The goal of Splunk-SIG is to bring facilitate communication and collaboration among Splunk users across the University’s schools and centers. The SIG list is also used to communicate service updates to Splunk constituents.
Meetings are held periodically.
You are here
- Get Started
- Services
- — Services A to Z —
- Accounts, Access & Security
- Applications & Data Analytics
- Backup, Storage & Platforms
- Community, Support & Learning
- Consulting & Professional Services
- Email, Calendaring & Collaboration
- Networks & Connectivity
- Phone, TV & Video
- Web Hosting
- — Service Rates —
- — Service Level Agreements —
- Security
- Collaborations
- Computing Policies
- Engaging Penn’s IT Community
- Identity & Access Management
- Penn IT Strategic Plan
- Cloud First
- Next Generation Unified Communications
- Penn Bot
- IT Advisory Groups
- Special Interest Groups (SIGs)
- Audio-Visual (AV-SIG)
- Cloud Computing (Cloud-SIG)
- Data Visualization (DataViz-SIG)
- Developer SIG (Dev-SIG)
- High-Performance Computing (HPC-SIG)
- Instructional Technology SIG
- Linux SIG
- Macintosh Networking Group (MacNet)
- Mobile Technologies (Mobile-SIG)
- O365 Special Interest Group
- PC Networking Group (PC-Net)
- Project Partners SIG
- Security SIG
- Social Media SIG
- Splunk Special Interest Group
- Super User Group (SUG)
- Web SIG
- Technology Services Strategy Review Board
- News
- Events
- About
- Overview
- Leadership & Groups
- Purpose & Values
- Strategic Goals
- Recognition
- Staff Profiles
- Aleks P.
- Ali A.
- Andre H.
- Angela H.
- Anita G.
- Beth L.
- Brian D.
- Caroline C.
- Dan C.
- Dan D.
- Danielle S.
- Dave T.
- David J.
- Diane G.
- Eero H.
- Erica S.
- Ernie C.
- Jeanette P.
- Joe K.
- Kalyani B.
- Kara G.
- Maureen G.
- Maurice (“Mo”) P.
- Mayumi H.
- Mike R.
- Mike S.
- Rae S.
- Raminderjit V.
- Sean C.
- Sherry M.
- Stephanie R.
- Steve M.
- Tamara D.
- Tomo T.
- Victor D.
- Wiam Y.
- Tech Jobs @ Penn
- Contact Us
- Hot Topics
- ISC Year in Review
- Modernize, Secure & Transform: Information Technology at Penn
- Positioning Penn for the Future of IT
- Security & Privacy Tip: What to Do if You’ve Been Hacked
- Security & Privacy Tip: Two-factor global traveler tip
- Security & Privacy Tip: Celebrate Data Privacy Month!
- Security & Privacy Tip: Year in Review
- Security & Privacy Tip: Traveling Securely
- Security & Privacy Tip: Mobile Device Security
- Get IT Help