Module 4 Flashcards
(12 cards)
name/value pairs
Ex: index=main, source=eventgen, sourcetype=evntgen
Field extractions (index time extractions)
Metadata field: host, source, sourcertype, index
internal field: _time, _raw
Custom fields
Search time extractions
Delimiter based
RegEx Based
Field Discovery
Splunk automatically discovers fields using key value pairs
When Fast search mode is active, this disables field discovery
Default selected fields
host, source, sourcetype
What are interesting fields
Fields that appear in atleast 20% of events
Where do you go when a field that isnt in atleast 20% of data
All fields above the selected fields
Syntax
field_name=field_value
Use “” for fields with spaces ex: “Jean Claude”
Splunk can use CIDR notation
Are Field names case sensitive?
Yes
action=addtocart (Yes)
ACTION=addtocart (no)
Are Field values case sensitive?
No
action=addtocart (Yes)
action=ADDTOCART (Yes)
Comparison Operators
=. !=, >, <, >=, <=