New Keyword App

One of the most common requests I get from new customers is that they want to centrally collect all their machine generated time series data and search for a keyword like error or RuntimeException. Obviously Splunk can do this. Then, the next set of questions concern things like give me the top hosts or applications producing this keyword, show me a baseline of last week vs this week for this keyword, show me a slope line on the trend for this or any keyword(s), find outliers that go beyond the average occurrences for the keyword and then try to predict what may happen in the future.

To answer these questions and then some, I’ve created an app template that you can download from Splunkbase and simply install the Keyword App. The app has no inputs as it uses your own indexed data. You can modify the default indexes for the role that uses the app in Manager to include indexes beyond main. Usually, what I do next in these blog entries is describe how to use the app. However, in this case, a picture is worth a thousand words. Rather than continue to entertain you with my prose, I’ll simply embed the the self explanatory dashboards here.

Top Host, Sourcetype, Source

Top Host, Sourcetype, and Source for Keyword

Comparing Present Count vs. Past Count

Slope for Trend

Find Outliers

Predict Future Counts (Recession Predict is Jack Coate’s idea)

There’s a Donut Chart (Ron Naken’s Module) that allows you to split your list of keywords by top 10 host, source, or sourcetypes and see the distribution of events.

Split Keyword(s) Distribution by Top 10 Hosts, Source, or Sourcetype

Here are rare events based on your filter:

Rare

Finally, here are rare events based on punctuation.

Punct

Conclusion

Hopefully, this template will satisfy all your needs out of the box. If you need to modify the searches, make a copy of the app’s default/data/ui/views/<dashboard>.xml file and put it into the app’s local/data/ui/views/<dashboard>.xml file and edit your local copy. I’m hoping this app will save you some time from configuring these common tasks.

Related Articles

Splunk BOTS 4.0: A New Hope
Security
3 Minute Read

Splunk BOTS 4.0: A New Hope

From the basics, to new data, to registration information, discover all you need to know about Splunk BOTS 4.0 at .conf19.
Which of Gartner’s 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business? - Part II
Security
3 Minute Read

Which of Gartner’s 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business? - Part II

Part 2 of our 3-part blog series, in which we take a closer look into Gartner Security and Risk Trends 2019 and give you suggestions on how to address them.
Which of Gartner’s 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business? - Part III
Security
2 Minute Read

Which of Gartner’s 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business? - Part III

Last and final part of our 3-part blog series in which we review Gartner's Security and Risk Trends 2019 and give advise on how to tackle them.
Which of Gartner’s 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business?
Security
2 Minute Read

Which of Gartner’s 2019 Top 7 Security and Risk Management Trends Are Impacting Your Business?

In this 3-part series, we take a closer look into Gartner's trends and share how you can address these issues.
New: Machine Learning in Splunk Enterprise Security Content Update
Security
3 Minute Read

New: Machine Learning in Splunk Enterprise Security Content Update

Use machine learning techniques to identify outliers in security-related data with a new probability-density function algorithm in Splunk's Machine Learning Toolkit (MLTK)
Monitor for, Investigate, and Respond to Phishing Payloads with Splunk Enterprise Security Content Update
Security
4 Minute Read

Monitor for, Investigate, and Respond to Phishing Payloads with Splunk Enterprise Security Content Update

Detect, investigate, and defend signs of phishing payloads in your environment with Splunk Enterprise Security Content Update (ESCU)
Boss of the SOC (BOTS) Advanced APT Hunting Companion App: Now Available on Splunkbase
Security
3 Minute Read

Boss of the SOC (BOTS) Advanced APT Hunting Companion App: Now Available on Splunkbase

If you want to learn more about threat hunting with Splunk, this app in conjunction with the BOTSv2 data set is just the answer!
Threat Intel and Splunk Enterprise Security Part 2 - Adding Local Intel to Enterprise Security
Security
4 Minute Read

Threat Intel and Splunk Enterprise Security Part 2 - Adding Local Intel to Enterprise Security

Splunker John Stoner shares a walkthrough for how to add local threat intelligence into Splunk Enterprise Security
Boss of the SOC 2.0 Dataset, Questions and Answers Open-Sourced and Ready for Download
Security
2 Minute Read

Boss of the SOC 2.0 Dataset, Questions and Answers Open-Sourced and Ready for Download

You asked, we delivered – Boss of the SOC 2.0 has been open sourced, including dataset, questions, answers and even a scoring server update!