Agentic Service Discovery

Resources

S

Splunk

by Splunk Inc.

Connect agents to Splunk to run searches, query alerts, and send events for log analysis and SIEM workflows.

MonitoringPaidBearer tokenmonitoringlogssiemsecuritysearchobservabilityanalytics

How agents use Splunk

  • Query logs for anomalies and security events to trigger automated responses
  • Send structured agent execution logs to Splunk via HEC for audit trails
  • Run saved security searches to detect threats and route to incident workflows
  • Build compliance reports from log data across systems
  • Monitor error rates and performance metrics from application logs

Agent actions

Run SearchExecute a Splunk SPL search and return results

Inputs: search, earliestTime, latestTime, maxCount, app

Returns: results, resultCount, jobId, doneProgress

Send HEC EventSend an event to Splunk via HTTP Event Collector (HEC)

Inputs: hecToken, event, sourcetype, index, time

Returns: success, ackId

Get Saved SearchesList saved searches and reports

Inputs: app, count

Returns: savedSearches, count

Run Saved SearchExecute a saved search by name and return results

Inputs: name, app

Returns: results, resultCount, jobId

Example workflows

1

Security incident detection

Agent queries Splunk for failed login patterns and creates PagerDuty incidents when thresholds are exceeded

2

Agent audit logging

Agent sends structured audit events to Splunk via HEC for compliance and traceability

About Splunk

Vendor
Splunk Inc.
Pricing Always review details with the vendor
PaidSplunk Enterprise: license by data volume ingested per day. Splunk Cloud from $65/GB/day. Free Trial available.
Authentication
Bearer token
Rate limit Always review details with the vendor
120 requests / minute
Compatible nodes
AgentResourceInputOutput

Build an AI workflow with Splunk

Use the Agentic Planner to design, visualize, and connect Splunk with your other tools.

Open Agentic Planner

Related Monitoring tools

Splunk AI Agent Integration | Fugentic