Splunk Enterprise

Ta_tshark

sol69
Explorer

How do I configure the inputs.conf for 

Ta_tshark TA_tshark (Network Input for Windows) | Splunkbase

Labels (1)
0 Karma

Solo69
Observer

Thanks, it’s exciting what I needed

0 Karma

livehybrid
Champion

Hi @sol69 

Please find the following instructions for configuring the add-on

Prerequisites

  1. Wireshark Installation

    • Download and install Wireshark.
    • During the installation process, deselect all components except for tshark (this is the command-line tool needed for packet capture), unless you have other reasons for installing the full package.
  2. TA-tshark app Installation

    • Install the TA-tshark add-on on your Universal Forwarder (UF).
    • After installation, ensure you configure the add-on to forward the necessary data.

Configuration Steps

  1. Modify Configuration Files

    • inputs.conf:
      • Locate the file (often included in the app package).
      • If needed, modify the configuration—by default, it is set up for Windows to capture traffic on port 53 (DNS) on the first interface.
      • The input is defined with the name tshark:port53 and a specified sourcetype.
    • bin/tcpdump.path:
      • Adjust this file if your environment requires a different tcpdump/tshark path than what is provided.
  2. Enable Packet Capture

    • In the inputs.conf file, find the stanza corresponding to the capture input.
    • Set disabled = 0 to enable the capture feature.
  3. Restart the Universal Forwarder (UF)

    • After making all changes, restart the UF to apply the new configuration settings.

Optional: Additional Apps for Enhanced Functionality

For further insights and to extend the functionality of the installed app, consider installing the following complementary Splunk apps:

These apps provide additional analysis and visualization capabilities related to DNS and DHCP traffic.

Note - How you install the app on your UF may depend on your architecture - are you using a Deployment Server to distribute apps to your UF(s)? 

Please let me know how you get on and consider adding karma to this or any other answer if it has helped.
Regards

Will

0 Karma

kiran_panchavat
Influencer

@sol69 

I recommend exploring an alternative method for forwarding the data, as this add-on or app does not appear to be CIM-compliant. It would be best to review this documentation for more details.

https://community.splunk.com/t5/Splunk-Enterprise/Monitoring-Wireshark-usage-with-splunk/m-p/690530 
https://community.splunk.com/t5/Monitoring-Splunk/Splunk-monitoring-a-wireshark-file/td-p/14218 

Did this help? If yes, please consider giving kudos, marking it as the solution, or commenting for clarification — your feedback keeps the community going!
0 Karma

kiran_panchavat
Influencer

@sol69 

To configure the inputs.conf for the TA_tshark (Network Input for Windows) on Splunk, follow these steps:

  1. Install TA_tshark:

    • Install the TA_tshark on your Universal Forwarder (UF) and configure forwarding.
  2. Modify inputs.conf:

    • Open the inputs.conf file located in $SPLUNK_HOME/etc/apps/TA_tshark/local/ (create the file ).
    • Add the following configuration to capture DNS traffic on port 53:
     [script://<give your path>]
     disabled = 0
     index = your_index
     sourcetype = tshark:port53
    • Ensure the disabled attribute is set to 0 to enable the input.
  3. Modify tcpdump.path:

    • If needed, update the bin/tcpdump.path file to point to the correct path of tshark.
  4. Restart the Universal Forwarder:

    • After making these changes, restart the Universal Forwarder to apply the new configuration.
Did this help? If yes, please consider giving kudos, marking it as the solution, or commenting for clarification — your feedback keeps the community going!
0 Karma
Get Updates on the Splunk Community!

Announcing the Expansion of the Splunk Academic Alliance Program

The Splunk Community is more than just an online forum — it’s a network of passionate users, administrators, ...

Learn Splunk Insider Insights, Do More With Gen AI, & Find 20+ New Use Cases You Can ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Buttercup Games: Further Dashboarding Techniques (Part 7)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...