Featured: Splunk Platform
Implementing a reingestion pipeline for AWS logs using Kinesis Data Firehose
This article describes a solution to efficiently handle log delivery failures from Amazon Web Services (AWS) to the Splunk platform. These failures occur within the Kinesis Data Firehose pipeline, and attempting to reingest the logs into the Splunk platform can be challenging.
Featured: Splunk Synthetic Monitoring
Rigor to Splunk Synthetics Migration - Customer FAQ
Splunk will sunset the legacy Rigor platform as of February 28, 2025, and replace it with Splunk Synthetic Monitoring, which offers a similar synthetic testing experience within Splunk Observability Cloud. This document answers some frequently asked questions about this change.
Featured: Edge Processor
Reducing Windows security event log volume with Splunk Edge Processor
With terabytes of logs every month coming from endpoints, cloud, or on-premises and domain servers, large volumes of security log data can result in many problems. This article explains how Splunk Edge Processor can be used to help you better manage security event log volume.
Resources for Splunk Program Managers
Accelerate and increase the value you derive from your data with Splunk software using the Splunk Success Framework (SSF), a flexible collection of best practices for setting up Splunk Enterprise or Splunk Cloud Platform as a program.
Data Ingestion and Application
Bring data to every question, decision, and action across your organization with comprehensive guidance for getting data in and applying data to your key use cases.
Get the latest
- Data Descriptors
- The data sources in use at your organization can all be linked to common use cases. Get recommendations from Splunk experts and then start getting answers from your data.
- Antivirus and antimalware data
- Application data
- Application server data
- Authentication data
- Backup data
- Vendor-specific data
- Endpoint detection and response (EDR) data
- Intrusion detection and prevention data (IDS and IPS)
- Load balancer data
- Email data
- Network communication data
- Patch management data
- Physical security data
- Web proxy data
- Change events data
- Configuration management data
- IP address assignment data
- Vulnerability detection data
- Web server data
- DNS data
- Linux and Unix
- Carbon Black
- Check Point
- Palo Alto Networks
- Trend Micro
- Mac OS
- Firewall data