Splunk Stream

Installation and Configuration Manual

This documentation does not apply to the most recent version of Splunk Stream. For documentation on the most recent version, go to the latest release.

About Splunk App for Stream

Splunk App for Stream lets you capture, filter, index, and analyze streams of network event data.

A "stream" is a grouping of network event data that has a specific network data protocol. When combined with logs, metrics, and other information, the streams that you capture with Splunk App for Stream can provide valuable insight into activities and behaviors occurring across your network infrastructure.

Use Splunk App for Stream to:

  • Passively capture "streams" of network event data.
  • Capture multiple protocols (HTTP, TCP, DNS, TNS, LDAP, and more).
  • Apply unique filtering rules.
  • Aggregate events for specific attributes.
  • Capture ephemeral (time-limited) streams.
  • Get estimates of stream index volume before sending data to indexers.
  • Monitor network trends and app performance in pre-built dashboards.
  • Correlate logs, events, and metrics for comprehensive search analytics.
  • Deploy and scale rapidly and unobtrusively with no need for tagging or instrumentation.


To get started creating streams, see Configure Streams in the Splunk App for Stream User Manual.

Last modified on 22 February, 2016
  Deployment requirements

This documentation applies to the following versions of Splunk Stream: 6.4.0, 6.4.1, 6.4.2


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters