All Apps and Add-ons

How to configure Splunk Stream "Ephemeral Streams" for Enterprise Security?


Looking to get the Splunk Stream "Ephemeral Streams" working for Enterprise Security (concept outlined here:

I've read the short documentation on applying a template for Stream (, but to no avail.

Have accomplished the following:
- Splunk Enterprise set up
- Splunk Enterprise Security on separate search head
- Splunk Stream installed/ Main app on ES Search Head (can control protocols to stream successfully)

So issue is, when attempting to initiate a Steam from a Notable Event through an Adaptive Response, nothing occurs. Didn't know if there is a piece missing or a configuration/network permissions change that would need to occur (such as enabling specific port for the ES Search Head to talk to Splunk Forwarder that has stream app enabled, etc.).

Any help or advice would be appreciated. Thanks!

0 Karma

Splunk Employee
Splunk Employee

Hi! Here are the steps you can perform to get the ephemeral stream through ES.

1) Install ES and Stream on Splunk

2) Configure ISF (Independent Stream Forwarder) which checks into search head. (Steps to configure ISF:

3) Make sure to get enough data indexed in splunk stream(For sourcetypes: tcp, dns, http, ip, udp)

3) Created a search such as: host=hostname_of_ISF sourcetype="stream:ip" dest_ip="" where the dest_ip is the IP of your Search head

4) Save the search as alert which runs on cron schedule for every min

5) In the Trigger Actions, select Notable Events and save the alert

5) Navigate to ES app > Incident Review, on your created notable event, run Adaptive Response Action by clicking on New Response Action -> Stream Capture.

6) The adaptive response from Stream Capture should show a "success" status.

7) Navigate to Stream App> Configure Streams > Ephemeral streams. You will see the created streams on the dashboard

Get Updates on the Splunk Community!

Routing Data to Different Splunk Indexes in the OpenTelemetry Collector

This blog post is part of an ongoing series on OpenTelemetry. The OpenTelemetry project is the second largest ...

Getting Started with AIOps: Event Correlation Basics and Alert Storm Detection in ...

Getting Started with AIOps:Event Correlation Basics and Alert Storm Detection in Splunk IT Service ...

Register to Attend BSides SPL 2022 - It's all Happening October 18!

Join like-minded individuals for technical sessions on everything Splunk!  This is a community-led and run ...