The Essential Guide To Data
The Essential Guide To Data
Guide to Data
An update to The Essential Guide
to Machine Data, exploring how
to bring data to every question,
decision and action
Time-Series Data.
Streaming Data.
Dark Data.
It’s no secret that data remains underused and undervalued in With the right approach, data makes it simple to:
most organizations all over the world. Despite the constant talk of
data-driven decisions, organizations of all sizes are still missing the • Make better informed decisions about every part of your business.
mark on how to effectively capture and use the troves of data being • Run your operations more efficiently.
generated every day, whether it comes from users, outside industry
• Optimize user and customer experiences.
resources, or their own networked devices. In fact, most business
and IT decision makers estimate that 55% of their data is dark data, • Detect the fingerprints of fraud — or prevent it altogether.
information you don’t know you have, or can’t fully tap. • Uncover potential disasters before they happen.
• Find hidden trends that help your company leapfrog the competition.
This is a big missed opportunity. Important insights across IT, security
and your organization lie hidden in this data. Data holds the definitive • Make everyone who uses it look like a hero.
record of all activity and behavior of your customers and users, • … and so much more.
transactions, applications, servers, networks, mobile devices and more.
Critical information on everything from configurations, APIs, message
The challenge with leveraging the vast quantity of data that most
queues, diagnostic outputs, sensor data of industrial systems and more
companies collect is that it comes in a dizzying range of formats
is all there — you just have to tap into it the right way.
that traditional data monitoring and analysis tools aren’t designed
to handle. Many tools can’t keep up with the varying data structures,
sources or time scales. And it goes well beyond just machine data as
well. But the upside to tapping into your data is tremendous, and this
is where Splunk comes in.
With Splunk, you can bring data to every question, decision and
action in your organization to create meaningful outcomes. Unlike any
other platform, Splunk is truly able to take any data from any source
and drive real action to benefit the business — from IT infrastructure
and security monitoring to DevOps and application performance
monitoring and management.
Turn Data Into Doing
in Practice
Use data to: Machine Data Contains
What Does Machine Critical Insights
Data Look Like?
Sources
Order ORDER, 05-21T14:04:12.484,10098213, 569281734,67.17.10.12,43CD1A7B8322,SA-2100
Processing
MAY 21 14:04:12.996 wl-01.acme.com Order 569281734 failed for customer 10098213.
Exception follows: weblogic.jdbc.extensions.ConnectionDeadSQLException:
Middleware weblogic.common.resourcepool.ResourceDeadException: Could not create pool connection. The
Error DBMS driver exception was: [BEA][Oracle JDBC Driver] Error establishing socket to host and port:
ACMEDB-01:1521. Reason: Connection refused
05/21 16:33:11.238 [CONNEVENT] Ext 1207130 (0192033): Event 20111, CTI Num:ServID:Type
0:19:9, App 0, ANI T7998#1, DNIS 5555685981, SerID 40489a07-7f6e-4251-801a-
But not knowing what data to ingest can stop businesses before Figure 1: Data can come from any number of sources, and at first glance,
they start. can look like random text.
1. A customer’s order didn’t go through 05/21 16:33:11.238 [CONNEVENT] Ext 1207130 (0192033): Event 20111, CTI Num:ServID:Type
0:19:9, App 0, ANI T7998#1, DNIS 5555685981, SerID 40489a07-7f6e-4251-801a-
Time waiting on Trunk
13ae51a6d092, hold T451.16
Care IVR
05/21 16:33:11:242 [SCREENPOPEVENT] SerID 40489a07-7f6e-4251-801a-13ae51a6d092
2. The customer called support to resolve the issue CUSTID 10098213 Customer ID
05/21 16:37:49.732 [DISCEVENT] SerID 40489a07-7f6e-4251-801a-13ae51a6d092
tweeted a complaint about the company this device from @ACME. Site doesn’t work! Called, gave up on waiting for them to answer! RT if
you hate @ACME!!”,objectType:“activity”,postedTime:“05-21T16:39:40.647-0600”}
Company’s Twitter ID
USER DATA
User Data
Use Cases: Security and Compliance
Use Cases
Security and Compliance: VPN logs help analyze users
coming onto the network. This information can be used in a
number of ways, including situational awareness, monitoring
foreign IP subnets, and compliance monitoring of browsers and
applications of connected hosts. VPN data can also help identify:
USER DATA
Examples and Data Sources: Active Directory, LDAP, Identity amount of time, and brute force activities. Specifically:
Management, Single-Sign On
• Active Directory domain controller logs contain information
Authentication data provides insight into users and identity regarding user accounts, such as privileged account activity,
activity. Common authentication data sources include: as well as the details on remote access, new account creation
and expired account activity.
• Active Directory: A distributed directory in which
organizations define user and group identities, security • LDAP logs include a record of who, when and where users log
policies and content controls. in to a system and how information is accessed.
APPLICATION DATA
Application Data
Examples: Kaspersky, McAfee, Norton Security, F-Secure, Avira,
Panda, Trend Micro
Use Cases
Security and Compliance: Antivirus logs support the analysis
of malware and vulnerabilities of hosts, laptops and servers;
and can be used to monitor for suspicious file paths. It can
help identify:
APPLICATION DATA
Tool Data Deployment Tools
(Platforms)
APPLICATION DATA
Examples: Dynatrace, New Relic, AppDynamics, MMSoft Pulseway, Use Case: Application Delivery and DevOps
LogicMonitor, Stackify, Idera, Ipswitch
Examples: Puppet Enterprise, Ansible Tower, Chef, SaltStack,
Application performance management software provides end-to- Rundeck machine data ingested through APIs, webhooks or
end measurement of complex, multitier applications to provide run logs
performance metrics from an end user’s perspective. APM logs also
provide event traces and diagnostic data that can assist developers Automated configuration and deployment tools, also known
in identifying performance bottlenecks or error conditions. The data as infrastructure as code, allow IT and DevOps practitioners
from APM software provides both a baseline of typical application to practice continuous application delivery in the cloud or on
performance and record of anomalous behavior or performance premises. When infrastructure is treated as code, it’s easy to
degradation. Carefully monitoring APM logs can provide an early share, collaborate, manage version control, perform peer unit
warning to application problems and allow IT and developers to testing, automate deployments, check the status of deployment
remediate issues before users experience significant degradation or and more.
disruption. APM logs also are required to perform post-hoc forensic
Tools like Rundeck are platforms that take automation
analysis of complex application problems that may involve subtle
frameworks like Salt Stack and enable teams to automate states
interactions between multiple machines, network devices or both.
or playbooks to make sure the code is released and reported
Use Cases back to a central reporting tool.
Security and Compliance: Security teams can use APM logs to
Use Cases
perform post-hoc forensic analysis of incidents that span multiple
Application Delivery and DevOps: Automation and configuration
systems and exploit vulnerabilities. The data can be used to
machine data monitoring helps application delivery teams deliver
correlate security indications between the system and application
applications faster without sacrificing stability or security.
activities. It also helps to identify SQL/API calls/CMD made in
relation to suspicious activity, or abnormal amounts of sessions or
CPU load in relation to security activity.
APPLICATION DATA
Examples: Data from Nexus, Artifactory, delivered through APIs, Use Case: Application Delivery and DevOps
webhooks; Yum, Pacman and Aptly data delivered through logs
Examples: Jenkins, Bamboo, TravicCI, TeamCity machine data
A binary repository is a tool for downloading and storing binary ingested through APIs, logs, webhooks
files used and created in software development. It’s used to store
software binary packages, artifacts and their corresponding Build platforms, like Jenkins and Bamboo, enable a continuous
metadata. They’re different from source code repositories, as integration practice that allows application delivery teams —
binary repositories do not store source files. Searching through including developers, DevOps practitioners, QA and release
these repositories is possible by analyzing associated metadata. engineering — to build artifacts, trigger new builds and
environments, automate tests and more.
Use Cases
Application Delivery and DevOps: Analyzing binary repository Use Cases
data helps application delivery teams and release managers Application Delivery and DevOps: Build systems monitoring
to ensure that the final deployment of code to production helps release managers, test and QA teams understand the
is successful. health of their build environment, the status of tests, get insights
into stack traces and build queues. This visibility helps remediate
build or test bottlenecks and increase the application delivery
velocity and quality.
APPLICATION DATA
Examples: Github, GitLab Use Case: Application Delivery and DevOps
For all but the most trivial implementations, application source Examples: Docker
code consists of dozens if not hundreds of interrelated files.
The complexity and volatility of code — particularly when Container logs are an efficient way to acquire logs generated
using agile development methodologies and changes are made by applications running inside a container. By utilizing logging
daily — makes keeping track of it virtually impossible without a drivers, output that is usually logged is redirected to another
structured, automated source code management and revision target. Since logging drivers start and stop when containers
control system. start and stop, this is the most effective way of capturing
machine data, given the often limited lifespan of a container.
Originally built as client-server applications where developers
checked in code to a central repository, today’s systems (such Container metrics contain details related to CPU, memory, I/O
as Git) are often distributed, with each developer working from and network metrics generated by a container. By capturing
a local copy of the full repository and changes synchronized this data, you have the opportunity to spot specific containers
across all subscribers to a particular project. Code management that appear to consume more resources than others — enabling
systems provide revision control (the ability to back out changes faster, more precise troubleshooting.
to an earlier version), software build automation, configuration
Use Cases
status records and reporting, and the ability to branch or fork all
Application Delivery and DevOps: Acquiring container log
or part of a source-code tree into a separate subproject with its
files gives developers and operations teams insight on errors,
own versioning.
issues and availability of applications running inside containers.
Use Cases Logs and metrics at the container level also call attention
Application Delivery: The version records of code management to containers whose performance is outside of expected
can help IT operations teams identify application changes parameters. As a result, admins can “kill” or “stop” a container
that are causing system problems, such as excessive resource instance, and “run” a new container in its place.
consumption or interference with other applications.
APPLICATION DATA
all layers of their Kubernetes environment and the underlying
Use Case: Application Delivery and DevOps infrastructure. This broad view helps operators monitor and
manage the health of containerized environments, oversee
Examples: Kubernetes, Amazon ECS2, Azure Container Services,
services migrating to Kubernetes, and quickly diagnose any
Docker Swarm, Google Container Engine
issues with the infrastructure, the orchestration platform itself,
Container orchestration tools provide an enterprise-level or the container.
framework for automating container deployments and
For example, operators can look into an under-performing pod
integrating and managing containerized applications at scale.
then to the metrics for the workload running in that pod and
Container orchestration tools like Kubernetes are important
view its neighbors allowing for more context than just container
for ensuring the speed, availability, scaling and networking of
level metrics and logs. Since particular problems in container
containerized environments. Like container metrics, it’s
environments can often be hard to find, this context is critical for
important to collect container orchestration metrics at high-
teams to correlate patterns — reducing mean time to clue and
resolutions due to their self-healing, ephemeral nature.
expediting root cause analysis. This is particularly helpful during
The most popular container orchestration platform is Kubernetes. troubleshooting when DevOps teams need to quickly pinpoint
Kubernetes metrics contain details related to the inventory, which service is causing a sudden spike in latency or error rate
health and performance of container resources (cluster maps, and why. This comprehensive view also assists with resource
node state, pod status, container status, namespace status, optimization and capacity planning.
workload deployments details, etc.) along with aggregated system
metrics (CPU, disk, memory, network) across nodes. By visualizing
and correlating this data, you have the opportunity to keep track
of infrastructure inventory, capacity, and cost and investigate
underlying issues across your Kubernetes environment leading
to failures — expediting troubleshooting.
Business Applications data flows that provide consistent information across back-
end digital business processes. ERP systems are typically built
Use Cases: Security and Compliance, Application Delivery, on a relational database management system with a variety
Business Analytics of modules and customizations for specific functions such as
supplier relationship management or supply chain management.
APPLICATION DATA
APPLICATION DATA
Examples: SAP, SFDC, SugarCRM, Oracle, Microsoft Dynamics Due to their complexity, ERP systems often are installed and
managed by product specialists.
Business Applications can create a wealth of data as part of
normal operations. Two examples are CRM and ERP applications: Use Cases
Security and Compliance: CRM records can help security teams
Customer relationship management (CRM) systems have
unravel incidents that involve multiple customers and problem
become an essential part of every organization, providing
episodes over a long time span. They can also provide evidence
a central database of all customer contact information,
of a breach, should records be modified outside normal business
communications and transaction details. CRM systems have
processes. In addition, the data can be used to audit access
evolved from simple contact management systems to platforms
records of customer or internal user information.
for customer support and engagement by providing personalized
sales and support information. The same customer support Application Delivery: CRM, ERP, and other business applications
data repository can be used to develop customized marketing are often mission-critical systems that facilitate a variety of
messages and sales promotions. CRM systems are also useful for front and back office processes. The performance of these
application support and enhancement by recording details about applications can impact internal operations. Business application
customer problems with a particular system or application along logs can be used to determine the health of those operations.
with their eventual solution — details that can inform future
application or service updates. Business Analytics: CRM, ERP, and other business applications
facilitate a variety of front and back office processes that span
Enterprise resource planning (ERP) applications are a critical other systems as well. As part of an end-to-end view of those
back-office IT service that provides systematic, automated complex business processes, business application data can help
collection and analysis of a variety of product, supply chain provide insights into the health of business operations.
and logistics data. ERP is used in product planning, tracking
purchases of components and supplies, inventory management,
monitoring and regulating manufacturing processes, managing
logistics, warehouse inventory and shipping, and to monitor and
measure the effectiveness of sales and marketing campaigns.
APPLICATION DATA
Application Delivery to detect without logging the internal state of various application
variables and buffers.
Examples: Custom applications
Similar to APM logs, custom application and debug logs can be
Best practices for application developers require the inclusion of
used to correlate security indications between the system and
debugging code in applications that can be enabled to provide
application activities. It also helps to identify SQL/API calls/CMD
minute details of application state, variables and error conditions
made in relation to suspicious activity, or abnormal amounts of
or exceptions. Debug output is typically logged for later analysis
sessions or CPU load in relation to security activity.
that can expose the cause of application crashes, memory leaks,
performance degradation and security holes. Furthermore, since IT Ops and Application Delivery: Debug output can expose
the events causing a security or performance problem may be application behavior that causes inefficient use of system
spaced over time, logs — along with the problem software — can resources or application failures that can be addressed by
help correlate and trace temporally separated errors to show developers and operations teams. Debug output is useful for
how they contribute to a larger problem. unraveling the internal state of an application that exhibits
performance problems or has been shown to have security
Application debug logs provide a record of program behavior
vulnerabilities, and the data can be helpful in identifying
that is necessary to identify and fix software defects, security
root cause.
vulnerabilities or performance bottlenecks. While test logs
record the output results of application usage, debug logs
provide information about an application’s internal state,
including the contents of variables, memory buffers and
registers; a detailed record of API calls; and even a step-by-
step trace through a particular module or subroutine. Due to
the performance overhead and amount of data produced,
debug logs typically are enabled only when a problem can’t be
identified via test or event logs.
APPLICATION DATA
tracing data can show microservices problems and bottlenecks
Use Case: IT Operations, Application Delivery and DevOps that aren’t visible when looking at each application individually,
especially through service mapping, such as slow DNS resolution
Examples: SignalFx, OpenTelemetry, Zipkin, Jaeger, fluentd
causing a complex web app to bog down as it tries to access
Distributed tracing is a method used to monitor how requests content and modules on many different systems.
flow through your microservices applications by mapping
Distributed tracing allows DevOps teams to see all traces
transaction paths and duration as they propagate across
and spans for an API call and fix underperforming APIs. This
services through trace and span data.
helps teams improve system performance in real-time, before
Popular open source distributed tracing instrumentation tools downstream effects impact customers. APM tools can expose
like OpenTelemetry record and publish operation data useful which transaction spans deviated from the norm while showing
for finding sources of latency and errors within a distributed correlation to code and infrastructure for deeper root cause
system — illuminating the relationship between user-visible analysis and troubleshooting. Since teams can visualize tracing
behavior and the complex mechanics of the microservices data in real-time, this information improves time to market by
underneath. APM software tools metricize information collected making it easy to immediately see how updates and rollouts to
through these instrumentation tools to provide actionable services impact applications.
insights on performance problems drilling down into specific
service-level details.
APPLICATION DATA
Examples: Exchange, Office 365 Examples: Static Analysis and Unit Testing logs (SonarQube, Tox,
APPLICATION DATA
IT Ops: Email messages and activity logs can be required • How much technical debt and issues are they resolving?
to maintain compliance with an organization’s information • How ready is their next release?
security, retention and regulatory compliance processes. Mail
• From unit testing — how many tests were performed per hour
server transaction and error logs also are essential debugging
and what tests are being run?
tools for IT problem resolution and also may be used for
usage-based billing.
If test coverage data is combined with build data, release
managers can start monitoring build and release performance
and start understanding the release quality. They can understand
the trends in error percentage and make decisions on if the build
is ready for production. Understanding code quality can also help
support teams get prepared for any additional volume of calls or
any particular issues that may arise.
APPLICATION DATA
Examples: AWS Lambda, Google Cloud Functions (GCF), Azure • Availability of applications running on serverless with point in
Functions, OpenShift Serverless time information about current state of functions like average
latency and total number of function cold starts.
