Blog Resources Splunk Administration: Tech Tips Splunk for Security Splunk Users: Tips and Tricks Things I Wish I'd Known about Splunk
Digital key on circuit board

Splunk Attack Range Setup Guide

Splunk Attack Range allows you to create vulnerable local or cloud environments, to simulate attacks and collect the data Into Splunk. In this on-demand video Bill Ouellette (Principal Splunk Security Engineer) will provide a Step by Step Guide on setting up the “Attack Range Framework” within your Splunk test instance.

Blog Other Splunk Administration: Tech Tips Splunk for IT Operations Splunk for Security Splunk Users: Tips and Tricks Things I Wish I'd Known about Splunk
Question mark in crystal ball

AWS Lambda vs AWS Firehose

Splunk has multiple methods in regards to Getting Data In (GDI). One very popular method is the Http Event Collector (HEC). The use of the HEC allows data ingestion into Splunk via HTTP POST messages. Two popular methods that send POST messages out of AWS into Splunk are the AWS services: Lambda and Firehose.

Blog Splunk Administration: Tech Tips Splunk Consulting Considerations Splunk for IT Operations Splunk Users: Tips and Tricks Things I Wish I'd Known about Splunk
Masked wrestler in a suit

Splunk Data Onboarding – Wrestle with Tough Data… and Win

On-boarding data into Splunk is a fundamental skill and common place for a Splunk Admin. In this article, we will prepare you for situations where getting data into Splunk presents a political or technical tarpit you might not expect.

  • 1
  • 2