Splunk Data Stream Processor

Learn Courtney Wright

This blog post contains important information regarding Splunk Data Stream Processor (DSP).

Effective immediately, DSP is no longer available for sale to new customers. Please read on for consideration of other available Splunk solutions that address similar use cases.

End of support for DSP version 1.3 has been modified from March 30, 2024 to July 1, 2023 in order to align with the end of life for Gravity, a Kubernetes orchestrator that was part of DSP releases prior to version 1.4. Existing DSP customers are encouraged to upgrade to version 1.4 for continued support through February 2025, as per the Splunk Software Support Policy.

About Splunk Data Stream Processor

Splunk Data Stream Processor is a real-time stream processing solution that collects and processes high-volume, high-velocity data then delivers results to Splunk and other destinations, in milliseconds. It provides a powerful and flexible way to manage and manipulate data streams by applying filters, transformations, and aggregations in real-time.

DSP is designed to handle large and complex data streams, including data from IoT devices, social media platforms, and machine logs. It provides a scalable architecture that can handle millions of events per second and can be deployed on-premises or in the cloud.

What To Use Instead

Splunk offers other solutions for your data transformation and processing needs:

More resources

Here are additional resources that can help you to adopt Splunk in your environment:

Related Articles

What Is Prompt Injection? Understanding Direct Vs. Indirect Attacks on AI Language Models
Learn
4 Minute Read

What Is Prompt Injection? Understanding Direct Vs. Indirect Attacks on AI Language Models

Learn what prompt injection is, how direct and indirect attacks target AI language models, and discover best practices to protect your systems from these threats.
Intrusion Detection Systems (IDS): Definition, Types, Purpose
Learn
6 Minute Read

Intrusion Detection Systems (IDS): Definition, Types, Purpose

An intrusion detection system monitors network traffic for anomalies and cyberattacks. Learn what types of IDS there are and which is right for you.
Managed Detection & Response: MDR Explained
Learn
5 Minute Read

Managed Detection & Response: MDR Explained

Learn how Managed Detection and Response (MDR) services enhance cybersecurity, address challenges, and provide 24/7 security.