between backticks, not single quotes.
Results Example:
11. Run the following search to determine total sales for each product from vendors in Europe in the last 30
days:
Now you’re going to use the second portion of this search string, where the evaluations are done, to create a
dynamic macro with arguments.
12. Navigate to Settings > Advanced search > Search macros.
13. Click New Search Macro.
14. Verify the Destination app is set to class_Fund2.
15. Name the macro: convert_sales(3)
16. To make things easy for the user, the currency, currency symbol and exchange rate are arguments. Enter
the following search string (the arguments are encapsulated by the $ signs):
NOTE: Be sure to include the pipe symbol ( | ) before the eval command.
NOTE: You can copy/paste the € symbol from this document or go to the following website for the
keyboard shortcuts: http://bit.ly/2BqMmR0
21. Run the search again for sales in the UK with the following arguments GBP, £, and 0.64. Copy/paste
the £ symbol from this document.
Results Example:
Task 5: Edit your macro and use the isnum expression to validate the rate field.
Results Example:
Steps
Scenario: Hackers are continually trying to log into the Linux server. IT Ops analysts need to track
ongoing attempts by external sources trying to log in with invalid credentials.
Task 1: Create a GET workflow action that opens a new browser window with information about the
source IP address.
Results Example:
Task 2: Create a POST workflow action that uses fields from events with errors to create a ticket in
the IT ticket tracking system.
15. Perform a search on the sales_entries sourcetype for events posting errors.
These events contain two fields that are needed when creating tickets in the tracking system:
TransactionID and CustomerID.
16. Create a field extraction with a field name of result for the string “error.” This allows you to easily search
for events where result=error.
If you don’t recall how to create a field extraction, please refer to Lab Exercise 7. If the
NOTE:
result=error field extraction isn’t done, the rest of this task will not work.
17. Navigate to Settings > Fields > Workflow actions.
18. Select New Workflow Action.
19. For the Destination App, select class_Fund2.
20. For Name, type: Create accounting system ticket
21. For Label, type: Open accounting ticket for transaction $TransactionID$
22. For Apply only to the following fields, type: result
23. For Show Action in, select Event menu.
24. For Action type, make sure link is selected.
25. For URI, type: http://52.3.246.206
26. From the Open link in dropdown menu, select New window.
27. From the Link Method dropdown menu, select post.
28. Enter the following values for the Post arguments:
— details = $_raw$
— environment = $host$
— occurred = $_time$
— priority = Urgent
— summary = sales transaction error on $host$
29. Click Save.
30. Rerun your search for events where result=error and view the details of one of the returned events. Does
your POST workflow action appear?
31. Click on your workflow action. A new browser window should appear with the ticket details.
Results Example:
Results Example:
Steps
Scenario: The VP of Sales wants to run reports based on daily activity from the online store but
doesn’t have the time to learn the search language.
Task 1: Create a data model and add a Web Requests root event. The root event will be the base
search for all child events.
Students are logged in with the power role and in this environment, power users have read-only
NOTE:
permissions. Therefore, students can only create data models in the default Search & Reporting
app, not in the CLASS: Fundamentals 2 app.
5. Click Create.
6. Click Add Dataset and select Root Event.
7. In the Dataset Name field, type: Web requests.
8. In the Constraints field, type: index=web sourcetype=access_combined
9. Click Preview to see a sampling of the events.
10. After the data has been verified, save the root event.
26. Click Pivot in the upper right corner to test the data model.
27. Select the Web requests dataset.
28. In the New Pivot window, change the following:
— Filter on the Last 7 days
— Split Rows by action taken and click Add To Table
— Split Columns by date_mday and click Add To Table
Results Example:
Task 5: Add a field that uses an eval expression. The eval expression will display events
chronologically by date and day of the week.
strftime is a function that converts epoch time to a readable format. You’ll learn more about it
NOTE:
in Splunk Fundamentals 3.
33. For Field Name, type: day
34. For Display Name, type: day
35. Click Preview to verify your eval expression returns results.
36. Save the eval expression.
Task 6: Verify the eval expression works as expected by using Pivot to create a dashboard.
Results Example:
Task 7: Add fields from a lookup. The lookup table will provide descriptions of status codes.
49. Verify that you are still in the Search & Reporting app. If necessary, click the dropdown list next to the
splunk> logo at the top left of the window and choose App: Search & Reporting.
50. Navigate to Settings > Data models.
51. Select the Buttercup Games Site Activity data model.
Results Example:
Results Example:
Task 1: From the pivot editor, add a filter to narrow your results.
1. Hover your mouse in the lower right corner of the Shopping cart activity by day dashboard panel. Click
the Open in Pivot icon .
2. Refine your search results by selecting the Column chart icon from the table formats on the left.
Steps
Scenario: The Buttercup Games sales team wants to correlate sales data across multiple data
sources, but not all source types use the same field names. To ensure that all data is
reported correctly, the IT team has installed the CIM app to use as a standard for field
names.
Task 2: Create field aliases for the fields that aren’t populated in the data model.
8. Create field aliases for the needed attributes that didn't populate.
Field names
expected by the
CIM Data Model
Field names
in your data
Task 3: Validate your data against the CIM Web data model.
Results Example:
NOTE: If your data model fields are not populating, delete the field alias and create it again.
Be careful to avoid typos.