Event-driven, serverless computing platforms also known as
• Usage on concurrency for availability and cost planning. Teams
functions-as-a-service (FaaS) allow IT and DevOps practitioners
can increase the amount of concurrency during times of high
to practice continuous application delivery without the need
demand and lower it, or completely turn it off, when demand
to perform administrative tasks required to provision and
decreases in real-time.
manage infrastructure. With FaaS, developers write single-
purpose functions that are triggered and scaled on demand • Errors with visibility and insights into failed invocations so
by events emitted from services so teams can focus on writing developers can remediate issues before users are impacted.
and delivering business critical applications. It makes it easy • Compute duration — time from when your function code
to automate processes, control costs, autoscale services starts executing as the result of an invocation to when it stops
and APIs, and promote collaboration across teams writing executing for deeper understanding into costs.
specialized applications in different languages. However, the
• How functions are supporting business and customer
“statelessness” and ephemerality of functions make monitoring
experience including user requests, checkout abandonment,
their performance almost impossible without real-time,
revenue per location, etc.
contextual solutions.
• Trends and breakdowns of functions by account, region, etc.
for deeper root cause analysis.
APPLICATION DATA
agents to gain entry to a particular system or entire network.
Examples: ncircle IP360, Nessus The data can used to identify:
An effective way to find security holes is to examine • System misconfiguration causing security vulnerability.
infrastructure from the attacker’s point of view. Vulnerability
• Outdated patches.
scans probe an organization’s network for known software
defects that provide entry points for external agents. These • Unnecessary network service ports.
scans yield data about open ports and IP addresses that can be • Misconfigured filesystems, users or applications.
used by malicious agents to gain entry to a particular system or
• Changes in system configuration.
entire network.
• Changes in various user, app or filesystem permissions.
Systems often keep network services running by default, even
when they aren’t required for a particular server. These running,
unmonitored services are a common means of external attack,
as they may not be patched with the latest OS security updates.
Broadscale vulnerability scans can reveal security holes that
could be leveraged to access an entire enterprise network.
Middleware Data
MIDDLEWARE DATA
Examples: log4j, log4php
Use Cases
Security and Compliance: Security breaches are often the
result of improper handling of unexpected inputs, such as buffer
overflow exploits or data injection used in cross-site scripting
attacks. This type of low-level vulnerability is almost impossible
to detect without logging the internal state of various application
variables and buffers. Since the events causing a security or
performance problem may be spaced over time, logs, along with
the problem software, can help correlate and trace temporally
separated errors to show how they contribute to a larger
problem. Anomalies in the logs can indicate potential failures or
compromised attempts. The data can also help:
MIDDLEWARE DATA
Examples: Tibco, Software AG, Apache Active MQ, Kafka, Given the array of always-active sensors on mobile devices, they
AMQP, MQTT are veritable gushers of data that can include:
Middleware describes a software layer of the prototypical • Physical parameters such as location, network MAC ID, device
three-tier enterprise application that typically implements GUID, device type and OS version.
data transformations, analysis and business logic. Middleware • Network settings such as address, AP or cell-base station
accesses databases for persistent storage and relies on web location, link performance.
apps for the user interface. Middleware is often developed on
• Application-specific telemetry such as time in app, features
the J2EE platform.
used and internal state and debug parameters similar to those
Use Cases provided by conventional application servers.
Security and Compliance: Since middleware generally accesses
network services and sensitive databases, security teams can
Use Cases
Security and Compliance: Security teams can expand
use log data to vet application integrity, identify suspicious
the threat landscape by monitoring mobile device data for
behavior and specific vulnerabilities. It can also be used for user
abnormal activity in regards to authentication, location and
and customer transaction monitoring and to identify abnormal
application usage.
transactions, unknown user interaction with third party accounts,
and the sequence of exact transaction patterns that match
IT Ops and Application Delivery: Since mobile apps invariably
known fraudulent profiles.
connect to one or more backend services, data from the client’s
point of view can provide insight into the app’s condition and
IT Ops and Application Delivery: Middleware data can help
state when investigating issues such as crashes, performance
operations teams diagnose problems with three-tier applications
degradation or security leaks. Mobile data shows the sequence
that involve the interaction between web, middleware and
of events and the application conditions leading up to and during
database servers.
a problem. If the source of the problem is the mobile application
itself, getting insight on mobile application data can help
developers deliver a better performing mobile app.
Examples: Java J2EE, Apache, Application Usage Logs, IIS logs, nginx potential cross-sales promotions.
MIDDLEWARE DATA
Web servers are the backend application behind every website Use Cases
that delivers all content seen by browser clients. Web servers Security and Compliance: Web logs record error conditions such as
access static HTML pages and run application scripts in a variety of a request to access a file without appropriate permissions and also
languages that generate dynamic content and call other applications track user activity that can flag security attacks such as attempted
such as middleware. unauthorized entry or DDoS. It can also help to identify SQL injections
and support correlating fraudulent transactions.
Web servers can vary widely, and can include:
• Since Java apps frequently access network services and sensitive
• Java – J2EE: Java is the most popular programming language due databases, security teams can use log data to vet the integrity
to its versatility, relative ease of use and rich ecosystem of developer of J2EE apps, identify suspicious application behavior and
tools. Via the J2EE platform, which includes APIs, protocols, SDKs application vulnerabilities.
and object modules, Java is widely used for enterprise apps including
• Apache web logs can alert to security attacks such as attempted
web applets, middle-tier business logic and graphic front ends. Java
unauthorized entry, XSS, buffer overflows or DDoS.
is also used for native Android mobile apps.
• Like web logs, generic application usage logs can alert security
• Apache: Apache is one of the oldest and most-used web servers teams to unauthorized access such as someone consuming more
on the internet, powering millions of enterprise, government and resources than normal, or using applications at odd hours.
public sites. Apache keeps detailed records of every transaction:
every time a browser requests a web page, Apache log details IT Ops and Application Delivery: Web logs are critical in debugging
include items such as the time, remote IP address, browser type both web application and server problems, but also are used to
and page requested. Apache also logs various error conditions such generate traffic statistics that are useful in capacity planning. Web
as a request for a missing file, attempts to access a file without server data can provide varying information for IT operations teams:
appropriate permissions or problems with an Apache plug-in
• J2EE data can help operations teams diagnose problems with
module. Apache logs are critical in debugging both web application
three-tier applications that involve the interaction between web,
and server problems, but are also used to generate traffic statistics,
middleware and database servers.
track user behavior and flag security attacks such as attempted
unauthorized entry or DDoS. • In aggregate, Apache web logs can show activity of a web service.
Drilling into details can reveal infrastructure bottlenecks and
• Application Usage Logs: Like Apache web logs, collecting indicate downstream issues.
application usage can provide valuable information to multiple
• Application usage logs can help IT operations teams with
stakeholders including developers, IT, sales and marketing.
infrastructure capacity planning, optimization, load balancing
Depending on how granular the measurement, usage tracking can
and usage-based billing by providing detailed records of
assist developers in identifying application features that are most
resource consumption.
NETWORK DATA
Examples: Stream, PCAP, bro
Use Cases
Security and Compliance: Packet Capture logs (PCAP) see
everything traversing a network and are required to identify
security attacks and incidents such as advanced persistent
threats, data exfiltration, DDoS and malware. DPI also can be
used to filter content subject to an organization’s terms of
service. PCAP data can also be used to provide and identify:
Examples: DHCP Insight, Linux DHCP Examples: BIND, PowerDNS, Unbound, Dnsmasq, Erl-DNS
NETWORK DATA
NETWORK DATA
DHCP is the network protocol most client devices use to The domain name system (DNS) is the internet’s phone book,
associate themselves with an IP network. Implemented via a providing a mapping between system or network resource
DHCP server, which could be standalone or embedded in a router names and IP addresses. DNS has a hierarchical name space
or other network appliance, DHCP provides network clients with that typically includes three levels: a top-level domain (TLD) such
critical network parameters including IP address, subnet mask, as .com, .edu or .gov; a second-level domain such as “google”
network gateway, DNS servers, WINS or other name servers, time or “whitehouse;” and a system level such as “www” or “mail.”
servers (NTP), a host and domain name and the address of other DNS nameservers operate in this hierarchy either by acting as
optional network services. authoritative sources for particular domains, such as a company
or government agency, or by acting as caching servers that store
Use Cases DNS query results for subsequent lookup by users in a specific
Security and Compliance: DHCP logs show exactly which location or organization; for example, a broadband provider
systems are connecting to a network, their IP and MAC caching addresses for its customers.
addresses, when they connect and for how long. This information
is useful in establishing the state of a network when a security Use Cases
incident occurs and tracing an attacker’s address back to a time Security and Compliance: Security teams can use DNS logs to
of access and type of device by looking at the MAC ID and vendor investigate client address requests such as correlating lookups
identification string. The data can also be used to support user with other activity, whether requests are made for inappropriate
network access verification. or otherwise suspicious sites and relative popularity of individual
sites or domains. Since DNS servers are a frequent target of
IT Ops: DHCP logs can be used when troubleshooting a client DDoS attacks, logs can reveal an unusually high number of
device that is having network problems, since it provides a requests from external sources. Likewise, since compromised
definitive record of the device’s primary IP parameters. The data DNS servers themselves are often used to initiate DDoS
may show that the DHCP server itself is at fault; for example, by attacks against other sites, DNS logs can reveal whether an
not properly vending addresses, renewing IP leases or giving the organization’s servers have been compromised. DNS data can
same address to two separate devices. also provide detection of unknown domains, malicious domains
and temporary domains.
Examples: McAfee ePO, Symantec SEP Examples: Palo Alto, Cisco, Check Point
NETWORK DATA
Endpoint security is used to protect corporate networks from Firewalls demarcate zones of different security policies.
inadvertent attacks by compromised devices using untrusted By controlling the flow of network traffic, firewalls act as
remote networks such as hotspots. By installing clients on gatekeepers collecting valuable data that might not be captured
laptops or other wireless and mobile devices, endpoint security in other locations due to the firewall’s unique position as the
software can monitor activity and provide security teams with gatekeeper to network traffic. Firewalls also execute security
warnings of devices attempting to spread malware or pose policy and thus may break applications using unusual or
other threats. unauthorized network protocols.
In this context, endpoint refers to the security client software Use Cases
or agent installed on a client device that logs security-related Security and Compliance: Firewall logs provide a detailed
activity from the client OS, login, logout, shutdown events and record of traffic between network segments, including source
various applications such as the browser (Explorer, Edge), mail and destination IP addresses, ports and protocols, all of which
client (Outlook) and Office applications. Endpoints also log their are critical when investigating security incidents. The data may
configuration and various security parameters (certificates, local also reveal gaps in security policy that can be closed with tighter
anti-malware signatures, etc.), all of which is useful in post-hoc construction of firewall rules. Firewall data can help identify
forensic security incident analysis. and detect:
NETWORK DATA
Examples: OSSEC, Getwatchlist, UTBox, Security Onion, Use Case: Security and Compliance
NETWORK DATA
NETWORK DATA
NETWORK DATA
Examples: Local Traffic Manager, Cisco Load Balancer, Citrix, Use Case: Security and Compliance
Kemp Technologies, Radware AppDirector OnDemand
Examples: Aruba ClearPass, Cisco ACS
Load balancers allocate external network traffic bound for a
particular server or application across multiple redundant Network access or admission control is a form of client/
instances. There are two categories of load balancer: local, in endpoint security that uses a locally installed software agent
which all resources in a load-balanced pool are on the same to pre-authorize connections to a protected network. NAC
subnet; and global or distributed, where the resource pool is screens client devices for contamination by known malware and
spread across multiple sites. Load balancers use several user- adherence to security policies such as running an approved OS
selectable algorithms to allocate traffic including: with the most recent patches. Clients failing NAC screens are
rerouted to an isolated quarantine network until any detected
• Round robin (systems get an equal number of connections problems are corrected.
allocated sequentially).
Use Cases
• Weighted round robin (where the load is assigned according to
Security and Compliance: NAC software collects data about
the percentage weight assigned each system in a pool).
the connecting clients such as an inventory of installed client
• Least connections (where new connections go to the system software, compliance with security policies, OS and application
with the fewest number of existing clients). patch versions, accessibility by remote access clients and user
• Weighted least connections (where the connection handling access to protected networks. NAC logs provide security teams
capacity of each system is taken into account when with a detailed profile of a client’s state and activity. It can
determining the least busy system for new connections). provide details into unauthorized device connections and be
used to correlate users/IP to a physical network location.
• Random (connections are randomly assigned to each member
of a pool).
Use Cases
IT Ops: Load balancer logs provide operations teams with a
record of overall traffic to systems or particular applications and
provide indicators of each system’s traffic-handling capacity and
health, along with the status and health of the load balancer itself.
NETWORK DATA
EHNT, BPFT show anomalous traffic patterns and flow destinations that
are indicative of a breach, such as an APT phoning home to a
Network protocols describe the structure of data that flows
command and control server for instructions, additional malware
through networks. In most cases, network ports are assigned to
code, or copying large amounts of data to an attacker’s system.
specific protocols for both security and performance reasons.
The data can also be used to detect traffic related to DDoS,
Some protocols operate at a lower level of the computing stack
malicious domains, and unknown domains or locations.
and are used to direct packet routing, such as TCP, UDP or IP.
Other protocols, such as HTTP, HTTPS and TNS describe how IT Ops: Network protocol traffic analysis can help determine
packets are structured for applications — such as web services, the network’s role in overall availability and performance of
databases and a wide range of client-based applications. By critical services. Application traffic can be monitored for usage,
capturing, decrypting and analyzing network protocol data, performance, availability and can provide visibility into specific
you can better understand the kinds of applications, their user data. For applications that cannot be instrumented on
usage, performance and even payload (content of the data) the servers, network traffic may be the only way to acquire
of applications. Since this data can be gathered directly from performance data.
a network tap, or with specialized software, it provides a
perspective on applications and how they interoperate that may
not be otherwise available.
Examples: Routers from Cisco, Juniper, Linksys, Arista, Examples: Ethernet Switch, Virtual Switches
NETWORK DATA
NETWORK DATA
Extreme Networks, Avaya
Switches are network intersections, places where packets
If switches are network intersections, then routers are the signal move from one network segment to another. In their purest
lights and traffic cops — the devices responsible for ensuring form, switches work within a particular IP subnet and can’t route
that traffic goes to the right network segment. Unlike switches Layer 3 packets to another network. Modern data center designs
that operate at Layer 2, routers work at Layer 3, directing traffic typically use a two-tier switch hierarchy: top-of-rack (ToR)
based on TCP/IP address and protocol (port number). Routers switches connecting servers and storage arrays at the edge
are responsible for particular Layer 3 address spaces and and aggregation or spine switches connecting to the network
manage traffic using information in routing tables and configured core. Although ethernet switches are far more widespread, some
policies. Routers exchange information and update their organizations also use fiber channels or infiniband for storage
forwarding tables using dynamic routing protocols. area networks or HPC interconnects, each of which has its own
type of switch.
Use Cases
Security and Compliance: Routers collect the same sort of Use Cases
traffic logs and statistics as switches; thus, their data is equally Security and Compliance: Switch data, often captured as
valuable to security teams as a source for flagging advanced NetFlow records, is a critical data source for flagging advanced
persistent threats, analyzing traffic flows for unusual activity and persistent threats, analyzing traffic flows for unusual activity
identifying potential data exfiltration. As a wire-level data source, and identifying potential data exfiltration. As a wire-level data
router statistics are almost impossible to spoof and thus a critical source, switch statistics are almost impossible to spoof and thus
source of security data. Router data can also be used to detect a crucial source of security data. This data can also be used to
configuration changes, and error or failure alerts correlating with correlate users or IP addresses to a physical network location.
security indicators.
IT Ops: Operations teams use switch logs to see the state of
IT Ops: Network engineers use router logs and statistics to traffic flow, such as source and destination, class of service and
monitor traffic flow and ensure that traffic is being correctly causes of congestion. Logs also can show traffic statistics in the
forwarded between network segments. Data from routing aggregate, by port and by client, and whether particular ports are
protocol updates can show whether your routers are congested, failing or down.
appropriately exchanging route tables with other locations, that
external traffic can reach you, and that internal traffic is correctly
forwarded to external routers.
Examples: Blue Coat, Fortinet, Juniper IDP, Netscreen Firewall, Examples: Asterisk CDR, Asterisk event, Asterisk messages
NETWORK DATA
NETWORK DATA
Palo Alto Networks, Palo Alto Networks config, Palo Alto Networks
system, Palo Alto Networks threat, Palo Alto Networks traffic, nginx Voice over IP protocol refers to several methods for transmitting
real-time audio and video information over an IP-based data
Network proxies are used in several ways in IT infrastructure: network. Unlike traditional phone systems using dedicated, point-
as web application accelerators and intelligent traffic direction, to-point circuits, VoIP applications use packet-based networks
application-level firewalls, and content filters. By acting as a to carry real-time audio streams that are interspersed with other
transparent ‘bump-in-the-wire’ intermediary, proxies see the entire ethernet data traffic. Since TCP packets may be delivered out of
Layer 7 network protocol stack, which allows them to implement order due to data loss and retransmission, VoIP includes features
application-specific traffic management and security policies. to buffer and reassemble a stream. Similarly, VoIP packets are
usually tagged with quality of service (QoS) headers to prioritize
Use Cases their delivery through the network.
Security and Compliance: Security teams are interested in
proxies as application-layer firewalls. Here, proxy records can Use Cases
identify details about specific content traversing network control Security and Compliance: VoIP deployments may expose
points including file names, types, source and destination, and organizations to potential security threats, and analyzing VoIP
metadata about the requesting client such as OS signature, logs can help identify and prevent these exploits.
application and username/ID (depending on the proxy
implementation). The data can also be used to help detect IT Ops: VoIP logs provide troubleshooting and usage data similar
command and control traffic, malicious domain traffic and to that of other network applications. Details include source,
unknown domain traffic. destination, time and duration of calls, call quality metrics
(e.g., packet loss, latency, audio fidelity/bit rate) and any error
Web proxies and some next generation firewalls may act in conditions. Integrating VoIP source/destination records with an
a transparent or explicit mode communicating with HTTP(S) employee database such as AD or LDAP and a DHCP database
servers on behalf of a client. Using a number of related allows linking call records to actual people and IP addresses to
technologies, the request and response can be inspected and physical locations; information that can assist in troubleshooting
permitted, or blocked, based on user role, site or resource and billing.
category or attack indicator. Data logged in the events can
potentially be used in detective correlation.
NETWORK DATA
Ruckus Idera, Ipswitch suspected of malicious activity.
The simple network management protocol (SNMP) is one of the The data can also help identify abnormal amounts of traffic to
oldest, most flexible and broadly adopted IP protocols used for a certain site or domain, an abnormal amount of specific SNMP
managing or monitoring networking devices, servers and virtual traps from a certain host, and an abnormal number of unique
appliances. This includes network devices such as routers and SNMP traps from hosts compared to normal profiles.
switches, as well as non-networking equipment such as server
hardware or disk arrays. IT Ops: SNMP data can provide current information about
performance, configuration and current state. This allows the
SNMP supports two different methods of obtaining data. monitoring of the “normal” state of the environment, which is vital
when using a service-level approach to monitoring the health
• SNMP Traps are essentially alerts, set to send an alert on a
of any environment. This could include current speed of all of
state change, critical threshold, hardware failure, and more.
the ports on a switch, the number of bytes sent (per port or in
Traps are initiated by the SNMP device, and the trap is sent to
aggregate) through a router, the CPU temperature of a server,
an SNMP collector.
and any other information made available by the vendor per the
• SNMP Polling is an interactive query/response approach. SNMP MIBs for that device.
Unlike traps, polling is initiated by the SNMP collector in the
form of a request for certain, or all, SNMP data available on the Many environments rely on SNMP traps for alerting when a
SNMP device. critical state is reached (e.g., CPU temperature is critical) or when
a failure occurs (e.g., RAID disk failure). SNMP traps are not only
Although many now provide vendor-specific APIs for remote sent by devices to monitoring systems, in some environments
management and data collection, SNMP is still valuable in SNMP traps are the de-facto method for multiple monitoring and
troubleshooting due to its ubiquity (nearly every device supports alerting systems to aggregate errors to a single console.
it) and inherently centralized design (a single instance of SNMP
management software can collect data from every device on an
internal network, even across route domains).
Operating
System Data
Every OS records details of its operating conditions and
errors, and these time-stamped logs are the fundamental
and authoritative source of system telemetry. Depending on
the OS, there may be separate logs for different classes of
events, such as routine informational updates, system errors,
boot loader records, login attempts and debug output. Error
logs often aggregate records from multiple subsystems and
OS services or daemons, and, thus, are a definitive source of
troubleshooting information.
Use Cases
Security and Compliance: System logs include a variety of
security information such as attempted logins, file access and
system firewall activity. These entries can alert security teams
to network attacks, a security breach or compromised software.
They also are an invaluable source of information in forensic
analysis of a security incident. For example, the data can be used
to identify changes in system configurations and commands
executed by users or privileged users.
Measures of system activity such as CPU load, memory and IT Ops and Application Delivery: Performance logs provide
disk usage, and I/O traffic are the IT equivalent of EKGs to a a real-time indication of system health by showing resource
doctor: the vital signs that show system health. Recording these usage that, when compared with historical norms, flags
measures provides a record of system activity over time that performance problems. When measurements deviate from
shows normal, baseline levels and unusual events. By registering standard or typical parameters, it’s a warning for IT admins to
myriad system parameters, performance logs also can highlight do further investigation.
mismatches between system capacity and application
requirements, such as a database using all available system
memory and frequently swapping to disk.
Virtual
Examples: CloudTrail, CloudWatch, Config, S3
Infrastructure
infrastructure, providing on-demand compute, storage,
database, big data and application services with consumption-
based pricing. AWS can be used to replace traditional enterprise
Data
virtual server infrastructure in which software runs on individual
virtual machines (VM) or to host cloud-native applications
built from a collection of AWS services. AWS includes a host
of service management, automation, security, network and
monitoring services used to deploy, scale, decommission, audit
and administer one’s AWS environment, subscriptions and
hosted applications.
Use Cases
Security and Compliance: Security data from AWS services
includes login and logout events and attempts, API calls and logs
from network and web application firewalls.
Use Cases: Security and Compliance, IT Operations Examples: WADLogs, WADEventLogs, WADPerformanceCounter,
VIRTUAL INFRASTRUCTURE DATA
Configuration Data and that item. Datastore latency, virtual or physical CPU utilization,
and over 100 other metrics fall into this category. As with the
Performance Metrics inventory information, this information is not present in the log
VIRTUAL INFRASTRUCTURE DATA
Infrastructure
much of which has legal and regulatory requirements regarding
its preservation. Backups also can be used to store multiple
versions of system images and data, allowing organizations to
Use Cases
IT Ops: Backup systems routinely log activity and system
conditions, recording information such as job history, error
conditions, backup target and a detailed manifest of copied files
or volumes. This data allows operations teams to monitor the
health of backup systems, software and jobs; triggers alerts in
the case of errors; and assists in debugging backup failures. It
also allows teams to locate where specific data may be stored,
when a recovery is required.
Mainframes are the original business computer: large, centralized Examples: Abbott Laboratories, Apple, Baxter, Boston Scientific,
latest bug fixes and security patches is an essential task that can access to facilities. Historically, these have been simple magnetic
prevent unplanned downtime, random application crashes and strips affixed to employee badges; however, locations with
security breaches. Although commercial apps and operating stringent security requirements may use some form of biometric
systems often have embedded patching software, some reader or digital key. Regardless of the technology, the systems
organizations use independent patch management software compare an individual’s identity with a database and activate
to consolidate patch management and ensure the consistent doors when the user is authorized to enter a particular location.
application of patches across their software fleet and to build As digital systems, badge readers record information such as
patch jobs for custom, internal applications. user ID, date and time of entry and perhaps a photo for each
access attempt.
Patch management software keeps a patch inventory using a
database of available updates and can match these against an Use Cases
organization’s installed software. Other features include patch Security and Compliance: For IT security teams, the data from
scheduling, post-install testing and validation and documentation card readers provide the same sort of access information for
of required system configurations and patching procedures. physical locations as a network firewall log. The data can be used
to detect attempted breaches and be correlated to system and
Use Cases network logs to identify potential insider threats and provide
Security and Compliance: Security teams can use patch logs to overall situational awareness. It can also be used to detect
monitor system updates and determine which assets could be at access at unusual times and locations or for unusual durations.
risk, due to failed or out-of-date patches.
IT Ops: Operations teams use patch logs to verify the timely and
correct application of scheduled patches, identify unpatched
systems and applications, and alert to errors in the patching
process. Correlating errors to patch logs can indicate when an
error is due to a patch.
Gimbal, MonsoonRF, Radius Networks, STMicroelectronics, to capture RFID data in a way that makes it simpler to track
TAGSYS RFID, ThingMagic events involving anything that has an attached RFID tag. Data
insights from RFID can help improve overall supply chain, order
The two primary wireless methods organizations use today
processing and inventory management.
to keep track of objects and interact with customers in retail
stores involve two distinct types of wireless communications BLE, meanwhile, is used to engage customers more directly as
technologies. The better known is radio-frequency optimization they move about a specific location, which in turn creates data
(RFID), which involves the use of tags capable of storing that can be used to optimize the customer experience.
information such as product information or what goods might be
loaded in a shipping container. Business Analytics: Whether it’s inventory tracked using RFID
tags or customers and employees moving around specific
At the same time, organizations are adopting Bluetooth Low locations, new classes of analytics applications are using the
Energy (BLE) wireless connectivity solutions that can broadcast data generated by these devices to serve up actionable business
signals to other devices. BLE is used most widely in beacons that insights in near real time. Retailers can leverage this data for
are employed, for example, to inform shoppers of new sales in several use cases, such as making sure that inventory is located
retail stores on their smartphones or update fans on events that as close as possible to the locations where customers are most
might be occurring during a sporting event. likely to want to purchase.
Use Cases
Security and Compliance: Sensor data can help protect
mission-critical assets and industrial systems against
cybersecurity threats by providing visibility into system
performance or set points that could put machines or
people at risk. Data can also be used to satisfy compliance
reporting requirements.
Examples: Boeing, BMW, Ford, GE, General Motors, Daimler-Benz, Examples: ARM, Intel, Lenovo, Microsoft, Samsung
Use Cases Going forward, there soon will be whole new classes of wearable
Internet of Things: Vehicle manufacturers are attaching devices taking advantage of everything from virtual reality
sensors to every mechanical and electronic component they applications delivered via a headset to sensors embedded in the
use. This allows companies to gain a unified view of assets latest fashion.
to quickly identify and diagnose operational issues, and to
monitor, track and avoid unplanned asset downtime. This helps Business Analytics: As more people become comfortable
to ensure that equipment is operating as intended. They can with sharing data via wearable devices, many are experiencing
also detect anomalies and deviations from normal behavior the power of analytics firsthand. Developers of applications
to take corrective action — improving uptime, asset reliability optimized for wearables are making recommendations
and longevity. concerning everything from how to improve life expectancy
to where to find a meal. Analytics from wearables can help
Business Analytics: With access to machine data, vehicle improve user experience and drive product innovation. For
manufacturers are applying analytics in ways that fundamentally example, product managers can understand how consumers are
changes their business models. Instead of selling a vehicle, interacting with devices to build better features.
manufacturers increasingly prefer to lease vehicles based on
actual usage. The longer that vehicle can be used between
repairs, the more profitable that leasing service becomes.
The key to providing this type of service economically is
advanced analytics, which are applied to all the aggregate data
that’s collected.
Additional Data
Sources
Databases are the fundamental elements of information
collection, storage and analysis of digital information. Databases
are categorized as either relational, in which data is organized in
spreadsheet-like tables of columns and rows, or NoSQL (non-
relational), where information is organized purely by columns
(column store) as key-value pairs, by unstructured documents or
interconnected graphs linking related data elements.
Use Cases
Security and Compliance: Database logs provide security
teams information about the accounts or systems accessing
tables or other database elements. Correlating database access
and transaction logs with identity management system records
can flag unauthorized access or access attempts to databases.
Database logs can also expose security holes such as open ports
or dormant, unused admin accounts, and help identify abnormal
queries or users, and abnormal database/table access.
Business Service
logs that track activity across multiple systems used in a
particular process can highlight anomalies that may indicate
ADDITIONAL DATA SOURCES
Performance Data
Use Cases
Security and Compliance: By aggregating data from users
around the world, third-party security lists provide security
teams with real-time information about nascent threats and
vulnerabilities that allow updating security policies, firewall rules
and vulnerable software before an attack. Lists also are used to
identify known sources of spam, both commercial and malware-
infested, to improve the effectiveness of filters on internal
email systems.
Free Trial
Splunk, Splunk> and Turn Data Into Doing are trademarks and registered trademarks of Splunk Inc. in the United States and
other countries. All other brand names, product names or trademarks belong to their respective owners. © 2022 Splunk Inc.
All rights reserved.
22-13476-Splunk-Essential-Guide-to-Data-EB-111