<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ta_tshark in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Ta-tshark/m-p/740488#M21744</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/265475"&gt;@sol69&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find the following instructions for configuring the add-on&lt;/P&gt;&lt;H3&gt;Prerequisites&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Wireshark Installation&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Download and install Wireshark.&lt;/LI&gt;&lt;LI&gt;During the installation process, deselect all components except for &lt;STRONG&gt;tshark&lt;/STRONG&gt; (this is the command-line tool needed for packet capture), unless you have other reasons for installing the full package.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;TA-tshark app Installation&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Install the &lt;STRONG&gt;TA-tshark&lt;/STRONG&gt; add-on on your Universal Forwarder (UF).&lt;/LI&gt;&lt;LI&gt;After installation, ensure you configure the add-on to forward the necessary data.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;HR /&gt;&lt;H3&gt;Configuration Steps&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Modify Configuration Files&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;inputs.conf&lt;/STRONG&gt;:&lt;UL&gt;&lt;LI&gt;Locate the file (often included in the app package).&lt;/LI&gt;&lt;LI&gt;If needed, modify the configuration—by default, it is set up for Windows to capture traffic on port 53 (DNS) on the first interface.&lt;/LI&gt;&lt;LI&gt;The input is defined with the name tshark:port53 and a specified sourcetype.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;bin/tcpdump.path&lt;/STRONG&gt;:&lt;UL&gt;&lt;LI&gt;Adjust this file if your environment requires a different tcpdump/tshark path than what is provided.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Enable Packet Capture&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In the &lt;STRONG&gt;inputs.conf&lt;/STRONG&gt; file, find the stanza corresponding to the capture input.&lt;/LI&gt;&lt;LI&gt;Set disabled = 0 to enable the capture feature.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Restart the Universal Forwarder (UF)&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;After making all changes, restart the UF to apply the new configuration settings.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;HR /&gt;&lt;H3&gt;Optional: Additional Apps for Enhanced Functionality&lt;/H3&gt;&lt;P&gt;For further insights and to extend the functionality of the installed app, consider installing the following complementary Splunk apps:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;DNS Insight&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://splunkbase.splunk.com/app/1827/" target="_new" rel="noopener"&gt;DNS Insight on Splunkbase&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;DHCP Insight&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://splunkbase.splunk.com/app/1837/" target="_new" rel="noopener"&gt;DHCP Insight on Splunkbase&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;These apps provide additional analysis and visualization capabilities related to DNS and DHCP traffic.&lt;/P&gt;&lt;P&gt;Note - How you install the app on your UF may depend on your architecture - are you using a Deployment Server to distribute apps to your UF(s)?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know how you get on and consider adding karma to this or any other answer if it has helped.&lt;BR /&gt;Regards&lt;/P&gt;&lt;P&gt;Will&lt;/P&gt;</description>
    <pubDate>Sun, 02 Mar 2025 07:21:10 GMT</pubDate>
    <dc:creator>livehybrid</dc:creator>
    <dc:date>2025-03-02T07:21:10Z</dc:date>
    <item>
      <title>Ta_tshark</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Ta-tshark/m-p/740480#M21741</link>
      <description>&lt;P&gt;How do I configure the inputs.conf for&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ta_tshark&amp;nbsp;&lt;A href="https://splunkbase.splunk.com/app/4921" target="_blank" rel="noopener"&gt;TA_tshark (Network Input for Windows) | Splunkbase&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Mar 2025 02:38:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Ta-tshark/m-p/740480#M21741</guid>
      <dc:creator>sol69</dc:creator>
      <dc:date>2025-03-02T02:38:32Z</dc:date>
    </item>
    <item>
      <title>Re: Ta_tshark</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Ta-tshark/m-p/740484#M21742</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/265475"&gt;@sol69&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;To configure the inputs.conf for the TA_tshark (Network Input for Windows) on Splunk, follow these steps:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Install TA_tshark&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Install the TA_tshark on your Universal Forwarder (UF) and configure forwarding.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Modify inputs.conf&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Open the inputs.conf file located in $SPLUNK_HOME/etc/apps/TA_tshark/local/ (create the file ).&lt;/LI&gt;&lt;LI&gt;Add the following configuration to capture DNS traffic on port 53:&lt;/LI&gt;&lt;/UL&gt;&lt;PRE&gt; [script://&amp;lt;give your path&amp;gt;]
 disabled = 0
 index = your_index
 sourcetype = tshark:port53&lt;/PRE&gt;&lt;UL&gt;&lt;LI&gt;Ensure the disabled attribute is set to 0 to enable the input.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Modify tcpdump.path&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If needed, update the bin/tcpdump.path file to point to the correct path of tshark.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Restart the Universal Forwarder&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;After making these changes, restart the Universal Forwarder to apply the new configuration.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.4.0/Admin/Inputsconf#Scripted_Input:" target="_blank"&gt;inputs.conf - Splunk Documentation&lt;/A&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 02 Mar 2025 05:10:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Ta-tshark/m-p/740484#M21742</guid>
