Splunk Data Stream Processor

This blog post contains important information regarding Splunk Data Stream Processor (DSP).

Effective immediately, DSP is no longer available for sale to new customers. Please read on for consideration of other available Splunk solutions that address similar use cases.

End of support for DSP version 1.3 has been modified from March 30, 2024 to July 1, 2023 in order to align with the end of life for Gravity, a Kubernetes orchestrator that was part of DSP releases prior to version 1.4. Existing DSP customers are encouraged to upgrade to version 1.4 for continued support through February 2025, as per the Splunk Software Support Policy.

About Splunk Data Stream Processor

Splunk Data Stream Processor is a real-time stream processing solution that collects and processes high-volume, high-velocity data then delivers results to Splunk and other destinations, in milliseconds. It provides a powerful and flexible way to manage and manipulate data streams by applying filters, transformations, and aggregations in real-time.

DSP is designed to handle large and complex data streams, including data from IoT devices, social media platforms, and machine logs. It provides a scalable architecture that can handle millions of events per second and can be deployed on-premises or in the cloud.

What To Use Instead

Splunk offers other solutions for your data transformation and processing needs:

More resources

Here are additional resources that can help you to adopt Splunk in your environment:

Related Articles

Telemetry 101: An Introduction To Telemetry
Learn
7 Minute Read

Telemetry 101: An Introduction To Telemetry

Telemetry is powerful data that can tell you all sorts of important information. Know what you can do with this useful data — get the full telemetry 101 here.
Security Intelligence: An Introduction
Learn
5 Minute Read

Security Intelligence: An Introduction

Learn how security intelligence uses real-time data, AI, and machine learning to anticipate, detect, and respond to evolving cybersecurity threats effectively.
Why Honeypots Work: The Case for Letting Attackers In
Learn
3 Minute Read

Why Honeypots Work: The Case for Letting Attackers In

Honeypots act as decoy systems to lure attackers, providing critical threat intelligence and strengthening defenses through advanced technology and real-time monitoring.