GPG-13 Auditing for Core Splunk
This app was designed to work with Splunk 6.4 through 7.1
This app will seek to achieve the same monitoring capabilities as the Somerford GPG13 app for Enterprise Security without the need to have ES.
INSTALLATION > either use the app manager within the UI or place the entire unncompressed DA-GPG13 Folder into the etc/apps folder of your Splunk Search Head
SYSTEM REQUIREMENTS > Splunk Enterprise running on referance hardware as per Splunk Docs.
PREREQUISITES > You will need CIM compliant data relevent to each of the datamodels containedwithin this app otherwise the app will not populate with data. This app is not designed to collect or parse data only to provide an aid to the auditing of the Splunk Data, the required datamodels from the CIM are NOT duplicated within this app.
If using the CIM App you will require the following Datamodels accelerated
Now with Dark Mode
Scheduler optimisations and 7.2 compatibility
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.