Category: Splunk Page 1 of 11

Collectd: Great Infrastructure Performance Metrics, but Where Do I Begin?

Splunker Bill Emmett offers a crash course in getting started with collectd for infrastructure performance metrics…

The Results Are In! What Are Your Peers Doing for IT Event Management?

Key findings from a recent Quocirca survey providing insight on how organizations cope with common event management pain points…

Data Night. How Machine Learning Could Change Valentine’s Day

“You Auto-Complete Me”…

Splunk Cloud Customer Update

Meltdown Patch and the Impact on Infrastructure Supporting Splunk Solutions

Splunk’s VP of Engineering, Krishna Tammana, shares findings on the performance impact of Meltdown-induced patching and recommendations for Splunk customers…

Splunk Marketing’s Resolution: Let’s Embrace Change

Splunk CMO Brian Goldfarb reflects on the importance of embracing change as a catalyst for growth and success…

Being Your Own Detective with SA-Investigator

This post of the Back to Basics Hunting series with Splunk discusses how to use the new SA-Investigator add-on for Enterprise Security to dig deep into your datamodels and find the evil lurking within.…

You’re Invited! Try Splunk Project Waitomo

Be among the first to try Splunk’s new infrastructure monitoring analytics technology, Project Waitomo…

Cyclical Statistical Forecasts and Anomalies – Part 2

Get brilliant alerts over big data using some Splunk goodness such summary indexes or data model accelerations to operate forecasts at greater scale…

Dubai Airports Flies Into The Future With Splunk

From super fast wifi to spotless bathrooms, Dubai Airports is building the airport of the future with Splunk!…

Empowering Women through Technology, Splunk’s chapter in Saudi Arabia

Powerful and thought-provoking conversations had at Splunk’s first ever Women in Tech event in Saudi Arabia…

Cisco and Splunk Team to Deliver Continuous Network Assurance and Intelligent Analytics

Network admins can proactively find and fix problems faster with Cisco Network Assurance Engine and Splunk software…

GDPR: Go Beyond Compliance. Deliver a ‘Data Trust’ Revolution

GDPR is knocking on all of our doors – but Gordon Morrison believes says go beyond compliance, and grab the opportunity to deliver a “Data Trust Revolution”…

Unmatched ROI – Investing Your Time in People

Splunker Lerry Wilson reflects on the personal ROI that comes from his involvement with the annual Night to Shine Special Needs prom…

A Girl, a Pony, and a Technical Certification

The story of one motivated middle-schooler named Evey Mahlerwein who used her winter break as an opportunity to learn about Splunk and machine data…

Splunk Named in Gartner 2017 Critical Capabilities for SIEM Report

Splunk was named in the Gartner 2017 Critical Capabilities for Security Information and Event Management report and received the highest score in the Basic Security Monitoring Use Case…

Finding and Upskilling Top Tech Talent with AWS and The Prince’s Trust

Proud to have young people upskilling their tech talents with time at Splunk – and we learnt a lot from them too!…

Staff Picks for Splunk Security Reading: January 2018

A monthly series of staff picked content from the Splunk security world. Each month will have a new selection of Splunk security presentations, white papers, or blog posts that you might have missed.…

Modernization at the U.S. Department of Health & Human Services and How Splunk is Helping

A recap from the 10th Annual Health IT Day and how Splunk is helping the U.S. Department of Health & Human Services meet its top challenges…

December at Splunk: Cans, BOTS and Festive Spots!

Rick Johnson shares an update on his time at Splunk after joining through the AWS re:Start initiative…

DIY: Software Asset Management with the Splunk Enterprise Free Edition

Handy tips on how to build your own SAM with Splunk to monitor software installs and usage…

Cyclical Statistical Forecasts and Anomalies – Part 1

Using the Machine Learning Toolkit to build a basic forecasting, thresholding, and alerting mechanism to apply to nearly any type of time series metric…

A Beginner’s Guide to Event Analytics

Event management is nothing new, but the terms and concepts associated with it have evolved and it’s time we set the record straight…

Congrats to the Winner of the December 2017 Karma Competition on Splunk Answers!

