Big Data Analytics. Using Splunk. Peter Zadrozny. Raghu Kodali. Apress"

Size: px
Start display at page:

Download "Big Data Analytics. Using Splunk. Peter Zadrozny. Raghu Kodali. Apress""

Transcription

1 Big Data Analytics Using Splunk Peter Zadrozny Raghu Kodali Apress"

2 Contents at a Glance About the Authors About the Technical Reviewer Acknowledgments xv xvii xix Chapter 1: Big Data and Splunk 1 ^Chapter 2: Getting Data into Splunk 9 Chapter 3: Processing and Analyzing the Data 31 I Chapter 4: Visualizing the Results 63 HChapter 5: Defining Alerts 97 Chapter 6: Web Site Monitoring 109 Chapter 7: Using Log Files To Create Advanced Analytics 127 a Chapter 8: The Airline On-Time Performance Project 139 Chapter 9: Getting the Flight Data into Splunk 143 Chapter 10: Analyzing Airlines, Airports, Flights, and Delays 161 Chapter 11: Analyzing a Specific Flight Over the Years 195 mchapter 12: Analyzing Tweets 211 a Chapter 13: Analyzing Foursquare Check-Ins 231 a Chapter 14: Sentiment Analysis 255 V

3 ATA GLANCE MChapter 15: Remote Data Collection 283 Chapter 16: Scaling and High Availability 295 Appendix A: The Performance of Splunk 307 Appendix B: Useful Splunk Apps 323 Index 345 vi

4 Contents About the Authors About the Technical Reviewer Acknowledgments xv xvii xix Chapter 1: Big Data and Splunk 1 What Is Big Data? 1 Alternate Data Processing Techniques 4 What Is Splunk? 5 About This Book 6 Chapter 2: Getting Data into Splunk 9 Variety of Data 9 How Splunk deals with a variety of data 10 Files & Directories 11 Data Generator 17 Generate Sample Data 18 Network Sources 22 Windows data 23 Other Sources 23 Apps and Add-ons 23 Forwarders 29 Summary 30 vii

5 HChapter 3: Processing and Analyzing the Data 31 Getting to Know Combined Access Log Data 31 Searching and Analyzing Indexed Data 33 Reporting 41 Which Are the Top Browsers? 41 Top Five IP Addresses 44 Which Are the Top Referral Web Sites? 45 How Many Events Have HTTP 404 Status? 47 How Many Events Have Purchase Action? 49 List of Products That Are Part of a Purchase 50 Sorting 52 Filtering 53 Adding and Evaluating Fields 54 Grouping 56 Summary 62 A Chapter 4: Visualizing the Results 63 Data Visualization 63 How Splunk Deals with Visualization 63 Chart 70 Chart the Number of GET and POST for Each Host 70 Chart the Purchases and Views for Each Product Category 72 Which Product Categories Are Affected by HTTP 404 Errors? 73 Purchasing Trend for MyGizmoStore. com 74 Duration of Transactions 76 Timechart 77 Top Purchases by Product 77 Page Views and Purchases 79 Visualization Using Google Maps App 80 viii

6 Globe 83 Dashboards 86 Summary 96 BChapter 5: Defining Alerts 97 What Are Alerts? 97 How Splunk Provides Alerts 97 Alert based on product sales 98 Alert on failed logins 102 Alerts on critical errors in log files 105 Summary 108 SChapter 6: Web Site Monitoring 109 Monitoring web sites 109 IT Operations 110 Hits by host 110 Hits by host without internal access 111 Traffic with good HTTP status 112 Traffic with bad HTTP status 113 Top pages by bad HTTP status 115 Business User demographics by region Bounce rate Unique visitors 120 Summary 125 SChapter 7: Using Log Files To Create Advanced Analytics 127 Traditional Analytics 127 A Paradigm Change Semantic Logging Logging Best Practices 137 Summary 138 ix

