icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.
Log4Shell Vulnerability: Information and guidance for you. Get resources.

Accept License Agreements

Thank You

Downloading Splunk
SHA256 checksum (splunk_2100.tgz) fc5be36225a1530c6ed53c707ddb6d7c20a9ec552c5e9aff68fdd6dacf70bcd4 SHA256 checksum (splunk_290.tgz) 5a7d21f22e68fe4ae1d595aff6d3f5eada347b5279cd017d12755b20197f7b15 SHA256 checksum (splunk_280.tgz) c2a084856af0ec44971dc7a016f1b5e0ed70ffedb28e186d12cb1d2b5db2c6a4 SHA256 checksum (splunk_270.tgz) 659f4c951dd024104c03733e4199dd5b12f28f8a895643a247377ce0838230fb SHA256 checksum (splunk_267.tgz) b24ba4da58172dec47025a05766a458c3013f13800b4234b31c9af732e6a7cd2 SHA256 checksum (splunk_266.tgz) 9fcc796ef552ffbf0289f8a450e16b4ef87ebeceb9e41fb640f202df89a730df SHA256 checksum (splunk_248.tgz) 4b9dff4d996ed0cedd8541b74bb2842e8ba27e2486682b396082f53534b1ef23 SHA256 checksum (splunk_233.tgz) 12a262b6c2ff9f721dc13d34bcb96a5bc5f0495949cf4d4fe3a3ea93ad6119aa SHA256 checksum (splunk_223.tgz) a1a1a763e052183a15158c91743d015755d0598e79dab1d39ffe5f2f8b78b73d SHA256 checksum (splunk_216.tgz) f4ff4029f46ac95dd720ade32820d94caa255a467fcbefe06541197665c1e2a3 SHA256 checksum (splunk_213.tgz) c608f8341722fcbef2c760f78fab75d5f93d57c76e0d616ab2273498138c7e5d

Flag As Inappropriate

soar

Splunk

Splunk SOAR Cloud
Splunk Built
Overview
This app integrates with Splunk to update data on the device, in addition to investigate and ingestion actions

Supported Actions Version 2.10.0

  • test connectivity: Validate the asset configuration for connectivity. This action logs into the device to check the connection and credentials
  • get host events: Get events pertaining to a host that have occurred in the last 'N' days
  • on poll: Ingest logs from the Splunk instance
  • run query: Run a search query on the Splunk device. Please escape any quotes that are part of the query string
  • update event: Update a notable event
  • post data: Post data to Splunk

Supported Actions Version 2.9.0

  • test connectivity: Validate the asset configuration for connectivity. This action logs into the device to check the connection and credentials
  • get host events: Get events pertaining to a host that have occurred in the last 'N' days
  • on poll: Ingest logs from the Splunk instance
  • run query: Run a search query on the Splunk device. Please escape any quotes that are part of the query string
  • update event: Update a notable event
  • post data: Post data to Splunk

Supported Actions Version 2.8.0

  • test connectivity: Validate the asset configuration for connectivity. This action logs into the device to check the connection and credentials
  • get host events: Get events pertaining to a host that have occurred in the last 'N' days
  • on poll: Ingest logs from the Splunk instance
  • run query: Run a search query on the Splunk device. Please escape any quotes that are part of the query string
  • update event: Update a notable event
  • post data: Post data to Splunk

Supported Actions Version 2.7.0

  • test connectivity: Validate the asset configuration for connectivity. This action logs into the device to check the connection and credentials
  • get host events: Get events pertaining to a host that have occurred in the last 'N' days
  • on poll: Ingest logs from the Splunk instance
  • run query: Run a search query on the Splunk device. Please escape any quotes that are part of the query string
  • update event: Update a notable event
  • post data: Post data to Splunk

Supported Actions Version 2.6.7

  • test connectivity: Validate the asset configuration for connectivity. This action logs into the device to check the connection and credentials
  • get host events: Get events pertaining to a host that have occurred in the last 'N' days
  • on poll: Ingest logs from the Splunk instance
  • run query: Run a search query on the Splunk device. Please escape any quotes that are part of the query string
  • update event: Update a notable event
  • post data: Post data to Splunk

Supported Actions Version 2.6.6

  • test connectivity: Validate the asset configuration for connectivity. This action logs into the device to check the connection and credentials
  • get host events: Get events pertaining to a host that have occurred in the last 'N' days
  • on poll: Ingest logs from the Splunk instance
  • run query: Run a search query on the Splunk device. Please escape any quotes that are part of the query string
  • update event: Update a notable event
  • post data: Post data to Splunk

