Splunk® Supported Add-ons

Splunk Add-on for Squid Proxy

Download manual as PDF

Download topic as PDF

About the Splunk Add-on for Squid Proxy

Version 1.0.0
Vendor Products Squid Proxy 3.x

The Splunk Add-on for Squid Proxy allows a Splunk software administrator to collect events from the Squid Proxy server access log using file monitoring. After the Splunk platform indexes the events, you can analyze the data using the prebuilt panels included with the add-on. This add-on provides CIM-compatible knowledge to use with other Splunk apps, such as Splunk Enterprise Security and the Splunk App for PCI Compliance.

Download the Splunk Add-on for Squid Proxy from Splunkbase at http://splunkbase.splunk.com/app/2965.

Discuss the Splunk Add-on for Squid Proxy on Splunk Answers at http://answers.splunk.com/answers/app/2965.

  NEXT
Source types for the Splunk Add-on for Squid Proxy

This documentation applies to the following versions of Splunk® Supported Add-ons: released


Comments

Hi Woodcock,

Thanks for identifying this. I have filed it as a bug against the add-on.

Nkaplan splunk, Splunker
July 29, 2019

The REGEX for [squid_access_extract_field_1] is wrong and should actually be this:
REGEX = [^:]+:\\/\\/((?:[0-9]{1,3}\\.){3}[0-9]{1,3})

Woodcock
July 5, 2019

Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters