OpenSearch Alert Monitoring: High CPU Usage Example Threats OpenSearch alerting feature sends notifications when data from one or… rooter November 28, 2024 3 min read 0
How to Retrieve and Restore Snapshots from S3 Repository in OpenSearch Threats Step 1: List Available Snapshots First, you need to list… rooter November 28, 2024 2 min read 0
Creating Snapshot Management Policies with Keystore Integration and Slack Notification Setup Threats Step 1: Add AWS Credentials to the Keystore To securely… rooter November 28, 2024 3 min read 0
Making Use of Building Block Rules in Elastic Threats Within the “Advanced Options” of the “About Rule” section of… rooter November 27, 2024 1 min read 0
Fields Aren’t Always Faster, Keyword Searches to Speed Up Splunk Threats When possible, use datamodels, they are generally your best bet… rooter November 27, 2024 1 min read 0
Making Use of Fillnull and Values() to Increase Rule Resiliency in Splunk Threats Within splunk we use “stats” and “tstats” a bunch as… rooter November 27, 2024 2 min read 0
Creating Macros for Code Reuse in Splunk Threats When you find yourself constantly reusing certain strings of Splunk… rooter November 27, 2024 2 min read 0
Extracting fields in SPL Threats Sometimes when working with new log sources or unfamiliar event… rooter November 25, 2024 2 min read 0
Elastic Flattened Fields Explained Threats Elastic has many “Field Types”. Flattened is a type that… rooter November 25, 2024 1 min read 0
Splunk: How to Make Lookup Based on Wildcards Threats 1) Add to transforms.conf stanza: [field_from_sourcetype] batch_index_query = 0 case_sensitive_match… rooter November 25, 2024 1 min read 0