Splunk® Supported Add-ons

Splunk Add-on for Carbon Black

Hardware and software requirements for the Splunk Add-on for Carbon Black

Carbon Black requirements

This add-on consumes Carbon Black event data from a JSON file configured through file_monitor. You download and run the Carbon Black Event Forwarder utility (cb-event-forwarder) in order to generate the JSON file. Splunk monitors the JSON file that is generated by this utility.

The cb-event-forwarder utility and installation instructions are available on GitHub at https://github.com/carbonblack/cb-event-forwarder.

Splunk platform requirements

Because this add-on runs on the Splunk platform, all of the system requirements apply for the Splunk software that you use to run this add-on.

  • For Splunk Enterprise system requirements: see System Requirements in the Splunk Enterprise Installation Manual.
  • If you are managing on-premises forwarders to get data into Splunk Cloud, see System Requirements in the Splunk Enterprise Installation Manual, which includes information about forwarders.
Last modified on 15 March, 2022
About the Splunk Add-on for Carbon Black   Installation and configuration overview for the Splunk Add-on for Carbon Black

This documentation applies to the following versions of Splunk® Supported Add-ons: released


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters