Homepage
Open in app
Sign inGet started

Seynur

We provide Cyber Security, IT Operations, and Data Analytics solutions. Our service offering utilizes data science, machine learning and analytics-driven security to enable leading organizations make sense of their data and solve business problems.

Multi-Server Splunk Setup with Ansible & SSH

Multi-Server Splunk Setup with Ansible & SSH

In modern, cloud-native environments, manual infrastructure management has become both inefficient and risky. Automation is no longer a…
Go to the profile of Hilal Gevrek
Hilal Gevrek
May 23
Kafka 101: Core Concepts and How It Works

Kafka 101: Core Concepts and How It Works

Apache Kafka is a high-throughput, low-latency, and scalable messaging system. Thanks to its distributed architecture, it manages…
Go to the profile of Beste Yiğit
Beste Yiğit
May 12
Splunk Cluster Manager Redundancy — Part 2: Implementation

Splunk Cluster Manager Redundancy — Part 2: Implementation

Cluster manager redundancy is a mechanism designed to ensure high availability and resilience in Splunk’s distributed architecture. If one…
Go to the profile of Oyku Can
Oyku Can
Apr 25
Splunk Cluster Manager Redundancy — Part 1: What it is, why it matters

Splunk Cluster Manager Redundancy — Part 1: What it is, why it matters

In distributed Splunk environments, the Cluster Manager (CM) plays a critical role: it coordinates peer nodes, their configuration bundles…
Go to the profile of Oyku Can
Oyku Can
Apr 24
Practical Approaches to Tuning ML-Based Correlation Searches in Splunk ES

Practical Approaches to Tuning ML-Based Correlation Searches in Splunk ES

In a rapidly evolving cyber security environment where new threats are encountered every day, effective threat detection and responses to…
Go to the profile of Oyku Can
Oyku Can
Jul 19, 2024
Splunk Connect for Syslog (SC4S): Installation, Usage & Implementations

Splunk Connect for Syslog (SC4S): Installation, Usage & Implementations

This blog outlines the installation and the usage of SC4S to import syslog input data into Splunk, addressing various use cases.
Go to the profile of Oyku Can
Oyku Can
Feb 26, 2024
Navigating Splunk Implementation (with Enterprise Security): A Practical Approach

Navigating Splunk Implementation (with Enterprise Security): A Practical Approach

In this post, I’d like to go over a Splunk project implementation (on-premises) concerning security. This is based on our experiences as…
Go to the profile of Selim Seynur
Selim Seynur
Feb 19, 2024
Risk-Based Alerting (RBA) with MITRE ATT&CK App for Splunk

Risk-Based Alerting (RBA) with MITRE ATT&CK App for Splunk

In this post, I’d like to review Risk-Based Alerting (RBA) in the context of the MITRE ATT&CK App for Splunk with a sample usage. The goal…
Go to the profile of Selim Seynur
Selim Seynur
Jan 9, 2023
Ingesting Event Data from Splunk Forwarder/SC4S to Kafka

Ingesting Event Data from Splunk Forwarder/SC4S to Kafka

The goal of this post is to quickly test/analyze methods to send event data from Splunk Forwarders or SC4S to Apache Kafka deployments…
Go to the profile of Selim Seynur
Selim Seynur
Oct 24, 2022
Ingesting Syslog data to Kafka

Ingesting Syslog data to Kafka

When working with event data analytics, especially for security purposes (i.e. SIEM), syslog becomes an important protocol to ingest data…
Go to the profile of Selim Seynur
Selim Seynur
Sep 27, 2022
Creating Custom Entity Type with Splunk IT Essentials Work

Creating Custom Entity Type with Splunk IT Essentials Work

Splunk IT Essentials Work correlates logs and metrics for each entity and helps you to monitor your infrastructure. It is free, and it…
Go to the profile of Merih Bozbura
Merih Bozbura
Sep 25, 2022
Converting Event Logs into Metrics in Splunk

Converting Event Logs into Metrics in Splunk

As well as collecting event logs, metrics data can be ingested into Splunk. There are a few ways to ingest metrics data; Splunk has already…
Go to the profile of Merih Bozbura
Merih Bozbura
Aug 26, 2022
Risk-Based Alerting (RBA) with Splunk Enterprise Security

Risk-Based Alerting (RBA) with Splunk Enterprise Security

Alert fatigue and false-positive results are the most common problems in a Security Operation Center (SOC) environment. The correlation…
Go to the profile of Merih Bozbura
Merih Bozbura
Apr 1, 2022
Restoring Archived Data with Splunk

Restoring Archived Data with Splunk

Data retention policies help to manage organizations’ big data. Since the amount of data collected today is tremendous, establishing a…
Go to the profile of Merih Bozbura
Merih Bozbura
Nov 1, 2021
Syslog Data Collection (SC4S) for Splunk and Custom Inputs

Syslog Data Collection (SC4S) for Splunk and Custom Inputs

As per Splunk Validated Architectures, Splunk Connect for Syslog (SC4S) is the current best practice recommendation to collect syslog data…
Go to the profile of Merih Bozbura
Merih Bozbura
Jan 26, 2021
Kafka + S3: Long-term searchable/queryable data retention

Kafka + S3: Long-term searchable/queryable data retention

The goal of this post is to provide an alternate solution for a question we have started to face with our clients. What is the best way to…
Go to the profile of Selim Seynur
Selim Seynur
Jan 8, 2021
Splunk Data Models & CIM

Splunk Data Models & CIM

In this post, you will find out what Splunk data models and CIM (Common Information Model) are and why they hold that much importance.
Go to the profile of Merih Bozbura
Merih Bozbura
Jan 4, 2021
Detecting Cyber Threats with MITRE ATT&CK App for Splunk — Part 3

Detecting Cyber Threats with MITRE ATT&CK App for Splunk — Part 3

In this part of the blog series I’d like to focus on writing custom correlation rules. The goal is to utilize MITRE ATT&CK App for Splunk…
Go to the profile of Selim Seynur
Selim Seynur
Jun 10, 2020
How to Become A Certified Splunk Enterprise Admin?

How to Become A Certified Splunk Enterprise Admin?

In this blog, I will talk about the stages of becoming a certified Splunk admin. Splunk is a data (The Data-to-Everything™) platform that…
Go to the profile of Enes Oğuzhan Alataş
Enes Oğuzhan Alataş
May 4, 2020
Detecting Cyber Threats with MITRE ATT&CK App for Splunk — Part 2

Detecting Cyber Threats with MITRE ATT&CK App for Splunk — Part 2

In this part of the blog series the goal is to utilize MITRE ATT&CK App for Splunk and associate custom/new correlation searches with…
Go to the profile of Selim Seynur
Selim Seynur
Apr 17, 2020
About SeynurLatest StoriesArchiveAbout MediumTermsPrivacyTeams