Skip to main content

Splunk Mission Control Seat Entitlement

A free version of Splunk Mission Control is included with Splunk Enterprise Security on premises term license, and cloud subscriptions. The quantity of initially allotted free entitlement of Splunk Mission Control is determined based on the Splunk Enterprise Security capacity as set forth in Table 1 below. Note that customers can request additional capacity of Splunk Mission Control at no charge if the initially allotted free User Seats are insufficient.

Splunk Enterprise Security License Capacity based on Daily Indexing Volume Splunk Enterprise Security Subscription Capacity based on SVCs Splunk Enterprise Security License Capacity based on: vCPU Splunk Mission Control User Seat Entitlement

< 1 TB

50

100

10

Up to 2 TB

100

250

20

Up to 3 TB

150

500

40

Up to 4 TB

200

750

60

Up to 6 TB

300

1000

80

Up to 8 TB

400

1250

100

8+ TB

400+

1250+

200

vCPUs” refers to the virtual CPUs to which Splunk Mission Control software has access. Each virtual CPU is equivalent to a distinct hardware thread of execution in a physical CPU core.

Splunk Virtual Core” means a unit of capabilities in Splunk Cloud that includes the following resources: compute, memory and I/O.

Mission Control User Seat” means a user of any type of the Mission Control platform and/or UI. This includes all administrators, analysts, content authors, etc.

Security Use Case

Security use cases - Mission Control use is limited to security use cases only. Security use cases include any activity in service of (a) the protection against intrusions, theft and other unauthorized access into Customer’s electronic systems, infrastructure, devices and networks, (b) threat monitoring and response, and (c) protection against disruption of service attacks. This also includes any activities in the organization of the CISO, such as the following:

  • SOC Efficiency Monitoring / Operational Metrics
  • User behavior analysis
  • Network traffic analysis
  • Data exfiltration detection/analysis
  • Insider threat detection/response
  • Incident investigation
  • Threat hunting
  • Cloud security monitoring
  • Phishing detection and remediation
  • Compliance monitoring and reporting