Configure and deploy indexes
Splunk App for PCI Compliance implements custom indexes for event storage. The indexes are defined across the apps provided with Splunk App for PCI Compliance.
- In a single instance deployment, the installation of Enterprise Security creates the indexes in the default path for data storage.
- In a Splunk Cloud deployment, customers work with Splunk Support to set up, manage, and maintain their cloud index parameters. See Manage Splunk Cloud indexes in the Splunk Cloud User Manual.
- In a distributed deployment, create the indexes on all Splunk platform indexers or search peers.
The indexes defined in Splunk App for PCI Compliance do not provide configuration settings to address:
- Multiple storage paths
- Accelerated data models
- Data retention
- Bucket sizing
- Use of volume parameters.
For detailed examples of configuring indexes, see indexes.conf.example in the Splunk Enterprise Admin Manual.
Indexes by app
You might see additional or fewer indexes, depending on your capabilities and which apps you have installed. The following are non-system indexes.
||Summary index used by the Geographically Improbable Access panel on the Access Anomalies dashboard.|
||Unused in this release.|
||Contains events that result from a threat list match.|
||Audit and Data Protection summary index.|
||Endpoint protection summary index.|
||WHOIS data index.|
||Contains the notable events.|
||Contains a stats summary of notable events used on select dashboards.|
||Contains the risk modifier events.|
||If PCI is installed, contains the PCI event data.|
||If PCI is installed, contains the PCI compliance status history.|
||If PCI is installed, contains the PCI summary data.|
||Unused in this release.|
||Contains the adaptive response action events.|
||Does not contain event data. Used behind the scenes for routing to your UBA target.|
||Contains UBA events.|
||Contains sequenced event data, after the successful termination of a sequence template.|
Add-ons can include custom indexes defined in an
indexes.conf file. See About managing indexes in the Splunk Enterprise Managing Indexers and Clusters of Indexers manual.
Splunk App for PCI Compliance includes a tool to gather the
indexes.conf and index-time
transforms.conf settings from all enabled apps and add-ons on the search head and assemble them into one add-on. For more details, see Deploy add-ons included with Splunk Enterprise Security in this manual.
Customize the menu bar in Splunk App for PCI Compliance
Configure users and roles
This documentation applies to the following versions of Splunk® App for PCI Compliance: 4.5.0 Cloud only, 4.0.1, 4.1.0, 4.1.1, 4.3.0, 4.4.0, 4.4.1, 4.0.0