Senior Client Partner at a tech consulting company with 1-10 employees
Real User
Top 10
2024-04-05T08:40:00Z
Apr 5, 2024
Splunk Infrastructure Monitoring helps identify bottlenecks within the network domain, including issues related to server databases, application response times, and code. These problems can be resolved by our customers promptly.
Splunk and AppDynamics SME at Saudi Networkers Services
Real User
Top 10
2024-02-27T15:45:00Z
Feb 27, 2024
We mostly work with developers. They run some pipelines, and they use Splunk as a platform to identify the errors, instead of themselves debugging the logs and understanding what the issue is. This is one side of the business. On the other side of the business, we use the Splunk database for frozen buckets where we archive the data. We can easily integrate it with other tools for monitoring our entire IT data infrastructure. I also handle AppDynamics. We have integrated Splunk and AppDynamics. With one click, we can understand what the actual issue is. It brings down the time to resolve. We have had some good experiences.
Senior Network Administrator at a comms service provider with 51-200 employees
Real User
Top 20
2023-07-27T12:32:00Z
Jul 27, 2023
We use Splunk Infrastructure Monitoring to get an overview of what's happening in our customers' infrastructure. We're monitoring our servers, network, IoT devices, etc. We're a service provider, so the solution is installed in one place.
We have used Splunk to give us insight into the NetFlow of the traffic running through our network. We connect different networks but we only use on-prem. We are in the middle of a spider web, providing these services to different networks. We are trying to gain visibility into the traffic that traverses our network internally. We are interested in the traffic volume because the services we are looking at are endpoint-encrypted, meaning encrypted traffic between a service provider and a client in another network. So we are not able to look into the media stream. The networks we are connecting have their own security boundaries and their own security levels, and we don't mess with that. We are just trying to let them talk together. We have been using Splunk for monitoring who is logging in and how and when.
Learn what your peers think about Splunk Infrastructure Monitoring. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Solution Architect(Splunk- Log Management) at Tata Consultancy
Real User
Top 10
2023-03-01T12:15:03Z
Mar 1, 2023
Our use cases have not been completely sorted and executed. In that case, if this has been done and we know the way forward, the stabilization is more complete. This is not yet stabilized, and I would say at the moment, the focus is more on creating alerts and incidents, rather than how the user can view Splunk ITSI. That focus has not yet been set. Once it is done, I think that would help.
Security Engineer at a tech services company with 201-500 employees
Real User
2020-03-29T08:26:00Z
Mar 29, 2020
Splunk sends security alerts. It's being used on two levels. One for the analysis of the data by the data scientists. Two, for the engineers to troubleshoot if there are any issues happening, like any security bugs, or anything that needs to be addressed and never mediated across.
Security Administrator at a tech services company with 501-1,000 employees
MSP
2020-03-15T08:07:00Z
Mar 15, 2020
The data from Splunk is used for network monitoring, apart from that, they are using another tool with this kind of logic as well. Splunk is not the primary tool. The database I'm using for real-time data for our client. We have only about 3-4 users on this solution.
Prinicipal Security Sales Engineer at a computer software company with 501-1,000 employees
Real User
2020-03-09T08:07:00Z
Mar 9, 2020
The solution is primarily used as security correlation and event correlation. It's a place for all of your logs to go so that you can have all those logs co-ordinated during security events.
The primary use case of this solution is for security management. We gather security logs from intrusion detection and prevention systems, such as firewalls, web application firewalls, and system logs from Linux and Windows servers, as well as anti-malware system logs. We combine them with Splunk to analyze our security level for our company. We use this data to analyze our company security situation and to define security use cases, like attacks. When we find these attacks, we contain them and mitigate our security flaws in our business environment.
For us, we use this product to create a special kind of log. It just logs everything for what it is monitoring and does the parsing afterward based on a packet that you impose on the logs. Then you can extract the data out of the fields that the logs normally comprised of. Typically, people just monitor applications, network infrastructure, and compliance.
