Splunk Search

How do I improve my search for outbound traffic to determine source, destination IP and destination port?

pandeyashish
New Member

I am trying to make a search for outbound traffic flow. i.e. source, destination IP and destination port. Is there any way to improve this search as it's currently breaking my search head and the performance is not as expected.

index=* sourcetype=* | stats values(dest_ip) values(dest_port) by src_ip

Your feedback and advice is much appreciated.
Thanks,

0 Karma

sundareshr
Legend

does this give you what you need?

index=firewall sourcetype=* src_ip=* | table src_ip dest_ip dest_port
0 Karma

pandeyashish
New Member

Thanks for the reply Sundaresh, I have used this query, since this is for firewall logs this query is using too long to execute the result. So I have to break down the time range. Do you have any suggestions based on index summary. The current query that I am using is
index=firewall sourcetype=* action="allowed" NOT dest_ip="10...*" NOT dest_port="443" NOT dest_port="80" | sistats count by src_ip dest_ip dest_port

Any feedback on this would help me to work on my assigned engagements 🙂
Thanks,

0 Karma

pandeyashish
New Member

index=firewall sourcetype=* | stats values(dest_ip) values(dest_port) by src_ip
This search is to find all the source and destination IPs with destination port.

0 Karma
Get Updates on the Splunk Community!

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...