Installing and configuring Splunk Stream (2024)

  1. Last updated
  2. Save as PDF

SplunkStream is a great way to monitor network traffic from a host or via a network TAP or SPAN port. The software acts as a network traffic sniffer. The most common way to implementStream is toinstall it on the host that's generating the traffic you want to capture, frequently a Windows Domain Controller serving DHCP and DNS server roles.

The next most common model is to install Stream on a SPAN port or a network TAP, allowing you to have an out-of-band Stream host monitoring the network. The Splunk configuration for that setup is identical.The only difference is you need your network team to assist.

Stream indexes and source types

Create an index to store the DNS data that Stream will produce. While Stream has the ability to dissect many different network protocols, this articlefocuses on DNS. By default, when Stream generates an event for a DNS session, it hasa source type of stream:dns.When creating indexes for Stream to store data, we recommended following Lantern'snaming convention guidance.

Install the Stream App

To get started with Stream, first review the installation package overview page to determine which apps need to be installed on which components. The on-premise and cloud deployment architectures guide you through various different installation options depending on your environment. Ensure you installSplunk App for Stream on an instance thatallows configuring of Stream on forwarders.

Installing and configuring Splunk Stream (1)

Ensure you have installed and configured the Stream add-on on forwarders to monitor the appropriate network interface. When configuring a Stream forwarder, the location of the Splunk Stream management server is stored in inputs.conf.

You'll need the Splunk_TA_stream app for a forwarder configuration. The custom inputs.conf that resides in that app should point to your remote Stream server, as below.Be sure to modify the protocol if you're utilizing SSL/TLS on your Stream server.

[streamfwd://streamfwd]splunk_stream_app_location = http://remote_stream_server:8000/en-us/custom/splunk_app_stream/stream_forwarder_id =disabled = 0

After the Splunk App for Stream is installed, open the Splunk Stream app from the main menu. Accept the defaults and click Let's Get Started.

You mightwant to check that the forwarder(s)is communicating with the search head that is running the Stream app. You can check in the Stream app under Admin Dashboards > Stream Forwarder Status to view which forwarders are communicating with the Stream app.

Now you're ready to configure Stream to monitor the relevant network interface on your Windows server, and forward the resulting DNS metadata to your Splunk indexers.

Configure a new DNS stream

Implementation

  1. Within the Splunk Stream app, select Configuration > Configure Streams.

Installing and configuring Splunk Stream (2)

  1. The Configure Streams dashboard displays the default settings for protocol information to be collected. You mightwant to disable the defaults, then select the protocol and details to create your new stream. You can select all of the available protocols and disable them all at once, by clicking the checkbox next to Name on the title bar.

Installing and configuring Splunk Stream (3)

  1. After selecting all of the protocols, click the Disable option.
  2. Create a new stream for collecting the DNS details that you'd like to capture. Start by clickingthe New Stream button, then Metadata Stream.

Installing and configuring Splunk Stream (4)

  1. This takes you into a workflow that allows you to configure the stream. Select DNS as the protocol in the Basic Info step of the workflow.

Installing and configuring Splunk Stream (5)

  1. Give the streama name and description with some context to help you to identify the data, then click Next.

Installing and configuring Splunk Stream (6)

  1. On the Aggregation step, selectNo for aggregation, then click Next. (You don't want aggregation because you want to see the individual DNS records.)

Installing and configuring Splunk Stream (7)

  1. On the Fields screen, select the fields (specific to DNS) that you want to collect and store. Note that some fields,not all fields are selected by default. For proper security alerting and investigation, we recommend thatyou enable at least the following fields:
  • bytes
  • bytes_in
  • bytes_out
  • dest_ip
  • dest_mac
  • dest_port
  • flow_id
  • host_addr
  • host_type
  • hostname
  • message_type
  • name
  • query
  • query_type
  • reply_code
  • reply_code_id
  • reverse_addr
  • src_ip
  • src_mac
  • src_port
  • transaction_id
  • transport
  • ttl

After you've selected the DNS fields that you'd like to collect, click Next.

Installing and configuring Splunk Stream (8)

  1. (Optional)Define the filtering of the collected data on the Filters screen. The filters are based on the fields you selected on the previous screen. For example, if you only wanted Stream to capture queries for external domains, you could define that here. At this stage, defining filters is optional because you might want to adjust filters later afteryou've collected data for a while and know what you have and what you'd like to keep or discard.

Installing and configuring Splunk Stream (9)

  1. Select the Next button again to go to the Settings screen, where you'll define the destination index for your DNS data.
  2. Select the destination index from the dropdown menu. This will be the index you have already created and are going to store DNS data in. If you don't see the expected index listed here, it is because you never created the index. Do so now.We recommend creating the same indexes on the Search Head running the Stream App as the Indexers. Although Stream won'tstore data in those indexes,it will show up in the dropdown here. In our example we are storing data to the netdns index.

Installing and configuring Splunk Stream (10)

  1. You cannow choose to save the configuration in Disabled mode, if you're notready to begin collecting data. You can also put it into Estimate mode to get an idea of how much data you'll be collecting after the configuration is enabled.

