Featured: Platform
Splunk over IPv6 runbook for Splunk Cloud Platform customers
If you use Splunk ITSI or Splunk Enterprise Security, you might need to update your Splunk Cloud Platform version, which might require scheduling the maintenance window. This article provides step-by-step instructions on enabling the IPv6 traffic in a DualStack mode for Splunk Cloud Platform deployments.
Featured: Platform
Using the Universal Configuration Console
The Universal Configuration Console is a command line tool used by Splunk engineering teams to create officially supported add-ons. The advantages of using this tool include providing a uniform look and feel with standard UI elements, facilitating open sourcing of well-known TAs, integrating with a CI/CD pipeline, and more.
Featured: Platform
Leveraging LLM reasoning and ML capabilities for Jira alert investigations
The Splunk Model Context Protocol server for Splunk Cloud Platform works with LLMs and integrations like Jira. It allows even novice Splunk users to use machine learning models, without having to write the SPL queries, in order to correlate alerts or add contextual information to data.
Resources for Splunk Program Managers
The Splunk Success Framework
Accelerate and increase the value you derive from your data with Splunk software using the Splunk Success Framework (SSF), a flexible collection of best practices for setting up Splunk Enterprise or Splunk Cloud Platform as a program.
Data Ingestion and Application
Data Descriptors
Bring data to every question, decision, and action across your organization with comprehensive guidance for getting data in and applying data to your key use cases.
Get the latest
New Articles
- Platform
- Turn data into doing to unlock innovation, enhance security and drive resilience.
- Security
- Protect your business and modernize your security operations with a best-in-class data platform.
- Observability
- Solve problems in seconds with the only full-stack, analytics-powered, and OpenTelemetry-native observability solution.
- Splunk Success Framework
- The Splunk Success Framework (SSF) is a flexible collection of best practices for setting up your Splunk software implementation as a program.
- Data Descriptors
- The data sources in use at your organization can all be linked to common use cases. Get recommendations from Splunk experts and then start getting answers from your data.
- Malware data
- Application data
- Application server data
- Authentication data
- Backup data
- Vendor-specific data
- Endpoint detection and response (EDR) data
- Intrusion detection data
- Load balancer data
- Email data
- Network communication data
- Patch management data
- Physical security data
- Web proxy data
- Change data
- Configuration management data
- IP address assignment data
- Vulnerability detection data
- Web server data
- Network resolution data
- Linux and Unix
- Okta
- SAP
- Zscaler
- Zoom
- Zeek
- Websense
- VMware
- CrowdStrike
- Carbon Black
- Kubernetes
- Check Point
- Fortinet
- Salesforce
- Symantec
- Palo Alto Networks
- Trend Micro
- Tenable
- GitHub
- Atlassian
- AppDynamics
- Dell
- Syslog
- Apache
- Amazon
- Cisco
- Microsoft
- JupiterOne
- GitLab
- Mac OS
- Docker
- Network firewall data
- MOVEit
- Skyhigh Security
- CyberArk
- OpenAI
- Adobe
- NETSCOUT
- Nagios
- Tanium
- Gigamon
- Fabrix.ai
- Financial data
- Medical device data
- Mobile device data
- User activity log data
- Network sessions data
- Electronic data interchange data
- Operational technology data
- IoT and industrial IoT data
- Network switch data
- Network router data
- Supplier and procurement data
- Network traffic data
- Web application firewall data
- Call detail record data
- Physical card reader data
- Content delivery network data
- Video conferencing and communication data
- Inventory data
- Storage data
- Database data
- Customer relationship management data
- Certificates data
- OpenTelemetry data
- Cloud services data
- Performance data
- Update data
- Personally identifiable information
- SNMP data
- Event signatures data
- Cloud productivity suite data
- Compliance and governance data
- Alerts data
- Binary repositories data
- Virtualization data
- Printer data
- Real user monitoring data
- Data access data
- Network access control data
- Data loss prevention data
- Insider threat data
- Threat intelligence data
- Synthetic monitoring data
- OpenLLMetry data
- Security orchestration, automation, and response data
- File integrity monitoring data
- Network VPN data
- Law enforcement data
- Deep packet inspection data