Discover, share, and install apps and add-ons with the Splunk community on Splunkbase. Publish your own or add others to your Splunk platform instance.
Streamline your security operations with a SOAR system that integrates orchestration, playbook automation, and case management to enhance threat response.
Access and share apps and add-ons with the Splunk community on Splunkbase. Publish your own apps, or download and install others on your Splunk platform instance.
Focus on a specific time range by dragging your mouse across the event stream or by using the time range dropdown.
Select various fields from the data, targeting the kind of data of interest to you, then scan the event list. Double-click any specific event to display more information.
Examine Top 10 Values. Click on a field to see the top 10 values of that field in your filtered dataset. The results are presented as a count and percentage of all data within the specified time range for that field. These values provide immediate insights from your data without having any predefined rules or previous knowledge of the data. You can add a value to the search criteria bar by hovering over the value and clicking the + icon.
Relevant Fields. This feature helps you find fields with a high relevance score. A high relevance score indicates these fields are significantly more common in your filtered results than in the entire data set and may be useful to investigate. See Investigate Using Relevant Fields for a suggested workflow.