Covering off some of the latest announcements at Splunk's user conference (.conf), an Add-on created to Splunk config files and also the presentation delivered at .conf18 on SplDevOps!
SplDevOps: Making Splunk Development a Breeze With a Deep Dive on DevOps' Con...Harry McLaren
As Splunk scales, it grows with more Splunk engineers, developers and users. Maintaining proper knowledge object development, deployment changes and best practices can become a daunting task where fear-driven development takes its toll. In this session we present our enhancement of Splunk’s scalability in terms of software management, continuous integration and continuous delivery (CI/CD) by providing a framework which consists of DevOps tooling in combination with our Splunk expertise. Specifically, we are able to maintain a proper Splunk development cycle by using Docker containers, configuration and secret management with Ansible and version control with Git (VCS), all achieved by taking advantage of Splunk's ".conf" versatility. Our result is a CI/CD development-to-testing-to-production framework that complements Splunk’s scalability with modern DevOps culture and facilitates a smoother yet moderated development experience.
Collecting AWS Logs & Introducing Splunk New S3 Compatible Storage (SmartStore) Harry McLaren
Two presentations at the January Splunk User Group in Edinburgh. Presenters were Harry McLaren and Tomasz Dziwok.
Topics covered are collecting AWS based logs at scale with Splunk and what the new object-based storage feature is within Splunk Enterprise (SmartStore).
Using Metrics for Fun, Developing with the KV Store + Javascript & News from ...Harry McLaren
We explore "Metrics, mstats and Me: Splunking Human Data” and also have some insights into the KV Store and javascript use in dashboards. We’ll also re-cover the conf18 updates for those who couldn’t attend our last session.
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...Harry McLaren
We’ll be exploring some of the more advanced capabilities of Phantom and also discussing the security framework from MITRE “ATT&CK” and it’s valued use when integrating it with Splunk Enterprise! We’ll also have two SplunkTrust members available for some general Q&A in our own ‘Meet the Experts’.
- Splunk Phantom Workbook Automation - SOAR (Security Orchestration, Automation & Response)
-- Tom Wise (Phantom Security Solutions Engineer & Trainer)
- Threat Hunting, Or: How I Learned to Stop Worrying & Love ATT&CK
-- Cian Heasley / Fraser Dumayne (Security Engineers)
- Meet the Experts with SplunkTrust
-- Harry McLaren (Senior Splunk Consultant)
-- Tom Wise (Splunk Consultant, Phantom Security Solutions Engineer & Trainer)
Here are the key steps to build a Splunk ITSI KPI to monitor for missing event formats:
1. Define the expected event formats in a lookup table with fields like Rule_ID, Event_Name, Raw_Filter, Punct.
2. Create a Base Search that looks up the Punct field against the lookup and filters for matching rules. This will return the expected event names.
3. Build a KPI on top of the Base Search to track the count of matching events over time. Set thresholds to alert if the count drops significantly.
4. Create an alert that triggers if the KPI value breaches the threshold. This will fire if an unexpected drop in events is detected.
EnerNOC is a leading provider of energy intelligence software and demand response solutions serving over 6,000 customers globally. Jim Nichols discusses how EnerNOC uses Splunk as part of its DevOps practices to drive the knowledge cycle. Key metrics are identified and shared via Splunk dashboards to foster collaboration between management, operations, and development. This enables insights into systems that were previously opaque. Once an effective dashboard is established, it kicks off an ongoing knowledge sharing cycle.
This document discusses Wipro's experience helping a customer transition from their existing SIEM platform to Splunk for security monitoring and analytics. It describes how Wipro guided the customer through a two-phase implementation: first standing up a hybrid on-premise/cloud Splunk deployment to address immediate needs, and now expanding that deployment to 500GB/day in Splunk Cloud and 200GB/day on-premise to accommodate growing data and use cases. The transition yielded significant improvements in search performance, data ingestion and parsing flexibility, and enhanced security visualization and analytics capabilities.
Thanks for coming out to another great PNW usergroup featuring Matt Snyder talking about RBA & Insider Threats, Thomas Booth discussing Splunk IT Essentials Work, and Larry Becker sharing cybersecurity best practices.
Taking Splunk to the Next Level - ArchitectureSplunk
This session led by Michael Donnelly will teach you how to take your Splunk deployment to the next level. Learn about Splunk high availability architectures with Splunk Search Head Clustering and Index Replication. Additionally, learn how to manage your deployment with Splunk’s operational and management controls to manage Splunk capacity and end user experience
This document provides an overview and examples of data onboarding in Splunk. It discusses best practices for indexing data, such as setting the event boundary, date, timestamp, sourcetype and source fields. Examples are given for onboarding complex JSON, simple JSON and complex CSV data. Lessons learned from each example highlight issues like properly configuring settings for nested or multiple timestamp fields. The presentation also introduces Splunk capabilities for collecting machine data beyond logs, such as the HTTP Event Collector, Splunk MINT and the Splunk App for Stream.
Justin Hardeman is a Unix administrator at Availity LLC, a company that processes over 2 billion healthcare transactions annually. He has over 5 years of experience using Splunk for monitoring Availity's large, multi-datacenter infrastructure consisting of 500+ virtual machines. Splunk has allowed Availity to move from a reactive to proactive approach by providing real-time visibility into issues, transactions, and workflows across their environment.
Presented by Bosch Cyber Defense Center at SplunkeLive! Frankfurt 2018:
Introduction / Who am I?
Bosch Cyber Defense Center
SIEM@Manufacturing
SIEM Workbench
Splunk Automation with Ansible
QCon London 2015 - Wrangling Data at the IOT RodeoDamien Dallimore
The document discusses how Splunk can help users manage and analyze Internet of Things (IoT) data. Splunk provides tools to collect data from various sources, search and correlate the data, and build applications and visualizations. This allows users to harness IoT data from devices, sensors, and industrial systems. Splunk also offers developer tools like APIs and SDKs to build custom IoT applications on its platform.
Splunk Data Onboarding Overview - Splunk Data Collection ArchitectureSplunk
Splunk's Naman Joshi and Jon Harris presented the Splunk Data Onboarding overview at SplunkLive! Sydney. This presentation covers:
1. Splunk Data Collection Architecture 2. Apps and Technology Add-ons
3. Demos / Examples
4. Best Practices
5. Resources and Q&A
Splunk is a time-series data platform that handles the three V's of data (volume, velocity, and variety) very well. It collects, indexes, and allows searching and analysis of data. Splunk can collect data from files, directories, network ports, programs/scripts, and databases. It breaks data down into searchable events and builds a high-performance index. This allows users to search, manipulate, and visualize data in reports, charts, and dashboards. Splunk can analyze structured, unstructured, and multistructured data from various sources like logs, networks, clicks, and more.
Splunk Enterprise 6.4 delivers a new library of interactive visualizations, faster analytics, and can reduce your historical data storage costs by up to 80%.
See how you can:
• Use new interactive visualizations to view results, and easily create and share your own
• Speed investigation and discovery of large-scale data with event sampling
• Reduce storage costs by up to 80% for aged data
• Get wider visibility into system performance and health with new management views
With the new features and lower storage costs offered by Splunk Enterprise 6.4, doing big data analysis is now easier than ever. See it in action by attending this webinar.
SplunkLive! Amsterdam 2015 - Web Framework & 3rd Party VisualizationSplunk
Besides seeing the newest features in Splunk Enterprise, we will show you how to use the Splunk Web Framework and 3rd party visualisations to create rich, interactive experiences using Splunk and its analytical capabilities.
Come and learn from our experts on ways to improve you IT Operational Visibility by using Splunk for monitoring environment health. In this hands-on session we will cover recommended approaches for end to end monitoring, across applications, OSes, and devices. Topics will include: critical services to monitor, use of the Splunk Common Information Model (CIM) for cross-dataset normalization, commonly deployed apps and TAs to gather data for IT infrastructure uses, and use of pre-made dashboard panels to quickly build dashboards for monitoring your environment.
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogicSnapLogic
Last week SnapLogic sponsored partner event Splunk Worldwide Users' Conference in Las Vegas. The theme of the conference was "Your Data, No Limits." In keeping with this theme, SnapLogic helps Splunk customers access more comprehensive analytics by integrating as much data as possible from as many sources as possible, and by streamlining the business process of loading data in Splunk, detecting problems, and facilitating actions that result in a prompt resolution.
To learn more, visit: http://www.snaplogic.com/.
Machine-generated data is one of the fastest growing and complex areas of big data. It's also one of the most valuable, containing a definitive record of all user transactions, customer behavior, machine behavior, security threats, fraudulent activity and more. Join us as we explore the basics of machine data analysis and highlight techniques to help you turn your organization’s machine data into valuable insights. This introductory workshop includes a hands-on(bring your laptop) demonstration of Splunk’s technology and covers use cases both inside and outside IT. Learn why more than 12,000 customers in over 110 countries use Splunk to make business, government, and education more efficient, secure, and profitable.
During the presentation, forward-looking statements were made regarding Splunk's plans and estimates that are subject to risks and uncertainties. Any information about Splunk's roadmap outlines general product direction but is subject to change without notice. Splunk undertakes no obligation to develop or include any described feature in a future release. The presentation demonstrated Splunk's IoT analytics capabilities for manufacturing including predictive maintenance, advanced monitoring, and self-service analytics.
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migrati...Splunk
Presented at Splunk Discovery Warsaw 2018:
SIEM Replacement Methodology
Use Cases
Data Sources & Data Onboarding
Architecture
Third Party Integration
You Got This!
Who should attend? Beginner - New to Splunk and have not used it before.
Description: Machine-generated data is one of the fastest growing and complex areas of big data. It's also one of the most valuable, containing a definitive record of all user transactions, customer behavior, machine behavior, security threats, fraudulent activity and more. Join us as we explore the basics of machine data analysis and highlight techniques to help you turn your organization’s machine data into valuable insights. This introductory workshop includes a hands-on(bring your laptop) demonstration of Splunk’s technology and covers use cases both inside and outside IT. Learn why more than 13,000 customers in over 110 countries use Splunk to make business, government, and education more efficient, secure, and profitable.
Here are some key considerations for architecting a Splunk application:
- Define a data model and taxonomy - Map data sources to common schemas and entities. This allows for unified search, reporting and alerts.
- Partition data appropriately - Separate apps by function, team, data type or other logical boundaries. Consider security, scalability and maintenance.
- Choose input methods based on data volume and type - Streaming for high volume, modular/scripted for custom parsing. Consider HTTP Event Collector, TCP or file monitors.
- Design for scalability - Distribute data and workloads across multiple Splunk instances. Consider sharding, clustering, load balancing.
- Implement modular and reusable components - Custom searches, lookups
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...Splunk
Presented at SplunkLive! Frankfurt 2018:
Introduction
SIEM Migration Methodology
Use Cases
Datasources & Data Onboarding
ES Architecture
Third-Party Integrations
You Got This!
Splunk FISMA for Continuous Monitoring Greg Hanchin
Splunk for Continuous Monitoring provides visibility, reporting, and search capabilities across IT systems and infrastructure using a single solution. It reduces IT costs by solving various challenges with one tool that runs on modern platforms and indexes machine-generated data from various sources and formats. Dashboards and views are tailored for different roles like executives, compliance, security, and IT operations to monitor security control effectiveness and changes over time in compliance with NIST guidelines for continuous monitoring.
1. The presentation provides an overview of Splunk and how it can be used to access, analyze, and gain insights from machine data.
2. It demonstrates Splunk's core capabilities like universal data ingestion, schema-on-the-fly indexing, and fast search capabilities.
3. The presentation concludes with a demo of Splunk's interface and basic functions like searching, field extraction, alerting, and reporting.
What's New with the Latest Splunk Platform ReleaseSplunk
This presentation + demo provides an overview of Splunk Cloud and Splunk Enterprise version 7.2, and Splunk Machine Learning Toolkit 4.0 – the customer value proposition, supporting customer stories, and high-level technical details.
Splunk Cloud and Splunk Enterprise 7.2 provide breakthrough performance, scale, and manageability. Key features include SmartStore for cost-effective data management, workload management to prioritize analytics workloads, and accessibility enhancements to enable more users. The release also expands AI/ML capabilities and delivers intuitive metrics visualization and search.
Taking Splunk to the Next Level - ArchitectureSplunk
This session led by Michael Donnelly will teach you how to take your Splunk deployment to the next level. Learn about Splunk high availability architectures with Splunk Search Head Clustering and Index Replication. Additionally, learn how to manage your deployment with Splunk’s operational and management controls to manage Splunk capacity and end user experience
This document provides an overview and examples of data onboarding in Splunk. It discusses best practices for indexing data, such as setting the event boundary, date, timestamp, sourcetype and source fields. Examples are given for onboarding complex JSON, simple JSON and complex CSV data. Lessons learned from each example highlight issues like properly configuring settings for nested or multiple timestamp fields. The presentation also introduces Splunk capabilities for collecting machine data beyond logs, such as the HTTP Event Collector, Splunk MINT and the Splunk App for Stream.
Justin Hardeman is a Unix administrator at Availity LLC, a company that processes over 2 billion healthcare transactions annually. He has over 5 years of experience using Splunk for monitoring Availity's large, multi-datacenter infrastructure consisting of 500+ virtual machines. Splunk has allowed Availity to move from a reactive to proactive approach by providing real-time visibility into issues, transactions, and workflows across their environment.
Presented by Bosch Cyber Defense Center at SplunkeLive! Frankfurt 2018:
Introduction / Who am I?
Bosch Cyber Defense Center
SIEM@Manufacturing
SIEM Workbench
Splunk Automation with Ansible
QCon London 2015 - Wrangling Data at the IOT RodeoDamien Dallimore
The document discusses how Splunk can help users manage and analyze Internet of Things (IoT) data. Splunk provides tools to collect data from various sources, search and correlate the data, and build applications and visualizations. This allows users to harness IoT data from devices, sensors, and industrial systems. Splunk also offers developer tools like APIs and SDKs to build custom IoT applications on its platform.
Splunk Data Onboarding Overview - Splunk Data Collection ArchitectureSplunk
Splunk's Naman Joshi and Jon Harris presented the Splunk Data Onboarding overview at SplunkLive! Sydney. This presentation covers:
1. Splunk Data Collection Architecture 2. Apps and Technology Add-ons
3. Demos / Examples
4. Best Practices
5. Resources and Q&A
Splunk is a time-series data platform that handles the three V's of data (volume, velocity, and variety) very well. It collects, indexes, and allows searching and analysis of data. Splunk can collect data from files, directories, network ports, programs/scripts, and databases. It breaks data down into searchable events and builds a high-performance index. This allows users to search, manipulate, and visualize data in reports, charts, and dashboards. Splunk can analyze structured, unstructured, and multistructured data from various sources like logs, networks, clicks, and more.
Splunk Enterprise 6.4 delivers a new library of interactive visualizations, faster analytics, and can reduce your historical data storage costs by up to 80%.
See how you can:
• Use new interactive visualizations to view results, and easily create and share your own
• Speed investigation and discovery of large-scale data with event sampling
• Reduce storage costs by up to 80% for aged data
• Get wider visibility into system performance and health with new management views
With the new features and lower storage costs offered by Splunk Enterprise 6.4, doing big data analysis is now easier than ever. See it in action by attending this webinar.
SplunkLive! Amsterdam 2015 - Web Framework & 3rd Party VisualizationSplunk
Besides seeing the newest features in Splunk Enterprise, we will show you how to use the Splunk Web Framework and 3rd party visualisations to create rich, interactive experiences using Splunk and its analytical capabilities.
Come and learn from our experts on ways to improve you IT Operational Visibility by using Splunk for monitoring environment health. In this hands-on session we will cover recommended approaches for end to end monitoring, across applications, OSes, and devices. Topics will include: critical services to monitor, use of the Splunk Common Information Model (CIM) for cross-dataset normalization, commonly deployed apps and TAs to gather data for IT infrastructure uses, and use of pre-made dashboard panels to quickly build dashboards for monitoring your environment.
Webinar: Improve Splunk Analytics and Automate Processes with SnapLogicSnapLogic
Last week SnapLogic sponsored partner event Splunk Worldwide Users' Conference in Las Vegas. The theme of the conference was "Your Data, No Limits." In keeping with this theme, SnapLogic helps Splunk customers access more comprehensive analytics by integrating as much data as possible from as many sources as possible, and by streamlining the business process of loading data in Splunk, detecting problems, and facilitating actions that result in a prompt resolution.
To learn more, visit: http://www.snaplogic.com/.
Machine-generated data is one of the fastest growing and complex areas of big data. It's also one of the most valuable, containing a definitive record of all user transactions, customer behavior, machine behavior, security threats, fraudulent activity and more. Join us as we explore the basics of machine data analysis and highlight techniques to help you turn your organization’s machine data into valuable insights. This introductory workshop includes a hands-on(bring your laptop) demonstration of Splunk’s technology and covers use cases both inside and outside IT. Learn why more than 12,000 customers in over 110 countries use Splunk to make business, government, and education more efficient, secure, and profitable.
During the presentation, forward-looking statements were made regarding Splunk's plans and estimates that are subject to risks and uncertainties. Any information about Splunk's roadmap outlines general product direction but is subject to change without notice. Splunk undertakes no obligation to develop or include any described feature in a future release. The presentation demonstrated Splunk's IoT analytics capabilities for manufacturing including predictive maintenance, advanced monitoring, and self-service analytics.
Splunk Discovery: Warsaw 2018 - Legacy SIEM to Splunk, How to Conquer Migrati...Splunk
Presented at Splunk Discovery Warsaw 2018:
SIEM Replacement Methodology
Use Cases
Data Sources & Data Onboarding
Architecture
Third Party Integration
You Got This!
Who should attend? Beginner - New to Splunk and have not used it before.
Description: Machine-generated data is one of the fastest growing and complex areas of big data. It's also one of the most valuable, containing a definitive record of all user transactions, customer behavior, machine behavior, security threats, fraudulent activity and more. Join us as we explore the basics of machine data analysis and highlight techniques to help you turn your organization’s machine data into valuable insights. This introductory workshop includes a hands-on(bring your laptop) demonstration of Splunk’s technology and covers use cases both inside and outside IT. Learn why more than 13,000 customers in over 110 countries use Splunk to make business, government, and education more efficient, secure, and profitable.
Here are some key considerations for architecting a Splunk application:
- Define a data model and taxonomy - Map data sources to common schemas and entities. This allows for unified search, reporting and alerts.
- Partition data appropriately - Separate apps by function, team, data type or other logical boundaries. Consider security, scalability and maintenance.
- Choose input methods based on data volume and type - Streaming for high volume, modular/scripted for custom parsing. Consider HTTP Event Collector, TCP or file monitors.
- Design for scalability - Distribute data and workloads across multiple Splunk instances. Consider sharding, clustering, load balancing.
- Implement modular and reusable components - Custom searches, lookups
SplunkLive! Frankfurt 2018 - Legacy SIEM to Splunk, How to Conquer Migration ...Splunk
Presented at SplunkLive! Frankfurt 2018:
Introduction
SIEM Migration Methodology
Use Cases
Datasources & Data Onboarding
ES Architecture
Third-Party Integrations
You Got This!
Splunk FISMA for Continuous Monitoring Greg Hanchin
Splunk for Continuous Monitoring provides visibility, reporting, and search capabilities across IT systems and infrastructure using a single solution. It reduces IT costs by solving various challenges with one tool that runs on modern platforms and indexes machine-generated data from various sources and formats. Dashboards and views are tailored for different roles like executives, compliance, security, and IT operations to monitor security control effectiveness and changes over time in compliance with NIST guidelines for continuous monitoring.
1. The presentation provides an overview of Splunk and how it can be used to access, analyze, and gain insights from machine data.
2. It demonstrates Splunk's core capabilities like universal data ingestion, schema-on-the-fly indexing, and fast search capabilities.
3. The presentation concludes with a demo of Splunk's interface and basic functions like searching, field extraction, alerting, and reporting.
What's New with the Latest Splunk Platform ReleaseSplunk
This presentation + demo provides an overview of Splunk Cloud and Splunk Enterprise version 7.2, and Splunk Machine Learning Toolkit 4.0 – the customer value proposition, supporting customer stories, and high-level technical details.
Splunk Cloud and Splunk Enterprise 7.2 provide breakthrough performance, scale, and manageability. Key features include SmartStore for cost-effective data management, workload management to prioritize analytics workloads, and accessibility enhancements to enable more users. The release also expands AI/ML capabilities and delivers intuitive metrics visualization and search.
Splunk Cloud and Splunk Enterprise 7.2 provide enhanced capabilities for data ingestion, visualization, and analytics powered by artificial intelligence and machine learning. New features include guided data onboarding, metrics search performance improvements, workload management for prioritizing queries, and accessibility enhancements. The presentation highlights how these updates help users gain more insights from their machine data and empower more people to explore and analyze data.
Splunk Cloud and Splunk Enterprise 7.2 provide enhanced capabilities for data ingestion, visualization, and analytics powered by artificial intelligence and machine learning. New features include guided data onboarding, metrics search performance improvements, smart data tiering for cost optimization, and accessibility enhancements. These updates aim to empower more users and accelerate business value from machine learning.
Alle Neuigkeiten im letzten Plattform ReleaseSplunk
Diese Session und Demo liefert einen Überblick über Splunk Cloud und Splunk Enterprise Version 7.2 und Splunk Machine Learning Toolkit 4.0 - Mehrwert für den Anwender, Kundenbeispiele und High-Level technische Details.
The Splunk PNW usergroup .conf21 Best of the Best roundup!
1. .conf21 Product Announcement recap
2. How T-Mobile Increased Splunk User Proficiency (Across 7,800 Users!) With a World-Class Center of Excellence
3. Top SOAR sessions
4. Workforce Analytics To Improve End-User Experience and Performance
Encontro anual para apresentação das novidades da .conf23Rafael Santos
Lançamentos de Produtos: Saiba em primeira mão sobre as últimas atualizações e novidades da plataforma Splunk. Descubra como as novas funcionalidades podem aprimorar sua capacidade de análise de dados e otimizar suas operações.
Casos de Sucesso: Ouça relatos de organizações que alcançaram resultados extraordinários ao implementar o Splunk em suas operações. Aprenda com as melhores práticas e lições aprendidas diretamente daqueles que já estão colhendo os benefícios dessa poderosa solução.
Painéis de Discussão: Junte-se a debates animados e painéis de discussão sobre tópicos relevantes relacionados ao Splunk. Tenha a chance de fazer perguntas aos especialistas e obter insights valiosos.
Networking: Amplie sua rede de contatos e interaja com outros profissionais que compartilham o mesmo interesse no Splunk. Conheça colegas da área, troque experiências e crie conexões significativas.
Splunk Phantom, the Endpoint Data Model & Splunk Security Essentials App!Harry McLaren
We'll be coving the latest and greatest updates to Phantom (SOAR Platform), the ins-and-outs of the new Endpoint Data Model and what you can use it for and finally showcase some of the awesome beta features just released as part of the Splunk Security Essentials App which includes MITRE ATT&CK and Kill Chain Mappings!
Securing the Enterprise/Cloud with Splunk at the CentreHarry McLaren
Using orchestration tools with Splunk to automate and respond to events of interest and what types of use cases and logs you can leverage AWS/Cloud as the source.
Delivered as part of the Splunk User Group in Edinburgh in August 2017
Steam: http://productfor.ge/SUGE0817
The document provides an overview of the Splunk data platform. It discusses how Splunk helps organizations overcome challenges in turning real-time data into action. Splunk provides a single platform to investigate, monitor, and take action on any type of machine data from any source. It enables multiple use cases across IT, security, and business domains. The document highlights some of Splunk's products, capabilities, and customer benefits.
Getting Started with Splunk Enterprise Hands-On Breakout SessionSplunk
This document provides an overview and demonstration of Splunk Enterprise. It discusses what machine data is and Splunk's mission to make it accessible. The presentation covers installing and onboarding data into Splunk, performing searches, creating dashboards and alerts. It also summarizes deployment architectures for Splunk and options for support and learning more.
This document summarizes a presentation about Splunk's platform. It discusses Splunk's mission of helping customers create value faster with insights from their data. It provides statistics on Splunk's daily ingest and users. It highlights examples of how Splunk has helped customers in areas like internet messaging and convergent services. It also discusses upcoming challenges and new capabilities in Splunk like federated search, flexible indexing, ingest actions, improved data onboarding and management, and increased platform resilience and security.
PSUG 3 - 2024-07-15 - Splunk & AI with Philipp DriegerTomas Moser
Once in a life time opportunity for Prague Splunk User Group and Splunkers in Czechia and abroad. Join us to discover Splunk AI and Machine Learning (ML) capabilities in a rare session presented by Philipp Drieger, Global Principal Machine Learning Architect at Splunk. With AI hype all over the world these days this is a unique moment and a chance to bring together those already familiar with Splunk universal machine data platform but without any AI/ML knowledge or experience and seasoned or full time data scientists interested in Splunk and its AI/ML capabilities.
Part 1: Introduction to Splunk AI (45min)
Get to know Splunk AI first hand from Philipp, Global Principal Architect for Machine Learning at Splunk. He will share a easy to understand overview of Splunk's key AI components and also highlight some real world customer use cases.
Open Q&A
Part 2: Splunk AI demos and open AMA session (45min)
Join Philipp showing live demos including Splunk's Machine Learning Toolkit, the Splunk App for Data Science and Deep Learning and the latest Splunk AI Assistant.
Open AMA session: Ask Me Anything about Splunk AI
This document provides an agenda for a Splunk Discovery Day event being held in Milwaukee on September 14, 2017. The agenda includes sessions on Machine Data 101, delivering new visibility and analytics for IT operations, and strengthening security posture. It notes there will be over 100 attendees, 3 sessions, and a happy hour. Breaks and a closing are also included. [/SUMMARY]
Splunk4Rookies - Attendee - May 2023.pdfdjdhhdddhhd
This document discusses creating a dashboard in Splunk with four views to meet the needs of different teams at a company. The IT operations team needs a view showing successful and unsuccessful web server requests over time. The DevOps team needs views of the most common customer operating systems and web browsers experiencing failures. The security/fraud team needs to see website activity by geographic location. Instructions are provided to create searches and visualizations to populate these views on a dashboard for multiple use cases.
An overview of Splunk Enterprise 6.3. Presented by Splunk's Jim Viegas at GTRI's Splunk Tech Day, December 8, 2015.
Visit http://www.gtri.com/ for more information.
Latest Updates to Splunk from .conf 2017 Announcements Harry McLaren
Session detailing some of the best announcements from the recent Splunk users conference. Delivered at the Splunk User Group in Edinburgh on October 16, 2017.
Splunk Enterprise is a software platform for searching, monitoring, and analyzing machine-generated big data, such as logs, metrics, and mobile data. The presentation provided an overview of Splunk Enterprise capabilities including: live demonstrations of installing Splunk, searching data, creating dashboards and alerts. It also covered Splunk deployment architectures for scaling from single instances to distributed environments supporting hundreds of terabytes per day.
This document provides an overview and demonstration of Splunk Enterprise. It discusses Splunk's capabilities for indexing, searching, and analyzing machine data from various sources. The live demonstration shows how to install Splunk, import sample data, perform searches, create dashboards and alerts. It also covers Splunk's deployment architecture and scalability options. Attendees are encouraged to ask questions on Splunk's online communities and support channels.
Security Operations, MITRE ATT&CK, SOC Roles / Competencies Harry McLaren
Security Operations & MITRE ATT&CK
Description: A two topic talk covering the core functions of the blue team (security operations), common roles and the required skills to be successful. Then an overview of the threat-led knowledgebase MITRE ATT&CK and how to put it to good use for threat detection and response.
