Manual cherry-pick of 12994 (#13002)

* Manual cherry-pick of 12994

* fix keywords

* Update content/en/blog/2023/network-security-splunk/index.md

Co-authored-by: Eric Van Norman <ericvn@us.ibm.com>

---------

Co-authored-by: Eric Van Norman <ericvn@us.ibm.com>
This commit is contained in:
Frank Budinsky 2023-04-05 10:50:10 -04:00 committed by GitHub
parent 297be8d926
commit ce3519d8dc
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 2 additions and 3 deletions

View File

@ -197,7 +197,6 @@ Cale
CDNs
CentOS
Cernich
ChatGPT
checksum
Chrony
Chun

View File

@ -2,7 +2,7 @@
title: "Comprehensive Network Security at Splunk"
description: "Security from Layer 3 to Layer 7 with Istio and more."
publishdate: 2023-04-03
attribution: "Bernard Van De Walle (Splunk), Mitch Connors (Aviatrix), ChatGPT"
attribution: "Bernard Van De Walle (Splunk), Mitch Connors (Aviatrix)"
keywords: [Istio,Security,Use Case]
---
@ -67,4 +67,4 @@ Securing Splunks Cloud Native Network Stack while meeting the scalability nee
While applying identity, observability, and policy principles at every layer in the stack may appear redundant at first glance, each layer is able to make up for the shortcomings of the others, so that together these layers form a tight and effective barrier to unwanted access.
If you are interested in diving deeper into Splunk's Network Security Stack, you can watch our Cloud Native SecurityCon [presentation](https://youtu.be/OuRQnJKIEaM). This post was generated in part by ChatGPT summarizing a transcript of that presentation.
If you are interested in diving deeper into Splunk's Network Security Stack, you can watch our Cloud Native SecurityCon [presentation](https://youtu.be/OuRQnJKIEaM).