splunkbase Profile Banner
Splunkbase Profile
Splunkbase

@splunkbase

Followers
710
Following
0
Media
0
Statuses
2K

San Francisco, CA
Joined January 2012
Don't wanna be here? Send us removal request.
@splunkbase
Splunkbase
8 years
Beginning today, please follow @splunk to continue receiving our updates.
0
0
0
@splunkbase
Splunkbase
8 years
neo4s: This app allows you to run cypher queries and get the results, all over splunk. This allows you to take advantage of both neo4j's cypher and splunk's SPL. https://t.co/X7k0hvBFLL #splunk
0
3
3
@splunkbase
Splunkbase
8 years
IBM Cloud Event Management Alert Action: IBM Cloud Event Management Alert Action is a custom webhook trigger alert action for the user to define the Splunk search and result fields with the IBM Cloud Event Management (CEM) event format in the… https://t.co/8Bd8UjrDM9 #splunk
0
0
0
@splunkbase
Splunkbase
8 years
Centrify Identity Platform Add-on for Splunk: As the only industry-recognized leader in both Privileged Identity Management and Identity-as-a-Service, Centrify provides a single platform to secure every user’s access to apps and infrastructure in… https://t.co/rEnBcWyuxW #splunk
0
0
0
@splunkbase
Splunkbase
8 years
Get Me ... Some Web data: This Splunk app is a pure fun app and was used in my Darksky Photographie Splunk app at .conf 2017 talk: **Take a talk into the art of dark sky photography with a splunk ninja** https://t.co/XtOwrus5NI https://t.co/N1UeCjgldJ #splunk
0
0
1
@splunkbase
Splunkbase
8 years
Hurricane Labs Add-On for Detectify: This app brings in scan findings from your Detectify account and provides field-mappings to make the data fit into the CIM Vulnerability datamodel. This app requires a Detectify enterprise plan. https://t.co/7gAQq60sHW #splunk
0
0
0
@splunkbase
Splunkbase
8 years
Wonderware (Archestra): Splunk your Wonderware (Archestra) data! See https://t.co/QFbEVsR88k for more info. https://t.co/uk9OqtCxeG #splunk
0
0
0
@splunkbase
Splunkbase
8 years
Ivanti Application Control for Splunk: The Ivanti Application Control App for Splunk allows a Splunk® Enterprise administrator to see what’s being blocked, allowed and elevated by the Application Control product within their environment. Support… https://t.co/9QOlfkSX8U #splunk
0
0
0
@splunkbase
Splunkbase
8 years
Countercept Omni EDR App for Splunk: Enabled threat hunters to use the Countercept Omni EDR data. Contains initial use cases for Processes and Powershell usage This is an Alpha release Requires the Countercept Omni EDR TA. Requires the Timeline… https://t.co/pR1bX7poSW #splunk
0
0
0
@splunkbase
Splunkbase
8 years
Countercept Omni EDR TA for Splunk: Connects the Countercept Omni EDR platform to Splunk. https://t.co/9GJiwU5NZs #splunk
0
0
0
@splunkbase
Splunkbase
8 years
Hurricane Labs Open Port Detection: Provides dashboards showing your open port data and optional Shodan integration. The TA-OPD app must be installed and configured for this to work. https://t.co/uGeieXZQ7A #splunk
0
0
2
@splunkbase
Splunkbase
8 years
TA-OPD: This TA allows you to easily analyze your devices for open ports using NMAP, but through the convenience of Splunk Modular Inputs. https://t.co/Yy9zwJAYr8 #splunk
0
0
3
@splunkbase
Splunkbase
8 years
Python LDAP Technology Add-On: This app provides a generating command to directly query an LDAP directory from Splunk search without any dependencies or configuration. Simply install this app on your Linux search head, restart Splunk, then use… https://t.co/s7rWiqwzsM #splunk
0
0
2
@splunkbase
Splunkbase
8 years
Automatic Search Add-on For Splunk: Do you find yourself running the same searches when you receive a Splunk alert? Want to automate this? Well the Automatic Search App For Splunk allows you to do just that. https://t.co/6088UPapuC #splunk
0
1
0
@splunkbase
Splunkbase
8 years
MAC Address Vendor Scripted Lookup: This app provides a scripted lookup to resolves MAC addresses to their manufacturer locally using python's netaddr library ( https://t.co/OzU8SVKLwo) and requires no configuration. Simply install the app on your… https://t.co/F9rpDOEIkB #splunk
Tweet card summary image
pypi.org
A network address manipulation library for Python
0
0
2
@splunkbase
Splunkbase
8 years
Carbon Black API Query: This supporting add-on provides one command -- cbquery. It is built on Carbon Black's cbapi and the Splunk SDK (note that this is not an offical product of Carbon Black). https://t.co/ZDtDZseHRs #splunk
0
0
0
@splunkbase
Splunkbase
8 years
Cyber Triage: This add-on integrates Cyber Triage ( https://t.co/sfbJv8yeml) to allow you to conduct a mini-forensic investigation on an endpoint. It pushes a collection tool to the remote endpoint, collects volatile and file system data, and… https://t.co/KVlDQiuyEJ #splunk
0
1
0
@splunkbase
Splunkbase
8 years
TA for Eset Remote Administrator: This TA for Splunk provide fields extractions from Eset Remote Administrator logs and mapping to the Malware CIM https://t.co/A4hr2XsU41 #splunk
0
0
0
@splunkbase
Splunkbase
8 years
Statuscake App: Visualization for Statuscake Addon for Splunk ( https://t.co/dvqSR6B9BA) Require Visualization Additional Download ( https://t.co/nbKyaEM8d7) https://t.co/Hgs23kisqu #splunk
0
0
0
@splunkbase
Splunkbase
8 years
Fitbit Add-on for Splunk: This is the Fitbit Add-on for Splunk. The goal of this Add-on is to track sleep and activity data for a user in Splunk. https://t.co/igvLLrLcAT #splunk
0
0
0