Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

The Magnificent Seven: New Ways to Get More Out of Your Microsoft and Splunk Environment

As a leading global provider of cloud computing services with a business critical software portfolio, Microsoft is a key Splunk partner. In our mission to empower customers with data, we are delighted to share a few of the latest integrations, dashboards, and reference guides that help you extract even more value from your Microsoft environments. Here’s a peek at what we’ve been working on lately.

Introducing a New Splunk Add-On for OT Security

The lines Between IT and OT are blurring. With IT and Operational Technology (OT) systems converging, ensuring the security of devices, applications, physical locations and networks has never been more difficult or more important. There is a growing recognition by security professionals that they have a readiness and visibility problem in plain sight.

Knowing the Value of 'Fast'

Software development (SDLC) value streams aren’t difficult to understand; you correlate all activity in the development process from planning to prod and relate activity to key objectives such as impact on revenue, application quality and user satisfaction. Unfortunately, most organizations approach value streams on an ad-hoc, manual basis. This approach to value streams requires significant effort, is prone to error and creates huge opportunity costs.

Meet the Fastest Forwarder on the Net

I have recently been heads-down working on a large Splunk Cloud PoV (20+ TB / day), and the customer asked if Splunk supported their forwarding technology called Vector. I had never heard of Vector, so I took a note to do further research. I couldn’t find anyone else at Splunk who had seen this technology before, so I embarked on a little research project. What I discovered surprised me—Vector is actually fairly powerful, and cool!

Upping the Auditing Game for Correlation Searches Within Enterprise Security - Part 1: The Basics

One question I get asked frequently is “how can I get deeper insight and audit correlation searches running inside my environment?” The first step in understanding our correlation searches, is creating a baseline of what is expected and identify what is currently enabled and running today. Content Management inside Splunk Enterprise Security is a quick way to filter on what is enabled (and it’s built into the UI and works out of the box).

A Day in the Life: Secrets of a Top Splunk Security Analyst

At Splunk, we’re proud to employ some of the top security analysts in the industry. On any given day, they’re investigating security incidents, triaging alerts and identifying threats so our systems and data — as well as those of our customers — remain secure. But what, exactly, do Splunk security analysts do? And what are some of their biggest challenges?

End-to-End Java Observability in 5 Simple Steps

Java is one of the most popular, flexible and useful programming languages with a very vibrant community to support it. Many of our customers use Java to create amazing applications, it’s an application on a single VM, or based on microservices running on Kubernetes. Naturally, we made it simple to understand the performance of Java-based applications using SignalFx Microservices APM.

Splunking Cisco Webex Meetings Data

The COVID-19 pandemic has had a major impact on our working lives. Companies have adopted by transforming their workforce to work remotely through video conferencing software. Cisco’s Webex Meetings, one of the most popular video conference softwares, plays a critical role in helping employees stay connected, enhance collaboration and drive productivity.

Using Splunk to Detect Abuse of AWS Permanent and Temporary Credentials

Amazon Web Services provides its users with the ability to create temporary credentials via the use of AWS Security Token Service (AWS STS). These temporary credentials work pretty much in the same manner like permanent credentials created from AWS IAM Service. There are however two differences.

Many-to-Many Communication: The Next Generation of Deterrence

Military strategists will often tell you that the best way to win a conflict is to prevent it by projecting an unmistakable posture of strength, preparedness and resolve. As history has shown in the seven decades since the Second World War, deterrence doesn’t come cheap, certainly not in the era of modern, technology-enabled warfare. Yet it is still far less costly in lives, dollars, and equipment than letting a hostile situation escalate out of hand.