Splunk for Beginners: FREE Security Lab with Botsv3 Dataset (Dashboards, Alerts & Queries!)
- BlueDolphin
- May 24
- 3 min read
If you're looking to break into cybersecurity or level up your blue team skills, learning Splunk is a smart move. But forget boring slideshows—this guide is all about hands-on practice.
In this tutorial, we’ll walk through how to install Splunk Enterprise on Windows, load up a juicy real-world dataset from Boss of the SOC (BOTS) v3, and start running useful searches, alerts, and dashboards right away.
Whether you're prepping for a security analyst role or just want to get better with log analysis, this post has you covered.
✅ What You’ll Learn
Installing Splunk Enterprise (Free!)
Importing the BOTS v3 dataset (Free)
Performing your first real searches
Building dashboards from security logs
Setting up alerts for brute force and ransomware
Want more step-by-step labs, security walkthroughs, and Splunk content?
📺 Watch the full video on YouTube💬 Leave a comment if you get stuck🔔 Don’t forget to like & subscribe—it really helps!
1. Install Splunk Enterprise (Yes, It’s Free!)
Go to the official Splunk download page and grab the Windows version. It says 60-day trial, but you’ll be prompted to continue using it even after that period expires.
After installing, just open your browser and visit:

Log in with your credentials and you’re in!
2. Load Real Security Data with BOTS v3
To make your Splunk experience real and relevant, download the Boss of the SOC v3 dataset from this GitHub repository.
Setup Steps:
Download and unzip the BOTS v3 files
Ingest them into Splunk (instructions are on the repo)
Search:
index=botsv3
Set your time range to All time to make sure everything loads properly.
Now you’ve got real-world logs at your fingertips—no fake data here.
3. First Search: Let’s Find Some Errors
Start simple:
index=botsv3 error
This will return all events with the word error. To get more granular, use fields like host or source.
Example:
index=botsv3 host="serverless" error
Need to exclude something (like AWS logs)? Use NOT:
index=botsv3 error NOT sourcetype="aws:cloudtrail"

4. Analyze with Stats and Timecharts
Want to see how often different log types appear?
index=botsv3 | stats count by sourcetype
Or use a timechart to track trends over time:
index=botsv3 | timechart count by sourcetype

These commands are great for spotting spikes, anomalies, or trends across your security environment.
5. Investigate Authentication Events with Transactions
Want to monitor login attempts and correlate them over time? Use transaction:
index=botsv3 sourcetype="WinEventLog:Security" (EventCode=4624 OR EventCode=4625) | transaction host, AccountName maxspan=30m | table _time AccountName host EventCode duration

This will show login successes and failures, grouped by host and user within a 30-minute window—perfect for spotting brute-force attempts.
6. Build a Splunk Dashboard (No Coding Required)
Dashboards make it easier to visualize your data.
How to Build One:
Go to the Dashboards tab
Click Create New Dashboard
Give it a name like “Host Authentication Attempts”
Choose Classic Dashboard for simplicity
Click Add Panel > New > Line Chart
Input your SPL search (like the one above)
Save the panel

Now you’ve got a real-time dashboard showing live security insights.
7. What’s Next?
Try creating alerts for:
Multiple failed logins from a single IP
Suspicious behavior patterns
Rare event codes
With a solid dataset and these fundamentals, you’re not just using Splunk—you’re thinking like a security analyst.
💡 Final Thoughts
Splunk is one of the most in-demand tools in cybersecurity. By starting with hands-on experience using real-world data, you’ll build skills that actually matter on the job.
Want more step-by-step labs, security walkthroughs, and Splunk content?
📺 Watch the full video on YouTube💬 Leave a comment if you get stuck🔔 Don’t forget to like & subscribe—it really helps!
#SplunkTutorial #CyberSecurityTraining #SOCAnalyst #SplunkForBeginners #BlueTeam #SecurityAnalytics #SIEM #SplunkDashboards #ThreatDetection #SplunkSPL #CyberSecurityLab #SecurityLogs #HandsOnCyberSecurity #RansomwareDetection #BruteForceDetection