Choosing a Cybersecurity Professional Services (PS) provider is similar to choosing any other professional provider. Think about how you would go about choosing a doctor, lawyer, or mechanic. Would you look at reviews? Seek out referrals? Conduct brief phone interviews? The process for choosing a PS provider is largely the same. In this article, we’ll […]
In a Splunk environment, Splunk operations are controlled by configuration files (conf files). Configuration of the file settings are essential to the proper running of the Splunk instance. In this article, we walk through how to properly configure the file settings to ensure that your Splunk instance is running optimally.
Did you know that all Splunk Knowledge Objects (KO) generated during a search are maintained in memory? Sure, any one KO in itself doesn’t take up a lot of memory, but run a search that returns 10 million events… You can do the math!