I am trying to use Splunk to monitor the time between keep alives between servers. The data has been captured using tcpdump (and filtered using awk) to only show the time, source and destination IP's and Ports (i.e. port 32640 & 32512).
I want to be able to graph the time between the keep alive per host, and show the average. Basically with the end goal being to see when the time between the keep alive between the servers start to increase (due to network latency etc).
A sample of the data is below.
192.168.10.50 is the server,
11:10:11.482331 10.0.6.190.32512 192.168.10.50.32640:
11:10:11.482523 10.0.6.98.32512 192.168.10.50.32640:
11:10:11.590070 10.0.6.185.32512 192.168.10.50.32640:
11:10:11.763787 10.0.6.2.32640 192.168.10.50.32640:
11:12:01.482331 10.0.6.190.32512 192.168.10.50.32640:
11:12:01.482523 10.0.6.98.32512 192.168.10.50.32640:
11:12:01.590070 10.0.6.185.32512 192.168.10.50.32640:
11:12:01.763787 10.0.6.2.32640 192.168.10.50.32640:
11:14:21.482331 10.0.6.190.32512 192.168.10.50.32640:
11:14:21.482523 10.0.6.98.32512 192.168.10.50.32640:
11:14:21.590070 10.0.6.185.32512 192.168.10.50.32640:
11:14:21.763787 10.0.6.2.32640 192.168.10.50.32640:
... View more