Thanks, it’s exciting what I needed
Hi @sol69
Please find the following instructions for configuring the add-on
Wireshark Installation
TA-tshark app Installation
Modify Configuration Files
Enable Packet Capture
Restart the Universal Forwarder (UF)
For further insights and to extend the functionality of the installed app, consider installing the following complementary Splunk apps:
DNS Insight
DNS Insight on Splunkbase
DHCP Insight
DHCP Insight on Splunkbase
These apps provide additional analysis and visualization capabilities related to DNS and DHCP traffic.
Note - How you install the app on your UF may depend on your architecture - are you using a Deployment Server to distribute apps to your UF(s)?
Please let me know how you get on and consider adding karma to this or any other answer if it has helped.
Regards
Will
I recommend exploring an alternative method for forwarding the data, as this add-on or app does not appear to be CIM-compliant. It would be best to review this documentation for more details.
https://community.splunk.com/t5/Splunk-Enterprise/Monitoring-Wireshark-usage-with-splunk/m-p/690530
https://community.splunk.com/t5/Monitoring-Splunk/Splunk-monitoring-a-wireshark-file/td-p/14218
To configure the inputs.conf for the TA_tshark (Network Input for Windows) on Splunk, follow these steps:
Install TA_tshark:
Modify inputs.conf:
[script://<give your path>] disabled = 0 index = your_index sourcetype = tshark:port53
Modify tcpdump.path:
Restart the Universal Forwarder: