Splunk Technology Add-on for SecurityMatters SilentDefense
-
Updated
May 7, 2017
Splunk Technology Add-on for SecurityMatters SilentDefense
Splunk App to determine Splunk server hardware requirements
Docker Splunk Enterprise image
html2text Search Command for Splunk
Incomplete attempt at dnsmasq log parsing
Splunk Addon for Puppet Enterprise
Splunk 7 Docker image - https://hub.docker.com/r/giabar/gb-splunk7/
Configuration files for create a tiered deployment server
Splunk configurations for a distributed architecture (non-clustering)
a Splunk app used to track freezer inventory and display the information across a few pre-built dashboards
Install a full Splunk Enterprise Cluster or Universal forwarder using an ansible playbook
A Python script for creating field calculation/alias for multiple add-ons in Splunk Enterprise
The Palo Alto Networks Add-on for Splunk allows a Splunk® Enterprise or Splunk Cloud administrator to collect data from Palo Alto Networks Next-Generation Firewall devices and Advanced Endpoint Protection.
This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup a Suricata Port Mirrored Server
Simple TA to enable on-boarding of journald events into Splunk.
Collection of Dashboards for Threat Hunting and more!
Add a description, image, and links to the splunk-enterprise topic page so that developers can more easily learn about it.
To associate your repository with the splunk-enterprise topic, visit your repo's landing page and select "manage topics."