Essntial Guide To Machine Data
Essntial Guide To Machine Data
0; Windows NT
317 27.160.0.0 - - [07/Jan 18:10:56:156] “GET /oldlink?item_id=EST-26&JSESSIONID=SD5SL9FF1ADFF3
1.1” 200 1318 “http://buttercup-shopping.com/cart.do?action=purchase&itemId=EST-26&product_id=K9-
” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)” 468 125.17.14.100
07/Jan 18:10:56:147] “POST /category.screen?category_id=SURPRISE&JSESSIONID=SD9SL4FF4ADFF7 HTTP
200 2423 “http://buttercup-shopping.com/cart.do?action=addtocart&itemId=EST-16&product_id=RP-
” “Opera/9.20 (Windows NT 6.0; U; en)” 564 130.253.37.97 - - [07/Jan 18:10:55:189] “GET /cart.
tion=changequantity&itemId=EST-18&product_id=AV-CB-01&JSESSIONID=SD5SL7FF6ADFF10 HTTP 1.1” 404
“http://buttercup-shopping.com/oldlink?item_id=EST-18” “Opera/9.20 (Windows NT 6.0; U; en)” 766
53.37.97 - - [07/Jan 18:10:55:187] “GET /oldlink?item_id=EST-6&JSESSIONID=SD10SL8FF2ADFF9 HTTP
THE ESSENTIAL
200 3865 “http://buttercup-shopping.com/cart.do?action=purchase&itemId=EST-6&product_id=AV-
MACHINE DATA
” “Opera/9.01 (Windows NT 5.1; U; en)” 553 62.216.64.19 - - [07/Jan 18:10:55:111] “GET /category.
n?category_id=FLOWERS&JSESSIONID=SD8SL8FF1ADFF6 HTTP 1.1” 200 3971 “http://buttercup-shopping.
art.do?action=remove&itemId=EST-15&product_id=FL-DSH-01” “Opera/9.01 (Windows NT 5.1; U; en)”
30.253.37.97 - - [07/Jan 18:10:55:108] “GET /category.screen?category_id=SURPRISE&JSESSIONID=SD-
F9ADFF9 HTTP 1.1” 404 474 “http://buttercup-shopping.com/oldlink?item_id=EST-21” “Mozilla/4.0
atible; MSIE 6.0; Windows NT 5.1)” 606 195.69.160.22 - - [07/Jan 18:10:54:192] “GET /cart.do?ac-
remove&itemId=EST-15&product_id=AV-SB-02&JSESSIONID=SD4SL1FF7ADFF7 HTTP 1.1” 200 205 “http://
rcup-shopping.com/cart.do?action=remove&itemId=EST-15&product_id=AV-SB-02” “Mozilla/4.0 (compati-
MSIE 6.0; Windows NT 5.1; SV1)” 163 131.178.233.243 - - [07/Jan 18:10:54:171] “GET /oldlink?item_
T-17&JSESSIONID=SD1SL9FF9ADFF1 HTTP 1.1” 200 1976 “http://buttercup-shopping.com/cart.do?ac-
GUIDE TO
purchase&itemId=EST-17&product_id=K9-CW-01” “Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_3;
) AppleWebKit/533.4 (KHTML, like Gecko) Chrome/5.0.375.38 Safari/533.4” 544 86.9.190.90 - - [07/
8:10:54:166] “POST /cart.do?action=addtocart&itemId=EST-7&product_id=FI-SW-01&JSESSIONID=SD10SL3F-
F4 HTTP 1.1” 404 2258 “http://buttercup-shopping.com/cart.do?action=addtocart&itemId=EST-7&prod-
d=FI-SW-01” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)” 189 82.245.228.36 - - [07/
8:10:54:165] “GET /category.screen?category_id=TEDDY&JSESSIONID=SD1SL1FF8ADFF2 HTTP 1.1” 200 488
://buttercup-shopping.com/cart.do?action=purchase&itemId=EST-27&product_id=FL-DLH-02” “Mozil-
0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)” 969 128.241.220.82 - - [07/
8:10:54:145] “GET /cart.do?action=view&itemId=EST-13&product_id=RP-SN-01&JSESSIONID=SD7SL8F-
F2 HTTP 1.1” 200 1901 “http://buttercup-shopping.com/cart.do?action=view&itemId=EST-13&product_
-SN-01” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1)” 393 130.253.37.97 - - [07/Jan
:54:121] “GET /category.screen?category_id=BOUQUETS&JSESSIONID=SD10SL1FF4ADFF10 HTTP 1.1” 406 1437
://buttercup-shopping.com/cart.do?action=addtocart&itemId=EST-27&product_id=AV-SB-02” “Mozilla/5.0
ntosh; U; Intel Mac OS X 10_6_3; en-US) AppleWebKit/533.4 (KHTML, like Gecko) Chrome/5.0.375.38
i/533.4” 571 141.146.8.66 - - [07/Jan 18:10:53:118] “GET /category.screen?category_id=SURPRISE&-
IONID=SD7SL3FF9ADFF10 HTTP 1.1” 200 3814 “http://buttercup-shopping.com/category.screen?cate-
id=SURPRISE” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)” 932 141.146.8.66 - - [07/Jan
:53:104] “POST /category.screen?category_id=BOUQUETS&JSESSIONID=SD3SL1FF7ADFF2 HTTP 1.1” 200 2567
://buttercup-shopping.com/product.screen?product_id=AV-SB-02” “Mozilla/4.0 (compatible; MSIE 6.0;
ws NT 5.1)” 920 130.253.37.97 - - [07/Jan 18:10:52:182] “GET /category.screen?category_id=TED-
ESSIONID=SD8SL2FF5ADFF2 HTTP 1.1” 200 1649 “http://buttercup-shopping.com/category.screen?cat-
_id=TEDDY” “Googlebot/2.1 ( http://www.googlebot.com/bot.html) “ 302 125.17.14.100 - - [07/Jan
DIGITAL EXHAUST.
TIME-SERIES DATA.
BIG DATA.
Whatever you call it, machine data is one of the
most underused and undervalued assets of any
organization. And, unfortunately, it’s usually kept
for some minimum amount of time before being
tossed out and never looked at again.
2
But some of the most important insights you can gain—across
IT and the business—are hidden in this data: where things went
wrong, how to optimize the customer experience, the fingerprints
of fraud. All of these insights can be found in the machine data
generated by the normal operations of your organization.
3
USING MACHINE DATA
IN PRACTICE
Using machine data requires three
(seemingly) simple steps:
1 2 3
INGEST CORRELATE ANALYZE
The organizations that get the most value from machine data
are able to take disparate data types, link them together, and
gain value from the result. But one of the biggest challenges is
understanding what data you should ingest.
In this example, analyzing the machine data makes the story clear:
By linking together the machine data, the company can see the
original issue and get a full view of the customer experience.
4
SOURCES MACHINE DATA
Order
Processing
Middleware
Error
Care IVR
Figure 1: Machine data can come from any number of sources, and at first
glance, can look like random text.
ON HOLD TIME
Care IVR
CUSTOMER ID
COMPANY TWITTER ID
ON HOLD TIME
Care IVR
CUSTOMER ID
COMPANY TWITTER ID
Figure 3: By correlating different types of machine data together, you can start
to gain real insight into what’s going on in your infrastructure, see security
threats or even use the insights to drive better business decisions.
5
THE ESSENTIAL GUIDE
TO MACHINE DATA
This book provides a high-level overview of the most common
types of machine data that are found in organizations of nearly
any size. While each organization’s needs and data sources will
vary by vendor, product and infrastructure, this book details where
you should look for machine data and the value it can provide to
IT, security, business analytics and Internet of Things use cases.
Many of the data sources listed in this book can support multiple
use cases – this is a major part of what drives machine data’s
tremendous value. The use cases supported by each data source
can be easily identified with the icons below.
INTERNET BUSINESS
OF THINGS ANALYTICS
6
Table of Contents
User Data................................................. 8 Proxies...................................................... 72
Authentication........................................ 8 VoIP........................................................... 74
8
USER DATA
Use Cases:
IT Ops & Application Delivery: Authentication data supports
IT operations teams as they troubleshoot issues related to
authentication. For example, application support can be tied to
logins, enabling IT operations to see whether users are struggling
to log in to applications. For IT operations teams that support
Active Directory, logs can be used to troubleshoot and understand
the health of Active Directory.
• LDAP logs include a record of who, when and where users log
in to a system and how information is accessed.
10
USER DATA
Use Cases:
Security & Compliance: VPN logs help in analyzing users coming
onto the network. This information can be used in a number
of ways, including situational awareness, monitoring foreign IP
subnets, and compliance monitoring of browsers and applications
of connected hosts. VPN data can also help identify:
11
ANTIVIRUS
Use Cases: Security & Compliance
Examples: Kaspersky, McAfee, Norton Security, F-Secure, Avira,
Panda, Trend Micro
12
APPLICATION DATA
Use Cases:
Security & Compliance: Antivirus logs support the analysis
of malware and vulnerabilities of hosts, laptops and servers; and
can be used to monitor for suspicious file paths. This data can
help identify:
13
APM
TOOL LOGS
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: Dynatrace, New Relic, App Dynamics, MMSoft Pulseway,
LogicMonitor, Stackify, Idera, Ipswitch
14
APPLICATION DATA
Use Cases:
IT Ops & Application Delivery: By providing end-to-end
measurement of complex, multi-tier applications, APM logs can
show infrastructure problems and bottlenecks that aren’t visible
when looking at each system individually, such as slow DNS
resolution causing a complex web app to bog down as it tries to
access content and modules on many different systems.
