<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk data logs spreadsheet in Reporting</title>
    <link>https://community.splunk.com/t5/Reporting/Splunk-data-logs-spreadsheet/m-p/192780#M10656</link>
    <description>&lt;P&gt;Knowing this level of data requires you to enhance the data with Splunk asset lookups. The simplest approach is to say:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|tstats count by sourcetype source host
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This will give you a count by each piece of metadata, most of which clue you in to what the data is. For example, &lt;CODE&gt;access_combined&lt;/CODE&gt; is a default standard for Apache Web logs. &lt;CODE&gt;WinEventLog:Security&lt;/CODE&gt; is the Windows Security log. If you need to go deeper than that, you will have to tell Splunk (via lookup) what each host in the environment is, what it does, etc....&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jul 2015 12:51:22 GMT</pubDate>
    <dc:creator>alacercogitatus</dc:creator>
    <dc:date>2015-07-06T12:51:22Z</dc:date>
    <item>
      <title>Splunk data logs spreadsheet</title>
      <link>https://community.splunk.com/t5/Reporting/Splunk-data-logs-spreadsheet/m-p/192779#M10655</link>
      <description>&lt;P&gt;I'm new to Splunk - and have been asked to create a spreadsheet that my global company can use to baseline our Proof of Concept (POC), &lt;BR /&gt;
Specifically, how do you identify what you are forwarding e.g. if I wanted to identify specific machines what is the best approach .....to identify the log type or the machine type??????  Would the below be the best approach????  &lt;/P&gt;

&lt;P&gt;And then add for example "firewall with IPS" Under "Security" ???&lt;BR /&gt;
Or "Cisco switch" under "network"?&lt;/P&gt;

&lt;P&gt;Security | Custom Applications | Networks | databases | Servers | Smartphones | Virtual Machines | Web Services | Sensors&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jul 2015 22:57:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/Splunk-data-logs-spreadsheet/m-p/192779#M10655</guid>
      <dc:creator>tacobell</dc:creator>
      <dc:date>2015-07-03T22:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk data logs spreadsheet</title>
      <link>https://community.splunk.com/t5/Reporting/Splunk-data-logs-spreadsheet/m-p/192780#M10656</link>
      <description>&lt;P&gt;Knowing this level of data requires you to enhance the data with Splunk asset lookups. The simplest approach is to say:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;|tstats count by sourcetype source host
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This will give you a count by each piece of metadata, most of which clue you in to what the data is. For example, &lt;CODE&gt;access_combined&lt;/CODE&gt; is a default standard for Apache Web logs. &lt;CODE&gt;WinEventLog:Security&lt;/CODE&gt; is the Windows Security log. If you need to go deeper than that, you will have to tell Splunk (via lookup) what each host in the environment is, what it does, etc....&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2015 12:51:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/Splunk-data-logs-spreadsheet/m-p/192780#M10656</guid>
      <dc:creator>alacercogitatus</dc:creator>
      <dc:date>2015-07-06T12:51:22Z</dc:date>
    </item>
  </channel>
</rss>

