Getting Data In

How do I capture and index these TCP events in Splunk?

lavkush
New Member

Hello Team,

Would be great to know how do I capture the following alerts in Splunk.

1) TCP Connect Request
2) TCP Disconnect Request
3) TCP Connect Confirm
4) TCP Disconnect Confirm

I need to sniff the local network and capture these in Splunk.
Please direct us to the appropriate portal/page.

Regards,
Ravi.

0 Karma

skoelpin
SplunkTrust
SplunkTrust

You can set up the stanza in your inputs.conf to capture the TCP traffic. You can tie the request/response together using a transaction command which will alert if there's no response to the request

http://docs.splunk.com/Documentation/Splunk/6.4.2/Data/Monitornetworkports

0 Karma
Get Updates on the Splunk Community!

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to ...

Announcing the Migration of the Splunk Add-on for Microsoft Azure Inputs to Officially Supported Splunk ...