About Splunk App for Stream
Splunk App for Stream lets you capture, filter, index, and analyze streams of network event data.
A "stream" is a grouping of network event data that has a specific network data protocol. When combined with logs, metrics, and other information, the streams that you capture with Splunk App for Stream can provide valuable insight into activities and behaviors occurring across your network infrastructure.
Use Splunk App for Stream to:
- Passively capture "streams" of network event data.
- Capture multiple protocols (HTTP, TCP, DNS, TNS, LDAP, and more).
- Apply unique filtering rules.
- Aggregate events for specific attributes.
- Capture ephemeral (time-limited) streams.
- Get estimates of stream index volume before sending data to indexers.
- Monitor network trends and app performance in pre-built dashboards.
- Correlate logs, events, and metrics for comprehensive search analytics.
- Deploy and scale rapidly and unobtrusively with no need for tagging or instrumentation.
To get started creating streams, see Configure Streams in the Splunk App for Stream User Manual.
Deployment requirements |
This documentation applies to the following versions of Splunk Stream™: 6.4.0, 6.4.1, 6.4.2
Feedback submitted, thanks!