Installing and configuring Splunk Stream (11)

  1. Click Nextto go to the Groups screen. Here, you canselect a group with which to associate the Stream configuration. You can follow the Distributed Forwarder Management documentation to create and manage forwarder groups to manage which Streams apply to which groups and machines. Use either the default group, or select the group you would like the configuration to apply to. Finally, click Create Stream to save your configuration.

Installing and configuring Splunk Stream (12)

Validation

If you've enabled the configuration, you should now be collecting DNS data. You can validate this by searching for:

index=<dns_index> sourcetype=stream:dns

Replace<dns_index> with the index you created to store your DNS data.

You should able to see JSON blobs of DNS transactions, with fields available on the left.

Installing and configuring Splunk Stream (13)

Installing and configuring Splunk Stream (2024)

FAQs

How to install Splunk stream? ›

Install the Splunk App for Stream
  1. Click Download. The installation package downloads to your local host.
  2. Log into Splunk Web.
  3. Click Manage Apps > Install app from file.
  4. Upload the installer file.
  5. Restart Splunk Enterprise if prompted.
Feb 17, 2023

How to install and configure Splunk Universal Forwarder in Windows? ›

Download the Splunk universal forwarder from splunk.com. Select the MSI file to start the installation. On the first screen of the installer, select Check this box to accept the License Agreement and select whether you are installing on Splunk Enterprise or Splunk Cloud Platform.

How to configure Splunk apps? ›

You can manage the configurations and properties for apps installed in your Splunk Enterprise instance from the Apps menu. Click on Apps in the User bar to select one of your installed apps or manage an app. From the Manage Apps page, you can do the following: Edit permissions for an app or add-on.

How does splunk stream work? ›

Stream collects network data and forwards it to Splunk Enterprise or Splunk Cloud. Stream does not analyze logs. If you can use a UF to send logs to Splunk then you don't need Stream.

What are streaming commands in splunk? ›

A streaming command applies a transformation to each event returned by a search. For example, the rex command is streaming because it extracts and adds fields to events at search time.

How do I check my Splunk universal forwarder configuration? ›

Find the configuration files

Navigate to outputs. conf in $SPLUNK_HOME/etc/system/local/ to locate your Universal Forwarder configuration files.

Where is Splunk forwarder installation location? ›

Default installation location

The universal forwarder installs by default in the /opt/splunkforwarder directory.

Where is Splunk configuration? ›

configuration file

Also referred to as a . conf file, configuration files are stored in the following locations: Default files: $SPLUNK_HOME/etc/system/default. Local files: $SPLUNK_HOME/etc/system/local.

How do I manually install apps in Splunk? ›

In Splunk Web, click the Apps gear icon. Click Browse more apps. The Splunk App Browser opens. Find your app or add-on, then click Install.

How to configure application logs in Splunk? ›

Collect logs from your hosts and containers
  1. Log in to Splunk Observability Cloud.
  2. In the left navigation menu, select Data Management.
  3. Go to the Available integrations tab, or select Add Integration in the Deployed integrations tab.
  4. Select the tile for the platform you want to import logs from.
May 28, 2024

How do I stream logs to splunk? ›

How to
  1. In Destination, select Splunk.
  2. In Display name, enter a human-readable description for the destination. ...
  3. In Event collector token, enter the HEC token you created and enabled in Splunk.
  4. If you want to send compressed gzip logs to this destination, check Send compressed data.

How do I manually install apps in splunk? ›

In Splunk Web, click the Apps gear icon. Click Browse more apps. The Splunk App Browser opens. Find your app or add-on, then click Install.

How to install splunk on Linux terminal? ›

Installation of Splunk for the First Time
  1. Step 1 : Locate the File. ...
  2. Step 2 : Extract the file. ...
  3. Step 3 : Change the Directory. ...
  4. Step 4 : Accept the License & Create Username and Password. ...
  5. Step 5 : Access Splunk server in Browser. ...
  6. Step 6 : Sign in to the Splunk Server.
May 6, 2024

How to setup splunk monitoring console? ›

To configure the monitoring console for a standalone instance:
  1. In Splunk Web, navigate to Monitoring Console > Settings > General Setup.
  2. Check that search head, license manager, and indexer are listed under Server Roles, and nothing else. If not, click Edit to correct.
  3. Click Apply Changes.
Aug 14, 2021

References

Top Articles
Latest Posts
Article information

Author: Greg O'Connell

Last Updated:

Views: 5926

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Greg O'Connell

Birthday: 1992-01-10

Address: Suite 517 2436 Jefferey Pass, Shanitaside, UT 27519

Phone: +2614651609714

Job: Education Developer

Hobby: Cooking, Gambling, Pottery, Shooting, Baseball, Singing, Snowboarding

Introduction: My name is Greg O'Connell, I am a delightful, colorful, talented, kind, lively, modern, tender person who loves writing and wants to share my knowledge and understanding with you.