Entries by Caroline Lea

Why Do I Need to Certify?

Why Do I Need to Certify? Here’s Four Good (and Brief) Reasons By: William Phelps | Senior Technical Architect   In the normal day-to-day work life in the software industry, there is usually enough real work (meaning “paid” work) to keep an IT worker busy.  Most of us want to just simply relax after a […]

Using Splunk to Monitor USB Removable Storage Devices

Using Splunk to Monitor USB Removable Storage Devices By: Pete Chen | Splunk Practice Team Lead   Windows Event Log Monitoring Abstract Information security is only as effective as physical security policies. Splunk continues to be a valuable tool in providing insight into risk and threat detection. As more security operation centers (SOC’s) look to limit sensitive […]

Machine Learning with Splunk: Fitting a Model

Machine Learning with Splunk: Fitting a Model By: Abe Hardy  | Splunk Consultant What is machine learning? A quick search online will return definitions using the words algorithm, statistics and model. A slightly less technical definition would be that machine learning is a general term used for formulas to determine outcomes based on features from provided […]

New Feature in Splunk to Monitor Environment Health

New feature in Splunk to Monitor Environment Health By: Pete Chen | Splunk Consultant   A new feature introduced in Splunk 7.2 is the Splunkd Health Status Report. Monitoring Splunk’s status by checking if Splunkd is running may tell you if Splunk is running, but it won’t tell you if there’s a problem developing while Splunk is running. […]

Version Source Control for your Splunk Environment

Version Source Control for your Splunk Environment By: Zubair Rauf | Splunk Consultant   When Splunk environments grow in organizations, the need for source control also grows with it. It is good practice to use the widely available source control tools that are available for enterprise level source control. There are many Version Source Control (VCS) software available […]

TekStream AXF 12c Upgrade Special Components

TekStream AXF 12c Upgrade Special Components By: John Schleicher |Sr. Technical Architect TekStream’s extension to Oracle’s Application eXtension Framework (AXF) provides enhanced customizations surrounding Invoice Reporting using Business Activity Monitor (BAM), auditing of user actions, and QuikTrace of BPEL process instance.   With the introduction of the 12c upgrade available with release 12.2.1.3 TekStream discovered that two of […]

What is Invoice Processing?

What is Invoice Processing? By: John Schleicher |Sr. Technical Architect   In a nutshell, invoice processing is the set of practices put in place by a company for the payment of the bills it incurs associated with their business.  Essentially, ‘bills’ translate to invoices.  This doesn’t starkly differ from that of an individual managing their personal bills […]

Optimizing Splunk Dashboards with Post-Process Searches

Optimizing Splunk Dashboards with Post-Process Searches By: Josh Grissom, MSIT, CISSP | Senior Splunk Consultant Optimizing Splunk Dashboards with Post-process Searches When creating Splunk dashboards, we often have the same search run multiple times showing different types of graphs or with slight variations (i.e. one graph showing “allowed” and another showing “blocked”). This creates more overhead […]