Summary
In this chapter, we talked about how Splunk monitors data inputs and how to take advantage of Splunk's alerting ability. We also detailed various topics such as Splunk monitoring, pointing to data, forwarders, Windows inputs in Splunk, input typing, and the data pipeline. We dived deeper into the Splunk Deployment Monitor app's download and installation, alerts, and other actions. Disabling, deleting, and cloning alerts and adjusting other permissions were shown subsequently.
In the next chapter, we will define and describe Splunk transactions from an enterprise's perspective.