15
CUSTOM APPLICATION
& DEBUG LOGS
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: Custom applications
16
APPLICATION DATA
Use Cases:
IT Ops & Application Delivery: Debug output can expose
application behavior that causes inefficient use of system
resources or application failures that can be addressed by
developers and operations teams. Debug output is useful for
unraveling the internal state of an application that exhibits
performance problems or has been shown to have security
vulnerabilities, and the data can be helpful in identifying
root cause
17
CRM, ERP AND OTHER
BUSINESS APPLICATIONS
Use Cases: Application Delivery, Security & Compliance, Business Analytics, IoT
Examples: SAP, SFDC, SugarCRM, Oracle, Microsoft Dynamics
Use Cases:
Application Delivery: CRM databases can provide a complete
record of all information and events leading up to a customer
escalation. When combined with other data sources, CRM can
provide indicators of deeper issues.
Business Analytics & IoT: CRM and ERP data is a crucial source of
referential and transactional data that helps drive much needed
context to machine data in business use cases. For instance, when
combined with point-of-sale data and mobile application data
from loyalty applications, retailers can drive real-time 1:1 targeted
marketing campaigns, and then use machine learning to predict
customer purchasing behavior and revenue trends.
19
CODE
MANAGEMENT
Use Cases: Application Delivery
20
APPLICATION DATA
Use Cases:
Application Delivery: The version records of code management
can help IT operations teams identify application changes that are
causing system problems, such as excessive resource consumption
or interference with other applications.
21
VULNERABILITY
SCANNING
Use Cases: Security & Compliance
Examples: ncircle IP360, Nessus
22
APPLICATION DATA
Use Cases:
Security & Compliance: Vulnerability scans yield data about open
ports and IP addresses that can be used by malicious agents to
gain entry to a particular system or entire network. The data can
used to identify:
23
MAIL
SERVER
Use Cases: IT Operations, Security & Compliance
Examples: Exchange, Office 365
24
APPLICATION DATA
Use Cases:
IT Ops: Email messages and activity logs can be required to
maintain compliance with an organization’s information security,
retention and regulatory compliance processes. Mail server
transaction and error logs also are essential debugging tools for IT
problem resolution and also may be used for usage-based billing.
25
TEST COVERAGE
TOOLS
Use Cases: Application Delivery & DevOps
Examples: Static Analysis & Unit Testing logs (SonarQube, Tox, PyTest, RubyGem
MiniTest, Bacon, Go Testing), build server logs and performance metrics
26
APPLICATION DATA
Use Cases:
Application Delivery and DevOps: Test coverage data
monitoring helps release managers, application owners and
others understand:
27
AUTOMATION, CONFIGURATION,
DEPLOYMENT TOOLS (PLATFORMS)
Use Cases: Application Delivery & DevOps
Examples: Puppet Enterprise, Ansible Tower, Chef, SaltStack, Rundeck,
machine data ingested through APIs, webhooks or run logs
28
APPLICATION DATA
Use Cases:
Application Delivery: Automation and configuration machine
data monitoring helps application delivery teams deliver
applications faster without sacrificing stability or security.
29
BUILD SYSTEMS
(PLATFORMS)
Use Cases: Application Delivery & DevOps
Examples: Jenkins, Bamboo, TravicCI, TeamCity, machine data ingested
through APIs, logs, webhooks
30
APPLICATION DATA
Use Cases:
Application Delivery and DevOps: Build systems monitoring
helps release managers, test and QA teams understand the health
of their build environment, the status of tests, get insights into
stack traces and build queues. This visibility helps remediate build
or test bottlenecks and increase the application delivery velocity
and quality.
31
BINARY
REPOSITORIES
Use Cases: Application Delivery & DevOps
Examples: Data from Nexus, Artifactory, delivered through APIs, webhooks; Yum,
Pacman and Aptly data delivered through logs
32
APPLICATION DATA
Use Cases:
Application Delivery and DevOps: Analyzing binary
repository data helps application delivery teams and release
managers to ensure that the final deployment of code to
production is successful.
33
CONTAINER LOGS
AND METRICS
Use Cases: Application Delivery & DevOps
Examples: Docker
34
APPLICATION DATA
Use Cases:
Application Delivery and DevOps: Acquiring container log files
gives developers and operations teams insight on errors, issues
and availability of applications running inside containers. Logs
and metrics at the container level also call attention to containers
whose performance is outside of expected parameters. As a result,
admins can “kill” or “stop” a container instance and “run” a new
container in its place.