7 Chapter 8: The Airline On-Time Performance Project 139 Summary 141 Chapter 9: Getting the Flight Data into Splunk 143 Working with CSV Files 143 The Flight Data 143 Downloading the Data 144 Getting to Know the Flight Data 145 Timestamp Considerations 147 Mapping Fields to a Timestamp 148 Indexing All the Flight Data 155 Indexing Data from a Relational Database 156 Defining a New Database Connection 156 Database Monitoring 158 Summary 160 Chapter 10: Analyzing Airlines, Airports, Flights, and Delays 161 Analyzing Airlines 161 Counting Airlines 162 Visualizing Results 165 Analyzing Airports 168 Analyzing Flights 172 Analyzing Delays 177 Delays by Airline 177 Causes of Delays by Airport 179 Winter versus Summer Delays 181 Creating and Using Macros 183 Report Acceleration 185 Accelerating Statistics 188 Summary 193 X

8 Chapter 11: Analyzing a Specific Flight Over the Years 195 Airline Names 195 Automating Field Lookups 202 Creating Lookup Tables from Searches 203 United Flight Summary 209 Chapter 12: Analyzing Tweets 211 Tapping the Sample Stream 212 Loading the Tweets into Splunk 215 A Day in Twitter 217 Most Popular Words 220 Real-Time Twitter Trends 223 Summary 229 Chapter 13: Analyzing Foursquare Check-Ins 231 The Check-In Format 232 Reverse Geocoding 234 Time Zone Considerations 235 Loading the Check-Ins 236 Analyzing the Check-Ins 239 The Sunday Brunch Search 239 Google Maps and the Top Venue 244 Check-Ins Patterns of a Venue 246 Venues by Number of Check-Ins 247 Analyzing Gender Activities 250 Summary 253 Chapter 14: Sentiment Analysis 255 Opinions, Views, Beliefs, Convictions 255 Commercial Uses 256 The Technical Side of Sentiment Analysis 257 xi

9 The Sentiment Analysis App 259 Globally Enabling Commands 260 Finding Sentiments 261 Training and Testing Data 265 The World Sentiment Indicator Project 269 Collecting the RSS Feeds 271 Indexing the Headlines into Splunk 272 Defining the Sentiment Corpus 276 Visualizing the Results 278 Summary 282 Chapter 15: Remote Data Collection 283 Forwarders 283 Popular Topologies 284 Installing a Forwarder 286 Deployment Server 289 Configuring the Deployment Server 291 Configuring the Forwarders 292 Deployment Monitor 292 Summary 294 HChapter 16: Scaling and High Availability 295 Scaling Splunk 295 Clustering 301 Setting up a Cluster 303 Summary 306 BAppendix A: The Performance of Splunk 307 Types of Searches 307 Search Performance Profiles 308 Needle in the Haystack 310 Distributed Searches 311 xii

10 Indexing Performance 315 Disk Speed and Searches 316 Understanding your Splunk Environment 318 Most Expensive Searches 318 Historic RunTimes 319 Categorizing Searches 320 Search Head Performance 321 Summary 322 Appendix B: Useful Splunk Apps 323 Splunk Apps 323 Splunk for Oracle WebLogic Server 325 Splunk Hadoop Connect 326 Splunk App for Microsoft Exchange 327 Technology Add-on for Microsoft SQLServer 2012 and 2008r2 328 Splunk App for AWS usage tracking 329 Splunk for FISMA 330 Splunk App for PCI Compliance 331 Splunk App for Enterprise Security 332 Splunk for RSA SecurlD Appliances 333 Splunk App for VMWare 334 Splunk App for HadoopOps 335 Splunk App for Active Directory 336 Splunk on Splunk (S.o.S) 337 Splunk for Nagios 338 Splunk App for Snort 339 Cisco Security Suite 340 Splunk for Palo Alto Networks 341 Splunk for Juniper Firewalls 342 Splunk for Barracuda Networks Web Application Firewall 343 Index 345 xiii

Expert Oracle Application. Express Security. Scott Spendolini. Apress"

Expert Oracle Application. Express Security. Scott Spendolini. Apress Expert Oracle Application Express Security Scott Spendolini Apress" Contents Foreword About the Author About the Technical Reviewer Acknowledgments Introduction xv xvii xix xxi xxiii BChapter 1: Threat

More information

NetFlow Analytics for Splunk

NetFlow Analytics for Splunk NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...

