Edge Processor Scaling, Energy & Manufacturing Use Cases, and More New Articles on Splunk Lantern
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark Topic
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data insights, key use cases, and tips on managing Splunk more efficiently.
We also host Getting Started Guides for a range of Splunk products, a library of Product Tips, and Data Descriptor articles that help you see everything that’s possible with data sources and data types in Splunk.
This month we’re focusing on a series of new Edge Processor articles designed to help you quickly grow your Edge Processor footprint. We’re also featuring three Operational Technology use cases for customers in the energy and manufacturing sectors, as well as sharing details on all of the other new use cases we’ve published over the past month. Read on to find out more.
Scaling Edge Processor Infrastructure
Lantern is growing its library of Edge Processor articles with a series of product tips that show you how to scale Edge Processor using Amazon EKS, helping you to alleviate scaling challenges and provide a fast on-ramp for growing your Edge Processor footprint in a rapid and easily supported way.
This series introduces you to a process for scaling with a number of articles that should be read in order. To start, Scaling Edge Processor infrastructure introduces you to different scaling scenarios, exploring the pros and cons of scaling up versus scaling out so you can decide the approach that’s right for your organization.
Establishing authentication requirements for node scaling automation helps you to understand and prepare for on-demand authentication so you’re well-prepared to build dynamic scaling for Edge Processor.
Running Edge Processor in containers shows you how to run Edge Processor in containers, a best-practice method that helps alleviate a lot of the technical and administrative work found in typical infrastructure scale-out.
After you have Edge Processor nodes running from containers, you can move on to deploying, scaling, and managing those containers with Kubernetes. Running Edge Processor nodes in Amazon EKS lays out step-by-steps you can follow to do this.
Finally, Load balancing traffic to Edge Processors in Amazon EKS shows you how to create a path from data sources into Edge Processor nodes that are running in containers, finishing up the whole process.
The context and detailed explanations in this series of articles should help you develop a dynamically scaled Edge Processor infrastructure ready to meet your data routing needs. Click here to see all of our Edge Processor articles, and let us know in the comments below what other Edge Processor articles you’d like to see on Lantern!
Optimizing Operational Technology
Many energy and manufacturing customers utilize Operational Technology (OT) systems to control processes, devices, and infrastructure, so we’re excited to publish a set of new articles to Lantern’s Use Case Explorer for the Splunk Platform that focus on this area.
Monitoring ingress and egress traffic across Operational Technology perimeters shows you how to identify threats and gain insights into the traffic that flows across OT perimeters, or airgaps, with six different searches you can use to identify traffic moving in different ways.
Many organizations use remote desktop connections to allow support staff and vendors access into OT environments, but these connections can open up organizations to threats which could shut down critical operations. Monitoring remote access to Operational Technology environments shows you how you can prevent this by utilizing search and building dashboards that help you to monitor access through remote access hosts.
Finally, Monitoring removable media devices in Operational Technology environments shows you how to prevent security breaches caused by connected removable media devices such as USB devices. It contains a number of searches for you to use to identify removable media usage, as well as allowlisting any devices that have been approved by your organization.
We hope that these new use cases provide value, ideas and inspiration for all of our energy and manufacturing customers! Drop a comment below if you have any questions or feedback on these articles.
This Month’s New Articles
Here are all of the other articles we’ve published throughout June:
- Monitoring applications using OpenAI API and GPT models with OpenTelemetry and Splunk APM
- Ingesting AWS S3 data written by ingest actions
- Applying Zipf's law in fraud detection
- Deploying Workload Identity Federation between AWS and GCP
What Else?
If you’re looking for more ways to access industry-specific guidance, Lantern’s industry-specific articles from the Use Case Explorer for the Splunk Platform are now searchable through the Resources section of splunk.com. We’re always looking for more ways to help you surface helpful content from Lantern, and we hope that this gives you one more way to find use cases that help you get even more value from your Splunk deployment.
We hope you’ve found this update helpful. Thanks for reading!
Kaye Chapman, Senior Lantern Content Specialist for Splunk Lantern