35
MIDDLEWARE
Use Cases: IT Operations, Application Delivery, Security & Compliance,
Business Analytics
Examples: Tibco, Software AG
36
MIDDLEWARE DATA
Use Cases:
37
WEB SERVER
Use Cases: IT Operations, Application Delivery, Security & Compliance,
Business Analytics
Examples: Java J2EE, Apache, Application Usage Logs, IIS logs, nginx
38
MIDDLEWARE DATA
Use Cases:
IT Ops & Application Delivery: Web logs are critical in debugging
both web application and server problems, but also are used to
generate traffic statistics that are useful in capacity planning. Web
server data can provide varying information for IT operations
teams:
39
WEB SERVER
(Continued)
40
MIDDLEWARE DATA
41
APPLICATION
SERVER
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: log4j, log4php
42
MIDDLEWARE DATA
Use Cases:
IT Ops & Application Delivery: The value of application server
logs depends on what they collect; however, these may include
customer information useful in troubleshooting or application
state transitions similar to, but less verbose than debug output
that can provide clues to application crashes, memory leaks and
performance problems.
43
MOBILE DEVICE
DATA
Use Cases: IT Operations, Application Delivery,
Security & Compliance
44
MIDDLEWARE DATA
Use Cases:
IT Ops & Application Delivery: Since mobile apps invariably
connect to one or more backend services, data from the client’s
point of view can provide insight into the app’s condition and
state when investigating issues such as crashes, performance
degradation or security leaks. Mobile data shows the sequence of
events and the application conditions leading up to and during
a problem. If the source of the problem is the mobile application
itself, getting insight on mobile application data can help
developers deliver a better performing mobile app.
45
SNMP
Use Cases: IT Operations, Security & Compliance
Examples: LogicMonitor, ManageEngine, Spiceworks,
Ruckus Idera, Ipswitch
46
NETWORK DATA
Use Cases:
IT Ops: SNMP data can provide current information about
performance, configuration and current state. This allows the
monitoring of the “normal” state of the environment, which is vital
when using a service-level approach to monitoring of health of any
environment. This could include current speed of all of the ports
on a switch, the number of bytes sent (per port or in aggregate)
through a router, the CPU temperature of a server, and any other
information made available by the vendor per the SNMP MIBs for
that device.
47
DEEP PACKET
INSPECTION DATA
Use Cases: IT Operations, Security & Compliance
Examples: Stream, PCAP, bro
48
NETWORK DATA
Use Cases:
IT Ops: Data on the network wire is authoritative and difficult
to spoof (although encryption, steganography and advanced
deception techniques can evade DPI). For example, DPI provides
raw information of everything transmitted over a network,
including things that aren’t necessarily part of or difficult to
extract from a log, such as database query results.
49
DHCP
Use Cases: IT Operations, Security & Compliance
Examples: DHCP Insight, Linux DHCP
50
NETWORK DATA
Use Cases:
IT Ops: DHCP logs can be used when troubleshooting a client
device that is having network problems since it provides a
definitive record of the device’s primary IP parameters. The data
may show the DHCP server itself is at fault; for example, by not
properly vending addresses, renewing IP leases or giving the same
address to two separate devices.
51
ENDPOINT
Use Cases: Security & Compliance
Examples: McAfee ePO, Symantec SEP
52
NETWORK DATA
Use Cases:
Security & Compliance: Endpoint data can be used for a variety
of security uses, including identifying newly detected binaries,
file hash, files in the filesystem and registries. It can also help
with identifying binary and hash registries that match threat
intelligence, as well as unpatched operating systems and binaries,
and to detect known malware.
53
FIREWALL
Use Cases: IT Operations, Security & Compliance
Examples: Palo Alto, Cisco, Check Point
54
NETWORK DATA
Use Cases:
IT Ops: When network applications are having communication
problems, network security policies may be the culprit. Firewall
data can provide visibility into which traffic is blocked and which
traffic has passed through – helping identify if you have an app or
network issue.
• Lateral movement
• Command and Control traffic
• DDoS traffic
• Malicious domain traffic
• Unknown domain traffic
• Unknown locations traffic
55
FTP
Use Cases: IT Operations, Security & Compliance
Examples: OSSEC, Getwatchlist, UTBox, Security Onion,
iSeries - AS400, Traffic Ray
56
NETWORK DATA
Use Cases:
IT Ops: FTP traffic logs record the key elements of a file
transmission, including source (client) name and address and
remote user name if the destination is password-protected. This
and other data are crucial when troubleshooting FTP problems,
regardless of the application.
57
INTRUSION
DETECTION/PREVENTION
Use Cases: Security & Compliance
Examples: Tipping Point, Juniper IDP, Netscreen Firewall, Juniper NSM IDP,
Juniper NSM, Snort, McAfee IDS
58
NETWORK DATA
Use Cases:
Security & Compliance: IDS logs provide security teams detailed
records of attacks including the type, source, destination and
port(s) used that provide an overall attack signature. Special
signatures may trigger alarms or other mitigating actions. IPS
provide the same set of attack signature data, but also may
include a threat analysis of bad network packets and detection of
lateral movement. This data can also detect command and control
traffic, DDoS traffic, and malicious or unknown domain traffic.
