PinnedInfoSecNinjaDeep Dive on the popular Log4Shell Remote Code Execution vulnerability in Apache Log4jRCE vuln. in Apache Log4jJul 29, 2022Jul 29, 2022
InfoSecNinjaInstalling Cribl Steam in Distributed Deployment — Part 2 of 2Installing One Worker node Running on Amazon Linux OSJun 11Jun 11
InfoSecNinjaInstalling Cribl Steam in Distributed Deployment — Part 1 of 2Installing One Leader node Running on Amazon Linux OSJun 11Jun 11
InfoSecNinjaEncrypting Data in Motion between Splunk (Enterprise & UF) and Cribl StreamA series of 4 blogs about Encrypting data in motion between Splunk and CriblOct 31, 2023Oct 31, 2023
InfoSecNinjaSecuring the data in motion from Splunk Universal/Heavy Forwarder to Cribl Host using TLS certsA series of 4 blogs about Encrypting data in motion between Splunk and CriblSep 19, 2023Sep 19, 2023
InfoSecNinjaSecuring the data in motion from Cribl host to Splunk Indexer using TLS certsA series of 4 blogs about Encrypting data in motion between Splunk and CriblSep 19, 2023Sep 19, 2023
InfoSecNinjaTypes of Splunk Search CommandsThere are six broad types for all of the search commands:Sep 19, 2023Sep 19, 2023