Supported Actions Version 2.4.8

  • test connectivity: Validate the asset configuration for connectivity. This action logs into the device to check the connection and credentials
  • get host events: Get events pertaining to a host that have occurred in the last 'N' days
  • on poll: Ingest logs from the Splunk instance
  • run query: Run a search query on the Splunk device. Please escape any quotes that are part of the query string
  • update event: Update a notable event
  • post data: Post data to Splunk

Supported Actions Version 2.3.3

  • test connectivity: Validate the asset configuration for connectivity. This action logs into the device to check the connection and credentials
  • get host events: Get events pertaining to a host that have occurred in the last 'N' days
  • on poll: Ingest logs from the Splunk instance
  • run query: Run a search query on the Splunk device. Please escape any quotes that are part of the query string
  • update event: Update a notable event
  • post data: Post data to Splunk

Supported Actions Version 2.2.3

  • test connectivity: Validate the asset configuration for connectivity. This action logs into the device to check the connection and credentials
  • get host events: Get events pertaining to a host that have occurred in the last 'N' days
  • on poll: Ingest logs from the Splunk instance
  • run query: Run a search query on the Splunk device. Please escape any quotes that are part of the query string
  • update event: Update a notable event
  • post data: Post data to Splunk

Supported Actions Version 2.1.6

  • test connectivity: Validate the asset configuration for connectivity. This action logs into the device to check the connection and credentials
  • get host events: Get events pertaining to a host that have occurred in the last 'N' days
  • on poll: Ingest logs from the Splunk instance
  • run query: Run a search query on the Splunk device. Please escape any quotes that are part of the query string
  • update event: Update a notable event
  • post data: Post data to Splunk

Supported Actions Version 2.1.3

  • test connectivity: Validate the asset configuration for connectivity. This action logs into the device to check the connection and credentials
  • get host events: Get events pertaining to a host that have occurred in the last 'N' days
  • on poll: Ingest logs from the Splunk instance
  • run query: Run a search query on the Splunk device. Please escape any quotes that are part of the query string
  • update event: Update a notable event
  • post data: Post data to Splunk

Release Notes

Version 2.10.0
April 27, 2022
  • Fixed an issue in On Poll action where the index time was not honored during scheduled ingestion [PAPP-25411]
Version 2.9.0
April 2, 2022
  • Added 2 new fields ("start_time" and "end_time") to "run query" action [PAPP-24566]
Version 2.8.0
March 9, 2022
  • Added a sleep time between REST calls to improve the performance [PAPP-23575]
Version 2.7.0
Feb. 17, 2022
  • Added a new 'attach_result' parameter in 'run query' action [PAPP-8315]
Version 2.6.7
Feb. 7, 2022
  • Added support for Python 3.9
Version 2.6.6
Jan. 20, 2022

Splunk Release Notes - Published by Splunk January 20, 2022

Version 2.6.6 - Released January 20, 2022

  • Changed the hashing algorithm to SHA256 when running in FIPS mode [PAPP-21816]
Version 2.4.8
Oct. 19, 2021

Splunk Release Notes - Published by Splunk October 19, 2021

Version 2.4.8 - Released October 19, 2021

  • Added a new 'Remove CEF fields having empty values from the artifact' configuration parameter [PAPP-9257]
Version 2.3.3
Sept. 21, 2021

Splunk Release Notes - Published by Splunk August 06, 2021

Version 2.3.3 - Released August 06, 2021

  • Updated the 'update event' action's status based on the "success" key in response [PAPP-9587]
  • Modified the code to re-connect based on retry limit in case of "Session not logged in" issue [PAPP-17690]
  • Modified the on-poll action to ingest updated/deleted artifacts in the existing container [PAPP-18788]
  • Updated the document for Update event action with the required role and permission
Version 2.2.3
Sept. 21, 2021

Splunk Release Notes - Published by Splunk August 06, 2021

Version 2.2.3 - Released July 13, 2021

  • Added support for custom status ID in the integer status parameter of the 'update event' action [PAPP-9598]
  • Bug fix in the 'run query' action [PAPP-13769]
  • Allow 0 for the 'Max events to ingest for Scheduled Polling' configuration parameter [PAPP-11483]
  • Fix for the 'Values to append to the container name' configuration parameter [PAPP-11072] [PAPP-17977]
  • Handled extra commas in the display parameter of the 'run query' action [PAPP-17228]
Version 2.1.6
Sept. 21, 2021

Splunk Release Notes - Published by Splunk August 06, 2021

Version 2.1.6 - Released June 24, 2021

  • Fixed the start_time field in the artifact [PAPP-17613]
Version 2.1.3
Sept. 21, 2021

Splunk Release Notes - Published by Splunk August 06, 2021

Version 2.1.3 - Released April 14, 2021

  • Fixed a bug which caused the app to ignore the Global Proxy Settings [PAPP-11360]
  • Fixed a bug during ingestion if an event had multiple associated severities [PAPP-12153]

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.