Splunk Search

How do I improve my search for outbound traffic to determine source, destination IP and destination port?

pandeyashish
New Member

I am trying to make a search for outbound traffic flow. i.e. source, destination IP and destination port. Is there any way to improve this search as it's currently breaking my search head and the performance is not as expected.

index=* sourcetype=* | stats values(dest_ip) values(dest_port) by src_ip

Your feedback and advice is much appreciated.
Thanks,

0 Karma

sundareshr
Legend

does this give you what you need?

index=firewall sourcetype=* src_ip=* | table src_ip dest_ip dest_port
0 Karma

pandeyashish
New Member

Thanks for the reply Sundaresh, I have used this query, since this is for firewall logs this query is using too long to execute the result. So I have to break down the time range. Do you have any suggestions based on index summary. The current query that I am using is
index=firewall sourcetype=* action="allowed" NOT dest_ip="10...*" NOT dest_port="443" NOT dest_port="80" | sistats count by src_ip dest_ip dest_port

Any feedback on this would help me to work on my assigned engagements 🙂
Thanks,

0 Karma

pandeyashish
New Member

index=firewall sourcetype=* | stats values(dest_ip) values(dest_port) by src_ip
This search is to find all the source and destination IPs with destination port.

0 Karma
Get Updates on the Splunk Community!

Join Us for Splunk University and Get Your Bootcamp Game On!

If you know, you know! Splunk University is the vibe this summer so register today for bootcamps galore ...

.conf24 | Learning Tracks for Security, Observability, Platform, and Developers!

.conf24 is taking place at The Venetian in Las Vegas from June 11 - 14. Continue reading to learn about the ...

Announcing Scheduled Export GA for Dashboard Studio

We're excited to announce the general availability of Scheduled Export for Dashboard Studio. Starting in ...