SplunkFundamentals1 Module5
SplunkFundamentals1 Module5
NOTE: Lab work will be done on your personal computer or virtual machine, no lab environment is
provided. We suggest you DO NOT do the lab work on your production environment. For this
course, we will be searching across all time. This is NOT a best practice in a production
environment, but needed for these labs due to the nature of the limited dataset.
The lab instructions refer to these source types by the types of data they represent:
Type Sourcetype Fields of interest
Steps
Scenario: There is reason to believe there might be a security issue with our web server. Your manager
has asked you to explore failed SSH login attempts.
Navigate to the Search view. (If you are in the Home app, click Search & Reporting from the column on
the left side of the screen. You can also access the Search view by clicking the Search menu option on
the green bar at the top of the screen.)
In the search bar, type the search: error OR fail*
Make sure that the time range picker to set the time range All time, and then click the Search button .
The search executes.
Review the search results. Observe that your search terms are highlighted in the results. (You may need to
scroll down or click Show all lines of an event to see the highlighted text.)
Use the pagination to page through and see more results.
Replace the number 22 in your search with: "port 22". Make sure to use the quotation marks.
Notice that you are now only seeing events the entire phase.
Page through the results. There are many login failures.
NOTE: Above the results, there is a menu item that allows you to change the number of events that
display on a page. By default, this option is 20 Per Page but you can click the option to increase
or decrease that number.
Click one of the user names in the search results. Note that when you click a user name, a menu of
options appears:
From the Job menu, which is below the right side of the search box, select Edit Job Settings.
Change the Read Permissions of the job. The default is Private. Click Everyone. For important searches,
this allows others to leverage your work.
Extend the Lifetime of your search. The default is that the search is saved for 10 minutes. Click 7 days.
Notice you can copy the link to your search results or bookmark the link.
Click Save to return to the Search view.
View your list of job histories from the Activity > Jobs menu (on the right side of the Splunk bar, which is
the black bar at the top of the browser window).
Take a moment to review Owner, Events, Expires, Status, and Actions of the jobs. (Note that if a job is
running, you can use the button – located under Actions - to stop it. This also sets the job status to
Finalized.)
NOTE: When you are using Splunk in a production environment, some jobs may still be running. If you
already have enough data, you can Finalize them to stop the search job.
Click on the search criteria (in blue) of the search for which you just changed the expiration to 7 days. The
search reopens in the Search & Reporting app.