by Andrew D’Auria
In this installment of "Hunting with Splunk: The Basics," we’re going to look at how to detect suspicious and potentially malicious network traffic to "new" domains.
by Dave Kerr
How to set up OpenShift to integrate with Splunk for logging in a Docker container orchestration environment. These techniques could easily be adapted for a standard Kubernetes installation as well!