New Keyword App

One of the most common requests I get from new customers is that they want to centrally collect all their machine generated time series data and search for a keyword like error or RuntimeException. Obviously Splunk can do this. Then, the next set of questions concern things like give me the top hosts or applications producing this keyword, show me a baseline of last week vs this week for this keyword, show me a slope line on the trend for this or any keyword(s), find outliers that go beyond the average occurrences for the keyword and then try to predict what may happen in the future.

To answer these questions and then some, I’ve created an app template that you can download from Splunkbase and simply install the Keyword App. The app has no inputs as it uses your own indexed data. You can modify the default indexes for the role that uses the app in Manager to include indexes beyond main. Usually, what I do next in these blog entries is describe how to use the app. However, in this case, a picture is worth a thousand words. Rather than continue to entertain you with my prose, I’ll simply embed the the self explanatory dashboards here.

Top Host, Sourcetype, Source

Top Host, Sourcetype, and Source for Keyword

Comparing Present Count vs. Past Count

Slope for Trend

Find Outliers

Predict Future Counts (Recession Predict is Jack Coate’s idea)

There’s a Donut Chart (Ron Naken’s Module) that allows you to split your list of keywords by top 10 host, source, or sourcetypes and see the distribution of events.

Split Keyword(s) Distribution by Top 10 Hosts, Source, or Sourcetype

Here are rare events based on your filter:

Rare

Finally, here are rare events based on punctuation.

Punct

Conclusion

Hopefully, this template will satisfy all your needs out of the box. If you need to modify the searches, make a copy of the app’s default/data/ui/views/<dashboard>.xml file and put it into the app’s local/data/ui/views/<dashboard>.xml file and edit your local copy. I’m hoping this app will save you some time from configuring these common tasks.

Related Articles

Take a SIP: A Refreshing Look at Subject Interface Packages
Security
10 Minute Read

Take a SIP: A Refreshing Look at Subject Interface Packages

Splunker Michael Haag dives into Subject Interface Packages (SIPs) and their role in Windows security, exploring how SIPs can be exploited by malicious actors to bypass security measures and sign malicious code.
Splunk SOAR 6.2 Introduces New Automation Features, Workload Migration, and Firewall Integrations
Security
3 Minute Read

Splunk SOAR 6.2 Introduces New Automation Features, Workload Migration, and Firewall Integrations

Announcing the release of Splunk SOAR 6.2 with features like logic loops for playbooks, integrations with CyberArk, two new firewall apps, and a new conversion option for classic playbooks.
Staff Picks for Splunk Security Reading November 2023
Security
3 Minute Read

Staff Picks for Splunk Security Reading November 2023

Splunk security experts share their list of presentations, whitepapers, and customer case studies from November 2023 that they feel are worth a read.
Using eval to Calculate, Appraise, Classify, Estimate & Threat Hunt
Security
5 Minute Read

Using eval to Calculate, Appraise, Classify, Estimate & Threat Hunt

This article discusses a foundational capability within Splunk — the eval command. Need to pick a couple commands for your desert island collection? eval should be one!
Using RegEx for Threat Hunting (It’s Not Gibberish, We Promise!)
Security
4 Minute Read

Using RegEx for Threat Hunting (It’s Not Gibberish, We Promise!)

Another excellent tool for your threat hunting: RegEx! SPL offers two commands for utilizing regular expressions in Splunk searches. See how to do it here.
Compliance Essentials for Splunk 2.1.0
Security
8 Minute Read

Compliance Essentials for Splunk 2.1.0

Announcing the latest on Compliance Essentials for Splunk, an essential part of your toolkit to help your organization maintain and monitor your compliance status and cyber resiliency with various frameworks.
Stat! 3 Must-Have Data Filtering Techniques
Security
6 Minute Read

Stat! 3 Must-Have Data Filtering Techniques

To hunt for threats, there's a lot of data you do NOT need. Here are the 3 must-have data filtering techniques so you can hunt those threats STAT!
Enhance Security Resilience Through Splunk User Behavior Analytics VPN Models
Security
5 Minute Read

Enhance Security Resilience Through Splunk User Behavior Analytics VPN Models

This blog introduces new machine learning models in Splunk UBA for VPN connection monitoring to enhance WFH security resilience.
More Than Just a RAT: Unveiling NjRAT's MBR Wiping Capabilities
Security
10 Minute Read

More Than Just a RAT: Unveiling NjRAT's MBR Wiping Capabilities

The Splunk Threat Research Team (STRT) provides a deep-dive analysis of NjRAT (or Bladabindi), a Remote Access Trojan (RAT) discovered in 2012 that's still active today.