Splunk is a leading data platform and enterprise SIEM used for security information and event management, IT observability, and operational intelligence, ingesting machine data from virtually any source for search, analysis, and visualization.
Vendors and security teams looking to integrate Splunk can route normalized security events, alerts, and findings into Splunk through Synqly's connector. Build a Splunk integration to centralize security telemetry in Splunk without managing custom inputs or forwarder configurations for every data source.
Configuration for Splunk Enterprise Security.
[Configuration guide](https://docs.synqly.com/guides/provider-configuration/splunk-setup)
Integration Use Cases
Get Alert
Retrieves an alert by ID.
Post Events
Writes a batch of `Event` objects to the SIEM configured with the token used for authentication.
Query Alerts
Queries alerts from the SIEM configured with the token used for authentication.
Query Events
Queries events from the SIEM configured with the token used for authentication.
Query Log Providers
Queries available log providers in the source SIEM