What is Splunk Technology ?

Splunk Technology

Splunk Enterprise is a software platform to search, analyze, and visualize the machine-generated data (physical, virtual, cloud).
 

Feature Description
Indexing Splunk indexes machine data. The maximum indexing volume depends on the Splunk  Enterprise license.
Search Search is the primary way for navigating data in Splunk. Search is used to retrieve events from  an index, use statistical commands to calculate metrics and generate reports, identify patterns  and predict future trends. Searches can be saved as reports and used to power dashboard  panels.
Alerts Alerts are triggered when conditions are met by search results for both historical and real-time  searches.
Reports Reports are saved searches. Reports can be added to dashboards as dashboard panels.
Dashboards Dashboards are results of completed searches as well as data from back grounded real-time  searches.


Splunk Architecture

 

Splunk
Splunk

Phases – Splunk data life cycle

 

Splunk
Splunk data life cycle

At the INDEXING Stage, Splunk takes parsed events and writes  them to the search index on disk.
When Splunk indexes raw event data, it transforms the data into  searchable events. Indexes reside in flat files on the Splunk  instance known as the indexer.
Event processing occurs at the PARSING Stage.
Parsing can occur on either an indexer or a heavy forwarder.
At the INPUT Stage, Splunk acquires the raw data stream from  its source, breaks it into 64K blocks, and annotates each block  with metadata keys.
Data input can occur on either an indexer or a forwarder.
 


Components of Splunk

  1. Forwarder – Installed on the source of data: collects and forwards data to indexer – Two types: Universal (simple—most common) and heavy (for special recuirements).
  2.  Indexer – Parses data received from forwarder(s) and stores it in one or more indexes – Executes searches and returns results – Add more indexers to increase both data input and search capacity – Can use index replication to provide high availability/disaster recovery.
  3. Search head – Provides Web Ul interacts with users, requests searches to indexers. and displays results – Manages knowledge objects: saved searches, alerts. dashboards, etc. – Add more search-i heads in a pool to scale and support more concurrent users.

Splunk Usage & Benefits

 

Splunk Usage & Benefits
Splunk Usage & Benefits

 

Splunk Users /Roles

Splunk users are assigned roles. Roles determine capabilities
Out of the box there are three roles:

  1. User
  2. Power
  3. Admin

Splunk administrators can create other roles.This class focuses on the Power  role.
 

Architectural Components of Splunk

Indexer
Splunk indexers, or index servers, provide indexing capability for local and remote data and  host the primary Splunk datastore, as well as Splunk Web
Forwarder
Forwarders are Splunk instances that forward data to remote indexers for indexing and  storage.
Deployment Server
A deployment server distributes configuration information to running instances of Splunk via a
push mechanism which is enabled through configuration
Search Peers
A search peer is an indexer that services requests from search heads in a distributed search  deployment.
Search Head
A search head is a Splunk instance configured to distribute searches to indexers, or search  peers.
 


More about Splunk Components

All-in-one/single server

  • Self-contained Splunk instance; gathers inputs, indexes, and acts as a search  interface
  • Typical of a test instance, staging, POC, demo, etc.

Indexer

  • A Splunk instance that gathers and/or receives data from forwarders and writes  them to disk
  • Can operate alone or with other indexers load balanced, and can also act as  search interface
  • If not a search head, could have Splunk Web disabled

Search head

  • Runs Splunk Web, generally does not index, and connects to indexers with  distributed search
  • Used in large implementations with high numbers of concurrent users/searches

Universal Forwarder (Light Forwarder)

  • Splunk “agent” installed on non-Splunk system to gather data locally, can’t parse  or index by design
  • Smallest possible hardware footprint — designed to be installed on production  systems

“Heavy” Forwarder

  • Splunk instance that gathers data, parses it, and forwards it on to an indexer – no  data written to disk
  • Generally works as a remote collector, intermediate forwarder, and possible data  filter

Deployment Server

  • Splunk instance that acts as configuration manager for a Splunk install — can run  on an indexer or search head or on a dedicated machine depending on size of  installation