New Keyword App

One of the most common requests I get from new customers is that they want to centrally collect all their machine generated time series data and search for a keyword like error or RuntimeException. Obviously Splunk can do this. Then, the next set of questions concern things like give me the top hosts or applications producing this keyword, show me a baseline of last week vs this week for this keyword, show me a slope line on the trend for this or any keyword(s), find outliers that go beyond the average occurrences for the keyword and then try to predict what may happen in the future.

To answer these questions and then some, I’ve created an app template that you can download from Splunkbase and simply install the Keyword App. The app has no inputs as it uses your own indexed data. You can modify the default indexes for the role that uses the app in Manager to include indexes beyond main. Usually, what I do next in these blog entries is describe how to use the app. However, in this case, a picture is worth a thousand words. Rather than continue to entertain you with my prose, I’ll simply embed the the self explanatory dashboards here.

Top Host, Sourcetype, Source

Top Host, Sourcetype, and Source for Keyword

Comparing Present Count vs. Past Count

Slope for Trend

Find Outliers

Predict Future Counts (Recession Predict is Jack Coate’s idea)

There’s a Donut Chart (Ron Naken’s Module) that allows you to split your list of keywords by top 10 host, source, or sourcetypes and see the distribution of events.

Split Keyword(s) Distribution by Top 10 Hosts, Source, or Sourcetype

Here are rare events based on your filter:

Rare

Finally, here are rare events based on punctuation.

Punct

Conclusion

Hopefully, this template will satisfy all your needs out of the box. If you need to modify the searches, make a copy of the app’s default/data/ui/views/<dashboard>.xml file and put it into the app’s local/data/ui/views/<dashboard>.xml file and edit your local copy. I’m hoping this app will save you some time from configuring these common tasks.

Related Articles

Ensuring Success with Splunk ITSI - Part 1: Thresholding Basics
Security
8 Minute Read

Ensuring Success with Splunk ITSI - Part 1: Thresholding Basics

Practical step-by-step guidance to configure ITSI to produce accurate and trusted alerts
Splunk Named a Leader in Gartner SIEM Magic Quadrant for the Fifth Straight Year
Security
2 Minute Read

Splunk Named a Leader in Gartner SIEM Magic Quadrant for the Fifth Straight Year

Gartner's 2017 Magic Quadrant for Security Information and Event Management names Splunk a leader for the fifth straight year
What’s Cyber Security Week like for Splunk? it-sa gold!
Security
1 Minute Read

What’s Cyber Security Week like for Splunk? it-sa gold!

Two gold awards and a successful it-sa event - that's how Splunk does Cyber Security Week!
What You Need to Know About Boss of the SOC
Security
3 Minute Read

What You Need to Know About Boss of the SOC

We introduced a new security activity at .conf2016 called “Boss of the SOC” (or BOTS), born from our belief that learning can be both realistic and fun.
The GDPR: Ready for the wakeup call from your Data Privacy Officer?
Security
1 Minute Read

The GDPR: Ready for the wakeup call from your Data Privacy Officer?

How machine data can help organisations prepare for GDPR and support their compliance programmes
What hygiene has to do with security: Infosec17 Recap
Security
2 Minute Read

What hygiene has to do with security: Infosec17 Recap

In a wrap up of Infosecurity Europe 2017, Matthias Maier shares the topics, trends and big win of the week.
Splunk and Tensorflow for Security: Catching the Fraudster with Behavior Biometrics
Security
8 Minute Read

Splunk and Tensorflow for Security: Catching the Fraudster with Behavior Biometrics

Raising the barrier for fraudsters and attackers: how to leverage Splunk and Deep Learning frameworks to discover Behavior Biometrics patterns within user activities
Punycode phishers - All you need to know
Security
2 Minute Read

Punycode phishers - All you need to know

Unicode domains can be used for homograph attacks. Learn what they are and how users can be tricked.
Assigning Role Based Permissions in Splunk Enterprise Security
Security
2 Minute Read

Assigning Role Based Permissions in Splunk Enterprise Security

Learn how to add a new role in Enterprise Security and apply capabilities to it