How to perform searching using fields in Splunk

Last updated on May 30 2022
Abhimanyu Joshi

Table of Contents

How to perform searching using fields in Splunk

Splunk – Field Searching

When Splunk reads the uploaded machine data, it interprets the data and divides it into many fields which represent a single logical fact about the entire data record.

For example, a single record of information may contain server name, timestamp of the event, type of the event being logged whether login attempt or a http response, etc. Even in case of unstructured data, Splunk tries to divide the fields into key value pairs or separate them based on the data types they have, numeric and string, etc.

We can see the fields from the secure.log file by clicking on the show fields link which will open up the following screen. We can notice the fields Splunk has generated from this log file.

image001 6
log file

Choosing the Fields

We can choose what fields to be displayed by selecting or unselecting the fields from the list of all fields. Clicking on all fields opens a window showing the list of all the fields. Some of these fields have check marks against them showing they are already selected. We can use the check boxes to choose our fields for display.

Besides the name of the field, it displays the number of distinct values the fields have, its data type and what percentage of events this field is present in.

image002 10
Choosing the Fields

Field Summary

Very detailed stats for every selected field become available by clicking on the name of the field. It shows all the distinct values for the field, their count and their percentages.

image003 5
Field Summary

Using Fields in Search

The field names can also be inserted into the search box along with the specific values for the search. In the below example, we aim to find all the records for the date, 15th Oct for the host named mailsecure_log. We get the result for this specific date.

image004 4
Using Fields

So, this brings us to the end of blog. This Tecklearn ‘How to perform searching using fields in Splunk’ helps you with commonly asked questions if you are looking out for a job in Splunk and Big Data Domain.

If you wish to learn Splunk and build a career in Splunk or Big Data domain, then check out our interactive, Splunk Developer and Admin Training, that comes with 24*7 support to guide you throughout your learning period. Please find the link for course details:

https://www.tecklearn.com/course/splunk-training-and-certification-developer-and-admin/

Splunk Developer & Admin Training

About the Course

Tecklearn’s Splunk Training covers all aspects of Splunk development and Splunk administration from basic to expert level. The trainee will go through various aspects of Splunk installation, configuration, etc. and also learn to create reports and dashboards, both using Splunk’s searching and reporting commands. As part of the course, also work on Splunk deployment management, indexes, parsing, Splunk cluster implementation, and more. With this online Splunk training, you can quickly get up and run with the Splunk platform and successfully clear the Splunk Certification exam.

Why Should you take Splunk Developer and Admin Training?

  • Splunk Development Operations Engineer can pocket home salaries of upto $148,590. -Indeed.com
  • 13,000+ customers in over 110 countries are already using Splunk to gain operational intelligence & reduce operational cost.
  • IDC predicts by 2020, world will be home to 40 trillion GB data. The demand to process this data is higher than ever.

What you will Learn in this Course?

Splunk Administration

Overview of Splunk

  • Need for Splunk and its features
  • Splunk Products and their Use-Case
  • Splunk Components: Search Head, Indexer, Forwarder, Deployment Server & License Master
  • Splunk Licensing options

Splunk Architecture

  • Introduction to the architecture of Splunk

Splunk Installation

  • Download and Install Splunk
  • Configure Splunk
  • Creation of index

Splunk Configuration Files

  • Introduction to Splunk configuration files
  • Managing the. conf files

Splunk App and Apps Management

  • Splunk App
  • How to develop Splunk apps
  • Splunk App Management
  • Splunk App add-ons
  • App permissions and Implementation

User roles and authentication

  • Introduction to Authentication techniques
  • User Creation and Management
  • Splunk Admin Roles and Responsibilities
  • Splunk License Management

Splunk Index Management

  • Splunk Indexes
  • Segregation of the Splunk Indexes
  • Concept of Splunk Buckets and Bucket Classification
  • Creating New Index and estimating Index storage

Various Splunk Input Methods

  • Understanding the input methods
  • Agentless input types

Splunk Universal Forwarder

  • Universal Forwarder management
  • Overview of Splunk Universal Forwarder

Deployment Management in Splunk

  • Implementing the Splunk tool and deploying it on server
  • Splunk environment setup and Splunk client group deployment

Basic Production Environment

  • Universal Forwarder
  • Forwarder Management
  • Data management
  • Troubleshooting and Monitoring

Splunk Search Engine

  • Integrating Search using Head Clustering and Indexer Clustering
  • Conversion of machine-generated data to operational intelligence
  • Set up Dashboard, Charts and Reports

Search Scaling and Monitoring

  • Splunk Distributed Management Console for monitoring
  • Large-scale deployment and overcoming execution hurdles
  • Distributed search concepts
  • Improving search performance

Splunk Cluster Implementation and Index Clustering

  • Cluster indexing
  • Configuring the cluster behaviour
  • Index and search behaviour

Distributed Management Console

  • Introduction to Splunk distributed management console
  • How to deploy distributed search in Splunk environment

Splunk Developer

Splunk Development Concepts

  • Roles and Responsibilities of Splunk developer

Basic Searching

  • Basic Searching using Splunk query
  • Build Search, refine search and time range using Auto-complete
  • Controlling a search job and Identifying the contents of search

Using Fields in Searches

  • Using Fields in search
  • Deployment of Field Extractor and Fields Sidebar for REGEX field extraction

Splunk Search Commands

  • Search command
  • General search practices
  • Concept of search pipeline
  • Specify indexes in search
  • Deployment of the various search commands: Fields, Sort, Tables, Rename, rex and erex

Creating Reports and Dashboards

  • Creation of Reports, Charts and Dashboards
  • Editing Dashboards and Reports
  • Adding reports to dashboard

Creating Alerts

  • Create alerts
  • Understanding alerts
  • Viewing fired alerts

Splunk Commands

  • Splunk Search Commands
  • Transforming Commands
  • Reporting Commands
  • Mapping and Single Value Commands

Lookups

  • Concept of data lookups, examples and lookup tables

Automatic Lookups

  • Configuring and Defining automatic lookups
  • Deploying lookups in reports and searches

Splunk Queries

  • Splunk Queries
  • Splunk Query Repository

Splunk Search Processing Language

  • Learn about the Search Processing Language

Analyzing, Calculating and Formatting results

  • Calculating and analysing results
  • Value conversion
  • Conditional statements and filtering calculated search results

Splunk Reports and Visualizations

  • Explore the available visualizations
  • Create charts and time charts
  • Omit null values and format results

Got a question for us? Please mention it in the comments section and we will get back to you.

0 responses on "How to perform searching using fields in Splunk"

Leave a Message

Your email address will not be published. Required fields are marked *