Announcing the winner of the December 2017 competition period for the “Where Will Your Karma Take You Contest” on Splunk Answers.…

AWS Re:Start and Splunk: Meet the Future of Tech Talent

Helen O’Keeffe interviews some of the young adults that gained experience at Splunk through the Prince’s Trust and AWS Re:Start initiative.…

Finding NEW Evil: Detecting New Domains with Splunk

This post discusses how to use Splunk (and Splunk Enterprise Security) to find domains that are “new” to your organization and why you should care (HINT: YOU SHOULD! THEY ARE VERY OFTEN NAUGHTY). It uses basic Splunk statistics along with …

Hands on Lab: Sandboxing with Splunk with Docker (from .conf2017)

Accept it. You’re afraid to take risks with Splunk. So was I. That is, until Docker changed my life. Join the cult and learn how to rapidly create disposable Splunk sandboxes in mere minutes!…

Ensuring Success with Splunk ITSI – Part 3: Adaptive Thresholding

Advanced threshold and alerting guidance to produce trusted alerts from ITSIs machine learning adaptive thresholds configuration…

Big Dating: Using Splunk to Fall in Love

Splunkers Kelly Kitagawa and Keegan Dubbs dive into the findings from their .conf2017 session on using big data to find a soulmate…

Power Data Ingestion into Splunk Using Amazon Kinesis Data Firehose

An overview of the integration and a step-by-step walkthrough on how to configure Amazon Kinesis Firehose to stream data to Splunk Enterprise, using VPC Flow Logs as an example.…

Not All SIEM Solutions Are Created Equal

See how Splunk’s analytics-driven SIEM solution tackles real-time security monitoring, advanced threat detection, forensics and incident management…

Security Update: Meltdown and Spectre vulnerabilities

Splunk CISO, Joel Fulton, provides update regarding Meltdown/Spectre vulnerabilities…

On the Road: The Path to Customer Success

Doug Merritt shares insights on Splunk’s commitment to customer success…

10 Years of Listens: Analyzing My Music Data with Splunk

Analyzing 3 different sources of music data in Splunk. …

Deck the Halls

Find out how energy and utilities companies like TransAlta and EnerNOC continue to keep the lights on this holiday with Splunk solutions…

Ensuring Success with Splunk ITSI – Part 2: Alerting Basics

Configuring Splunk IT Service Intelligence to produce accurate and trusted alerts…

KubeCon 2017: k8s Logs & Metrics – I AM THE CAPTAIN NOW!

Splunk attending kubecon ’17 in Austin Texas. Monitoring kubernetes (k8s)…

IDC: 3 Features of an Effective Infrastructure Monitoring Solution

IDC Analyst Tim Grieser describes features of an effective IT infrastructure monitoring solution…

IT Modernization – Government Means Business

Learn how Splunk is helping government agencies make the move to modern technology paradigms…

The Product is Docs

The Splunk doc team has written a book about how they do what they do…

Configuring JA3 with Bro for Splunk

Configuring Bro to output JA3 signatures and how to ingest that data into Splunk …

Jingle Bell Rock

Find out how media and entertainment companies like Shazam are using Splunk to stay at the forefront of demand…

Detecting Typosquatting, Phishing, and Corporate Espionage with Enterprise Security Content Update’s Brand-Abuse Monitoring Analytic Story

Splunk’s Enterprise Security Content Update (ESCU) app can provide you with early warnings and situational awareness—powerful elements of an effective defense against adversaries…

Detecting Typosquatting, Phishing, and Corporate Espionage with Enterprise Security Content Update

Splunk’s Enterprise Security Content Update (ESCU) app can provide you with early warnings and situational awareness—powerful elements of an effective defense against adversaries…

Congrats to the Winner of the November 2017 Karma Competition on Splunk Answers!

Announcing the winner of the November 2017 competition period for the “Where Will Your Karma Take You Contest” on Splunk Answers.…

Ensuring Success with Splunk ITSI – Part 1: Thresholding Basics

Practical step-by-step guidance to configure ITSI to produce accurate and trusted alerts…

AWS re:Start – My Golden Ticket

Rick Johnson shares his story of joining Splunk via the AWS:reStart initiative…

Splunk Supports London Poppy Day

James Savory shares the success of this year’s team supporting London Poppy Day …

‘Tis the Season for Holiday Shopping, Toys in Every Store

With the busy holiday shopping season upon us, see retailers Kurt Geiger are using Splunk to help maximize the shopping experience for their customers…

Source=Future date_year=2018 | predict

For the third year in a row, our Splunk experts have teamed up to forecast and share their insights for 2018…

Introducing Splunk AWS Serverless Apps

Introduction to the AWS Serverless Apps published by Splunk, and a walkthrough on how to use one of these apps to easily ingest & analyze AWS data with Splunk Enterprise.…

Tall Tales of Hunting with TLS/SSL Certificates

TLS and SSL certificates are a great way to hunt advanced adversaries. Collect them with Splunk Stream, Bro, or Suricata and hunt in your own data!…

AWS re:Invent 2017 – ‘Twas the Season of Giving!

Tony Bolander provides a recap of the innovative solutions Splunk announced at AWS re:Invent 2017…

Splunk Named a Leader in Gartner SIEM Magic Quadrant for the Fifth Straight Year

Gartner’s 2017 Magic Quadrant for Security Information and Event Management names Splunk a leader for the fifth straight year…

Moving Diversity and Inclusion Forward at Splunk

At Splunk, we’re committed to recruiting, retaining and developing high-performing and engaged Splunkers from and with diverse backgrounds…

Are We Making the Best Use of Our Security Analytics Platform?

Splunker Paul Pang recaps the first Boss of the SOC (BOTS) event hosted by Splunk Hong Kong…

Cloud Migration Migraine? Three Tips for Relief

Gain full visibility into your infrastructure and make your migration to the cloud less painful with these tips for relief…

Do We Calculate, Appraise, Classify, Estimate? Yes, But We Do It All with Evaluate (eval)

One of the most powerful commands in Splunk is the eval command. The eval command helps Splunkers modify data (on the fly) and enrich fields.…

It’s Beginning to Look a Lot Like the Holidays!

‘Tis the season for travel—see how Splunk helps optimize the customer experience for travelers during the winter holidays and year-round…

How 5 Companies Stopped the Silos and Got Better Event Management

See how Splunk customers have adopted Splunk IT Service Intelligence (ITSI) to successfully simplify their operations, prioritize issue resolution and provide visibility into critical services…

Introducing the Free Campus Compliance Toolkit for NIST 800-171

Join us on December 7th to learn about how Splunk can help with NIST 800-171 compliance …

3 Huge Problems Facing Your IT Department—and Why Better Event Management Is the Answer

Solve your challenges around event flooding and bring a whole new approach through machine learning algorithms with Splunk IT Service Intelligence (ITSI) 3.0…

Ingest Data with One Tool from Twitter to OPC, Node-RED

How to setup Node-RED to ingest data into Splunk.…

True North – Data Stories from SplunkLive! Utrecht & Stockholm

Matt Davies shares highlights of the customer stories presented at this year’s SplunkLive! Utrecht and SplunkLive! Stockholm…

Ready, Set, Stream with the Kinesis Firehose and Splunk Integration

Stream data from various AWS services directly into Splunk reliably and at scale with the Kinesis Firehose integration with Splunk…

Splunk’s Marva Bailer is WiT Women of the Year Finalist!

Huge Congrats, Marva!…

Data Claus is Coming to Town!

London-based Splunktern, Rupert Truman gets festive with data and Splunk’s his 2017 holiday season!…

Configuring Microsoft’s Azure SAML Single Sign On (SSO) with Splunk Cloud – Using the ‘New’ Azure Portal

Configuring Microsoft’s Azure Security Assertion Markup Language (SAML) Single Sign On (SSO) with Splunk Cloud – Azure Portal…

Smart AnSwerS #85

Members of the Splunk Community help each other solve problems as they dive into Splunk. Check out some of the smartest answers!…

How Australian Organisations Can Prevent Cybercrime from Taking a Toll on Their Networks

With the government’s sharpened focus on cybersecurity, now is the time for businesses to streamline security infrastructure and drive threats out of their organisation…

Women In Technology – “When I Grow Up I Want to be a Computer Scientist”

In celebration of Women in Technology, Matt Davies shares his daughter’s early steps in the world of coding …

What Is AIOps and What It Means for You

Discover what AIOps means for IT and how Splunk brings this intelligence to organizations for end-to-end visibility and better, faster, stronger operations…

DAMAGE CONTROL – Critical IT Incidents Cost Companies Six Million Dollars Per Year

Splunk and Quocirca explore the real impact of critical IT incidents on organizations today…

Congrats to the Winner of the October 2017 Karma Competition on Splunk Answers!

Announcing the winner of the October 2017 competition period for the “Where Will Your Karma Take You Contest” on Splunk Answers.…

Machine Learning: Making IT Events Less Eventful

Why trust in machine learning can help IT professionals do higher value tasks…

Why ITOps Need to Rage WITH the Machine (Learning)

Why trust in machine learning can help IT professionals do higher value tasks…

Countdown to AWS re:Invent 2017 – Splunk Race Cars, Demos, Jams, Sessions & More!

Presentations, demos, and so much more – Splunker Tony Bolander offers a look at everything we have in store for AWS re:Invent 2017 in Las Vegas…

Econocom’s Road to Splunk ITSI

Learn how Splunk IT Service Intelligence (ITSI) is helping European-based Econocom improve the quality of its services…

Central Logging: The First Step to Improving Security Visibility

Get a single view across multiple sources of security data and analyze it all from a single place to gain insights into your security posture quickly and efficiently…

Celebrating Our Veterans at Splunk

From investing in military talent to supporting military-related nonprofits to building a veteran-friendly workplace, Splunk celebrates veterans today and every day…

A Recap of EDUCAUSE 2017

The top-of-mind issues for attendees at EDUCAUSE 2017 showed that IT and digital transformation are front and center to the survival of higher education institutions…

Customers and Competition: Why Retail Needs to Harness Machine Data

Customers want a seamless digital shopping experience, competitors want your marketshare. Machine data is the answer for retailers.…

In Great Company! Splunk Listed on Deloitte 2017 Technology Fast 500

Splunk has been selected as a Deloitte 2017 Technology Fast 500 award winner…

Using Splunk Enterprise Security and Booz Allen Cyber4Sight for Splunk for Advanced Threat Detection and Mitigation

Splunk Enterprise Security customers have another option to detect and mitigate ransomware with Booz Allen Cyber4Sight for Splunk and its human-curated threat intelligence service…

Total Enterprise-wide Visibility Including the IBM z/OS Mainframe!

Syncsort Ironstream® forwards IBM z/OS mainframe data sources to Splunk in real-time…

The Intersection of Technology and Biotechnology with Recursion Pharmaceuticals and Splunk

Recursion Pharmaceuticals is using Splunk and Machine Learning to help reach its goal of discovering 100 new treatments for genetic diseases by 2025 …

Smart AnSwerS #84

Members of the Splunk community help each other solve problems as they dive into Splunk. Check out some of the best answers and uses of Splunk in these posts.…

SCinet: Securing the Super Computing Highway at SC17 Yet Again!

Splunker Ashok Sankar explains what makes the SC17 conference different from any other and offers a preview of what to expect…

Cybersecurity Framework: A Pragmatic Path to Bolstering Security

Splunker Ashok Sankar shines the spotlight on the security challenges faced within the public sector…

You Can’t ‘Hyde’ from Dr. Levenshtein When You Use URL Toolbox

The URL Toolbox is a powerful Splunk security app that not only allows you to parse domains but also allows you to analyze Splunk fields for Shannon entropy and Levenshtein distance…

Who You Gonna Call? Hostbusters! I Ain’t Afraid Of No Breach!

The similarities between cybersecurity and bustin’ ghosts are, well…spooky! …

Golden Bathrooms, Daft Punk and VR: EMEA Customer Highlights from .conf2017

A snapshot of .conf17’s customer highlights through an EMEA lens…

Cybersecurity in Healthcare: More than Protecting Patient Data

When it comes to cybersecurity in healthcare, it’s more than protecting patient data – it’s about patient safety and saving lives…

Are you using Bad Rabbit as an opportunity to look at the basics and be strategic?

A new ransomware strain named Bad Rabbit has emerged…

Splunk at EDUCAUSE 2017

Splunker Ashok Sankar offers a look at all the Splunk activities in store for attendees at EDUCAUSE 2017…

What’s Cyber Security Week like for Splunk? it-sa gold!

Two gold awards and a successful it-sa event – that’s how Splunk does Cyber Security Week!…

Cyber Hygiene is Vital: Three Tips to Clean Up the Security of Your Organisation

Here are three steps to clean up the security of your organisation and ensure you’re well equipped to survive in tomorrow’s threat landscape…

Data Sherlock: The Game is Afoot

Grab three of your superhero friends and put your IT domain knowledge to the test with Boss of the NOC (BoTN)…

Top of Mind for CISOs: Automation, Enabling the Business and Advanced Threat Defense

Splunker Girish Bhat shares key takeaways from the CISO Customer Advisory Board meeting discussions at .conf2017…

How Many Splunkers Does it Take to Win a Fortune Magazine Award? All of Them

Splunk named to Fortune Magazine’s Future 50 most forward-looking, innovative companies…