Splunk is one of the leading SIEM solutions in the market that provides the ability to collect, analyze and correlate the network and machine logs

Splunk ingests machine data (logs, events, metrics), parses and indexes it, and makes it searchable so analysts can monitor, detect, investigate, and report incidents.

image.png

Simple flow:

Forwarder (agent) → Indexer (parse & store) → Search Head (run SPL, build dashboards/alerts) → Outputs/Actions (email, webhook, ticket).

image.png


Core components

Splunk Forwarder

image.png

A lightweight agent installed on endpoints to collect and forward data to Splunk. It’s low overhead and recommended for production ingestion.

Common sources:


Indexer

Parses incoming data (timestamps, line breaking), normalizes into field-value pairs, and stores events in indexes (hot → warm → cold → frozen). Indexers also answer search requests.