Splunk WLM (Workload Management) provides the ability to allocate compute and memory resource to search, indexing, and other processes such as scripted inputs. This allows you to allocate the right resources to your Splunk server depending on its role.
Congratulations! Your organization has had the foresight to purchase Splunk’s Enterprise Security along with expert Professional Services to assure a successful implementation. This guide will serve as a checklist to help ensure you are prepared for the most successful ES deployment possible.
According to the Ponemon Institute the average cost of data breach for a company is $3.8 million dollars. Regardless of whether you are operating in the cloud or on-premise taking steps to harden your operating system is an absolute must to limit potential security weaknesses.
Now that Splunk’s newest release (8.0) supports Python3 we have fielded many questions from customers on what the practical approach for migration is. In this blog, we will discuss the steps you should make when migrating your environment to Python3.
Making data CIM compliant can be a daunting and confusing exercise for new Splunkers and experienced ones alike. Often the biggest misconceptions have to do with the approach rather than the exercise itself. My biggest piece of advice – start with the end in mind.
Splunk Dashboards bring meaning to your data in a way that is useful in troubleshooting and translating concepts to others.
As Splunk consultants, it’s common to come across customers who have a Splunk license and are ingesting data, but have yet to learn or have taken the time to develop their own Splunk dashboards.
Logging for Cloudwatch Events using Splunk HEC Welcome to another installment on how to log multiple AWS accounts into Splunk, when the recommended method is not feasible. In this article we will take a look at Splunking AWS Cloudwatch Event data using an HTTP Event Collector (HEC) input.