{"id":366,"date":"2017-08-16T10:56:22","date_gmt":"2017-08-16T10:56:22","guid":{"rendered":"https:\/\/dbsysonline.in\/?page_id=366"},"modified":"2017-09-27T09:32:08","modified_gmt":"2017-09-27T09:32:08","slug":"machine-data","status":"publish","type":"page","link":"https:\/\/dbsysonline.in\/index.php\/machine-data\/","title":{"rendered":"Machine Data"},"content":{"rendered":"<div id=\"pl-366\"  class=\"panel-layout\" ><div id=\"pg-366-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-366-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-366-0-0-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"0\" >\t\t\t<div class=\"textwidget\"><\/div>\n\t\t<\/div><\/div><div id=\"pgc-366-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-366-0-1-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"1\" ><h3 class=\"widget-title\">What is Machine Data<\/h3>\t\t\t<div class=\"textwidget\"><p>Big data can be broken down into two broad categories: human-generated digital footprints and machine data. The  newer categories of data such as logs, network, clickstream, and social media becoming part of the mainstream data analysis done by enterprises to make better business decisions. These types of data are sometimes also known as machine data.<br \/>\nMachine Data is   the fastest growing and complex areas of big data and  also graded as  the most valuable that contains  a definitive record of all user transactions, customer behavior, machine behavior, security threats, fraudulent activity and more.<\/p>\n<\/div>\n\t\t<\/div><\/div><div id=\"pgc-366-0-2\"  class=\"panel-grid-cell\" ><div id=\"panel-366-0-2-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"2\" >\t\t\t<div class=\"textwidget\"><\/div>\n\t\t<\/div><\/div><\/div><div id=\"pg-366-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-366-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-366-1-0-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"3\" >\t\t\t<div class=\"textwidget\"><\/div>\n\t\t<\/div><\/div><div id=\"pgc-366-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-366-1-1-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"4\" ><h3 class=\"widget-title\">Machine Data With Splunk<\/h3>\t\t\t<div class=\"textwidget\"><p>Splunk makes it easy to collect all of these log files , even though they are not considered structured, as there is no upfront schema for the data, there are no custom connectors, and in general you don\u2019t have to use a relational database<br \/>\nSplunk Provides.<br \/>\nSearching, which allows drilling down into the data to troubleshoot issues and incidents that facilitate the root cause analysis.<br \/>\nReal-time visibility, by which you can monitor and alert your system as a whole, allowing tracking of Service Level Agreements (SLAs) and performance issues<br \/>\nHistorical analysis, by which you can find trends and historical patterns, behavior baselines and thresholds, and produce compliance reports.<\/p>\n<\/div>\n\t\t<\/div><\/div><div id=\"pgc-366-1-2\"  class=\"panel-grid-cell\" ><div id=\"panel-366-1-2-0\" class=\"so-panel widget widget_text panel-first-child panel-last-child\" data-index=\"5\" >\t\t\t<div class=\"textwidget\"><\/div>\n\t\t<\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>What is Machine Data Big data can be broken down into two broad categories: human-generated digital footprints and machine data. The newer categories of data<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-366","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dbsysonline.in\/index.php\/wp-json\/wp\/v2\/pages\/366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbsysonline.in\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dbsysonline.in\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dbsysonline.in\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dbsysonline.in\/index.php\/wp-json\/wp\/v2\/comments?post=366"}],"version-history":[{"count":8,"href":"https:\/\/dbsysonline.in\/index.php\/wp-json\/wp\/v2\/pages\/366\/revisions"}],"predecessor-version":[{"id":492,"href":"https:\/\/dbsysonline.in\/index.php\/wp-json\/wp\/v2\/pages\/366\/revisions\/492"}],"wp:attachment":[{"href":"https:\/\/dbsysonline.in\/index.php\/wp-json\/wp\/v2\/media?parent=366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}