Splunk Stream

Installation and Configuration Manual

This documentation does not apply to the most recent version of Splunk Stream. For documentation on the most recent version, go to the latest release.

About Splunk App for Stream

Splunk App for Stream lets you capture, filter, index, and analyze streams of network event data.

A "stream" is a grouping of network event data that has a specific network data protocol. When combined with logs, metrics, and other information, the streams that you capture with Splunk App for Stream can provide valuable insight into activities and behaviors occurring across your network infrastructure.

Use Splunk App for Stream to:

  • Passively capture "streams" of network event data.
  • Capture multiple protocols (HTTP, TCP, DNS, TNS, LDAP, and more).
  • Apply unique filtering rules.
  • Aggregate events for specific attributes.
  • Capture ephemeral (time-limited) streams.
  • Get estimates of stream index volume before sending data to indexers.
  • Monitor network trends and app performance in pre-built dashboards.
  • Correlate logs, events, and metrics for comprehensive search analytics.
  • Deploy and scale rapidly and unobtrusively with no need for tagging or instrumentation.


For Splunk App for Stream quick deployment instructions, see Stream Easy Setup in this manual.

To get started configuring stream capture, see Configure Streams in the Splunk App for Stream User Manual.

Last modified on 08 June, 2016
  Deployment requirements

This documentation applies to the following versions of Splunk Stream: 6.6.0, 6.6.1, 6.6.2


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters