Using C3.js to Create a Custom Visualization in Splunk


Data visualizations in Splunk are an extremely powerful way to analyze and derive value from the mountains of data collected every day. Today, I’d like to cover how to create a custom visualization in Splunk using the C3.js library, which is built on top of the extremely popular and powerful D3.js data visualization library. One of the advantages of using C3 is that the syntax is somewhat simpler to use than D3. While “D3” stands for “Data-drive Documents,” “C3” stands for “Comfortable, Customizable, and...

Implementing CKEditor Customizations in Oracle WebCenter Sites 12c

As many WebCenter Sites developers already know, the flexibility of the CKEditor attribute editor allows us to apply customizations to it. Actually, implementing these customizations isn't always the easiest task. For the newest 12c version, Oracle's official documentation can, unfortunately, be quite confusing.

To help clarify how to implement CKEditor customizations in 12c, this blog will outline simple instructions on how to customize the CKEditor toolbar.

Say for instance that we have an attribute called "Abstract," and it needs a basic, simplified CKEditor as its...

Meet the Slack App for Splunk

We're excited to announce the release of our new Slack App for Splunk! The Slack App for Splunk helps to gain insight into your company’s Slack environment.

The app seamlessly monitors your team's Slack activity by leveraging the Slack App for Splunk’s modular inputs. The messages generated in your public Slack channels are collected and indexed into Splunk, ready for reporting!

The Slack App for Splunk also provides prebuilt dashboards for Slack monitoring. The app effortlessly track metrics including: where and how often your users are logging in and what channels are being...

Brute Force Attacks: Splunk Detection and Analytics


One of the longest-standing and most common challenges to both information security and web development teams is the brute force attack. Although this form of attack has been around for many years, it is still one of the most popular and widely used password-cracking methods. In terms of impact, brute force attacks are a very serious threat capable of affecting millions of accounts. If these attacks are not detected and addressed in a timely manner they can lead to theft of intellectual property and personally identifiable information, significant financial losses, and even...

Expand your Toolkit: Troubleshooting Splunk from the GUI with REST API

Recently, I fixed a malfunctioning email from Splunk. It included a PDF of a dashboard, “a scheduled PDF.” The dashboard wasn’t documented and its creator had recently left the company, so I was tasked with investigating something unfamiliar. The email was a 24-hour snapshot used by executives. The result was low insight into a high-visibility problem that required analysis and resolution.

This investigation used Splunk’s REST API to...

Stay In Touch