This Splunk Technical Add-on allows you to fetch data from the CrowdStrike Falcon® Discover module. The following inputs are supported:
- CrowdStrike Falcon Discover Application data: Monitor applications discovered on your agents
| Splunk platform instance type | Supported | Required | Comments |
|---|---|---|---|
| Search Heads | Yes | Yes | Only the source type is required, but you can install the whole TA without input configuration on search heads |
| Indexers | Yes | Conditional | I recommend to use Heavy Forwarders to collect data, but an Indexer can also be used. If you don't run the input on an indexer, don't install this TA to Indexers! |
| Heavy Forwarders | Yes | Conditional | It's recommended to run inputs on this instance! |
| Universal Forwarders | No | No |
📝 Single-instance (standalone) and Splunk Cloud deployments are supported as well!
The Add-on fetches data from the CrowdStrike Falcon REST API. You have to add a new API client with at least the following API scopes:
- Hosts
- Discover
Copy the client ID and secret. You will need it during the TA configuration.
The Setup of this TA is very straightforward. Here are the required steps:
-
Install the TA on your Splunk instance(s) according to the table above (Where to install this add-on (Splunk Enterprise))
-
Open the CrowdStrike Falcon Discover Add-on for Splunk App
-
Switch to Configuration and add a new Account
-
Switch to Inputs and create new inputs according to your needs.
-
Verify that the input is working by searching for the data! If you don't see anything, have a look at the Troubleshooting section.
The TA writes logs into _internal. You can use the following search for troubleshooting/monitoring purposes:
index="_internal" sourcetype="crowdstrike:discover:application:talog"
Optionally, raise the Log Level on the App Configuration page:
This project uses Docker Compose to spin up a full Splunk Enterprise development environment.
-
Put your Splunk developer license in the root of this repository in a file called
splunk.lic -
Start the Docker instance:
docker compose up [-d]
That's it. You can now start configuring the add-on in Splunk Web and develop whatever you like.
Hint: The Splunk instance is pre-configured with an index called crowdstrike. You can use it to store data.
This project is actually hosted in GitLab and synced to GitHub, but you can still contribute to this project in GitHub of course!



