Getting Data In

How do I capture and index these TCP events in Splunk?

lavkush
New Member

Hello Team,

Would be great to know how do I capture the following alerts in Splunk.

1) TCP Connect Request
2) TCP Disconnect Request
3) TCP Connect Confirm
4) TCP Disconnect Confirm

I need to sniff the local network and capture these in Splunk.
Please direct us to the appropriate portal/page.

Regards,
Ravi.

0 Karma

skoelpin
SplunkTrust
SplunkTrust

You can set up the stanza in your inputs.conf to capture the TCP traffic. You can tie the request/response together using a transaction command which will alert if there's no response to the request

http://docs.splunk.com/Documentation/Splunk/6.4.2/Data/Monitornetworkports

0 Karma
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...