Every action below is available as a verb in Cerebral OS — callable from a Cerebral, a Map, or the Runtime API. All executions are governed, audited, and dry-run safe.
Cancel Search Job
splunk:cancel_search_job
Cancel a running search job.
Write
High risk
Create Saved Search
splunk:create_saved_search
Create a new saved search.
Write
Medium risk
Delete Saved Search
splunk:delete_saved_search
Delete a saved search permanently.
Write
High risk
Get App
splunk:get_app
Get detailed information about a specific Splunk app.
Read
Low risk
Get Index
splunk:get_index
Get detailed information about a specific index.
Read
Low risk
Get Saved Search
splunk:get_saved_search
Get details of a saved search by name.
Read
Low risk
Get Search Job
splunk:get_search_job
Get the status and details of a search job.
Read
Low risk
List Apps
splunk:list_apps
List all installed Splunk apps.
Read
Low risk
List Indexes
splunk:list_indexes
List all available indexes in Splunk.
Read
Low risk
List Saved Searches
splunk:list_saved_searches
List all saved searches in the specified app.
Read
Low risk
List Search Jobs
splunk:list_search_jobs
List search jobs with their status and details.
Read
Low risk
Run Saved Search
splunk:run_saved_search
Execute a saved search and return the job ID.
Write
Medium risk
Search Data
splunk:search_data
Execute a search query and return results.
Read
Low risk
Send Event
splunk:send_event
Send a single event to Splunk via HTTP Event Collector.
Write
Medium risk