      <dc:creator>kiran_panchavat</dc:creator>
      <dc:date>2025-03-02T05:10:18Z</dc:date>
    </item>
    <item>
      <title>Re: Ta_tshark</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Ta-tshark/m-p/740485#M21743</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/265475"&gt;@sol69&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I recommend exploring an alternative method for forwarding the data, as this add-on or app does not appear to be CIM-compliant. It would be best to review this documentation for more details.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.splunk.com/t5/Splunk-Enterprise/Monitoring-Wireshark-usage-with-splunk/m-p/690530" target="_blank"&gt;https://community.splunk.com/t5/Splunk-Enterprise/Monitoring-Wireshark-usage-with-splunk/m-p/690530&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;A href="https://community.splunk.com/t5/Monitoring-Splunk/Splunk-monitoring-a-wireshark-file/td-p/14218" target="_blank"&gt;https://community.splunk.com/t5/Monitoring-Splunk/Splunk-monitoring-a-wireshark-file/td-p/14218&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Mar 2025 05:15:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Ta-tshark/m-p/740485#M21743</guid>
      <dc:creator>kiran_panchavat</dc:creator>
      <dc:date>2025-03-02T05:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: Ta_tshark</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Ta-tshark/m-p/740488#M21744</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/265475"&gt;@sol69&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find the following instructions for configuring the add-on&lt;/P&gt;&lt;H3&gt;Prerequisites&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Wireshark Installation&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Download and install Wireshark.&lt;/LI&gt;&lt;LI&gt;During the installation process, deselect all components except for &lt;STRONG&gt;tshark&lt;/STRONG&gt; (this is the command-line tool needed for packet capture), unless you have other reasons for installing the full package.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;TA-tshark app Installation&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Install the &lt;STRONG&gt;TA-tshark&lt;/STRONG&gt; add-on on your Universal Forwarder (UF).&lt;/LI&gt;&lt;LI&gt;After installation, ensure you configure the add-on to forward the necessary data.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;HR /&gt;&lt;H3&gt;Configuration Steps&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Modify Configuration Files&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;inputs.conf&lt;/STRONG&gt;:&lt;UL&gt;&lt;LI&gt;Locate the file (often included in the app package).&lt;/LI&gt;&lt;LI&gt;If needed, modify the configuration—by default, it is set up for Windows to capture traffic on port 53 (DNS) on the first interface.&lt;/LI&gt;&lt;LI&gt;The input is defined with the name tshark:port53 and a specified sourcetype.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;bin/tcpdump.path&lt;/STRONG&gt;:&lt;UL&gt;&lt;LI&gt;Adjust this file if your environment requires a different tcpdump/tshark path than what is provided.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Enable Packet Capture&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In the &lt;STRONG&gt;inputs.conf&lt;/STRONG&gt; file, find the stanza corresponding to the capture input.&lt;/LI&gt;&lt;LI&gt;Set disabled = 0 to enable the capture feature.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Restart the Universal Forwarder (UF)&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;After making all changes, restart the UF to apply the new configuration settings.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;HR /&gt;&lt;H3&gt;Optional: Additional Apps for Enhanced Functionality&lt;/H3&gt;&lt;P&gt;For further insights and to extend the functionality of the installed app, consider installing the following complementary Splunk apps:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;DNS Insight&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://splunkbase.splunk.com/app/1827/" target="_new" rel="noopener"&gt;DNS Insight on Splunkbase&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;DHCP Insight&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://splunkbase.splunk.com/app/1837/" target="_new" rel="noopener"&gt;DHCP Insight on Splunkbase&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;These apps provide additional analysis and visualization capabilities related to DNS and DHCP traffic.&lt;/P&gt;&lt;P&gt;Note - How you install the app on your UF may depend on your architecture - are you using a Deployment Server to distribute apps to your UF(s)?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know how you get on and consider adding karma to this or any other answer if it has helped.&lt;BR /&gt;Regards&lt;/P&gt;&lt;P&gt;Will&lt;/P&gt;</description>
      <pubDate>Sun, 02 Mar 2025 07:21:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Ta-tshark/m-p/740488#M21744</guid>
      <dc:creator>livehybrid</dc:creator>
      <dc:date>2025-03-02T07:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: Ta_tshark</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Ta-tshark/m-p/740984#M21794</link>
      <description>&lt;P&gt;Thanks, it’s exciting what I needed&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 01:05:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Ta-tshark/m-p/740984#M21794</guid>
      <dc:creator>Solo69</dc:creator>
      <dc:date>2025-03-06T01:05:13Z</dc:date>
    </item>
  </channel>
</rss>

