Join us as we sit down with Doug Cahill and talk about Cybersecurity Integrations: The ROI Black Hole

PARTNER

Splunk Enterprise Security

Splunk | SIEM

Splunk is a leading data platform and enterprise SIEM used for security information and event management, IT observability, and operational intelligence, ingesting machine data from virtually any source for search, analysis, and visualization.

Vendors and security teams looking to integrate Splunk can route normalized security events, alerts, and findings into Splunk through Synqly's connector. Build a Splunk integration to centralize security telemetry in Splunk without managing custom inputs or forwarder configurations for every data source.

Configuration for Splunk Enterprise Security.

[Configuration guide](https://docs.synqly.com/guides/provider-configuration/splunk-setup)

Integration Use Cases

Get Alert

Retrieves an alert by ID.

event_note

Post Events

Writes a batch of `Event` objects to the SIEM configured with the token used for authentication.

notifications_active

Query Alerts

Queries alerts from the SIEM configured with the token used for authentication.

event_list

Query Events

Queries events from the SIEM configured with the token used for authentication.

data_alert

Query Log Providers

Queries available log providers in the source SIEM

Integration Resources