Modern Security Operations & Common Roles/Competencies Harry McLaren
This document provides an overview of modern security operations technologies and frameworks from the perspective of Harry McLaren, a cybersecurity professional with 14 years of experience. It discusses the evolution of security operations functions from basic monitoring to advanced detection, analysis, and response. Key components of a security operations center are described, including threat modeling, detection configuration, and the MITRE ATT&CK framework for mapping threats, techniques, and countermeasures. Implementing a DevOps approach and config-as-code is advocated to improve effectiveness, faster adaptation, and increased scalability. Common security analyst roles and competencies such as technical skills, behaviors, and emotional intelligence are also covered.
This session will outline common roles for cyber defenders, including areas like Security Operations, Engineering and Consultancy. It will focus on the fundamental competencies (skills/behaviours) expected of entry level applicants getting into cybersecurity and how to build yourself into a confident professional working to defend your employer and their customers.
Security operations centres are made up of several roles and each role benefits from a person with specific skills and competencies. This presentation was presented at Napier University on the 13/11/2019 at their 'Cyber Breakfast'.
Hunting Hard & Failing Fast (ScotSoft 2019)Harry McLaren
Many organisations have invested millions in building security operations teams, deploying powerful monitoring and reporting tools and then asking for continual improvement in the form of tuning, threat hunting and developing new threat models. However, within large enterprises, these types of changes either represent a risk of making changes to a live production platform or take weeks or months to go through the development and release process or route-to-live. This session outlines some DevOps principals and associate framework for enforcing change management, but still supporting rapid changes to code and configuration.
* SOC Capabilities
* OODA & Threat Hunting
* Balancing SOC Risk
* Using Splunk for an Agile SIEM
* Result: Empowered Hunters
* Resources & Questions
Lessons on Human Vulnerability within InfoSec/CyberHarry McLaren
Truths and lessons from a cybersecurity consultant who shares his experience with failure, vulnerability and the lessons we can all take forward to be kinder and healthier professionals.
This was also recorded here: https://youtu.be/-Rcfn1iFb1g?t=7m56s
Big Data For Threat Detection & ResponseHarry McLaren
Slides used at the University of Edinburgh SIGINT group (cybersecurity society). Covering what is big data, the value for security use cases, hunting for threats/actions, using Splunk to detect and respond, SIEM use and some useful searches (which were demoed).
OWASP - Analyst, Engineer or Consultant?Harry McLaren
The slides used at the March 2018 OWASP Edinburgh meetup to share a look at common roles within cybersecurity from the perspective of a Managing Consultant who’s been through several in quick succession and an introspective analysis of what makes a successful cybersecurity professional.
TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk DevelopmentHarry McLaren
TSTAS, the Life of a Splunk Trainer and using DevOps in Splunk Development
Some interesting talks about using TSTATS and the internal Splunk logs, have a Splunk Trainer share his journey with Splunk and how he's managed to achieve every possible Splunk certification (over 10!), and a short discussion about emerging thoughts of using development/release frameworks with Splunk deployments.
Cyber Scotland Connect: What is Security Engineering?Harry McLaren
Harry McLaren is a managing consultant at ECS who gives a presentation on cybersecurity engineering. Cybersecurity engineering involves building systems, deploying configurations, integrating systems, and developing solutions to protect against, detect, and respond to threats. It is important for engineering projects to consider people, process, technology, the end user, support requirements, and how the solution fits within the business and IT strategies. The presentation provides examples of scenario walkthroughs and best practices for engineers, such as using automation, version control, containers, and cloud technologies.
Cyber Scotland Connect: Getting into Cybersecurity (Deck 2)Harry McLaren
Getting into Cybersecurity: Advice, tips and tricks from an experienced cybersecurity consultant.
Slides by: Robert Williamson
Website: https://cyberscotlandconnect.com/
Cyber Scotland Connect: Getting into Cybersecurity (Deck 1)Harry McLaren
Getting into Cybersecurity: Advice, tips and tricks from an experienced recruitment consultant.
Slides by: Stefanie Corlay
Website: https://cyberscotlandconnect.com/
We'll aim to do a brief intro to the event and an overview of our Mission Statement + Purpose (we promise to keep the boring stuff short!)
Our aim is to mix some short interactive sessions with some Q&A's, some brilliant speakers and other bits and pieces to hopefully deliver some real value to people attending.
Slides by: Stuart Turner
Website: https://cyberscotlandconnect.com/
Security Meetup Scotland - August 2017 (Deconstructing SIEM)Harry McLaren
There are many misconceptions about what a SIEM is and why they should still be the heart of an operational capability when it comes to security controls and monitoring. This topic will outline what makes a powerful SIEM and why creating it yourself is increasingly challenging. We'll explore the frameworks at the heart of a SIEM and how Splunk has developed Enterprise Security with these in mind; finishing with some general lessons learned for SIEM implementation projects.
Supporting Splunk at Scale, Splunking at Home & Introduction to Enterprise Se...Harry McLaren
Slide deck delivered at the June Splunk User Group in Edinburgh: Supporting Splunk at Scale, Splunking at Home & Introduction to Enterprise Security.
Sign up to the group here: https://usergroups.splunk.com/group/splunk-user-group-edinburgh/
Building Splunk Apps, Development Paths with Splunk & User Behaviour Analytics Harry McLaren
This document provides an agenda and summaries for a Splunk User Group meeting in Edinburgh in April 2017. The meeting will include presentations and demos on building Splunk apps, development paths and certification, and Splunk User Behavior Analytics. The introductory presentation will be given by Harry McLaren from ECS and will provide background on ECS and the Splunk User Group. Additional presentations will cover building custom Splunk apps using both the web interface and direct XML editing, and paths for Splunk certification. The final presentation will demo Splunk UBA for detecting insider threats and advanced adversaries. Attendees are encouraged to discuss in-house developed apps and get involved in the Splunk community.
Splunk Dashboarding & Universal Vs. Heavy ForwardersHarry McLaren
This document provides an agenda and summaries for a Splunk user group meeting in Edinburgh. The meeting will include presentations and discussions on creating dashboards, using universal vs. heavy forwarders, and latest Splunk challenges and solutions. It introduces the speakers, including employees from the hosting company ECS and user group leader Harry McLaren. Updates from the recent Splunk .conf event are also summarized, such as new premium app releases and the Splunk ML Toolkit.
Splunk User Group Edinburgh - November EventHarry McLaren
- Harry McLaren is the founder and leader of the Splunk User Group in Edinburgh. He works as a security consultant specializing in Splunk at ECS.
- The agenda includes presentations on using Splunk for IT operations and use case development, as well as a demo of IT service intelligence. There will also be a discussion on developing organizational insights from business pains.
- Developing use cases involves defining roles, system requirements, and goals. Examples provided are using Splunk for insider threat detection and monitoring customer experience on an e-commerce platform.
Thingyan is now a global treasure! See how people around the world are search...Pixellion
We explored how the world searches for 'Thingyan' and 'သင်္ကြန်' and this year, it’s extra special. Thingyan is now officially recognized as a World Intangible Cultural Heritage by UNESCO! Dive into the trends and celebrate with us!
Just-in-time: Repetitive production system in which processing and movement of materials and goods occur just as they are needed, usually in small batches
JIT is characteristic of lean production systems
JIT operates with very little “fat”
This comprehensive Data Science course is designed to equip learners with the essential skills and knowledge required to analyze, interpret, and visualize complex data. Covering both theoretical concepts and practical applications, the course introduces tools and techniques used in the data science field, such as Python programming, data wrangling, statistical analysis, machine learning, and data visualization.
How iCode cybertech Helped Me Recover My Lost Fundsireneschmid345
I was devastated when I realized that I had fallen victim to an online fraud, losing a significant amount of money in the process. After countless hours of searching for a solution, I came across iCode cybertech. From the moment I reached out to their team, I felt a sense of hope that I can recommend iCode Cybertech enough for anyone who has faced similar challenges. Their commitment to helping clients and their exceptional service truly set them apart. Thank you, iCode cybertech, for turning my situation around!
[email protected]
AI Competitor Analysis: How to Monitor and Outperform Your CompetitorsContify
AI competitor analysis helps businesses watch and understand what their competitors are doing. Using smart competitor intelligence tools, you can track their moves, learn from their strategies, and find ways to do better. Stay smart, act fast, and grow your business with the power of AI insights.
For more information please visit here https://www.contify.com/
By James Francis, CEO of Paradigm Asset Management
In the landscape of urban safety innovation, Mt. Vernon is emerging as a compelling case study for neighboring Westchester County cities. The municipality’s recently launched Public Safety Camera Program not only represents a significant advancement in community protection but also offers valuable insights for New Rochelle and White Plains as they consider their own safety infrastructure enhancements.
Mieke Jans is a Manager at Deloitte Analytics Belgium. She learned about process mining from her PhD supervisor while she was collaborating with a large SAP-using company for her dissertation.
Mieke extended her research topic to investigate the data availability of process mining data in SAP and the new analysis possibilities that emerge from it. It took her 8-9 months to find the right data and prepare it for her process mining analysis. She needed insights from both process owners and IT experts. For example, one person knew exactly how the procurement process took place at the front end of SAP, and another person helped her with the structure of the SAP-tables. She then combined the knowledge of these different persons.
27. There is no best way…
Version control; git
Automation; jenkins
Orchestration; ansible
28. Where to start?
I recommend
version control of configuration
monitor .conf files for changes
ideally store backup of configuration somewhere
git
can be simple
monitor file changes
But perhaps something easier…
30. Open Source & SplunkBase
https://gitlab.com/ecs_public_projects
https://splunkbase.splunk.com/
First open source software
Open to feedback
Will maintain on a best effort basis
PRs welcome!