Ed Ferrara, MSIA, CISSP eferrara@temple.edu MIS 5208 Processing and Analyzing Data Ed Ferrara, MSIA, CISSP eferrara@temple.edu.

Slides:



Advertisements
Similar presentations
Welcome to Middleware Joseph Amrithraj
Advertisements

Layer 7- Application Layer
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Design and Implementation of a Server Director Project for the LCCN Lab at the Technion.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Systems Architecture, Fourth Edition1 Internet and Distributed Application Services Chapter 13.
CP476 Internet Computing Browser and Web Server 1 Web Browsers A client software program that allows you to access and view Web pages on the Internet –Examples.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Computer Science 101 Web Access to Databases Overview of Web Access to Databases.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
Linux Operations and Administration
1 Web Developer & Design Foundations with XHTML Chapter 6 Key Concepts.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
Lecturer: Ghadah Aldehim
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
HOW WEB SERVER WORKS? By- PUSHPENDU MONDAL RAJAT CHAUHAN RAHUL YADAV RANJIT MEENA RAHUL TYAGI.
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
Hour 7 The Application Layer 1. What Is the Application Layer? The Application layer is the top layer in TCP/IP's protocol suite Some of the components.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
CSE 6590 Department of Computer Science & Engineering York University 111/9/ :26 AM.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
Multimedia and Networks. Protocols (rules) Rules governing the exchange of data over networks Conceptually organized into stacked layers – Application-oriented.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Module: Software Engineering of Web Applications Chapter 2: Technologies 1.
Form Processing Week Four. Form Processing Concepts The principal tool used to process Web forms stored on UNIX servers is a CGI (Common Gateway Interface)
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
Computer Network Architecture Lecture 6: OSI Model Layers Examples 1 20/12/2012.
Splunk Enterprise Instructor: Summer Partain 3 Day Course.
MIS 5208 Ed Ferrara, MSIA, CISSP Week 11: Visualizing Results With Splunk.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
MIS 5208 Ed Ferrara, MSIA, CISSP Week 11: Processing and Analyzing Data.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
The Web Web Design. 3.2 The Web Focus on Reading Main Ideas A URL is an address that identifies a specific Web page. Web browsers have varying capabilities.
Web and Proxy Server.
ArcGIS for Server Security: Advanced
MIS 5208 Week 10: Getting Data Into Splunk - Searching
Tiny http client and server
Installing TMG & Choosing a Client Type
Instructor Materials Chapter 5 Providing Network Services
Web Concepts Lesson 2 ITBS2203 E-Commerce for IT.
CCNA Routing and Switching Routing and Switching Essentials v6.0
Web Development Web Servers.
Warm Handshake with Websites, Servers and Web Servers:
COMP2322 Lab 2 HTTP Steven Lee Feb. 8, 2017.
MCA – 405 Elective –I (A) Java Programming & Technology
E-commerce | WWW World Wide Web - Concepts
Network Load Balancing
E-commerce | WWW World Wide Web - Concepts
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
Lecture 6: TCP/IP Networking By: Adal Alashban
PHP / MySQL Introduction
CompTIA Server+ Certification (Exam SK0-004)
CS222 Web Programming Course Outline
Topic 5: Communication and the Internet
Chapter 10: Device Discovery, Management, and Maintenance
Multimedia and Networks
Chapter 8: Monitoring the Network
MIS 5208 Week 13: Visualizing Results With Splunk
TCP/IP Protocol Suite: Review
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
The Client Server Model
TCP/IP Protocol Suite: Review
The Client Server Model
Applications Layer Functionality & Protocols
Chapter 7 Network Applications
What’s new ArcGIS 10.1 for Server The Server Framework
Web Servers (IIS and Apache)
Presentation transcript:

Ed Ferrara, MSIA, CISSP eferrara@temple.edu MIS 5208 Processing and Analyzing Data Ed Ferrara, MSIA, CISSP eferrara@temple.edu

Please signup for this training! Temple, as a member school of Internet2, is entitled to free training and certification exams for Splunk Power Users:  http://www.internet2.edu/blogs/detail/10079  If you register and take the courses described in the blog posting yourself, you will have access to the teaching materials in PDF form as part of the elearning course. Reminder

Review Search There are ____ components to the Search and Reporting interface? 5 2 7 1 7

Review Search

Review Search What is the most efficient way to filter events in Splunk? By Time By Host With the admin user In app By Time

Reverse chronological order Review Search When a search is run, events are returned in _________? Chronological order Pdf Alphabetical order Reverse chronological order Reverse chronological order

Transforming Commands Review Search Commands that create statistics or visualizations are called _________? Transforming commands Machine learning commands Math Data science Transforming Commands

Review Search The search & reporting App has how many search modes _________? 2 5 3 4 3

* Review Search Which character acts as a wildcard in Splunk __? ~ % * ! *

AND NOT OR Review Search What are Boolean operators in Splunk __? AND AFTER OR IF AND NOT OR

Data Sources A number of system applications and network devices such as routers switches relay events over network ports using the TCP or UDP protocols. Some applications make use of the SNMP standard to send events over UDP. Syslog, which is a standard for computer data logging is another set of sources where there is a wealth of information that could be captured at a network port level. Splunk can be enabled to accept input from a TCP or UDP port. Use the Splunk Web user interface and configure a network input source where you specify: Host Port Sourcetype Once you save the configuration, Splunk will start indexing the data coming out of the specified network port. This kind of network input can be used to capture syslog information that gets generated on remote machines and the data does not reside locally to a Splunk instance. Splunk forwarders can also be used to gather data on remote hosts.

