Great tool for digging deep in to the back-end and to monitor the front-end
November 05, 2019

Great tool for digging deep in to the back-end and to monitor the front-end

PAULIUS BUCINSKAS | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Splunk Enterprise

Splunk Enterprise tool is being used across our Digital department. Using this tool we are able to search and analyze event logs of our customer sessions. We can see the error trends of our Digital Services. Set up alerts for multiple KPIs and create dashboards for monitoring the health of our Digital products.
  • Captures multiple different information about a customer and his/her session.
  • Intuitive and informative search options.
  • Option to set up precise alerts for different KPIs.
  • The speed of the tool could be improved.
  • It could store and allow to search for historical data older than 60 days (may be related to our company license).
  • Dashboard creation could be more user-friendly.
  • It helps to determine issues that affect multiple customers.
  • It helps to catch bugs more quickly.
Splunk Enterprise stores and captures more detailed customer logs. Also, we can build search including back-end information.
Good and informative "Help" page with a lot of useful information.

Do you think Splunk Enterprise delivers good value for the price?


Are you happy with Splunk Enterprise's feature set?


Did Splunk Enterprise live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Splunk Enterprise go as expected?

I wasn't involved with the implementation phase

Would you buy Splunk Enterprise again?


When needed to search for some specific event information triggered by end-user or by any other service, Splunk Enterprise tool can give that information and by reviewing the log of the event you can find a lot of needed information that could help you to find the solution or resolve the issue on the spot.

Splunk Enterprise Feature Ratings

Centralized event and log data collection
Event and log normalization/management
Deployment flexibility
Not Rated
Integration with Identity and Access Management Tools
Custom dashboards and workspaces
Host and network-based intrusion detection