Home Posts tagged "Best Practices"

Accelerated Data Models in a Distributed Splunk Environment

󰀄
Accelerated Data Models in a Distributed Splunk Environment

Splunk v6.0.1 is packed with new features that enhance the user experience and can provide useful, lightning fast reports. For a full overview of the new features check out this link: Splunk 6! One of the new features that provide users the ability to build exceptionally fast reports is data models. Users can use the

Say my name, say my name…

󰀄
Say my name, say my name…

As a consultant, I get asked this question from my clients all the time. They use Splunk everyday and when they log in they see this screen:   Splunk’s greatest asset is how customized we can make searches, reports, and dashboards, and so why shouldn’t we be able to customize our login screen? Well to

Splunk, Where’s my Props?!

󰀄
Splunk, Where’s my Props?!

Here’s the scenario. You find the perfect app for your data. You onboard the data, configure all your files, look through all your dashboards to finally see the views you have been waiting for. Then your greatest fear is realized, your dashboards are not working! You trouble shoot the searches in your dashboards and the

Passing Time

󰀄
Passing Time

System monitoring dashboards are something we are often asked to provide for our clients. Normally, this is a pretty straight forward task, but on a recent client engagement, I was presented with one requirement that was a bit out of the ordinary. This client was looking to monitor a set of ten desktops with a

Setting up a Simple Workflow in Oracle WebCenter Sites

󰀄
Setting up a Simple Workflow in Oracle WebCenter Sites

Welcome fellow enthusiasts of Oracle WebCenter Sites, to an introductory blog about how to set up a simple workflow!  As we all know, workflow is an integral aspect of any web content management system, and thus creating an efficient workflow is paramount to the overall success of the system and it’s business owners. The particular

Passwords: Sharks Can Smell a Breach a Mile Away

󰀄
Passwords: Sharks Can Smell a Breach a Mile Away

2013 is not shaping up to be a banner year for Internet security. 2012 saw data breaches like 6.5 million LinkedIn password hashes leaked, 420,000 member accounts from social network Formspring, Yahoo! Voices more than 400,000 usernames and passwords, 1.5 million passwords from the online dating site eHarmony. Twitter is the latest system to suffer

Setting Up a Development Environment in Oracle WebCenter Sites

󰀄
Setting Up a Development Environment in Oracle WebCenter Sites

Function1 would like to take this opportunity to welcome Mike Field (co-author of this blog) to our Web Experience Management team.  Mike joins us from Metastratus Web Solutions and brings in-depth expertise in all aspects of Oracle WebCenter Sites.  Mike and I worked together on creating a development environment in Oracle WebCenter Sites for a

Security Hardening Open Source Projects

󰀄
Security Hardening Open Source Projects

A client recently had a stream of attacks on several of their online applications. Thanks to excellent monitoring, solid architecture and nice, clean installations, the attacks were easily rebuffed. Cheers to all involved. Just the same, the attacks gave me some insights on what a typical attack vector looks like to an online intruder. There

Planning for Success

󰀄
Planning for Success

Oftentimes during the course of a project, you may encounter schedule changes, new requirements or requirement changes, and risks.  When these things happen, it is still possible to complete the project however, without a project plan, it’s almost impossible to do so successfully.  A well-structured, clear, and concise project plan can always help to ensure

Splunk Data Input Pipeline and Processors

󰀄
Splunk Data Input Pipeline and Processors

Image courtesy of the Splunk on Splunk App I was a recent attendee of Splunk’s worldwide user’s conference .conf 2012. It was held at the ultra modern and chic Cosmopolitan Hotel located in the heart of Las Vegas, Nevada.  Over 1000 people attended the conference and there were 90+ information sessions geared towards a wide

󰁓
󰀰 󰀩 󰀭 󰀎