icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Druva Add-on For Splunk
SHA256 checksum (druva-add-on-for-splunk_201.tgz) d3bbef0b4332c9c96ff44cd362e4cff8437c3c176a9e371c4e905830b720a495 SHA256 checksum (druva-add-on-for-splunk_200.tgz) 3aded3c1dcf117aaa3b2f8f7a49feda522f767c43182bd27e3d61ab67e8e3ca7 SHA256 checksum (druva-add-on-for-splunk_103.tgz) 48e015b347180cd8d3afc5fd2759b3c43afbf0c8ae9db65cd971d2bbeb80eea6 SHA256 checksum (druva-add-on-for-splunk_102.tgz) b7109ef79df2000aba3559b67241665baa2aca97f61d3c40aea7eec75dbb5da2 SHA256 checksum (druva-add-on-for-splunk_101.tgz) dcf47328062dce7868e9ca64cf89d8736858165e12aab2575e6aef294fd8571d SHA256 checksum (druva-add-on-for-splunk_100.tgz) 0687cfa4cf0f1a98fc5195f8b3d108a21803cdee88959eaca697f41715ddb701
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate


Druva Add-on For Splunk

The Druva Add-on for Splunk allows a SplunkĀ® Enterprise administrator to collect data from the Druva Cloud Platform into Splunk. You can consume the data using the Druva App for Splunk and any App you create for your SOC or IT requirements. This add-on provides the inputs to use with other Splunk apps.


Druva Add-on for Splunk helps in ingesting Druva events in Splunk.


  • Splunk version 7.0.0 >=

Topology and Setting up Splunk Environment

  • This app has been distributed in two parts.
    • Add-on app, which helps in ingesting events from Druva into Splunk
    • Main app for visualizing events occuring in Druva.
  • This App setup is same for both distributed and standalone environment:
    • Configure Add-on app on Search head.
    • Install the Main app on search head.
  • Installation in Splunk Cloud
    • It is same as on-premise Splunk.

Installation of App

  • This app can be installed through UI using "Manage Apps" or extract zip file directly into /opt/splunk/etc/apps/ folder.

Configuration of the Add-on

  • Go to Druva Add-on For Splunk
  • Click on the Configuration tab > Add to add a new account and create a new input.
  • Enter the following details in the Add Account pop-up:
    • Account Name
    • Cloud Type
    • Anomaly Detection: Select the source for which you want to view the events. For example, inSync Events for inSync and Ransomware Recovery events for Unusual Data Activity (UDA) events.
    • Client ID
    • Client Secret
      Druva supports OAuth 2.0. To begin the Authorization process, Please select CID and secret from the Druva Portal and supply as an input to the configuration. Click on Add to save the configuration and create a new Input.
  • Click Add to save the configuration
  • Navigate to the Input tab > Create New Input to create a new Input. On the Add Druva pop-up, enter and provide the requested details, and click Add to complete the configuration.

Test your Install

  • After the configuration of input is complete, the input should fetch the events. Use the following query to verify if the events are being ingested.
search `druva_get_index`

Logging of the App

  • Monitor file $SPLUNK_HOME/var/log/splunk/ta_druva_druva.log to track the events of Add-on.

Release Notes

Version 2.0.1
July 8, 2022

Support for UDA events from Ransomware Recovery

Version 2.0.0
Jan. 17, 2021
  • Upgrade for Pyton 3.X
  • Support for Splunk Version 8.X.X
  • Dual Compatibility with Python 2.X and Python 3.X
Version 1.0.3
July 5, 2020
  • Support for Gov Cloud Endpoints
Version 1.0.2
Jan. 27, 2020
  • Cloud Certification related changes
  • Minor bug fixes
Version 1.0.1
Oct. 16, 2019
  • Bug Fix for Custom Index name selection during Add-on Configuration
Version 1.0.0
Sept. 22, 2019

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.