Splunk Search

How to display source IP and destination IP mapping count by connection events?

junster
Explorer

Hi, I am trying to build a dashboard to show a mapping between source IP and destination IP based on different connections (open or close). I was able to get the result like this but not sure how to present it in a visualization tool and group by the source IP. Any help would be appreciated.

Source IP, Destination IP, Connection Type, Count

10.2.12.3, 168.192.0.1, open, 24

10.2.12.3, 168.192.0.5, open, 45

10.2.12.6, 168.192.0.1, close, 12

10.2.12.4, 168.192.0.6, open, 4

 

Thanks

 

Thanks,

Jun

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

A Sankey diagram may be the solution.  See https://splunkbase.splunk.com/app/3112

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

A Sankey diagram may be the solution.  See https://splunkbase.splunk.com/app/3112

---
If this reply helps you, Karma would be appreciated.

junster
Explorer

Thanks, @richgalloway  It worked.

Get Updates on the Splunk Community!

Automatic Discovery Part 1: What is Automatic Discovery in Splunk Observability Cloud ...

If you’ve ever deployed a new database cluster, spun up a caching layer, or added a load balancer, you know it ...

Real-Time Fraud Detection: How Splunk Dashboards Protect Financial Institutions

Financial fraud isn't slowing down. If anything, it's getting more sophisticated. Account takeovers, credit ...

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...