59
LOAD BALANCER
Use Cases: IT Operations
Examples: Local Traffic Manager, Cisco Load Balancer, Citrix,
Kemp Technologies, Radware AppDirector OnDemand
60
NETWORK DATA
Use Cases:
IT Ops: Load balancer logs provide operations teams with a record
of overall traffic to systems or particular applications and provide
indicators of each system’s traffic-handling capacity and health,
along with the status and health of the load balancer itself.
61
DNS
Use Cases: IT Operations, Security & Compliance
Examples: BIND, PowerDNS, Unbound, Dnsmasq, Erl-DNS
62
NETWORK DATA
Use Cases:
IT Ops: DNS server logs provide operations teams with a record
of traffic, the type of queries, how many are locally resolved either
from an authoritative server or out of cache, and a picture of
overall system health.
63
NETWORK ACCESS
CONTROL (NAC)
Use Cases: Security & Compliance
Examples: Aruba ClearPass, Cisco ACS
64
NETWORK DATA
Use Cases:
Security & Compliance: NAC software collects data about the
connecting clients such as an inventory of installed client software,
compliance with security policies, OS and application patch
versions, accessibility by remote access clients and user access
to protected networks. NAC logs provide security teams with a
detailed profile of a client’s state and activity. It can provide details
into unauthorized device connections and be used to correlate
users/IP to a physical network location.
65
NETWORK SWITCHES
Use Cases: IT Operations, Security & Compliance
Examples: Ethernet Switch, Virtual Switches
66
NETWORK DATA
Use Cases:
IT Ops: Operations teams use switch logs to see the state of traffic
flow, such as source and destination, class of service and causes
of congestion. Logs can show traffic statistics in the aggregate,
by port and by client, and whether particular ports are congested,
failing or down.
67
NETWORK ROUTERS
Use Cases: IT Operations, Security & Compliance
Examples: Routers from Cisco, Juniper, Linksys, Arista,
Extreme Networks, Avaya
68
NETWORK DATA
Use Cases:
IT Ops: Network engineers use router logs and statistics to
monitor traffic flow and ensure that traffic is being correctly
forwarded between network segments. Data from routing
protocol updates can show whether your routers are appropriately
exchanging route tables with other locations, that external traffic
can reach you, and that internal traffic is correctly forwarded to
external routers.
69
NETWORK PROTOCOLS
Use Cases: IT Operations, Security & Compliance
Examples: HTTP, Cisco NetFlow, Ntop, Flow-tools, FlowScan,
EHNT, BPFT
70
NETWORK DATA
Use Cases:
IT Ops: Network protocol traffic analysis can help determine
the network’s role in overall availability and performance of
critical services. Application traffic can be monitored for usage,
performance and availability, and can provide visibility into
specific user data. For applications that cannot be instrumented
on the servers, network traffic may be the only way to acquire
performance data.
71
PROXIES
Use Cases: IT Operations, Security & Compliance
Examples: Blue Coat, Fortinet, Juniper IDP, Netscreen Firewall,
Palo Alto Networks, nginx
72
NETWORK DATA
Use Cases:
IT Ops: Operations teams often use proxies embedded in an
application delivery controller (ADC), a more advanced Layer
7-aware version of a load balancer. In this context, proxy logs
can provide information about incoming requests and traffic
distribution among available resources.
73
VoIP
Use Cases: IT Operations, Security & Compliance
Examples: Asterisk CDR, Asterisk event, Asterisk messages
74
NETWORK DATA
Use Cases:
IT Ops: VoIP logs provide troubleshooting and usage data
similar to that of other network applications. Details include
source, destination, time and duration of calls, call quality metrics
(e.g., packet loss, latency, audio fidelity/bit rate) and any error
conditions. Integrating VoIP source/destination records with an
employee database such as AD or LDAP and a DHCP database
allows linking call records to actual people and IP addresses to
physical locations; information that can assist in troubleshooting
and billing.
75
SYSTEM LOGS
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: Unix, Windows, Mac OS
76
OPERATING SYSTEM DATA
Use Cases:
IT Ops & Application Delivery: System logs often are the first
place operations teams turn when troubleshooting system
problems, whether with the OS, hardware or various I/O interfaces.
Since a particular problem often manifests itself with errors in
multiple subsystems, correlating log entries is one of the best
ways of identifying the root cause of a subtle system failure.
77
SYSTEM PERFORMANCE
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: PERFMON, Windows Events Logs, sar, vmstat, iostat
78
OPERATING SYSTEM DATA
Use Cases:
IT Ops & Application Delivery: Performance logs provide a
real-time indication of system health by showing resource usage
that, when compared with historical norms, flags performance
problems. When measurements deviate from standard or typical
parameters, it’s a warning for IT admins to do further investigation.
79
AMAZON WEB
SERVICES
Use Cases: IT Operations, Security & Compliance
Examples: CloudTrail, CloudWatch, Config, S3
80
VIRTUAL INFRASTRUCTURE DATA
Use Cases:
IT Ops: AWS services provide similar types of system and
service data as traditional IT infrastructure, much of which is
consolidated by the CloudWatch service. These include service
monitoring, alarms and dashboards for metrics, logs, and events
generated by other AWS resources and applications. Typical
events and measures include when instances are instantiated
and decommissioned, CPU usage, network traffic and storage
consumption.
81
MICROSOFT AZURE
Use Cases: IT Operations, Security & Compliance
Examples: WADLogs, WADEventLogs, WADPerformanceCounter,
WADDiagnostInfrastructure
82
VIRTUAL INFRASTRUCTURE DATA
Use Cases:
IT Ops: Azure services provide detailed logs for monitoring one’s
infrastructure across entire technology stack, VMs, containers,
storage and application services. The data is useful in maintaining
application delivery quality and service levels, measuring user
behavior, resource utilization and for capacity planning and cost
management.
83
VMware SERVER LOGS,
CONFIGURATION DATA AND
PERFORMANCE METRICS
Use Cases: IT Operations, Security & Compliance
Examples: vCenter, ESXi
84
VIRTUAL INFRASTRUCTURE DATA
and over 100 other metrics fall into this category. As with the
inventory information, this information is not present in the
log files and must be viewed through the vSphere client or
polled through the vSphere API.
Use Cases:
IT Ops: Operations teams can use VMware data to measure the
health of the overall hypervisor environment and underlying guest
operating systems. Admins can use this data for capacity planning
and for troubleshooting of ongoing performance issues, such as
datastore latency issues.
This data also records hardware resource usage that can be used
to optimize VM deployments across a server pool to maximize
resource consumption without having workloads overwhelm any
given server.
85
PHYSICAL CARD
READERS
Use Cases: Security & Compliance
86
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
Security & Compliance: For IT security teams, the data from card
readers provide the same sort of access information for physical
locations as a network firewall log. The data can be used to detect
attempted breaches and be correlated to system and network logs
to identify potential insider threats and provide overall situational
awareness. It can also be used to detect access at unusual times
and locations or for unusual durations.
87
SENSOR DATA
Use Cases: IT Operations, Security, Business Analytics, Internet of Things
Examples: Binary and numeric values including switch state, temperature,
pressure, frequency, flow, from MQTT, AMQP and CoAP brokers,
HTTP event collector
88
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
IT Ops: Some of the most important parameters for operations
teams to monitor are environmental conditions such as
temperature, humidity, airflow and voltage regulation in a data
center. Similar readings are available from individual servers and
network equipment that, when correlated, can highlight problems
in the facility or equipment ready to fail.
Internet of Things:
89
SERVER LOGS
Use Cases: IT Operations, Security & Compliance, Application Delivery
90
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
IT Ops & Application Delivery: Server logs provide a detailed
record of overall system health and forensic information about the
exact time of errors and anomalous conditions that are invaluable
in finding the root cause of system problems.
91
BACKUP
Use Cases: IT Operations
92
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
IT Ops: Backup systems routinely log activity and system
conditions, recording information such as job history, error
conditions, backup target and a detailed manifest of copied files
or volumes. This data allows operations teams to monitor the
health of backup systems, software and jobs; triggers alerts in the
case of errors; and assists in debugging backup failures. It also
allows teams to locate where specific data may be stored, when a
recovery is required.
93
STORAGE
Use Cases: IT Operations
Examples: EMC, Netapp, IBM
94
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
IT Ops: Shared storage logs record overall system health (both
hardware and software), error conditions (such as a failed
controller, network interface or disks) and usage (both capacity
used per volume and file or volume accesses). Collectively, the
information can alert operations teams to problems, the need for
more capacity and performance bottlenecks.
95
MAINFRAME
Use Cases: IT Operations, Security & Compliance
96
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
IT Ops: Like other servers, mainframes measure and log numerous
system parameters that show their current status, configuration
and overall health. Since most mainframe subsystems are
redundant, system logs also show non-disruptive hardware failures
or anomalous behavior that is predictive of an impending failure.
Due to their use for critical applications, mainframes often record
application performance data such as memory usage, I/O and
transaction throughput, processor utilization and network activity.
97
PATCH LOGS
Use Cases: IT Operations, Security & Compliance
98
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
IT Ops: Operations teams use patch logs to verify the timely and
correct application of scheduled patches, identify unpatched
systems and applications, and alert to errors in the patching
process. Correlating errors to patch logs can indicate when an
error is due to a patch.
99
TELEPHONY
Use Cases: IT Operations
Examples: Cisco Unified Communications Manager, Shoretel, Twilio
100
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
IT Ops: Like VoIP, telephony logs provide an overview of system
health along with troubleshooting and usage data similar to that
of other network applications. Details include source, destination,
time and duration of voice/video calls, web conferences and
text messages, call-quality metrics (e.g., packet loss, latency,
audio fidelity/bit rate), error conditions and user attendance at
web conferences. By integrating telephony records of source/
destination address with an employee database such as AD or
LDAP and a DHCP database, organizations can link call records to
actual user IDs and IP addresses to physical locations; information
that can assist in troubleshooting and billing. Logs also can
reveal any network segments experiencing congestion or other
performance problems that may indicate equipment problems or
the need for an upgrade.
