Splunk Systems Administration (Level 1) (TTDPL05)

COURSE OUTLINE:

Description

Splunk System Administration is a hands-on Splunk training course that prepares system administrators to configure and manage Splunk. Topics include foundation level coverage of installation, configuring data inputs and forwarders, data management, user accounts, licenses, and troubleshooting and monitoring. The focus in this class is the knowledge, best practices, and configuration details for Splunk administration in a medium to large distributed deployment environment.�

This course is an independent content (not Splunk certified), foundation level Splunk administration class. Students with more advanced troubleshooting, performance or environmental concerns might consider more advanced training.

Audience

Attendees of this course should be familiar with how to use Splunk to a basic level, and should be able to perform searching and reporting with Splunk.� Please note that this course is a foundation level Splunk administration class.

Learning Objectives

Working within in an engaging, hands-on learning environment, guided by our expert practitioner, students will explore:�

  • Installation
  • License management
  • Getting data in
  • Managing Splunk apps
  • Splunk configuration files
  • Universal forwarder and forwarder management
  • Data inputs in detail
  • Index administration, maintenance and optimization
  • Users, roles, and authentication
  • Event Parsing with data preview
  • Manipulating raw data
  • Field extraction
  • Distributed search
  • Search performance tuning
  • Introduction to large-scale Splunk

Session 1 - Splunk Overview

  • Splunk overview
  • Identify Splunk components
  • Identify Splunk system administrator role

Session 2 - License Management

  • Identify license types
  • Describe license violations
  • Add and remove licenses

Session 3 - Splunk Apps

  • Describe Splunk apps and add-ons
  • Install an app on a Splunk instance
  • Manage app accessibility and permissions

�

Session 4 - Splunk Configuration Files

  • Describe Splunk configuration directory structure
  • Understand configuration layering process
  • Use btool to examine configuration settings

�

Session 5 - Splunk Indexes

  • Describe index structure
  • List types of index buckets
  • Create new indexes
  • Monitor indexes with Monitoring Console

�

Session 6 - Search Head Cluster

  • Apply a data retention policy
  • Backup data on indexers
  • Delete data from an index
  • Restore frozen data

�

Session 7 - Splunk User Management

  • Describe user roles in Splunk
  • Create a custom role
  • Add Splunk users

�

Session 8 - Splunk Authentication Management

  • Integrate Splunk with LDAP
  • List other user authentication options
  • Describe the steps to enable Multifactor Authentication in Splunk

�

Session 9 - Basics of Data

  • Describe the basic settings for an input
  • List Splunk forwarder types
  • Configure the forwarder
  • Add an input to UF using CLI

�

Session 10 - Distributed Search

  • Describe how distributed search works
  • Explain the roles of the search head and search peers
  • Configure a distributed search group
  • List search head scaling options

�

Session 11 - Introduction to Data Administration

  • Splunk overview
  • Identify Splunk data administrator role

�

Session 12 - Getting Data In - Staging

  • List the four phases of Splunk Index
  • List Splunk input options
  • Describe the band settings for an input

�

Session 13 - Configuring Forwarders

  • Understand the role of production Indexers and Forwarders
  • Understand the functionality of Universal Forwarders and Heavy Forwarders
  • Configure Forwarders
  • Identify additional Forwarder options

�

Session 14 - Forwarder Management

  • Explain the use of Forwarder Management
  • Describe Splunk Deployment Server
  • Manage forwarders using deployment apps
  • Configure deployment clients
  • Configure client groups
  • Monitor forwarder management activities

�

Session 15 - Monitor Inputs

  • Create file and directory monitor inputs
  • Use optional settings for monitor inputs
  • Deploy a remote monitor input

�

Session 16 - Network and Scripted Inputs

  • Create network (TCP and UDP) inputs
  • Describe optional settings for network inputs
  • Create a basic scripted input

�

Session 17 - Agentless Inputs

  • Identify Windows input types and uses
  • Understand additional options to get data into Splunk
  • HTTP Event Collector
  • Splunk App for Stream

Session 18 - Fine Tuning Inputs

  • Understand the default processing that occurs during input phase
  • Configure input phase options, such as sourcetype fine-tuning and character set encoding

�

Session 19 - Parsing Phase and Data

  • Understand the default processing that occurs during parsing
  • Optimize and configure event line breaking
  • Explain how timestamps and time zones are extracted or assigned to events
  • Use Data Preview to validate event creation during the parsing phase

�

Session 20 - Manipulating Raw Data

  • Explain how data transformations are defined and invoked
  • Use transformations with props.conf and transforms.conf to:
  • Mask or delete raw data as it is being indexed
  • Override sourcetype or host based upon event values
  • Route events to specific indexes based on event content
  • Prevent unwanted events from being indexed
  • Use SEDCMD to modify raw data

�

Session 21 - Supporting Knowledge Objects

  • Create field extractions
  • Configure collections for KV Store
  • Manage Knowledge Object permissions
  • Control automatic field extraction

�

Session 22 - Creating a Diag

  • Identify Splunk diag
  • Using Splunk diag