Splunk Search

Citrix Netscaler: How to log external IP addresses

eberg1
Engager

Hey there,

I am needing to look at what ip's our users are using to connect to our Citrix VD website.

I've been trying to take a crack at it for almost a week now and have exhausted all my ideas.

Any ideas?

0 Karma
1 Solution

NetFlow_Logic
Contributor

Have you considered Citrix Netscaler IPFIX (AppFlow)?

NetFlow Optimizer is one of the alternatives.
https://citrixready.citrix.com/netflow-logic-corporation/netflow-optimizer.html

Here the link to download NFO, as well as information on how to install and configure it, and get free evaluation license.
https://www.netflowlogic.com/downloads/
Should you have any questions, please don’t hesitate to reach out and we’ll be happy to help you.

View solution in original post

n90x
New Member

use client_IP on netScaler to track this information, it will be recorded in syslog which can be sent to SPLUNK,use client_IP

0 Karma

NetFlow_Logic
Contributor

Have you considered Citrix Netscaler IPFIX (AppFlow)?

NetFlow Optimizer is one of the alternatives.
https://citrixready.citrix.com/netflow-logic-corporation/netflow-optimizer.html

Here the link to download NFO, as well as information on how to install and configure it, and get free evaluation license.
https://www.netflowlogic.com/downloads/
Should you have any questions, please don’t hesitate to reach out and we’ll be happy to help you.

Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...