More information

Office and SharePoint

Office and SharePoint Office and SharePoint 2010 User's Guide Integrating SharePoint with Excel, Outlook, Access and Word Michael P. Antonovich Apress About the Author About the Technical Reviewer Acknowledgments xvi xvii xviii

More information

Practical Hadoop. Security. Bhushan Lakhe

Practical Hadoop. Security. Bhushan Lakhe Practical Hadoop Security Bhushan Lakhe Contents J About the Author About the Technical Reviewer Acknowledgments Introduction xiii xv xvii xix Part I: Introducing Hadoop and Its Security 1 Chapter 1: Understanding

More information

"Charting the Course... MOC 20409 B Server Virtualization with Windows Hyper-V and System Center. Course Summary

Charting the Course... MOC 20409 B Server Virtualization with Windows Hyper-V and System Center. Course Summary Description Course Summary This five day course will provide you with the knowledge and skills required to design and implement Microsoft Server solutions using Hyper-V and System. Objectives At the end

More information

Building a Data Warehouse

Building a Data Warehouse Building a Data Warehouse With Examples in SQL Server EiD Vincent Rainardi BROCHSCHULE LIECHTENSTEIN Bibliothek Apress Contents About the Author. ; xiij Preface xv ^CHAPTER 1 Introduction to Data Warehousing

More information

Training Guide: Configuring Windows8 8

Training Guide: Configuring Windows8 8 Training Guide: Configuring Windows8 8 Scott D. Lowe Derek Schauland Rick W. Vanover Introduction System requirements Practice setup instructions Acknowledgments Errata & book support We want to hear from

More information

Introduction. Chapter 1 Why Understanding Your Web Traffic Is Important to Your Business 3

Introduction. Chapter 1 Why Understanding Your Web Traffic Is Important to Your Business 3 Contents Foreword Introduction xix xxi Part I Measuring Success 1 Chapter 1 Why Understanding Your Web Traffic Is Important to Your Business 3 Website Measurement Why Do This?... 4 Information Web Analytics

More information

Pro SQL Server 2008 Pol icy-based. Management. Ken Simmons. Colin Stasiuk. Jorge Segarra. Apress8

Pro SQL Server 2008 Pol icy-based. Management. Ken Simmons. Colin Stasiuk. Jorge Segarra. Apress8 Pro SQL Server 2008 Pol icy-based Management Ken Simmons Colin Stasiuk Jorge Segarra Apress8 Contents Contents at a Glance Contents About the Authors About the Technical Reviewers Acknowledgments Introduction

More information

Beginning Windows 8. Mike Halsey Microsoft MVP for Windows. Apress*

Beginning Windows 8. Mike Halsey Microsoft MVP for Windows. Apress* Beginning Windows 8 Mike Halsey Microsoft MVP for Windows Apress* Contents at a Glance About the Author About the Technical Reviewers Acknowledgments Introduction xxi xxiii xxv xxvii Chapter 1: Introducing

More information

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix

Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment

More information

Understanding the Digital Audience

Understanding the Digital Audience Understanding the Digital Audience How Splunk Software is Used to Find the Needle and See the Whole Haystack CUSTOMER profile Splunk customer profiles are a collection of innovative, in-depth use cases

More information

Windows PowerShell Cookbook

Windows PowerShell Cookbook Windows PowerShell Cookbook Lee Holmes O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Foreword Preface xvii xxi Part I. Tour A Guided Tour of Windows PowerShell

More information

System Administration of Windchill 10.2

System Administration of Windchill 10.2 System Administration of Windchill 10.2 Overview Course Code Course Length TRN-4340-T 3 Days In this course, you will gain an understanding of how to perform routine Windchill system administration tasks,

More information

SAS. 9.4 Guide to Software Updates. SAS Documentation

SAS. 9.4 Guide to Software Updates. SAS Documentation SAS 9.4 Guide to Software Updates SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2013. SAS 9.4 Guide to Software Updates. Cary, NC: SAS Institute

More information

Expert Oracle Enterprise

Expert Oracle Enterprise Expert Oracle Enterprise Manager 12c Kellyn Pot'vin Anand Akela Gokhan Atil Bobby Curtis Alex Gorbachev Niall Litchfield Leighton Nelson Pete Sharman Apress' Contents J About the Authors About the Technical

More information

Pro SQL Server 2012. Reporting Services. Third Edition. mm m. Brian McDonald. Shawn McGehee. Rodney Landrum. Apress*

Pro SQL Server 2012. Reporting Services. Third Edition. mm m. Brian McDonald. Shawn McGehee. Rodney Landrum. Apress* Pro SQL Server 2012 Reporting Services Third Edition mm m Brian McDonald Shawn McGehee Rodney Landrum Apress* Contents About the Authors About the Technical Reviewers Acknowledgments m Introduction xvn

More information

This document details the procedure for installing Layer8 software agents and reporting dashboards.

This document details the procedure for installing Layer8 software agents and reporting dashboards. Quick Start Guide This document details the procedure for installing Layer8 software agents and reporting dashboards. Deployment to data analysis takes approximately 15 minutes. If you wish to deploy via

More information

Nasuni Management Console Guide

Nasuni Management Console Guide Nasuni Management Console Guide Version 5.5 April 2014 2014 Nasuni Corporation All Rights Reserved Document Information Nasuni Management Console Guide Version 5.5 April 2014 Copyright Copyright 2010-2014

More information

"Charting the Course... ... to Your Success!" MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary

Charting the Course... ... to Your Success! MOC 50331 D Windows 7 Enterprise Desktop Support Technician Course Summary Description Course Summary This course provides students with the knowledge and skills needed to isolate, document and resolve problems on a Windows 7 desktop or laptop computer. It will also help test

More information

Release 6.2.1 System Administrator s Guide

Release 6.2.1 System Administrator s Guide IBM Maximo Release 6.2.1 System Administrator s Guide Note Before using this information and the product it supports, read the information in Notices on page Notices-1. First Edition (January 2007) This

More information

ZTE Australia Help Guides MF91

ZTE Australia Help Guides MF91 MF91 Gaming & IP Services Configuration Guides Introduction The purpose of this document is to walk you through the setup of your MF91 for Gaming or any other usage that requires transparency of data traffic

More information

Data Warehousing in the Age of Big Data

Data Warehousing in the Age of Big Data Data Warehousing in the Age of Big Data Krish Krishnan AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD * PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of Elsevier

More information

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

Apple Pro Training Series. OS X Server. Essentials. Arek Dreyer. and Ben Greisler

Apple Pro Training Series. OS X Server. Essentials. Arek Dreyer. and Ben Greisler Apple Pro Training Series OS X Server Essentials Arek Dreyer and Ben Greisler Table of Contents Configuring and Monitoring OS X Server Lesson 1 About This Guide 3 Learning Methodology 4 Lesson Structure

More information

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts DETAILED REPORT LIST Track which users, when and for how long they used an application on Remote Desktop Services (formerly Terminal Services) and Citrix XenApp (known as Citrix Presentation Server). These

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,

More information

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks _Firewall Palo Alto Networks is the next-generation firewalls that enhance your network security and enable any enterprises to look beyond IP addresses and packets. These innovative firewalls let you see

More information

Introduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1

Introduction. Acknowledgments Support & Feedback Preparing for the Exam. Chapter 1 Plan and deploy a server infrastructure 1 Introduction Acknowledgments Support & Feedback Preparing for the Exam xv xvi xvii xviii Chapter 1 Plan and deploy a server infrastructure 1 Objective 1.1: Design an automated server installation strategy...1

More information

AppFabric. Pro Windows Server. Stephen Kaufman. Danny Garber. Apress. INFORMATIONSBIBLIOTHbK TECHNISCHE. U N! V En SIT AT S R!

AppFabric. Pro Windows Server. Stephen Kaufman. Danny Garber. Apress. INFORMATIONSBIBLIOTHbK TECHNISCHE. U N! V En SIT AT S R! Pro Windows Server AppFabric Stephen Kaufman Danny Garber Apress TECHNISCHE INFORMATIONSBIBLIOTHbK T1B/UB Hannover 133 294 706 U N! V En SIT AT S R! B L' OT H E K HANNOVER Contents it Contents at a Glance

More information

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with

More information

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0

Contents. Platform Compatibility. GMS SonicWALL Global Management System 5.0 GMS SonicWALL Global Management System 5.0 Contents Platform Compatibility...1 New Features and Enhancements...2 Known Issues...6 Resolved Issues...6 Installation Procedure...7 Related Technical Documentation...8

More information

Oracle Web Cache 11g Overview

<Insert Picture Here> Oracle Web Cache 11g Overview Oracle Web Cache 11g Overview Oracle Web Cache Oracle Web Cache is a secure reverse proxy cache and a compression engine deployed between Browser and HTTP server Browser and Content

More information

Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction

Contents. Part 1 SSH Basics 1. Acknowledgments About the Author Introduction Acknowledgments xv About the Author xvii Introduction xix Part 1 SSH Basics 1 Chapter 1 Overview of SSH 3 Differences between SSH1 and SSH2 4 Various Uses of SSH 5 Security 5 Remote Command Line Execution

More information

Contents. iii. ix xi xi xi xiii xiii xiii xiv xv xvi xvii xix

Contents. iii. ix xi xi xi xiii xiii xiii xiv xv xvi xvii xix What s New in Microsoft Office Project 2003 Getting Help Getting Help with This Book and Its CD-ROM Getting Help with Microsoft Office Project 2003 Using the Book s CD-ROM What s on the CD-ROM System Requirements

More information

Splunk: Using Big Data for Cybersecurity

Splunk: Using Big Data for Cybersecurity Next Session Begins at 14:40 Splunk: Using Big Data for Cybersecurity Joe Goldberg Splunk Splunk: Using Big Data for Cybersecurity Joseph Goldberg Splunk Advanced Threats in the Headlines Cyber Criminals

More information

9/26/2013. Installer.ps1 will validate all settings before deployment. Define your deployment. Define your deployment Run PDT Downloader

9/26/2013. Installer.ps1 will validate all settings before deployment. Define your deployment. Define your deployment Run PDT Downloader 1 Server Roles and Features.NET Framework 3.51.NET Framework 4.5 IIS Web Server IIS Default Document IIS Directory Browsing IIS HTTP Errors IIS Static Content IIS HTTP Redirection IIS HTTP Logging IIS

More information

The Definitive Guide to Google AdWords

The Definitive Guide to Google AdWords The Definitive Guide to Google AdWords Create Versatile and Powerful Marketing and Advertising Campaigns a ii a Bart Weller Lori Calcott Apress* Contents y About the Author About the Technical Reviewer

More information

Table of Contents. Introduction

Table of Contents. Introduction viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification

More information

Introduction to Web Analytics Terms

Introduction to Web Analytics Terms Introduction to Web Analytics Terms N10014 Introduction N40002 This glossary provides definitions for common web analytics terms and discusses their use in Unica Web Analytics. The definitions are arranged

More information

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Foreword p. xvii Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Information to Management p. 5 Example of an

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

WebEOC Product Suite Comparison

WebEOC Product Suite Comparison WebEC Product Suite Comparison WebEC is a robust incident management tool with offerings available to support organizations of every size. Use the chart below to compare availability of user functions,

More information

Social Network for Monitoring Behavior Change

Social Network for Monitoring Behavior Change Social Network for Monitoring Behavior Change Senior Design Group 11 Client: Yolanda Coil Advisor: Simanta Mitra Team #11: Gavin Monroe Nicholas Schramm Davendra Jayasingam Executive Summary This project

More information

SQL Server Integration Services Design Patterns

SQL Server Integration Services Design Patterns SQL Server Integration Services Design Patterns Second Edition Andy Leonard Tim Mitchell Matt Masson Jessica Moss Michelle Ufford Apress* Contents J First-Edition Foreword About the Authors About the Technical

More information

For Splunk Universal Forwarder and Splunk Cloud

For Splunk Universal Forwarder and Splunk Cloud Quick Start Guide; For Splunk Universal Forwarder and Splunk Cloud This document details the procedure for manually installing Layer8 software agents, and forwarding data to an existing Splunk Enterprise

More information

Junos WebApp Secure 5.0.0-10 (formerly Mykonos)

Junos WebApp Secure 5.0.0-10 (formerly Mykonos) Junos WebApp Secure 5.0.0-10 (formerly Mykonos) Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net April, 2013 Juniper Networks, Inc.

More information

Splunk Company Overview

Splunk Company Overview Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected

More information

Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.

Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved. Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio

More information

Using Google Analytics

Using Google Analytics Using Google Analytics Overview Google Analytics is a free tracking application used to monitor visitors to your website in order to provide site designers with a fuller knowledge of their audience. At

More information

1. Amendment of Section I. Invitation to Bid item no. 6 and 7 are hereby amended as follows: From:

1. Amendment of Section I. Invitation to Bid item no. 6 and 7 are hereby amended as follows: From: Republic of the Philippines Department of Finance INSURANCE COMMISSION 1071 United Nations Avenue Manila BIDS AND AWARDS COMMITTEE SUPPLEMENTAL BID BULLETIN NO. 2 SUPPLY, DELIVERY, INSTALLATION AND COMMISSIONING

More information

Intelligence Using Excel

Intelligence Using Excel PowerPivot for Business Intelligence Using Excel and SharePoint Barry Ralston Apress* About the Author About the Technical Reviewer xi xii Acknowledgments Chapter 1: Getting Started with PowerPivot for

More information

Development in Azure. Dan Gartner Developer Technology Specialist Microsoft

Development in Azure. Dan Gartner Developer Technology Specialist Microsoft Development in Azure Dan Gartner Developer Technology Specialist Microsoft MSDN Azure Benefits Visual Studio / Azure Integration Azure SDK 2.5 Visual Studio Online Build and Load Test Application Insights

More information

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Our Systems Experience, Specifically:

Our Systems Experience, Specifically: Our Systems Experience, Specifically: This list is not all encompassing; if you are looking for something in particular that is not listed, we hope you please call or email. Windows Server 2003/XP/Vista

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Assignment # 1 (Cloud Computing Security)

Assignment # 1 (Cloud Computing Security) Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual

More information

Monitoring System Status

Monitoring System Status CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,

More information

Beginning Oracle. Application Express 4. Doug Gault. Timothy St. Hilaire. Karen Cannell. Martin D'Souza. Patrick Cimolini

Beginning Oracle. Application Express 4. Doug Gault. Timothy St. Hilaire. Karen Cannell. Martin D'Souza. Patrick Cimolini Beginning Oracle Application Express 4 Doug Gault Karen Cannell Patrick Cimolini Martin D'Souza Timothy St. Hilaire Contents at a Glance About the Authors Acknowledgments iv xv xvil 0 Chapter 1: An Introduction

More information

Guide to Analyzing Feedback from Web Trends

Guide to Analyzing Feedback from Web Trends Guide to Analyzing Feedback from Web Trends Where to find the figures to include in the report How many times was the site visited? (General Statistics) What dates and times had peak amounts of traffic?

More information

Dashboard. Aug 22, 2011 - Aug 28, 2011 Comparing to: Site. 199 Visits. 43.72% Bounce Rate. 658 Pageviews. 00:02:54 Avg. Time on Site. 3.

Dashboard. Aug 22, 2011 - Aug 28, 2011 Comparing to: Site. 199 Visits. 43.72% Bounce Rate. 658 Pageviews. 00:02:54 Avg. Time on Site. 3. Dashboard, 211 - Aug 28, 211 5 5 Site Usage 199 43.72% Bounce Rate 658 :2:54 Site 3.31 s/visit 14.57% % New Content by Title Title % visits (not set) 86 13.7% Institutional Marketing 84 12.77% University

More information

Web Load Stress Testing

Web Load Stress Testing Web Load Stress Testing Overview A Web load stress test is a diagnostic tool that helps predict how a website will respond to various traffic levels. This test can answer critical questions such as: How

More information

Practical Android Projects Lucas Jordan Pieter Greyling

Practical Android Projects Lucas Jordan Pieter Greyling Practical Android Projects Lucas Jordan Pieter Greyling Apress s w«^* ; i - -i.. ; Contents at a Glance Contents --v About the Authors x About the Technical Reviewer xi PAcknowiedgments xii Preface xiii

More information

Log files management. Katarzyna KAPUSTA

Log files management. Katarzyna KAPUSTA Log files management Katarzyna KAPUSTA CERN openlab 07 September 2012 CERN openlab otn-2012-01 openlab Summer Student Report Log files management Katarzyna KAPUSTA Giacomo TENAGLIA 07 September 2012 Version

More information

Ignify ecommerce. Item Requirements Notes

Ignify ecommerce. Item Requirements Notes wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor

More information

WebEx Meeting Center User Guide

WebEx Meeting Center User Guide WebEx Meeting Center User Guide For Hosts, Presenters, and Attendees 8.17 Copyright 1997 2010 Cisco and/or its affiliates. All rights reserved. WEBEX, CISCO, Cisco WebEx, the CISCO logo, and the Cisco

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

WHITE PAPER Closing the Loop on Social Leads. A Hootsuite & 2DiALOG HubSpot White Paper

