At Discovered Intelligence the holiday season is an opportunity to celebrate our employees’ contributions to a successful year, by connecting with everyone over a big holiday dinner and surprising them with a fun holiday gift.
These gifts vary from year to year, but for the past few years we have put together a gift bag for our employees containing products from independent small businesses across Ontario, to make up a very tasty and warm gift bag. The last few years have been particularly challenging for small businesses, due to the many lockdowns and ‘shopping local’ is a great way to provide support.
Gift bag with products sourced from local Ontario businesses
Read on to find out more about the items in our employee holiday bag and the small businesses they were sourced from. We urge everyone to please not forget to continue to support small businesses in 2023!
Dried Cherries
Sourced from Cherry Lane, cherry farm in Vineland, Ontario
Since 1907, Cherry Lane has been providing tart cherries, tart cherry juice concentrate, and a variety of other fruit products to consumers. The members of the Smith family, who own and operate Cherry Lane, have always been proud to be Ontario fruit farmers.
Peanuts were introduced to the Southwestern Ontario’s sandy soils of Norfolk County in 1979, by the Picard Family. You’ll find the best quality confections, freshly roasted peanuts – in many flavours and varieties and at each of their five locations in Ontario.
Sourced from Wellesley Brand Apple Products, Wellesley, Ontario
Wellesley has been manufacturing Quality Apple Products using the finest ingredients & time-tested recipes for over 75 years. All products use Ontario grown, fresh quality apples and are naturally sweet, made without the use of added sugar or sweeteners.
Sourced from the Niagara Food Company, St Catharine’s, Ontario
Niagara Food Company has been creating home-style, gourmet meals and sweet treats since 2010. We source local ingredients to create high quality, delicious food and snacks.
Sourced from CFX – Chocolate Factory Experience, St David’s, Ontario
Carefully crafted using artisanal chocolate panning and molding techniques at their in-house chocolate factory, CFX provides an incredible assortment of products that can delight even the most discriminating palate.
Sourced from Alexander’s Fudge, Smithville, Ontario
Alexander’s Fudge was started in Smithville, Ontario in 2013 by Chris Alexander. Made with real butter and cream, Alexander’s Fudge is simply the best you’ve ever had!
The Moyer apple farm has been in the family since 1799. The company specializes in thoughtfully crafted caramel apples and gourmet sauces that look great and taste even better, so that you enjoy every bite.
Interested in learning more about working at Discovered Intelligence? Good news, we’re hiring!Click here for more details.
https://discoveredintelligence.com/wp-content/uploads/2022/12/gift_basket_2022.jpg24352268paulhttps://discoveredintelligence.com/wp-content/uploads/2013/12/DI-Logo1-300x137.pngpaul2022-12-20 16:30:382022-12-20 16:53:302022 Holiday Gift – Supporting Small Businesses in Ontario
Deploying apps to forwarders using the Deployment Server is a pretty commonplace use case and is well documented in Splunk Docs. However, it is possible to take this a step further and use it for distribution of apps to the staging directories of management components like cluster manager or a search head cluster deployer, from where apps can then be pushed out to clustered indexers or search heads.
Splunk is a great data intelligence platform when used effectively. With a full understanding of Splunk’s functionality and capabilities, it should totally consume you with it’s awesomeness and you will find yourself preaching its benefits to your entire company! Our customers are always asking for recommendations on how to better grasp the fundamentals of the platform and the following article should provide this guidance. Read more
https://discoveredintelligence.com/wp-content/uploads/2018/10/gettingstarted.jpg286420paulhttps://discoveredintelligence.com/wp-content/uploads/2013/12/DI-Logo1-300x137.pngpaul2022-07-14 12:20:002022-11-08 17:07:24Help Getting Started with Splunk
Splunk Cloud Admins rejoice! The Splunk Cloud ACS Command Line Interface is here! Originally, the Splunk Cloud Admin Config Service (ACS) was released in January 2021 to provide various self-service features for Splunk Cloud Admins. It was released as an API-based service that can be used for configuring IP allow lists, configuring outbound ports, managing HEC tokens, and many more which are all detailed in the Splunk ACS Documentation.
To our excitement Splunk has recently released a CLI version of ACS. The ACS CLI is much easier to use and less error-prone compared to the complex curl commands or Postman setup one has had to deal with to-date. One big advantage we see with the ACS CLI is how it can be used in scripted approach or within a deployment CI/CD pipeline to handle application management and index management.
We would recommend that you first refer to the ACS Compatibility Matrix to understand what features are available to the Classic and Victoria experience Splunk Cloud platforms.
