Splunk Infrastructure Monitoring Primary Use Case
We mainly use it for different divisions and departments within our company to keep track of our systems' health. We also ingest log files to get data and alerts for different groups.
View full review »Our primary use case for this solution is as a supplement to Dynatrace, so the log analytics is done in Splunk instead of Dynatrace.
View full review »We use Splunk Infrastructure Monitoring to monitor our hybrid infrastructure.
We implemented Splunk Infrastructure Monitoring to help us monitor our infrastructure as we scale.
View full review »Buyer's Guide
Splunk Infrastructure Monitoring
March 2024
Learn what your peers think about Splunk Infrastructure Monitoring. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,246 professionals have used our research since 2012.
CJ
reviewer2239860
Software Engineer at a logistics company with 5,001-10,000 employees
We have our application development and we monitor our websites. I create alerts and dashboards to help us notify if we have any infrastructure issues.
We get our data in and then I create some SQL queries to find out where our averages are and do some predictive analysis. When we deviate from the normal, that is where I like to set up alerts and dashboards. I have alerts that trigger and link to dashboards to see the trend over time or what happened last hour. There is also alerting to the phones.
View full review »SM
Siraj Moosakoya.
Senior Network Administrator at a comms service provider with 51-200 employees
We use Splunk Infrastructure Monitoring to get an overview of what's happening in our customers' infrastructure. We're monitoring our servers, network, IoT devices, etc. We're a service provider, so the solution is installed in one place.
View full review »We primarily use the solution for network monitoring and to identify threats. It is a security measure.
View full review »We have used Splunk to give us insight into the NetFlow of the traffic running through our network. We connect different networks but we only use on-prem. We are in the middle of a spider web, providing these services to different networks. We are trying to gain visibility into the traffic that traverses our network internally.
We are interested in the traffic volume because the services we are looking at are endpoint-encrypted, meaning encrypted traffic between a service provider and a client in another network. So we are not able to look into the media stream.
The networks we are connecting have their own security boundaries and their own security levels, and we don't mess with that. We are just trying to let them talk together.
We have been using Splunk for monitoring who is logging in and how and when.
View full review »SN
ShabbeerNasrudeen
Solution Architect(Splunk- Log Management) at Tata Consultancy
Our use cases have not been completely sorted and executed. In that case, if this has been done and we know the way forward, the stabilization is more complete. This is not yet stabilized, and I would say at the moment, the focus is more on creating alerts and incidents, rather than how the user can view Splunk ITSI. That focus has not yet been set. Once it is done, I think that would help.
View full review »We mostly work with developers. They run some pipelines, and they use Splunk as a platform to identify the errors, instead of themselves debugging the logs and understanding what the issue is. This is one side of the business. On the other side of the business, we use the Splunk database for frozen buckets where we archive the data.
We can easily integrate it with other tools for monitoring our entire IT data infrastructure. I also handle AppDynamics. We have integrated Splunk and AppDynamics. With one click, we can understand what the actual issue is. It brings down the time to resolve. We have had some good experiences.
View full review »ON
Olivier Ntumba
Network & Systems Administrator Individual Contributor at T-Systems
We primarily use the solution in order to monitor the servers as well as the VM infrastructure.
View full review »Primarily, our organization uses the solution to implement proper infrastructure in our campus environment.
View full review »MA
MS Alam.
System Administrator at Nournet communications
We use Splunk Infrastructure Monitoring because it is a durable solution for our environment.
View full review »SG
Shashank Gahoi
Cyber Security Consultant at a manufacturing company with 10,001+ employees
We primarily use the solution for event management. We have a baseline that we monitor, and if anything goes wrong, we manage it.
View full review »SM
Siraj Moosakoya
Senior Network Administrator at Tawasul telecom
We use this solution to examine the logs and consolidate and track incidents.
View full review »JS
JaspreetSingh
Security Administrator at a tech services company with 501-1,000 employees
The data from Splunk is used for network monitoring, apart from that, they are using another tool with this kind of logic as well. Splunk is not the primary tool. The database I'm using for real-time data for our client. We have only about 3-4 users on this solution.
View full review »MA
reviewer916710
Information Security Manager at a comms service provider with 1,001-5,000 employees
Our primary use for the product is for reporting for one of our systems. It fits a particular need for reporting so we have deployed it there.
View full review »The primary use case of this solution is for security management. We gather security logs from intrusion detection and prevention systems, such as firewalls, web application firewalls, and system logs from Linux and Windows servers, as well as anti-malware system logs.
We combine them with Splunk to analyze our security level for our company. We use this data to analyze our company security situation and to define security use cases, like attacks. When we find these attacks, we contain them and mitigate our security flaws in our business environment.
View full review »JP
reviewer1114944
Prinicipal Security Sales Engineer at a computer software company with 501-1,000 employees
The solution is primarily used as security correlation and event correlation. It's a place for all of your logs to go so that you can have all those logs co-ordinated during security events.
View full review »For us, we use this product to create a special kind of log. It just logs everything for what it is monitoring and does the parsing afterward based on a packet that you impose on the logs. Then you can extract the data out of the fields that the logs normally comprised of.
Typically, people just monitor applications, network infrastructure, and compliance.
View full review »We are IT consultants and our primary use case for this solution is for analyzing machine data.
View full review »RP
reviewer1312308
Security Engineer at a tech services company with 201-500 employees
Splunk sends security alerts. It's being used on two levels. One for the analysis of the data by the data scientists. Two, for the engineers to troubleshoot if there are any issues happening, like any security bugs, or anything that needs to be addressed and never mediated across.
Buyer's Guide
Splunk Infrastructure Monitoring
March 2024
Learn what your peers think about Splunk Infrastructure Monitoring. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
768,246 professionals have used our research since 2012.