<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Logging in Splunk Enterprise in Monitoring Splunk</title>
    <link>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668486#M9889</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/262413"&gt;@gayathrc&lt;/a&gt;&amp;nbsp;...Pls check this "Getting Data in" Splunk document.. this gives the steps of monitoring a network input (TCP / UDP).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.1.1/Data/Monitornetworkports" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.1.1/Data/Monitornetworkports&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;upvotes / karma points appreciated, thanks.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 14 Nov 2023 00:32:29 GMT</pubDate>
    <dc:creator>inventsekar</dc:creator>
    <dc:date>2023-11-14T00:32:29Z</dc:date>
    <item>
      <title>Logging in Splunk Enterprise</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668385#M9884</link>
      <description>&lt;P&gt;Hi! This is a very basic question. First time working with Splunk Enterprise Platform.&lt;BR /&gt;&lt;BR /&gt;How do you actually go about switching on the feature to log network traffic coming into an internal network with a specific IP range? I essentially want for Splunk Enterprise to act as a logger for all traffic that enters the internal network on a certain port, for example. How do I go about it?&lt;BR /&gt;&lt;BR /&gt;FYI - I do not want to use the Forwarder or upload log files function.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 03:16:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668385#M9884</guid>
      <dc:creator>gayathrc</dc:creator>
      <dc:date>2023-11-13T03:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in Splunk Enterprise</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668389#M9885</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/262413"&gt;@gayathrc&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I suppose that you already have your Splunk infrastrcuture, if not you have to engage a splunk architect to design it.&lt;/P&gt;&lt;P&gt;Anyway, are you speaking of Packet capture or network switches logs?&lt;/P&gt;&lt;P&gt;in the first case, you have to configure The Splunk App for Steam, for more datails see at&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://splunkbase.splunk.com/app/1809" target="_blank"&gt;https://splunkbase.splunk.com/app/1809&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://splunkbase.splunk.com/app/5234" target="_blank"&gt;https://splunkbase.splunk.com/app/5234&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://splunkbase.splunk.com/app/5238" target="_blank"&gt;https://splunkbase.splunk.com/app/5238&lt;/A&gt;&lt;/P&gt;&lt;P&gt;If instead you have to use Swirches logs, you have to configure one of the component of your Splunk infrastructure (usually an Heavy Forwarder) as receiver of network inputs (for more infos see at&amp;nbsp;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.1.1/Data/Monitornetworkports" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.1.1/Data/Monitornetworkports&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;then you have to install the add-on related to your network technology (e.g. the Cisco Add-on for network technoogy &lt;A href="https://splunkbase.splunk.com/app/1467" target="_blank"&gt;https://splunkbase.splunk.com/app/1467&lt;/A&gt;) and then search for the fieds extracted.&lt;/P&gt;&lt;P&gt;If you don't have the basic knoledge about Splunk searching, see the Splunk Search Tutorial (&lt;A href="https://docs.splunk.com/Documentation/Splunk/latest/SearchTutorial/WelcometotheSearchTutorial" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/latest/SearchTutorial/WelcometotheSearchTutorial&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;Ciao.&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 07:04:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668389#M9885</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-11-13T07:04:22Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in Splunk Enterprise</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668402#M9886</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;It's like&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/161352"&gt;@gcusello&lt;/a&gt;&amp;nbsp;said, but I want to add one comment. You should never use splunk as an syslog receiver even it can do it. You will lose event more or less. It's much better to use real syslog servers to manage centralised syslog server. You you could use e.g. rsyslog, syslog-ng or SC4S (Syslog connector for splunk).&lt;/P&gt;&lt;P&gt;r. Ismo&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 10:01:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668402#M9886</guid>
      <dc:creator>isoutamo</dc:creator>
      <dc:date>2023-11-13T10:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in Splunk Enterprise</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668408#M9887</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/262413"&gt;@gayathrc&lt;/a&gt;&amp;nbsp;... I believe you have some network devices, you want to monitor/send the network devices logs to Splunk.&amp;nbsp;&lt;/P&gt;&lt;P&gt;if so, you may use a syslog tool, to forward the logs to a "heavy forwarder"(HF), and then, from HF, you can send the logs to Splunk indexer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;if this is just a small POC project or use-case testing, then, you can achieve it without HF(or even without syslog)(but there will be data loss issues).&lt;/P&gt;&lt;P&gt;Please provide some more details about the requirements, thanks.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 10:29:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668408#M9887</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2023-11-13T10:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in Splunk Enterprise</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668436#M9888</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/80737"&gt;@inventsekar&lt;/a&gt; - you guessed it right! I'm only looking to use Splunk for a small Network Forensics project where I need to demo an attack on an internal network. For this purpose, I need to log the events and ensure that one such events sends out an Event Alert from Splunk. This will aid in investigating the attack. It's not a huge network, the project only requires about 5-6 devices in the internal network.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 15:06:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668436#M9888</guid>
      <dc:creator>gayathrc</dc:creator>
      <dc:date>2023-11-13T15:06:56Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in Splunk Enterprise</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668486#M9889</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/262413"&gt;@gayathrc&lt;/a&gt;&amp;nbsp;...Pls check this "Getting Data in" Splunk document.. this gives the steps of monitoring a network input (TCP / UDP).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.1.1/Data/Monitornetworkports" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.1.1/Data/Monitornetworkports&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;upvotes / karma points appreciated, thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 00:32:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668486#M9889</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2023-11-14T00:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in Splunk Enterprise</title>
      <link>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668955#M9892</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/262413"&gt;@gayathrc&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;good for you, see next time!&lt;/P&gt;&lt;P&gt;Ciao and happy splunking&lt;/P&gt;&lt;P&gt;Giuseppe&lt;/P&gt;&lt;P&gt;P.S.: Karma Points are appreciated by all the contributors &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Nov 2023 06:21:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Monitoring-Splunk/Logging-in-Splunk-Enterprise/m-p/668955#M9892</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2023-11-17T06:21:57Z</dc:date>
    </item>
  </channel>
</rss>