ACS CLI Setup Requirements
Before you get started with the ACS CLI there are a few requirements to be aware of:
You must have the sc_admin role to be able to leverage the ACS CLI.
You must be running a Mac or Linux operating systems. However, if you are a Windows user you can use the Windows Subsystem for Linux (WSL), or any Linux VM running on Windows, to install and use the ACS CLI.
The Splunk Cloud version you are interacting with must be above 8.2.2109 to use the ACS CLI. To use Application Management functions, your Splunk Cloud version must be 8.2.2112 or greater.
Please refer to the Splunk ACS CLI documentation for further information regarding the requirements and the setup process.
ACS CLI Logging
At the time of authoring this blog, logging and auditing of interactions through the Splunk Cloud ACS is not readily available to customers. However, when using the ACS CLI it will create a local log on the system where it is being used. It is recommended that any administrators given access to work with the ACS CLI have the log file listed below collected and forwarded to the their Splunk Cloud stack. This log file can be collected using the Splunk Universal Forwarder, or other mechanism, to create an audit trail of activities.
Linux: $HOME/.acs/logs/acs.log
Mac: $HOME/Library/Logs/acs/acs.log
The acs.log allows an administrator to understand what operations were run, request IDs, status codes and much more. We will keep an eye out for Splunk adding to the logging and auditing functionality not just in the ACS CLI but ACS as a whole and provide a future blog post on the topic when available.
Interacting With The ACS CLI
Below are examples of common interactions an administrator might have with Splunk Cloud now done by leveraging the Splunk Cloud ACS CLI. There are many more self-service features supported by the ACS CLI, details of the supported features and CLI operations are available in the Splunk Cloud ACS CLI documentation.
Application Management
One of the most exciting features of the ACS CLI is the ability to control all aspects of application management. That means, using the ACS CLI you can install both private applications and Splunkbase applications.
The command is easy to understand and straightforward, for both private and Splunkbase applications it supports commands to install, uninstall, describe applications within your environment as well as a list command to return a complete list of all installed applications, with their configurations. Specific to only Splunkbase applications there is an update command which allows you to, you guessed it, update the application to the latest version published and available.
For both private and Splunkbase apps, when running a command it will prompt you to enter your splunk.com credentials. You can pass –username –password parameters along with the command to avoid prompting for credentials. For private apps these credentials will be used to authenticate to AppInspect for application vetting.
Application Management: Installing a Private App
Let’s look at how we use the ACS CLI to install a private application. The following command will install a private app named company_test_app:
acs apps install private --acs-legal-ack Y --app-package /tmp/company_test_app.tgz
Now when a private app is installed using the ACS CLI it will automatically be submitted to AppInspect for vetting. A successful execution of the command will result in the following response, which you will note includes the AppInspect summary:
Submitted app for inspection (requestId='*******-****-****-****-************') Waiting for inspection to finish... processing.. success Vetting completed, summary: { "error": 0, "failure": 0, "skipped": 0, "manual_check": 0, "not_applicable": 56, "warning": 1, "success": 161 } Vetting successful Installing the app... { "appID": "company_test_app", "label": "Company Test App", "name": "company_test_app", "status": "installed", "version": "1.0.0" }
Application Management: Installing a Splunkbase Application
Let’s now look at an example of installing a Splunkbase application by running a command to install the Config Quest application:
The licensing URL passed as a parameter in the command above can be found in the application details on Splunkbase. Additionally, by running a curl command the licensing URL can be retrieved from the Splunkbase API:
Index management using the ACS CLI supports a wide range of functionality. The supported commands allow you to create, update, delete and describe an index within your environment as well as a list command to return a list of all of the existing indexes, with their configurations.
Let’s now look at how we run one of these commands by running a command that creates a metrics index with 90 days searchable retention period. Note that ACS supports creating either event or metrics index, however it does not yet support configuring DDAA or DDSS.
Managing HTTP Event Collector (HEC) token’s just got real easy. The ACS CLI supports commands to create, update, delete and describe a HEC token within your environment as well as a list command to return a list of all of the existing HEC token’s, with their configurations.
Let’s now look at how we run one of these commands by running a command to create a HEC token in Splunk Cloud quickly and easily:
acs hec-token create --name test_token --default-index main --default-source-type test
A successful execution of the command provides the token value in the JSON response:
Planning a sequel to the blog –Moving bits around: Deploying Splunk Apps with Github Actions – led me to an interesting experiment. What if we could manage and automate the deployment server the same way, without having to log on to the server at all. After all, the deployment server is just a bunch of app directories and a serverclass.conf file.