Nasuni Connector for Splunk app icon

Nasuni Connector for Splunk

Gain centralized visibility into Nasuni storage activity, security events, and ransomware alerts directly within Splunk. This integration ingests and enriches syslog data from Nasuni Edge Appliances and the Nasuni Management Console (NMC) to power search, correlation, and automated response workflows.

Built by , an official Splunk Partner
splunk product badge

Latest Version 1.0.0
April 23, 2026
Compatibility
Splunk Enterprise, Splunk Cloud
Platform Version: 10.3, 10.2, 10.1, 10.0
Rating

0

(0)

Log in to rate this app
Support
Nasuni Connector for Splunk support icon
Developer Supported app
The Nasuni Connector for Splunk enables security and operations teams to monitor, investigate, and respond to storage-related events across their Nasuni environment. By ingesting and parsing syslog data from Nasuni Edge Appliances and the Nasuni Management Console (NMC), the app normalizes and enriches events for efficient search, correlation, and integration with Splunk SOAR workflows. With visibility into file activity, system operations, and security alerts, including ransomware protection and antivirus alerts, teams can accelerate incident response, strengthen audit capabilities, and improve overall data security posture. Ingested Event Types Include: -System & operational events – General syslog activity from Edge Appliances and NMC -Ransomware protection alerts – Detection and mitigation events from Advanced Ransomware Protection -File system audit events – File access, modification, and deletion tracking -Snapshot activity – Success and failure of snapshot operations -Antivirus alerts – Threat detections from integrated antivirus scanning

Categories

SIEM, Threat Intel

Created By

Nasuni, an official Splunk Partner

Type

app

Downloads

2

Resources

Log in to report this app listing