WHITE PAPER Closing the Loop on Social Leads. A Hootsuite & 2DiALOG HubSpot White Paper WHITE PAPER Closing the Loop on Social Leads A Hootsuite & 2DiALOG HubSpot White Paper Closing the Loop on Social Leads A Guide to Measuring Social Media Lead Generation Social media has outgrown its infancy

More information

Contents. 1 Introduction. 2 Feature List. 3 Feature Interaction Matrix. 4 Feature Interactions

Contents. 1 Introduction. 2 Feature List. 3 Feature Interaction Matrix. 4 Feature Interactions 1 Introduction 1.1 Purpose and Scope................................. 1 1 1.2 Organization..................................... 1 2 1.3 Requirements Notation............................... 1 2 1.4 Requirements

More information

Security. AAA Identity Management. Premdeep Banga, CCIE #21713. Cisco Press. Vivek Santuka, CCIE #17621. Brandon J. Carroll, CCIE #23837

Security. AAA Identity Management. Premdeep Banga, CCIE #21713. Cisco Press. Vivek Santuka, CCIE #17621. Brandon J. Carroll, CCIE #23837 AAA Identity Management Security Vivek Santuka, CCIE #17621 Premdeep Banga, CCIE #21713 Brandon J. Carroll, CCIE #23837 Cisco Press 800 East 96th Street Indianapolis, IN 46240 ix Contents Introduction

More information

Beginning SQL Server. 2012 Administration. Apress. Rob Walters Grant Fritchey

Beginning SQL Server. 2012 Administration. Apress. Rob Walters Grant Fritchey Beginning SQL Server 2012 Administration Rob Walters Grant Fritchey Apress Contents at a Glance About the Authors About the Technical Reviewer Acknowledgments Introduction xv xvi xvii xviii Chapter 1:

More information

Monitoring Remote Access VPN Services

Monitoring Remote Access VPN Services CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,

More information

Security Information/Event Management Security Development Life Cycle Version 5

Security Information/Event Management Security Development Life Cycle Version 5 Security Information/Event Management Security Development Life Cycle Version 5 If your enterprise is like most, you are collecting logs from most every device with security relevance. The flood of events

More information

About the Authors Acknowledgments Foreword Prologue: Our Story Introduction: Social Media What It Is and Why We Wrote This Book

About the Authors Acknowledgments Foreword Prologue: Our Story Introduction: Social Media What It Is and Why We Wrote This Book About the Authors Acknowledgments Foreword Prologue: Our Story Introduction: Social Media What It Is and Why We Wrote This Book xi xiii xv xvii xix Part I: Overview of Social Media and Its Role in the

More information

ETPG6 Five Low-Cost Security Takeaways 8/21 (Thursday) @ 3:30pm Governor s Ballroom CD. Presented by Jerry Askew, Eric Richards & Kevin Svec

ETPG6 Five Low-Cost Security Takeaways 8/21 (Thursday) @ 3:30pm Governor s Ballroom CD. Presented by Jerry Askew, Eric Richards & Kevin Svec ETPG6 Five Low-Cost Security Takeaways 8/21 (Thursday) @ 3:30pm Governor s Ballroom CD Presented by Jerry Askew, Eric Richards & Kevin Svec Presenters: Jerry Askew, Eric Richards & Kevin Svec Five Low-Cost

More information

DocuShare User Guide

DocuShare User Guide DocuShare User Guide Publication date: April 2011 This document supports DocuShare Release 6.6.1 Prepared by: erox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California 94304 USA

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

TIBCO Rendezvous Administration. Software Release 8.3.0 July 2010

TIBCO Rendezvous Administration. Software Release 8.3.0 July 2010 TIBCO Rendezvous Administration Software Release 8.3.0 July 2010 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY

More information

GOOGLE MOBILE ANALYTICS INTEGRATION. JANUARY 2013 (App version 3.0.8 onwards)

GOOGLE MOBILE ANALYTICS INTEGRATION. JANUARY 2013 (App version 3.0.8 onwards) GOOGLE MOBILE ANALYTICS INTEGRATION JANUARY 2013 (App version 3.0.8 onwards) What is Google Mobile Analytics? Google Mobile Analytics is a service to show how users interact with their websites and mobile

More information

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution

Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Quick Start 5: Introducing and configuring Websense Cloud Web Security solution Websense Support Webinar April 2013 TRITON STOPS MORE THREATS. WE CAN PROVE IT. 2013 Websense, Inc. Page 1 Presenter Greg

More information

Technology Partners. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009.

Technology Partners. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009. We create innovative software solutions for SharePoint, Office 365, MS Windows Remote Desktop Services, and

More information

Transparent Inline Filter (Recommended) - Figure 1 - -

Transparent Inline Filter (Recommended) - Figure 1 - - ently identify the user using their Active Directory credentials. Transparent Inline Filter (Recommended) Figure 1 FailSafe Bypass Interfaces are available. (Optional FailSafe and Fiber available) Figure

More information

Dream Report. Industrial and Municipal. Water and Wastewater. OCEAN DATA SYSTEMS The Art of Industrial Intelligence

Dream Report. Industrial and Municipal. Water and Wastewater. OCEAN DATA SYSTEMS The Art of Industrial Intelligence Dream Report OCEAN DATA SYSTEMS The Art of Industrial Intelligence User Friendly & Programming Free Reporting. Water and Wastewater Industrial and Municipal Applications 40-CFR-141 EPA and State Reports

More information

disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM

disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM disect Systems Logging Snort alerts to Syslog and Splunk PRAVEEN DARSHANAM INTRODUCTION Snort is an open source network Intrusion Detection and Prevention Systems (IDS/IPS) developed by Martin Roesch capable

More information

Pro Puppet. Jeffrey McCune. James TurnbuII. Apress* m in

Pro Puppet. Jeffrey McCune. James TurnbuII. Apress* m in Pro Puppet m in James TurnbuII Jeffrey McCune Apress* About the Authors About the Technical Reviewer Acknowledgments Introduction Chapter 1: Getting Started with Puppet What Is Puppet? Deployment Configuration

More information

"Charting the Course...... to Your Success!" MOC 50290 A Understanding and Administering Windows HPC Server 2008. Course Summary

Charting the Course...... to Your Success! MOC 50290 A Understanding and Administering Windows HPC Server 2008. Course Summary Description Course Summary This course provides students with the knowledge and skills to manage and deploy Microsoft HPC Server 2008 clusters. Objectives At the end of this course, students will be Plan

More information

Network Monitoring Comparison

Network Monitoring Comparison Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification 1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.

More information

BSM 9.0 ESSENTIALS. Instructor-Led Training

BSM 9.0 ESSENTIALS. Instructor-Led Training BSM 9.0 ESSENTIALS Instructor-Led Training INTENDED AUDIENCE New users of Business Service Management (BSM) 9.0, including: Database Administrators System Administrators Network Administrators Operations

More information

Office 2010 Workflow;

Office 2010 Workflow; Office 2010 Workflow; Developing Collaborative Solutions MARK J. COLLINS Apress* Contents Preface About the Author About the Technical Reviewers Acknowledgements Introduction xix xxi xxii xxiii xxiv PART

More information

THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS.

THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS. THIS SERVICE LEVEL AGREEMENT (SLA) DEFINES GUARANTEED SERVICE LEVELS PROVIDED TO YOU BY INFRONT WEBWORKS. I. Service Definition Infront Webworks, will provide you with cloud based services and other application

More information

Where can I install GFI EventsManager on my network?

Where can I install GFI EventsManager on my network? Installation Introduction Where can I install GFI EventsManager on my network? GFI EventsManager can be installed on any computer which meets the minimum system requirements irrespective of the location

More information

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase,

1Fortinet. 2How Logtrust. Firewall technologies from Fortinet offer integrated, As your business grows and volumes of data increase, Fortinet 1Fortinet Firewall technologies from Fortinet offer integrated, high-performance protection against today s wide range of threats targeting applications, data and users. Fortinet s firewall technology

More information

SEACW DELIVERABLE D.1.6

SEACW DELIVERABLE D.1.6 SEACW DELIVERABLE D.1.6 Validation Methodology Specifications Project Acronym SEACW Grant Agreement No. 325146 Project Title Deliverable Reference Number Deliverable Title Social Ecosystem for Antiaging,

More information

Fortinet FortiGate App for Splunk

Fortinet FortiGate App for Splunk SOLUTION BRIEF Fortinet FortiGate App for Splunk Threat Investigation Made Easy The FortiGate App for Splunk combines the best security information and event management (SIEM) and threat prevention by

More information