About Splunk Stream
Splunk Stream lets you capture, filter, index, and analyze streams of network event data.
A "stream" is a grouping of events defined by a specific network protocol and set of fields. When combined with logs, metrics, and other information, the streams that you capture with Splunk Stream can provide valuable insight into activities and behaviors occurring across your network infrastructure.
Use Splunk Stream to:
- Passively capture live streams of network event data.
- Capture multiple protocols (HTTP, TCP, DNS, TNS, LDAP, and more).
- Collect NetFlow protocol data.
- Apply unique filtering rules.
- Aggregate events for specific attributes.
- Extract content from strings and generate hashes.
- Capture ephemeral (time-limited) streams.
- Analyze stream metadata before indexing.
- Monitor network trends and app performance in pre-built dashboards.
- Use independent Stream forwarder to capture and send data from remote linux machines.
- Deploy and scale rapidly and unobtrusively with no need for tagging or instrumentation.
For Splunk Stream installation instructions, including a detailed overview of Splunk Stream components, see Install Splunk Stream.
To get started using Splunk App for Stream splunk_app_stream
for stream configuration management, see Configure Streams in the Splunk Stream User Manual.
Deployment requirements |
This documentation applies to the following versions of Splunk Stream™: 7.0.0, 7.0.1
Feedback submitted, thanks!