Basics
Learn the basics of Splunk.
Splunk has three main components:
Forwarder
Splunk Forwarder is a lightweight agent installed on the endpoint
Web server generating web traffic.
Windows machine generating Windows Event Logs, PowerShell, and Sysmon data.
Linux host generating host-centric logs.
Database generating DB connection requests, responses, and errors.
Indexer
Splunk Indexer plays the main role in processing the data
Takes the data
normalizes data into field-value pairs
determines the datatype of the data
stores data as events
Search Head
Splunk Search Head is the place within the Search & Reporting App where users can search the indexed logs
When the user searches for a term or uses a Search language known as Splunk Search Processing Language
the request is sent to the indexer
the relevant events are returned in the form of field-value pairs
In the Splunk Bar, you can see
system-level messages (Messages)
configure the Splunk instance (Settings)
review the progress of jobs (Activity)
miscellaneous information such as tutorials (Help)
search feature (Find).
The default app for every Splunk installation is Search & Reporting.
Last updated