Search Tool Looks Inward To Tap System Logs - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Enterprise Applications

Search Tool Looks Inward To Tap System Logs

Splunk 2.1 adds features that mimic another Google practice: furnishing command line APIs to the search engine so third parties can write independent applications that exploit its capabilities.

Think of Splunk as Google for systems administrators, a search tool that looks inward instead of out.

The latest version of the 9-month-old tool, released last week, hunts down problems found in log data culled from companies' IT systems. And Splunk 2.1 adds a feature that mimics another Google practice: furnishing command line APIs to the search engine so third parties can write independent applications that exploit its capabilities.

LogLogic, LogRhythm, and EMC's Network Intelligence offer competing products that collect logged data, but they're positioned more as instruments that help companies capture server information needed to comply with industry standards and government regulations rather than troubleshooting tools.

As developers independently write applications that incorporate Google, Yahoo, and other search engines into applications for the Web, such as mapping apps, software writers can use Splunk's APIs to create, for instance, a Flash application that monitors real-time security threats and visually pinpoints the source of an attack. Another possible use of Splunk's search capability would be as a visual tool for a marketer that depicts major sites blocking its outbound e-mail, as indexed in the marketer's internal IT systems logs.

The new Splunk release can run on multiple servers, with search results merged and presented in an interactive Ajax Web user interface. It requires 40% less storage capacity for indexing and storing original log and IT data than the last version. Splunk CEO Michael Baum contends the tool is up to five times faster than conventional log technologies and log appliances and can work more quickly if needed since it can run on clustered servers. Indexing speeds range from 20,000 to 120,000 events per second on a single server.

Pricing is based on the peak daily volume, starting at $2,500 a year for indexing 512 Mbytes of raw, uncompressed data each day. It scales to 1,000 Gbytes for $300,000 a year.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
InformationWeek Is Getting an Upgrade!

Find out more about our plans to improve the look, functionality, and performance of the InformationWeek site in the coming months.

Commentary
New Storage Trends Promise to Help Enterprises Handle a Data Avalanche
John Edwards, Technology Journalist & Author,  4/1/2021
Slideshows
11 Things IT Professionals Wish They Knew Earlier in Their Careers
Lisa Morgan, Freelance Writer,  4/6/2021
Commentary
How to Submit a Column to InformationWeek
InformationWeek Staff 4/9/2021
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Successful Strategies for Digital Transformation
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll