Splunk Stream

Installation and Configuration Manual

Download manual as PDF

This documentation does not apply to the most recent version of StreamApp. Click here for the latest version.
Download topic as PDF

About Splunk App for Stream

Splunk App for Stream lets you capture, filter, index, and analyze streams of network event data.

A "stream" is a grouping of network event data that has a specific network data protocol. When combined with logs, metrics, and other information, the streams that you capture with Splunk App for Stream can provide valuable insight into activities and behaviors occurring across your network infrastructure.

Use Splunk App for Stream to:

  • Passively capture "streams" of network event data.
  • Capture multiple protocols (HTTP, TCP, DNS, TNS, LDAP, and more).
  • Apply unique filtering rules.
  • Aggregate events for specific attributes.
  • Capture ephemeral (time-limited) streams.
  • Get estimates of stream index volume before sending data to indexers.
  • Monitor network trends and app performance in pre-built dashboards.
  • Correlate logs, events, and metrics for comprehensive search analytics.
  • Deploy and scale rapidly and unobtrusively with no need for tagging or instrumentation.

To get started creating streams, see Configure Streams in the Splunk App for Stream User Manual.

Deployment requirements

This documentation applies to the following versions of Splunk Stream: 6.4.0, 6.4.1, 6.4.2

Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters