A community-built SPL + dashboard repository
GoSplunk
Discover field-tested SPL searches and full dashboard XML you can copy straight into Splunk.
Sample SPL
index=security EventCode=4625
| stats count by Account_Name, ComputerName
| sort - count 128
SPL searches
Hand-picked SPL searches from across the library.
Sysmon - Find Processes with Renamed Executables
Splunk User Search Activity
Dashboard and App views by user
List of Hosts in a Linux Environment
Windows Time Change
Sysmon - cmd line for non -local connections
REST Call for a list of Alert actions (Webhook_sms or Email or notable or ..)
Detect Scheduler Running Twice a Search
List All Splunk Users & Associated Roles
Dashboards
Full XML dashboards with panels, inputs, and drilldowns. Copy once, ship instantly.