What do you do if you have a large number of Deployment Servers (DS) and want to separate business units into different serverclasses? In this article, we will discuss steps you can take to adapt your (DS) to your growing organization.
If you work in the cybersecurity sector, you know that the U.S. Department of Defense (DoD) is rolling out a Cybersecurity Maturity Model Certification program, or CMMC, to create stronger cybersecurity standards for contractors working in the DoD supply chain. Over 300,000 firms either currently do business within the Defense Industrial Base (DIB) or intend […]
To say a lot has change in 2020 is an understatement. The world we live in and work in has dramatically changed these past few months and some changes might last even longer. But even in this unpredictable world, we still look at data to help us solve our problems.
Designing Glass Tables and/or Dashboards is a critical element in your ITSI configuration. The correct implementation will help communication to your visualization audience/consumer. Let’s discuss a few points to help steer your decision making process.
No matter the size of your organization, deploying Splunk in your environment is a big decision. After all, it can scale from very small to very large. Furthermore, it can be used as an on-premise hardware, or as a service to run within the Cloud. Perhaps you’re wondering if you should go with Splunk Enterprise […]
In a Splunk environment, Splunk operations are controlled by configuration files (conf files). Configuration of the file settings are essential to the proper running of the Splunk instance. In this article, we walk through how to properly configure the file settings to ensure that your Splunk instance is running optimally.
UBA, User Behavior Analytics, is a Premium Splunk App that leverages machine learning technologies, to secure an organization from insider threats while also providing outsider threat monitoring and alerting capabilities. In this blog we will cover frequently asked questions around UBA and its functionality.
In this article we will walk you through what post process searching is, how it can help you optimize your dashboards, and why it is important.
Transaction processing can involve transactions flowing from multiple sources. In that case, you can use Splunk ITSI to drill down to issues with specific transaction end points.
Did you know that all Splunk Knowledge Objects (KO) generated during a search are maintained in memory? Sure, any one KO in itself doesn’t take up a lot of memory, but run a search that returns 10 million events… You can do the math!