Splunk Search

Real time log data for splunk

Hi guyz,
I'm new to splunk and log management. I wanted to get hands on real time monitoring commands that splunk supports. For that I need real time log data. Where can I find such data. Is it available in windows or i'll have do download from internet.
Thanks.
Regards,
Yusuf

0 Karma

Contributor

Welcome to Splunk Yusuf,.
splunk keeps updating ur data into index as the logs are generated.

splunk uses reverse chronological time sort, which means Latest event first and earliest next.

While searching for events,
it can be either for searching,saved search are Alerting, etc..
alt text
As the data is parsed it triggers a alert
eg: if any security event is generated it must shoot up a alert where,
latest time:Now (Real time)

people talks about Real-time which is nothing but Latest event..

Keep splunking .. 🙂

Legend

I don't know what you mean by "real time log data." When you configure Splunk to monitor a file, it reads the data, parses it and places the events in the index. Splunk then monitors the file and watches for new events being appended to the log. As new events are added, they too are parsed and indexed. This does happen in real time.

All you need to do is to figure out what you want to monitor in your environment and the set up the appropriate input to collect the data.

If you are new to Splunk, you can practice with the Splunk tutorial.

Thank you for your reply.
By real time log data I mean a log file where new events are written to the log file every second or 2-5 seconds.

0 Karma