Featured: Splunk Platform
Splunk 9.1.1 FAQ
This FAQ addresses expected questions regarding Splunk's August 2023 security advisories that can be addressed by upgrading to Splunk Enterprise 9.1.1.
Featured: Real User Monitoring
Using session replay in Splunk Real User Monitoring
Replaying sessions reduces the amount of time support teams need to troubleshoot a problem and shows you how users interact with your applications so you can improve the design.
Featured: Common Access Cards
Configuring Splunk for Common Access Card (CAC) authentication
This article contains detailed guidance on how to configure any Splunk Enterprise instance to allow access via a Department of Defense Common Access Card
Resources for Splunk Program Managers
The Splunk Success Framework
Accelerate and increase the value you derive from your data with Splunk software using the Splunk Success Framework (SSF), a flexible collection of best practices for setting up Splunk Enterprise or Splunk Cloud Platform as a program.
Data Ingestion and Application
Data Descriptors
Bring data to every question, decision, and action across your organization with comprehensive guidance for getting data in and applying data to your key use cases.
Get the latest
New Articles
- Platform
- Turn data into doing to unlock innovation, enhance security and drive resilience.
- Security
- Protect your business and modernize your security operations with a best-in-class data platform.
- Observability
- Solve problems in seconds with the only full-stack, analytics-powered, and OpenTelemetry-native observability solution.
- Splunk Success Framework
- The Splunk Success Framework (SSF) is a flexible collection of best practices for setting up your Splunk software implementation as a program.
- Data Descriptors
- The data sources in use at your organization can all be linked to common use cases. Get recommendations from Splunk experts and then start getting answers from your data.
- Antivirus data
- APM tool data
- Application server data
- Authentication data
- Backup data
- Binary repositories data
- Build systems data
- Business service data
- Code management data
- Container data
- CRM, ERP, and other business application data
- Custom application and debug data
- Database data
- Deep packet inspection data
- DHCP data
- Endpoint data
- Firewall data
- Intrusion detection and prevention data (IDS and IPS)
- Load balancer data
- Mail server data
- Medical device data
- Mobile device data
- Network access control data
- Network protocol data
- Network router data
- Network switch data
- Patch log data
- Physical card reader data
- Point of sale data
- Proxy data
- RFID/NFC/BLE data
- SNMP data
- Storage data
- System log data
- System performance data
- Telephony data
- Virtual private network data
- Virtualization data
- VoIP data
- Vulnerability scanning data
- Web server data
- DNS data
- Linux and Unix
- Okta
- SAP
- Zscaler
- Zoom
- Zeek
- Websense
- VMware
- CrowdStrike
- Carbon Black
- Kubernetes
- Check Point
- Fortinet
- Salesforce
- Symantec
- Palo Alto Networks
- Trend Micro
- Tenable
- GitHub
- Atlassian
- AppDynamics
- Dell
- Syslog
- Apache
- Amazon
- Cisco
- Microsoft
- JupiterOne
- GitLab
- Mac OS