Splunk® Enterprise Security

Installation and Upgrade Manual

Acrobat logo Download manual as PDF

This documentation does not apply to the most recent version of ES. Click here for the latest version.
Acrobat logo Download topic as PDF

Configure and deploy indexes

Splunk Enterprise Security implements custom indexes for event storage. The indexes are defined across the apps provided with Enterprise Security.

  • In a single server deployment, the installation of Enterprise Security creates the indexes in the default path for data storage. For an architectural overview, see Single server deployments in this manual.
  • In all other deployment types, the indexes must be created on all Splunk platform indexers or search peers. For an architectural overview, see Distributed search deployments in this manual.

Index configuration

The indexes defined in Enterprise Security do not provide configuration settings to address:

  • Multiple storage paths
  • Accelerated data models
  • Data Retention
  • Bucket sizing
  • Use of volume parameters.

For detailed examples of configuring indexes, see indexes.conf.example in the Splunk Enterprise Admin Manual.

Indexes by app

App context Indexes
DA-ESS-ThreatIntelligence ioc index is unused in this release.
threat_activity index contains threat list match events.
SA-AccessProtection access_summary
SA-AuditAndDataProtection audit_summary
SA-EndpointProtection endpoint_summary
SA-IdentityManagement session_start
SA-ThreatIntelligence notable index contains the notable events.
notable_summary index contains a stats summary of notable events used on select dashboards.
risk index contains the risk modifier events.
SA-NetworkProtection network_summary
Splunk_SA_CIM cim_summary is unused in this release.
Splunk_SA_ExtremeSearch xtreme_contexts

In addition, the add-ons might include custom indexes defined in an indexes.conf file.

Index deployment

Splunk Enterprise Security includes a tool to gather the indexes.conf and index-time props.conf and transforms.conf settings from all enabled apps and add-ons on the search head and assemble them into one add-on. For more details, see Distributed Configuration Management in this manual.

Last modified on 08 September, 2016
Install and deploy add-ons
Configure users and roles

This documentation applies to the following versions of Splunk® Enterprise Security: 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.1.4

Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters