Index: The repository for data. When the Splunk platform indexes raw data, it transforms the data into searchable events. Indexer : A Splunk Enterprise instance that indexes data, transforming raw data into events and placing the results into an index. It also searches the indexed data in response to search requests. Search head : is the component used for interacting with Splunk. It provides a graphical user interface to users for performing various operations. You can search and query the data stored in the Indexer by entering search words and you will get the expected result. A Splunk search head cluster is a group of Splunk Enterprise search heads that serves as a central resource for searching. As the central source for searching, the cluster is a group of networked searched heads that share configurations, apps, search artifacts, and job scheduling. Telnet : a network protocol that allows a user on one computer to log into another computer that is part of the same network. Server:- A server is simply a computer that listens for incoming requests. Though there are machines made and optimized for this particular purpose, any computer that is connected to a network can act as a server. In fact, you will often use your very own computer as server when developing apps. What are the clients? The clients are anything that send requests to the back-end. They are often browsers that make requests for the HTML and JavaScript code that they will execute to display websites to the end user. However, there are many different kinds of clients: they might be a mobile application, an application running on another server, or even a web enabled smart appliance. Nati Tasew, [10/10/2022 12:33 PM] 2nd Week Assignment ———————————— Using Splunk Technology Add on for Data Onboarding:- 1. Download Splunk_TA_windows from https://splunkbase.splunk.com/app/742. 2. Install the above downloaded file as new app using "install app from file" option in local splunk instance. 3. Navigate to the splunk installed directory (mostly it should be c:\Program Files\splunk) and go inside etc\apps\Splunk_TA_windows\default directory. 4. Edit the inputs.conf file to enable [WinEventLog:Security] and route data to windows index 5. Before step 4, create index Windows using settings->Indexes option. 6. Check the data in Splunk by searching index=Windows Onboard xml data and parse it, use LINE_BREAKER , MUST_BREAK_AFTER 1. Onboard below xml data using Add Data-> upload option 2. Apply event breaking properties so that every book is a new event. Regards, Nitesh Sharma Data Parsing Formate: Timestamp : 2017-08-08 22:38:24 Logging_Priority : 331 Log_Level : INFO Connection_factory : [XYZXYZ] Thread_Number : (httpXYSGHFA 10.100.1234.12-1234-81) Application_Message : 22:38:24,331 INFO [APP_INVOKE_MSG] APP Response [ ID_123SDFBH//-1/NO,RULE.ID:1:1=below minimum value (0) ] Data integration tools are software-based tools that ingest, consolidate, transform, and transfer data from its originating source to a destination, performing mappings, and data cleansing. The tools you add have the potential to simplify your process. ETL tools enable data integration strategies by allowing companies to gather data from multiple data sources and consolidate it into a single, centralized location. ETL tools also make it possible for different types of data to work together. Data warehousing is a technology that aggregates structured data from one or more sources so that it can be compared and analyzed for greater business intelligence Data Warehousing integrates data and information collected from various sources into one comprehensive database. For example, a data warehouse might combine customer information from an organization's point-of-sale systems, its mailing lists, website, and comment cards.