Welcome to the new Splunkbase! To return to the old Splunkbase, click here.
JupiterOne Add-on for Splunk app icon

JupiterOne Add-on for Splunk

The JupiterOne Add-on imports and enriches JupiterOne Alerts, allowing you to access this data in Splunk. It collects alert data directly from JupiterOne, parses the data and extracts valuable data so that you can trigger your own notable alerts in your Splunk account. It also provides workflow actions that allow you to link back to entities in JupiterOne or search your JupiterOne account for any field value in Splunk, regardless of entitytype and now supports a Custom Command so that you can execute a J1QL query directly from Splunk and display the response from JupiterOne in your Splunk account.

Built by C B
splunk product badge

Compatibility
Not Available
Platform Version: 9.4, 9.3, 9.2, 9.1, 9.0, 8.2, 8.1, 8.0
Rating

0

(0)

Log in to rate this app
Ranking

#25

in Investigative
The JupiterOne Add-on imports and enriches JupiterOne Alerts, allowing you to access this data in Splunk. It collects alert data directly from JupiterOne, parses the data and extracts valuable data so that you can trigger your own notable alerts in your Splunk account. It also provides workflow actions that allow you to link back to entities in JupiterOne or search your JupiterOne account for any field value in Splunk, regardless of entitytype and now supports a Custom Command so that you can execute a J1QL query directly from Splunk and display the response from JupiterOne in your Splunk account.

Categories

Created By

C B

Type

addon

Downloads

1,073

Resources

Login to report this app listing