Splunk Search

How to search for newly established connection between members of the Splunk infrastructure?

fatsug
Builder

Hello again community

Today I received notice that on every Friday morning at a particular time there are a lot of new sessions registered in the firewall log, apparently caused somehow by Splunk.

The question was passed down, why? So I played around with the metrics log, input/output etc. Though I cannot se any corelated increase or decrease in the numbers observed around the same time.

What I ended up with was alterations of

 

index=_internal source=*metrics.log group=tcp<in|out>_connections
| timechart count by host useother=false

 

My question, is this a reasonable approach?

Otherwise, what would be a better search to get the number of newly established connections between members of the Splunk infrastructure to figure out if any components are establishing a higher number of new connections?

All the best

 

0 Karma

richgalloway
SplunkTrust
SplunkTrust

The words "apparently" and "somehow" aren't much to work with.  I'd go back to the reporter for more detail.  Find out what makes them think the connections are caused by Splunk.  Are the connections *to* Splunk, *from* Splunk, or something else?

I hope you're Splunking your firewall logs.  Then you'd be able to search the timeframe in question to see just what is happening - how many connections, which sources (address and port), and which destinations (address and port).

Your query is a reasonable one for finding TCP connections to or from Splunk instances.  I'm not sure Metrics covers all possible Splunk connections, though.  For example, a burst of API calls wouldn't show up there.  Other connections to consider include a burst of alerts, scheduled dashboard deliveries, and forwarders phoning home (there may be more).

---
If this reply helps you, Karma would be appreciated.

fatsug
Builder

Not much to work with pretty much summarizes it all nicely, lets just say "it's complicated"

Well, until there is more to go on my interpretation is that there is not much more that can be done.

I'll see if I can get some additional information regarding connections, otherwise I suppose that there is not much else to do.

Thank you very much for the feedback

Best regards

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to July Tech Talks, Office Hours, and Webinars!

What are Community Office Hours?Community Office Hours is an interactive 60-minute Zoom series where ...

Updated Data Type Articles, Anniversary Celebrations, and More on Splunk Lantern

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

A Prelude to .conf25: Your Guide to Splunk University

Heading to Boston this September for .conf25? Get a jumpstart by arriving a few days early for Splunk ...