Splunk Search

How do I improve my search for outbound traffic to determine source, destination IP and destination port?

pandeyashish
New Member

I am trying to make a search for outbound traffic flow. i.e. source, destination IP and destination port. Is there any way to improve this search as it's currently breaking my search head and the performance is not as expected.

index=* sourcetype=* | stats values(dest_ip) values(dest_port) by src_ip

Your feedback and advice is much appreciated.
Thanks,

0 Karma

sundareshr
Legend

does this give you what you need?

index=firewall sourcetype=* src_ip=* | table src_ip dest_ip dest_port
0 Karma

pandeyashish
New Member

Thanks for the reply Sundaresh, I have used this query, since this is for firewall logs this query is using too long to execute the result. So I have to break down the time range. Do you have any suggestions based on index summary. The current query that I am using is
index=firewall sourcetype=* action="allowed" NOT dest_ip="10...*" NOT dest_port="443" NOT dest_port="80" | sistats count by src_ip dest_ip dest_port

Any feedback on this would help me to work on my assigned engagements 🙂
Thanks,

0 Karma

pandeyashish
New Member

index=firewall sourcetype=* | stats values(dest_ip) values(dest_port) by src_ip
This search is to find all the source and destination IPs with destination port.

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...