Splunk Development

  • Splunk Overview
  • Why use Splunk?
  • Splunk developer roles and responsibilities
  • Creating a search query in Splunk
  • Use auto-complete to create a search
  • Time span
  • Filter your search
  • Event Management
  • Recognizing the search’s contents
  • Managing a Job Search
  • What is a Field
  • How to use Fields in search
  • Deploying Fields Sidebar and Field Extractor for REGEX field extraction
  • Delimiting Field Extraction using FX
  • Writing Splunk query for search
  • Sharing, saving
  • Scheduling and exporting search results
  • How to create alerts, Understanding alerts, Viewing fired alerts
  • Creating the reports, Configuring the reports, Finetuning the reports
  • Scheduling the reports
  • Creating search charts, reports and dashboards
  • Editing reports and dashboards
  • Adding reports to dashboards
  • Introduction to Tags in Splunk
  • Deploying Tags for Splunk search
  • Understanding event types and utility
  • Generating and implementing event types in search
  • Macro Overview
  • What are variables and arguments in Macros
  • Studying the search command
  • The general search practices
  • What is a search pipeline
  • How to specify indexes in search
  • Highlighting the syntax
  • Deploying the various search commands like fields, tables,
  • sort, rename, rex and erex
  • Creating get, post and search workflow actions
  • Use top, rare and stat commands
  • Using following commands and their functions: addcoltotals, addtotals, top, rare and stats
  • Iplocation, geostats, geom and addtotals commands
  • Calculating and analyzing results
  • Value conversion
  • Roundoff and format values
  • Using the eval command
  • Conditional statements
  • Filtering calculated search results
  • Explore the available visualizations
  • Create charts and time charts
  • Omit null values and format results
  • How to search the transactions
  • Creating report on transactions
  • Grouping events using time and fields
  • Comparing transactions with stats
  • Learning data lookups
  • Examples and lookup tables
  • Defining and configuring automatic lookups
  • Deploying lookups in reports and searches
  • Describe pivot
  • Relationship between data model and pivot
  • Select a data model object
  • Create a pivot report
  • Create instant pivot from a search
  • Add a pivot report to dashboard
  • Working with raw data for data extraction, transformation, parsing and preview
  • Data Retention configuration
  • Splunk CIM Overview
  • Utilizing the CIM Add-On to normalize data

Splunk Administration Course Curriculum

  • Introduction to the architecture of Splunk
  • Various server settings
  • How to set up alerts
  • Various types of licenses
  • Important features of Splunk tool
  • The requirements of hardware and conditions needed for installation of Splunk
  • How to install and configure Splunk
  • The creation of index
  • Standalone server’s input configuration
  • The preferences for search
  • Linux environment Splunk installation
  • The administering and architecting of Splunk
  • How to install Splunk in the Linux environment The conditions needed for Splunk
  • Configuring Splunk in the Linux environment
  • Data inputs
  • App management
  • Splunk important concepts
  • Parsing machine-generated data
  • Search indexer and forwarder
  • Splunk distributed management console
  • Indexing of clusters
  • How to deploy distributed search in Splunk environment
  • Forwarder management
  • User authentication and access control
  • Introduction to the Splunk app
  • How to develop Splunk apps
  • Splunk add-on, important configs
  • Splunk app management Splunk app add-ons
  • Using Splunk-base for installation and deletion of apps
  • Different app permissions and implementation
  • How to use the Splunk app
  • Apps on forwarder
  • Index time configuration file
  • The search time configuration file
  • Understanding of Index time and search time configuration files in Splunk
  • Forwarder installation
  • Input and output configuration
  • Universal Forwarder management
  • Splunk Universal Forwarder highlights
  • Understanding the Splunk Indexes
  • The default Splunk Indexes
  • Segregating the Splunk Indexes
  • Learning Splunk Buckets and Bucket Classification
  • Estimating Index storage
  • Creating new Index
  • Implementing the Splunk tool
  • Deploying it on the server
  • Splunk environment setup
  • Splunk client group deployment
  • Exploring the concept of role inheritance
  • Splunk authentications
  • Native authentications
  • LDAP authentications
  • Splunk Configuration Files
  • Exploring the Universal Forwarder and Forwarder Management
  • Understanding about the management, troubleshooting, and monitoring
  • Converting machine-generated data into operational intelligence
  • Setting up the dashboard, reports, and charts
  • Integrating Search Head Clustering and Indexer Clustering
  • Exploring the Splunk input methods
  • Deploying scripted, Windows and network
  • Agentless input types and fine-tuning them all
  • Splunk user authentication and job role assignment
  • Understanding on how to manage, monitor and optimize Splunk Indexes
  • Exploring about the parsing of machine-generated data
  • Manipulation of raw data
  • Previewing and parsing
  • Data field extraction
  • Comparing single-line and multi-line events
  • Distributed search concepts
  • Improving search performance
  • Large-scale deployment and overcoming execution hurdles
  • Working with Splunk Distributed Management Console for monitoring the entire operation
  • Exploring the Cluster indexing
  • Understanding about the configuring individual nodes
  • Configuring the cluster behaviour, index, and search behaviour
  • Setting node type to handle different aspects of the cluster like master node, peer node and search head.

PRACTICE TEST AND INTERVIEW QUESTIONS

At CYBERVZN trainings, we provide practice tests at the end of the course, Splunk interview question and answers, Community question and answers, and Sample Resumes to crack the interview.