Agentic Service Discovery

Resources

S

Splunk

by Splunk Inc.

Connect agents to Splunk to run searches, query alerts, and send events for log analysis and SIEM workflows.

OvervågningBetaltBearer-tokenmonitoringlogssiemsecuritysearchobservabilityanalytics

Sådan bruger agenter Splunk

  • Query logs for anomalies and security events to trigger automated responses
  • Send structured agent execution logs to Splunk via HEC for audit trails
  • Run saved security searches to detect threats and route to incident workflows
  • Build compliance reports from log data across systems
  • Monitor error rates and performance metrics from application logs

Agenthandlinger

Run SearchExecute a Splunk SPL search and return results

Input: search, earliestTime, latestTime, maxCount, app

Returnerer: results, resultCount, jobId, doneProgress

Send HEC EventSend an event to Splunk via HTTP Event Collector (HEC)

Input: hecToken, event, sourcetype, index, time

Returnerer: success, ackId

Get Saved SearchesList saved searches and reports

Input: app, count

Returnerer: savedSearches, count

Run Saved SearchExecute a saved search by name and return results

Input: name, app

Returnerer: results, resultCount, jobId

Eksempel på workflows

1

Security incident detection

Agent queries Splunk for failed login patterns and creates PagerDuty incidents when thresholds are exceeded

2

Agent audit logging

Agent sends structured audit events to Splunk via HEC for compliance and traceability

Om Splunk

Leverandør
Splunk Inc.
Pris Tjek altid detaljer med udbyderen
BetaltSplunk Enterprise: license by data volume ingested per day. Splunk Cloud from $65/GB/day. Free Trial available.
Godkendelse
Bearer-token
Hastighedsgrænse Tjek altid detaljer med udbyderen
120 anmodninger / minut
Kompatible noder
AgentResourceInputOutput

Byg et AI-workflow med Splunk

Brug Agentic Planner til at designe, visualisere og forbinde Splunk med dine andre værktøjer.

Åbn Agentic Planner

Relaterede Overvågning-værktøjer