Splunk® Enterprise Security

Install and Upgrade Splunk Enterprise Security

Configure and deploy indexes for Splunk Enterprise Security

Splunk Enterprise Security implements custom indexes for event storage. The indexes are defined across the apps provided with Splunk Enterprise Security.

  • In a single instance deployment, the installation of Splunk Enterprise Security creates the indexes in the default path for data storage.
  • In a Splunk Cloud Platform deployment, customers work with Splunk Support to set up, manage, and maintain their cloud index parameters.
  • In a distributed deployment, create the indexes on all Splunk platform indexers or search peers.

Index configuration

The indexes defined in Splunk Enterprise Security do not provide configuration settings to address:

  • Multiple storage paths
  • Accelerated data models
  • Data retention
  • Bucket sizing
  • Use of volume parameters.


Indexes by app

You might see additional or fewer indexes, depending on your capabilities and which apps you have installed. The following are non-system indexes.

App context Index Description
DA-ESS-AccessProtection gia_summary Summary index used by the Geographically Improbable Access panel on the Access Anomalies dashboard.
DA-ESS-ThreatIntelligence ioc Unused in this release.
threat_activity Contains events that result from a threat list match.
SA-AuditAndDataProtection audit_summary Audit and Data Protection summary index.
SA-EndpointProtection endpoint_summary Endpoint protection summary index.
SA-NetworkProtection whois WHOIS data index.
SA-ThreatIntelligence notable Contains the findings.
notable_summary Contains a stats summary of findings used on select dashboards.
risk Contains the risk modifier events.
Splunk_DA-ESS_PCICompliance pci If PCI is installed, contains the PCI event data.
pci_posture_summary If PCI is installed, contains the PCI compliance status history.
pci_summary If PCI is installed, contains the PCI summary data.
Splunk_SA_CIM cim_summary Unused in this release.
cim_modactions Contains the adaptive response action events.
Splunk_TA_ueba ubaroute Does not contain event data. Used behind the scenes for routing to your UBA target.
ueba Contains UBA events.
SplunkEnterpriseSecuritySuite ba_test Contains test index events for behavioral analytics service.

Add-ons can include custom indexes defined in an indexes.conf file.

Index deployment

Splunk Enterprise Security includes a tool to gather the indexes.conf and index-time props.conf and transforms.conf settings from all enabled apps and add-ons on the search head and assemble them into one add-on.

See also

For more information on managing, configuring, and deploying indexes, see the product documentation:

Last modified on 09 August, 2024
Integrate Splunk Stream with Splunk Enterprise Security   Configure users and roles in Splunk Enterprise Security

This documentation applies to the following versions of Splunk® Enterprise Security: 8.0.0


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters