In many environments, services and dependency hierarchies may be constantly changing. Maybe you are working with a containerized application and your web, application, and database servers are [...]
Lookups are a vital part of Splunk. This Splunk search command can be used to enrich data and provide critical insights into the events users are ingesting. Whether it be blacklisted IPs, [...]
If you’re reading this, the words “Splunk” and “deployment” may strike some level of interest. And not just the idea of deploying, but deploying well. Taking on a [...]
In many organizations, Splunk users and admins spend their time in Splunk onboarding new data, writing new searches (trying to find a needle in a haystack), or creating reports and dashboards for [...]
Splunk is full of hidden gems. One of those gems is the Splunk Search Command: iplocation. By utilizing particular database files, iplocation can add geolocation- information to ip address [...]
Hi, I’m Georges, Scrum Master Myth Buster. As a resident Scrum Master at Kinney Group, I’m responsible for promoting and championing Agile & Scrum habits on our automation [...]
I get it, SPL is a very wide language. With so many commands, arguments, functions, you name it. It’s a lot to learn and definitely a lot to remember. But what if I told you there were a couple [...]
In Dude, Where’s My Data? (Part One), you learned how to configure your data source to send your data to Splunk. In Dude, Where’s My Data? (Part Two), you learned how to configure [...]
Working in the security space in Splunk, something we are well-aware of the pressure behind security alert management. Often on the frontlines of responding to alerts, security analysts often [...]
Here’s the situation: You’re a security analyst that’s been tasked with finding different attacks on your servers. You need to find various events relating to possible brute force attempts, [...]