{"id":62076,"date":"2024-05-05T14:11:31","date_gmt":"2024-05-05T09:41:31","guid":{"rendered":"https:\/\/www.apk.co.ir\/video\/?p=62076"},"modified":"2024-05-21T14:45:39","modified_gmt":"2024-05-21T10:15:39","slug":"splunk-enterprise-security-planning-deploying-and-configuring-section-5","status":"publish","type":"post","link":"https:\/\/www.apk.co.ir\/video\/splunk-enterprise-security-planning-deploying-and-configuring-section-5\/","title":{"rendered":"Splunk Enterprise Security-Planning, Deploying, and Configuring-Section 5"},"content":{"rendered":"\n
Splunk Enterprise Security-Planning, Deploying, and Configuring-Data Models and Acceleration Overview<\/p>\n","protected":false},"excerpt":{"rendered":"
Splunk Enterprise Security-Planning, Deploying, and Configuring-Data Models and Acceleration Overview<\/p>\n","protected":false},"author":1004068,"featured_media":62359,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"video","meta":{"footnotes":""},"categories":[1],"tags":[],"cactus_badges":[],"video-series":[],"class_list":{"0":"post-62076","1":"post","2":"type-post","3":"status-publish","4":"format-video","5":"has-post-thumbnail","7":"category-security","8":"post_format-post-format-video"},"yoast_head":"\n