Splunk Infrastructure Monitoring offers features including, Instant visualization, real-time actionable alerts, centralized enterprise controls, and scalability. Instant visualization
Get fast time to value with over 250+ cloud service integrations and pre-built dashboards out of the box for rapid, full-stack visualization. Autodiscover, break down, group, and explore clouds, services and systems in minutes.
Real-time actionable alerts
Act before infrastructure performance affects...
We are monitoring our servers and their health. We are monitoring their functionality and supporting the Kubernetes platform.
Splunk Infrastructure Monitoring helps identify bottlenecks within the network domain, including issues related to server databases, application response times, and code. These problems can be resolved by our customers promptly.
We mostly work with developers. They run some pipelines, and they use Splunk as a platform to identify the errors, instead of themselves debugging the logs and understanding what the issue is. This is one side of the business. On the other side of the business, we use the Splunk database for frozen buckets where we archive the data. We can easily integrate it with other tools for monitoring our entire IT data infrastructure. I also handle AppDynamics. We have integrated Splunk and AppDynamics. With one click, we can understand what the actual issue is. It brings down the time to resolve. We have had some good experiences.
We use Splunk Infrastructure Monitoring to get an overview of what's happening in our customers' infrastructure. We're monitoring our servers, network, IoT devices, etc. We're a service provider, so the solution is installed in one place.
We have used Splunk to give us insight into the NetFlow of the traffic running through our network. We connect different networks but we only use on-prem. We are in the middle of a spider web, providing these services to different networks. We are trying to gain visibility into the traffic that traverses our network internally. We are interested in the traffic volume because the services we are looking at are endpoint-encrypted, meaning encrypted traffic between a service provider and a client in another network. So we are not able to look into the media stream. The networks we are connecting have their own security boundaries and their own security levels, and we don't mess with that. We are just trying to let them talk together. We have been using Splunk for monitoring who is logging in and how and when.
We primarily use the solution for network monitoring and to identify threats. It is a security measure.
Primarily, our organization uses the solution to implement proper infrastructure in our campus environment.
Our primary use case for this solution is as a supplement to Dynatrace, so the log analytics is done in Splunk instead of Dynatrace.
Our use cases have not been completely sorted and executed. In that case, if this has been done and we know the way forward, the stabilization is more complete. This is not yet stabilized, and I would say at the moment, the focus is more on creating alerts and incidents, rather than how the user can view Splunk ITSI. That focus has not yet been set. Once it is done, I think that would help.
We primarily use the solution in order to monitor the servers as well as the VM infrastructure.
Splunk sends security alerts. It's being used on two levels. One for the analysis of the data by the data scientists. Two, for the engineers to troubleshoot if there are any issues happening, like any security bugs, or anything that needs to be addressed and never mediated across.
The data from Splunk is used for network monitoring, apart from that, they are using another tool with this kind of logic as well. Splunk is not the primary tool. The database I'm using for real-time data for our client. We have only about 3-4 users on this solution.
We primarily use the solution for event management. We have a baseline that we monitor, and if anything goes wrong, we manage it.
The solution is primarily used as security correlation and event correlation. It's a place for all of your logs to go so that you can have all those logs co-ordinated during security events.
Our primary use for the product is for reporting for one of our systems. It fits a particular need for reporting so we have deployed it there.
We use this solution to examine the logs and consolidate and track incidents.
We are IT consultants and our primary use case for this solution is for analyzing machine data.
The primary use case of this solution is for security management. We gather security logs from intrusion detection and prevention systems, such as firewalls, web application firewalls, and system logs from Linux and Windows servers, as well as anti-malware system logs. We combine them with Splunk to analyze our security level for our company. We use this data to analyze our company security situation and to define security use cases, like attacks. When we find these attacks, we contain them and mitigate our security flaws in our business environment.
For us, we use this product to create a special kind of log. It just logs everything for what it is monitoring and does the parsing afterward based on a packet that you impose on the logs. Then you can extract the data out of the fields that the logs normally comprised of. Typically, people just monitor applications, network infrastructure, and compliance.