Splunk Add-on for Juniper
|Vendor Products||Juniper Networks IDP devices (IDP75, IDP250, IDP800, IDP8200), Juniper Netscreen Firewall 6.x, Juniper NSM, Juniper NSM IDP, Juniper SSLVPN series, Junos OS 11.4-12.2, Junos OS 15.1x49-D80 for RT_FLOW_SESSION_CLOSE Event, vSRX|
|Add-on has a web UI||No. This add-on does not contain any views.|
The Splunk Add-on for Juniper allows a Splunk software administrator to pull system logs and traffic statistics from Juniper IDP, Juniper NetScreen Firewall, Juniper NSM, Juniper NSM IDP, Juniper SSLVPN, Junos OS, and Juniper SRX (SRX 100, SRX110, SRX 210, SRX 220, SRX 240, SRX 550, SRX 650, SRX 1500 for RT_FLOW_SESSION_CLOSE Event, SRX 3600, SRX 5400, SRX 5600, SRX 5800) using syslog. This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk apps, such as Splunk Enterprise Security and the Splunk App for PCI Compliance.
Download the Splunk Add-on for Juniper from Splunkbase.
For a summary of new features, fixed issues, and known issues, see Release Notes for the Splunk Add-on for Juniper.
For information about installing and configuring the Splunk Add-on for Juniper, see Installation and configuration overview for the Splunk Add-on for Juniper.
See Questions related to Splunk Add-on for Juniper on Splunk Answers.
Source types for the Splunk Add-on for Juniper
This documentation applies to the following versions of Splunk® Supported Add-ons: released