Key Features
- Get this detailed, highly practical guide to help you perform efficient administration with Splunk
- This use case rich guide connects your complex administration needs with the best possible solution
- Using hands-on examples, you’ll get prepared for the Splunk administration exam
Book Description
With the increasing focus on machine data, otherwise referred to as big data, Splunk software offers a vast, investigative platform that allows you to get broad business insights and real-time security intelligence. Acquiring and mastering best administration practices from the beginning of your installation and onward will not only empower you by increasing your knowledge, but will also help ensure the time you dedicate to this advantageous software is worthwhile.
This book aims to take your limited knowledge of Splunk administration to the next level by teaching you how to fully utilize the power of various components, troubleshoot complex configuration, and manage the overall Splunk environment efficiently. This step-by-step guide will take you through the basics of Splunk administration and beyond into other crucial areas, such as monitoring and securing your Splunk installation.
With this book, you will learn how to create, deploy, and manage multisite clusters for high availability. Moreover, you'll delve into the intermediate and advanced functionality of forwarder management, application deployment best practices, and optimizing search options. The combination of instructions and real-world examples throughout this book will ensure your Splunk administration success.
What you will learn
- From installation to monitoring, best practices, and configuration details, get to know everything you need to know to become Splunk admin certified
- Design an environment to work in and analyze machine generated data with the Splunk base and apps
- Evaluate when to cluster a Splunk indexer
- Set up and utilize forwarders to retrieve data from your system
- Use the Splunk deployment server to host and deploy apps to various components within the infrastructure
- Improve your Splunk environment’s security by seeing how to limit access and configure various areas of your Splunk infrastructure
- Improve your knowledge of search performance methodology
About the Author
Somesh Soni is a Splunk Consultant with over 11 years of IT experience. He has bachelor’s degree in Computer Science (Hons.) and has been interested in exploring and learning about new technologies throughout his whole life. He has extensive experience in Consulting, Architecture, Administration, and Development in Splunk. He’s proficient in various programming languages and tools including C#.NET/VB.NET, SSIS, and SQL Server.
Somesh is currently working as a Splunk Master with Randstad Technologies. His activities are focused on Consulting, Implementation, Admin, Architecture, and support-related activities for Splunk. He started his career with the one of the Top three Indian IT giants. He has executed projects for major fortune 500 companies such as Coca-Cola, Wells Fargo, Microsoft, Capital Group, and more. He has worked in various capacities of Technical Architect, Technical Lead, Onsite Coordinator, Technology Analyst, and more.
Somesh has been a great contributor in the Splunk Community work and has consistently been on the top of the list. He is a member of Splunk Trust 2015-16 and overall one of the topmost contributor to Splunk Answers community.
You can find him at https://www.linkedin.com/in/somesh-soni-b6322485.