<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reducing Splunk authentication storms in Security</title>
    <link>https://community.splunk.com/t5/Security/Reducing-Splunk-authentication-storms/m-p/444012#M10420</link>
    <description>&lt;P&gt;Does this match your situation?&lt;/P&gt;

&lt;P&gt;&lt;A href="https://static.rainfocus.com/splunk/splunkconf18/sess/1523340475734001cAJl/finalPDF/A-Deep-Dive-Into-1379_1538782399746001rPuN.pdf"&gt;https://static.rainfocus.com/splunk/splunkconf18/sess/1523340475734001cAJl/finalPDF/A-Deep-Dive-Into-1379_1538782399746001rPuN.pdf&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 31 May 2020 22:15:54 GMT</pubDate>
    <dc:creator>nagrajkulkarni</dc:creator>
    <dc:date>2020-05-31T22:15:54Z</dc:date>
    <item>
      <title>Reducing Splunk authentication storms</title>
      <link>https://community.splunk.com/t5/Security/Reducing-Splunk-authentication-storms/m-p/444009#M10417</link>
      <description>&lt;P&gt;Splunk authentication is destroying my Active Directory because of frequency of authentications, our user search dn contains 100000 users, our DC's are logging around 2.5 million authentication queries a day from the Splunk service account, I have some suspicions that it is around the cache configuration, can anyone offer some advice on how to reduce this auth storm (only a 10-20 people use the app per day).&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jun 2020 16:45:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Reducing-Splunk-authentication-storms/m-p/444009#M10417</guid>
      <dc:creator>kcb</dc:creator>
      <dc:date>2020-06-07T16:45:43Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing Splunk authentication storms</title>
      <link>https://community.splunk.com/t5/Security/Reducing-Splunk-authentication-storms/m-p/444010#M10418</link>
      <description>&lt;P&gt;How broad is your groupBaseFilter set to?  userBaseDN? what is your sizelimit set to?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2019 17:17:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Reducing-Splunk-authentication-storms/m-p/444010#M10418</guid>
      <dc:creator>rchurch0505</dc:creator>
      <dc:date>2019-08-12T17:17:39Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing Splunk authentication storms</title>
      <link>https://community.splunk.com/t5/Security/Reducing-Splunk-authentication-storms/m-p/444011#M10419</link>
      <description>&lt;P&gt;Make sure you do NOT have LDAP enabled on your indexers.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2019 18:16:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Reducing-Splunk-authentication-storms/m-p/444011#M10419</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2019-08-12T18:16:49Z</dc:date>
    </item>
    <item>
      <title>Re: Reducing Splunk authentication storms</title>
      <link>https://community.splunk.com/t5/Security/Reducing-Splunk-authentication-storms/m-p/444012#M10420</link>
      <description>&lt;P&gt;Does this match your situation?&lt;/P&gt;

&lt;P&gt;&lt;A href="https://static.rainfocus.com/splunk/splunkconf18/sess/1523340475734001cAJl/finalPDF/A-Deep-Dive-Into-1379_1538782399746001rPuN.pdf"&gt;https://static.rainfocus.com/splunk/splunkconf18/sess/1523340475734001cAJl/finalPDF/A-Deep-Dive-Into-1379_1538782399746001rPuN.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 31 May 2020 22:15:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Reducing-Splunk-authentication-storms/m-p/444012#M10420</guid>
      <dc:creator>nagrajkulkarni</dc:creator>
      <dc:date>2020-05-31T22:15:54Z</dc:date>
    </item>
  </channel>
</rss>