101
POINT-OF-SALE SYSTEMS
(POS)
Use Cases: Internet of Things, Business Analytics, Security & Compliance
Examples: IBM, LightSpeed, NCR, Revel Systems, Square, Toshiba, Vend
Use Cases:
Internet of Things: Historically, POS systems were either not
connected or managed on a dedicated private network. Thanks
to the rise of the Internet of Things (IoT), these systems are
being connected directly to cloud platforms that make remotely
administering these devices from a central location much simpler.
There’s no longer a need to dispatch IT personnel to manually
update each system. This is critical because a POS failure can
result in longer lines that inconvenience customers and potentially
lead to lost revenue. A negative customer experience can easily
translate to customers opting to shop somewhere else in a retail
industry that is intensely competitive.
102
PHYSICAL INFRASTRUCTURE & IoT DATA
103
RFID/NFC/BLE
Use Cases: Internet of Things, Business Analytics
Examples: Alien Technology, BluVision, Check Point Systems, Gimbal, MonsoonRF,
Radius Networks, STMicroelectronics, TAGSYS RFID, ThingMagic
RFID, NFC and BLE are the three primary wireless methods
organizations use today to keep track of objects and interact with
customers in retail stores. NFC is a subset of RFID and is designed
to be a more secure form of data exchange, and allows devices
to communicate peer-to-peer. Common use cases of RFID are
asset tracking, inventory management, even attendee tracking.
NFC is commonly used for contact-less payments, exchanging
information between two parties (such as smartphones), and even
badge readers that unlock doors.
104
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
Internet of Things: RFID is arguably one of the first instances
of an Internet of Things (IoT) application. Deployed in place of
traditional barcode readers, RFID tags are used in everything from
shipping to keeping track of farm animals. IoT deployments make
it possible to capture RFID data in way that makes it simpler to
track events involving anything that has an attached RFID tag.
Data insights from RFID can help improve overall supply chain,
order processing and inventory management.
105
SMART METERS
Use Cases: Internet of Things, Business Analytics
Examples: ABB, GE, Google, eMeter, IBM, Itron, Schneider Electric, Siemens
106
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
Internet of Things: Smart meters are deployed across critical
systems at large utilities companies, for example, power, gas and
water utilities. These systems are the lifeblood of infrastructure
and failure can lead to catastrophic outcomes. Real time
monitoring of smart meters can help organizations better analyze
failures remotely, by way of remotely detecting line down failures.
Equally important is securing the devices from tampering that
could lead to malicious attacks and breaches.
107
TRANSPORTATION
Use Cases: Internet of Things, Business Analytics
Examples: Boeing, BMW, Ford, GE, General Motors, Daimler-Benz,
John Deere, Volkswagen
108
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
Internet of Things: Vehicle manufacturers are attaching sensors to
every mechanical and electronic component they use. This allows
companies to gain a unified view of assets to quickly identify
and diagnose operational issues and to monitor, track and avoid
unplanned asset downtime. This helps to ensure that equipment
is operating as intended. Manufacturers can also detect anomalies
and deviations from normal behavior to take corrective action –
improving uptime, asset reliability and longevity.
109
MEDICAL DEVICES
Use Cases: Internet of Things, Business Analytics, Security & Compliance
Examples: Abbot Laboratories, Apple, Baxter, Boston Scientific, GE,
Siemens, St. Jude Medical
110
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
Internet of Things: Most devices inside a hospital are connected
to local monitoring applications. But it’s possible to monitor
patient care remotely using sensors that communicate with either
a wearable device or some other system for monitoring patients in
their homes.
111
ENVIRONMENTAL
SENSORS
Use Cases: Internet of Things, Business Analytics
Examples: Bosch Sensortec, Mouser Electronics, Raritan, Schneider Electric,
TSI, Vaisala
112
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
Internet of Things: Environmental sensors are a class of smart
meters that have been optimized to monitor the environment.
In some instances, such as a data center, the information provided
by these sensors is used to automatically alter temperature
setting and heat flow.
113
INDUSTRIAL CONTROL
SYSTEMS (ICS)
Use Cases: Internet of Things, Business Analytics, Security & Compliance
Examples: ABB, Emerson Electric, GE, Hitachi, Honeywell, Rockwell Automation,
Siemens, Toshiba
114
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
Internet of Things: Machine data from ICS can be used to gain
real-time visibility into the uptime and availability of critical assets.
This enables companies to detect an issue, perform root cause
analysis and take preventive action to prevent certain events from
happening in the future. Companies are also leveraging machine
data from ICS systems to secure these mission-critical assets.
