Blog

This blog details a step-by-step process on how to create and run a prediction model with Splunk MLTK. The use case explained in this blog is specifically, how to predict the number of incident tickets created for an Operation Team during a busy holiday time, so the team can prepare for the workload.
  • Blog
  • Splunk

Predict Your Incident Tickets With Splunk MLTK 

Splunk timestamp extraction can be tricky until you work with it a couple times. Follow along with me through a couple different examples and you should be able to extract a timestamp out of any data. There are a few settings in Splunk’s “Magic 8” that go into props.conf of the data you are trying to ingest.
  • Blog
  • Splunk

Splunk Timestamp Extraction – Where and How to Find Time!

Helpful Splunk resources from the TekStream developer team
  • Blog
  • Splunk

Useful Online Resources for the Aspiring Splunk Admin

Get Your Custom App to Pass App Vetting on the First Try
  • Blog
  • Splunk

Get Your Custom App to Pass App Vetting on the First Try

What is serverless automation, you ask? It's a game-changing approach that combines the best of serverless computing with the magic of automation. With serverless automation, you can automate tasks, workflows, and integrations without the need for manual intervention or the hassle of managing infrastructure. Thanks to nifty tools like AWS Lambda and EventBridge, businesses can achieve seamless automation, real-time data processing, and make agile decisions that drive success.
  • AWS
  • Blog

Unleashing the Power of Serverless Automation

Splunk’s Compliance Essentials provides several features that can help organizations meet the requirements of various compliance frameworks like CMMC, DFARS, FISMA and more. This app comes pre-packaged with a library of compliance practices, dashboards that can be used to monitor compliance status & track progress, and reports that can be used to demonstrate compliance to auditors.
  • Blog
  • Splunk

Splunk Compliance Essentials: Your One-Stop Shop

Splunk SOAR: HUD Tutorial
  • Blog
  • Splunk

Splunk SOAR: Introduction to the HUD Space

The goal here is to aggregate the detections to maximize your chances of detecting this critical attack. A part of that is gathering the list of IOCs scattered in multiple locations on the internet and looking at activity that could point to the MeowCorp Ransomware exploitation. Here at TekStream, we have several security engineers that are intimate with cybersecurity knowledge and especially the logs of our clients. To get help building detection for your specific client, fill in the form below and get access to our Splunk/security expertise. 
  • Blog
  • Security Bulletin

TekStream Security Bulletin: APT Spotlight Ransomware from MeowCorp

TekStream Security Bulletin: Splunk Takes Out SysJoker Variant
  • Blog
  • Security Bulletin

TekStream Security Bulletin: Splunk Takes Out SysJoker Variant Written in Rust

TekStream Tutorial: Troubleshooting Multiple Splunk Forwarders
  • Blog
  • Splunk

Troubleshooting Splunk Forwarders Tutorial: Send Commands to Multiple Splunk Forwarders (Linux)

TekStream Security Bulletin: Use Splunk to Swat StripedFly
  • Blog
  • Security Bulletin

TekStream Security Bulletin: Use Splunk to Swat StripedFly

Datamodel is really like Savedsearches, providing structure to underlying unstructured data. Datamodel has multiple datasets, where datasets are like a table in the traditional database. In Splunk, when we create dataset, we create with some constrains. This blog walks through the end-to-end flow of a datamodel in Splunk ES. By the end of this demonstration, you will find the above definition makes sense.
  • Blog
  • Splunk

How Datamodel Works in Splunk ES

Splunk SOAR: Make the most of your HUD Space with Pin lists
  • Blog
  • Splunk

Splunk SOAR: Make the Most of Your HUD Space with Pin Lists

So what are these annoying SPL commands that can cause data to be lost? The three main ones are the sort, join and append commands. In this blog we will be going over each of these commands and how they can cause data loss. Fortunately, in Splunk there is usually more than one way to get things done and we will explore ways to not use these commands if you have large datasets or if you expect to have large data sets in the future.
  • Blog
  • Splunk

Three Splunk Commands That Can Cause Loss of Data