Operations | Monitoring | ITSM | DevOps | Cloud

Splunk

Upping the Auditing Game for Correlation Searches Within Enterprise Security - Part 1: The Basics

One question I get asked frequently is “how can I get deeper insight and audit correlation searches running inside my environment?” The first step in understanding our correlation searches, is creating a baseline of what is expected and identify what is currently enabled and running today. Content Management inside Splunk Enterprise Security is a quick way to filter on what is enabled (and it’s built into the UI and works out of the box).

A Day in the Life: Secrets of a Top Splunk Security Analyst

At Splunk, we’re proud to employ some of the top security analysts in the industry. On any given day, they’re investigating security incidents, triaging alerts and identifying threats so our systems and data — as well as those of our customers — remain secure. But what, exactly, do Splunk security analysts do? And what are some of their biggest challenges?

End-to-End Java Observability in 5 Simple Steps

Java is one of the most popular, flexible and useful programming languages with a very vibrant community to support it. Many of our customers use Java to create amazing applications, it’s an application on a single VM, or based on microservices running on Kubernetes. Naturally, we made it simple to understand the performance of Java-based applications using SignalFx Microservices APM.

Splunking Cisco Webex Meetings Data

The COVID-19 pandemic has had a major impact on our working lives. Companies have adopted by transforming their workforce to work remotely through video conferencing software. Cisco’s Webex Meetings, one of the most popular video conference softwares, plays a critical role in helping employees stay connected, enhance collaboration and drive productivity.

Using Splunk to Detect Abuse of AWS Permanent and Temporary Credentials

Amazon Web Services provides its users with the ability to create temporary credentials via the use of AWS Security Token Service (AWS STS). These temporary credentials work pretty much in the same manner like permanent credentials created from AWS IAM Service. There are however two differences.

Many-to-Many Communication: The Next Generation of Deterrence

Military strategists will often tell you that the best way to win a conflict is to prevent it by projecting an unmistakable posture of strength, preparedness and resolve. As history has shown in the seven decades since the Second World War, deterrence doesn’t come cheap, certainly not in the era of modern, technology-enabled warfare. Yet it is still far less costly in lives, dollars, and equipment than letting a hostile situation escalate out of hand.

The DevOps Workflow

At the center of DevOps practices is automation and workflow - but what does that actually mean? In this episode of Dissecting DevOps, Dave and Chris talk about the ideal state of DevOps workflows, and why an iterative approach to DevOps processes is critical for the long term success of DevOps practices and principles. Dave McAllister and Chris Riley are DevOps Advocates at Splunk.

From Feeding Families to Empowering Students: How Data Is Fueling Amazing Outcomes During COVID-19

We’re living history. We’ve heard it uttered in everything from news reports to conversations with loved ones. And it’s true — the tragedy and uncertainty of COVID-19 is shaping history and policy as we know it. But there’s something else newsworthy, too. Amid the pandemic, we’ve seen beacons of hope, humanity and progress. People have banded together to solve monumental problems at record pace.