Splunk Concepts

From NovaOrdis Knowledge Base
Revision as of 18:29, 11 January 2017 by Ovidiu (talk | contribs) (→‎Index)
Jump to navigation Jump to search

Internal

Event

Segment

Field

A field is a named piece of information. Spunk can parse fields with a fixed, delimited position on a line, name/value pair where there is a single value for each field, or a name/value pair where there is more than one value (example: the To: e-mail address field).

Fields are searchable. For more details on searching with fields, see Searching with Fields.

Default Fields

Selected Fields

Interesting Fields

Tag

Indexing

Splunk extracts fields from events when indexing.

Index

The index is the repository for data. During the indexing process, the raw event data are transformed into searchable events, and the data that allows searching reside in flat index files on the Splunk instance known as indexer.

Searching

Forwarding Agent

A forwarding agent is a Splunk instance that forwards data to another Splunk instance (an indexer or another forwarder) or to a third-party system. The forwarding agent is a minimalistic service that forwards information as close to real time as possible.

There are three types of forwarders:

  • A universal forwarder is a streamlined, dedicated version of Splunk that contains only the essential components needed to forward data.
  • A heavy forwarder is a full Splunk instance, with some features disabled to achieve a smaller footprint.
  • A light forwarder is also a full Splunk instance, with most features disabled to achieve as small a footprint as possible. The universal forwarder, with its even smaller footprint yet similar functionality, supersedes the light forwarder for nearly all purposes.

In most respects, the universal forwarder represents the best tool for forwarding data to indexers. Its main limitation is that it forwards only unparsed data. Therefore, you cannot use it to route data based on event contents. For that, you must use a heavy forwarder.