Avatar of Rocky Cortez
Rocky Cortez

asked on 

Need a Splunk transition plan from one team to another.

I am looking for assistance on developing a Splunk transition plan from one team to another. Timeframe should be within one month.
SecurityContent Management

Avatar of undefined
Last Comment
btan
Avatar of gheist
gheist
Flag of Belgium image

Just pass admin password from one team to another? Should not take less than a minute if they know eachothers email
Avatar of giltjr
giltjr
Flag of United States of America image

To add just a bit to gheist's comment documentation on the current environment.  Things like:

What type of and how many Splunk servers you have (search head, indexers, syslog forwarders).
Do you have more than one Splunk environment.
What type of daily/weekly/monthly/yearly maintenance functions
What automated reports do you have.
Do you have Splunk doing alerting and if so on what.
How security is setup
Current license limit


You may want to have one of the new team members shadow one of the current members for a couple hours a day for a couple days a week.

I am assuming that there is some arrangement where the new team will be able to contact the old team if needed.
ASKER CERTIFIED SOLUTION
Avatar of btan
btan

Blurred text
THIS SOLUTION IS ONLY AVAILABLE TO MEMBERS.
View this solution by signing up for a free trial.
Members can start a 7-Day free trial and enjoy unlimited access to the platform.
See Pricing Options
Start Free Trial
Security
Security

Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.

32K
Questions
--
Followers
--
Top Experts
Get a personalized solution from industry experts
Ask the experts
Read over 600 more reviews

TRUSTED BY

IBM logoIntel logoMicrosoft logoUbisoft logoSAP logo
Qualcomm logoCitrix Systems logoWorkday logoErnst & Young logo
High performer badgeUsers love us badge
LinkedIn logoFacebook logoX logoInstagram logoTikTok logoYouTube logo