Share data usage in Splunk Enterprise Security
How data is collected
Splunk Enterprise Security uses saved searches to collect anonymous usage data. These searches run in the background regardless of whether or not you opt-in to send usage data to Splunk, and do not have any significant impact on performance.
Splunk Enterprise Security also uses FullStory to collect experiential user journey information with the user personally identifiable information redacted.
Splunk collects usage data to improve the design, usability, and experience of the product. Customers may opt-out of sharing AI data including, but not limited to, chats, responses, context, and feedback. To opt out of sharing this AI data, see Opt out of data sharing for the AI Assistant in Splunk Enterprise Security.
What data is collected
Splunk Enterprise Security version 8.4 collects the following basic usage information. This page includes new telemetry components introduced in version 8.4. Splunk Enterprise Security still collects components introduced in earlier versions. Use the version selector to see data collection documentation from earlier versions.
For more information on telemetry information collected by Splunk SOAR, see Share data from Splunk SOAR (Cloud).
| Component | Description | Example |
|---|---|---|
team-queue-created |
Indicates that a team queue was created and it reports the total number of queues | There were 3 team-based queues and we create one with title "Four". We capture:
JSON
|
team-queue-changed |
Indicates that a team queue was updated and it reports the total number of queues | We change the name of one of the team based queue from "Queue A" to "Queue B". We capture
JSON
|
team-queue-selected |
Indicates that a team queue was selected on Analyst Queue | We have 2 queues "Queue1" & "Queue2" and we select one of them. We capture:
JSON
|
team-queue-role-added |
Indicates that a roles were added to a team queue (captures all roles added as an array) | There were 3 roles, and roles demoRole and mc_analyst were added. We capture:
JSON
|
team-queue-role-removed |
Indicates that a roles were removed from a team queue (Captures all roles removed as an array | There were 5 roles and roles demoRole and mc_analyst were removed. We capture:
JSON
|
team-queue-rule-created |
Indicates that a rule was made created and it reports the total number of rules created in the team queue conditions | We had 3 rules for a particular queue and we add one rule to it. We track:
JSON
|
team-queue-rule-changed |
Indicates that a rule was made modified and it reports the total number of rules in the team queue conditions | We had 3 rules for a particular queue and we add filters in one rule to it. We track:
JSON
|
team-queue-rule-removed |
Indicates that a rule was made removed and it reports the total number of rules in the team queue conditions | We had 3 rules for a particular queue and we delete one rule from it. We track:
JSON
|
team-queue-manual-move |
Indicates when an item or items are being moved | We move 100 items from Queue A to Queue B. We track:
JSON
Then we move 100 items from Queue B to default Queue. We track:
JSON
|
team-queue-priority-changed |
Indicates that the priorities of the queues was modified (which affects the rule execution) | We had queues order as [ A, B ,C] and we change order as [ C, B, A]. We track:
JSON
|
team-queue-rule-execution |
Indicates that a finding was sent to a queue | |
add-event-to-investigation, workflow-action-clicked |
Measures click volume from ES search page to the add-event workflow |
JSON
|
add-event-error |
Indicates that there was an error returned from the API call when user tried to add an event to the investigation |
JSON
|
add-event-success |
Indicates that user was able to successfully add an event to an investigation |
JSON
|
add-event-exception |
Aims to detect client-side exceptions thrown when user tried to add event to investigation |
JSON
|
finding-modal-investigation-option |
The selectedOption of NEW or EXISTING button once checkboxed |
JSON
|
finding-modal-investigation-selected |
The investigation id of selected item for investigation |
JSON
|
finding-modal-investigation-type-change |
Defined in settings, will be defaulted to default type |
JSON
|
finding-modal-finding-created |
A summary of the findings created, whether or not it has investigation as well |
JSON
|
finding-modal-error |
This will error if finding creation fails |
JSON
|
create-new-investigation-modal |
The summary of new investigation created |
JSON
|
investigation-modal-created |
Contains the current queue of which investigation is created |
JSON
|
investigation-modal-error |
This will error out if investigation creation failed |
JSON
|
toggledAIAssistantAvailability |
Tracks metric around when user toggles the AI assistant on/off |
JSON
|
non-skewable-detections-table |
Tracks metric around how many detections are converted to skewable by user in non skewable detections table |
JSON
|
allow-skew-cron-schedule |
Tracks if user converts detection to skewable on detection editor |
JSON
|