115
WEARABLES
Use Cases: Internet of Things, Business Analytics
Examples: ARM, Intel, Lenovo, Microsoft, Samsung
116
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
Internet of Things: Beyond merely syncing with smartphones,
the latest generation of smartwatches is taking advantage of
geo-positioning systems and application programming interfaces
to give device owners an optimal application experience that
includes both their location and often time of day.
117
METRIC LINE PROTOCOLS
Use Cases: IT Operations, Application Delivery, IoT
Examples: collectd, statsd
118
PHYSICAL INFRASTRUCTURE & IoT DATA
Use Cases:
IT Ops & Application Delivery: Metrics Line Protocols provides
usage, performance and availability data across operating
systems, storage devices, applications and other components of
IT infrastructure. Metrics are particularly useful for the monitoring
portion of IT Operations and Application Delivery, where trends can
help identify where there is a problem. Once trends and thresholds
illustrate performance issues, other data sources are often correlated
to determine the root cause of the problem.
119
DATABASE
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: MySQL, Postgres, Other Relational Databases
120
ADDITIONAL DATA SOURCES
Use Cases:
IT Ops & Application Delivery: Database logs can be aggregated
and analyzed to show the overall performance of a particular
database system, and also provide visibility into database issues.
Metrics useful to IT operations teams include queries per second
and query response time, both measured against a baseline
standard made from historical data.
121
THIRD-PARTY LISTS
Use Cases: Security & Compliance
Examples: Threat Lists, OS Blacklist, IP Blacklists, Vulnerability Lists,
Google Analytics
122
ADDITIONAL DATA SOURCES
Use Cases:
Security & Compliance: By aggregating data from users around
the world, third-party security lists provide security teams with
real-time information about nascent threats and vulnerabilities
that allow updating security policies, firewall rules and vulnerable
software before an attack. Lists also are used to identify known
sources of spam, both commercial and malware-infested, to
improve the effectiveness of filters on internal email systems.
123
SOCIAL MEDIA FEEDS
Use Cases: IT Operations
124
ADDITIONAL DATA SOURCES
Use Cases:
IT Ops: Due to their interactivity, convenience and ubiquity,
social media feeds provide organizations with an unfiltered and
instantaneous view of customer opinion. By analyzing feeds from
the most popular sites, organizations can quickly identify potential
problems with a product or service, mishandled customer support
incidents or other sources of customer dissatisfaction about an
organization’s products or online presence. Proactively addressing
these online complaints allows the organization to turn unhappy
and potentially lost customers into delighted and loyal ones.
125
HUMAN RESOURCES
Use Cases: Security & Compliance
Examples: BambooHR, Fairsail HRMS, Namely, Zenefits
126
ADDITIONAL DATA SOURCES
Use Cases:
Security & Compliance: HR records can show if someone no
longer employed still has active accounts, and can also provide
evidence of disciplinary action that might be useful in security
investigations.
127
BUSINESS SERVICE
TRANSACTION & BUSINESS
SERVICE PERFORMANCE DATA
Use Cases: IT Operations, Application Delivery, Security & Compliance
Examples: Payments Status, Batch Upload Status, Customer Order Status
128
ADDITIONAL DATA SOURCES
Use Cases:
IT Ops & Application Delivery: IT can use process logs to identify
flaws in their support or admin processes, or problems that have
fallen through gaps in existing process flows.
129
p-shopping.com/category.screen?category_id=GIFTS” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT
317 27.160.0.0 - - [07/Jan 18:10:56:156] “GET /oldlink?item_id=EST-26&JSESSIONID=SD5SL9FF1ADFF3
1.1” 200 1318 “http://buttercup-shopping.com/cart.do?action=purchase&itemId=EST-26&product_id=K9-
” “Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)” 468 125.17.14.100
07/Jan 18:10:56:147] “POST /category.screen?category_id=SURPRISE&JSESSIONID=SD9SL4FF4ADFF7 HTTP
EB-Splunk-Essential-Guide-to-Machine-Data-103
© 2017 Splunk Inc. All rights reserved. Splunk, Splunk>, Listen to Your Data, The Engine for Machine Data,Splunk Cloud, Splunk
200 2423 “http://buttercup-shopping.com/cart.do?action=addtocart&itemId=EST-16&product_id=RP-
” “Opera/9.20 (Windows NT 6.0; U; en)” 564 130.253.37.97 - - [07/Jan 18:10:55:189] “GET /cart.
tion=changequantity&itemId=EST-18&product_id=AV-CB-01&JSESSIONID=SD5SL7FF6ADFF10 HTTP 1.1” 404
“http://buttercup-shopping.com/oldlink?item_id=EST-18” “Opera/9.20 (Windows NT 6.0; U; en)” 766
Light and SPL are trademarks and registered trademarks of Splunk Inc. in the United States and other countries.
53.37.97 - - [07/Jan 18:10:55:187] “GET /oldlink?item_id=EST-6&JSESSIONID=SD10SL8FF2ADFF9 HTTP