Windows Data The Windows operating system churns out a number of log files that have information about: Windows events Registry Active Directory WMI Performance Other data. Splunk recognizes Windows log streams as a source type and allows adding one more of these log streams to be indexed as input for further processing. Although Windows sources such as Active Directory or others can be individually configured, Splunk provides a better and easy way of dealing with these Windows logs or events by using: Splunk App for Windows Splunk Technology Add-on for Windows

Windows Technology Add-On On Linux Note:  Windows Technology add-on can be installed on Splunk running on Windows. If you are running Splunk on Linux then the Windows TA can be installed on a forwarder running on a Windows machine. Forwarders are explained later in this chapter and in Chapter 15 of the text.

Splunk also provides similar Technology Add-ons for Linux and Unix known as *Nix. This Add-on makes use of both log files and scripting to get different sets of event and log data available in Linux or Unix into Splunk. You can install *Nix technology on Linux systems

Other Apps

Getting to Know Combined Access Log Data In the real world, enterprises have numerous applications and most of them will be running on a heterogeneous infrastructure, which includes all sorts of hardware, databases, middleware, and application programs. It will not be possible to have Splunk running locally or near to each of the applications or infrastructure, meaning the data will not be local to Splunk. What we have seen in this chapter is how we can get data into Splunk which is local to it. The use cases assumed that Splunk will be able to access files or directories, which could be on local or file systems that have remote data, but they are attached to the machine where Splunk is running. A Splunk forwarder is the same as a standard Splunk instance but with only the essential components that are required to forward data to receivers, which could be the main Splunk instance or indexer.

Processing and Analyzing Data

Processing and Analyzing Data Requirement Understand the data set that you want to process and analyze. Get intimately acquainted with the data you will work with first. Review Log files are generated by almost all kinds of applications and servers: End-user applications Web servers Complex middleware platforms Operating systems and firmware also generate huge amounts of raw data into log files. The challenge lies in understanding, analyzing, and mining the raw data in the log files and making sense out of it.

Preview Data 127.0.0.1 - JohnDoe [10/Oct/2000:13:55:36 -0700] "GET /apache_pb.gif HTTP/1.0" 200 2326 "http://www.google.com" "Opera/9.20 (Windows NT 6.0; U; en)" 127.0.0.1 This is the IP address of the client (the machine, host, or proxy server) that was making an HTTP request to access either a web application or an individual web page. The value in the field could be represented as hostname. - This field is used to identify the client making the HTTP request. The contents of this field are highly unreliable, a hyphen is typically used, which indicates the information is not available. JohnDoe This is the user id of the user who is requesting the web page or an application. 10/Jan/2013:10:32:55 -0800 The timestamp of when the server finished processing the request. The format can be controlled using web server settings. “GET /apache_pb.gif HTTP/1.0” This is the request line that is received from the client. It shows the method information, in this example GET, the resource that the client was requesting, in this case /apache_pb.gif, and the protocol used, in this case HTTP/1.0 200 This is the status code that the server sends back to the client. Status codes are very important information as they tell whether the request from the client was successfully fulfilled or failed, in which case some action needs to be taken. 200 in this case indicates that the request has been successful. 2326 This number indicates the size of the data returned to the client. In this case 2326 bytes were sent back to the client. If no content was returned to the client, this value will be a hyphen.“

Preview Data 127.0.0.1 - JohnDoe [10/Oct/2000:13:55:36 -0700] "GET /apache_pb.gif HTTP/1.0" 200 2326 "http://www.google.com" "Opera/9.20 (Windows NT 6.0; U; en)" “http://www.google.com” This field is known as a referrer field and shows from where the request has been referred. You could be seeing web site URLs like http://www.google.com, http://www.yahoo.com, or http://www.bing.com as the values in the referrer field. Referrer information helps web sites or online applications to see how the users are coming in to the web site and this information could be used to determine where the online advertisement dollars should be spent. As you may notice that referrer has an extra “r”. That is intentional and originated from the original proposal submitted in the HTTP specification. In browsers like Chrome where users can use incognito mode, or have referrers disabled, the values in the field will not be accurate. In HTML5 the user agent that is reporting this information can be instructed not to send the referrer information. “Opera/9.20 (Windows NT 6.0; U; en)” This is the user-agent field, and it has the information that the client browser reports about itself. You will see values like “Opera/9.20 (Windows NT 6.0; U; en)”, which means that the request is coming from an Opera browser running on a Windows NT (actually Windows Vista or Windows Server 2008) operating system. User-agent information helps to optimize web sites and web applications and cater for requests coming from smaller form factor devices such as the iPad and mobile phones.

Look at some of the data…

Lab 4

Load the Data

Load the Data

Load the Data

Load the Data

Load the Data

Load the Data

Load the Data

Load the Data

Load the Data

Load the Data

Load the Data

Search the Data

Chapter 3

List All Fields

List All Fields

List All Fields

List All Fields

List All Fields - CategoryID

List All Fields – date_hour

List All Fields – Time Selection

List All Fields – Average Over Time

Thank you