Feedback welcome! You can contact me by emailing 1daniel.schwartz1@gmail.com.
You have questions or problems?
For issues please contact me via email or open a new issue on Github:
https://github.com/DanielSchwartz1/SplunkForPCAP/issues/new
Emails will be usually answered between Monday-Friday 9am - 6pm European Time.
Get Started: https://schwartzdaniel.com/pcap-analyzer-for-splunk-getting-started/
=> INTRODUCTION
The Splunk App for PCAP files will express the pcap files into helpful charts by converting the files into a Splunk readable CSV file
=> NOTES ABOUT THE DATA
I have suffered from timestamp problems with PCAP files over 500MB.
In case of big files I have split the pcap files into smaller files by using editcap.exe out of the Wireshark package.
-Index defined for the data: Default Index is choosed
-Sourcetype defined for the data:
-->sourcetype=pcap:analyzer
=>REQUIREMENTS
=> GETTING STARTED
Getting started - Requirements!
Step 1: Make sure the $SPLUNK_HOME/etc/apps/SplunkForPCAP/bin/ folder has all administrative privileges to execute the batch and shell script
Step 2: Make sure you have tshark installed (delivered with Wireshark)
Step 3: Make sure you have set SPLUNK_HOME variable
To allow Splunk to collect your PCAP Files you have to specify where you have stored your pcap files.
You can specify your location in the Data Inputs (via Settings) --> PCAP File Location.
The app checks every 5 minutes for a new pcap file in your defined folder.
You will recognize that after you can see your pcap file indexed in Splunk it is moved to a folder called "converted" within the same defined location. That is happening to avoid that the automatic script converts your pcap file twice.
=> ROADMAP
=> NOTES
- What is tshark? TShark is a network protocol analyzer. It lets you capture packet data from a live network, or read packets from a previously saved capture file, either printing a decoded form of those packets to the standard output or writing the packets to a file
There are some important changes made to improve the user experience:
1. A new python script is taking care about the convertion of your capture file. In the old version it was a shell / batch script depending on the OS
2. The new version includes in the raw events the format of field=value - no extra parsing needed for the standard fields
3. The converted capture file was before moved away from your initial location - now a new folder "converted" will be created in the same location of your capture file
4. Starting from now also .pcapng files will be automatically converted - not only .pcap
5. The new collection includes also the UDP port details
6. The field names have changed for a better understanding
fixed compatibility issues
fixed compatibility issues
fixed compatibility issues
fixed small xml issues to stay compatible
Fixed scripts to handle folders with spaces in the path on Windows
Fixed python error for Windows 10 user
Repaired pcap2csv.bat
Fixed some variable issues in the scripts to convert pcap files.
Fixed automatic script to catch tshark versions starting from 2.x.x
bug fixes
Several bug fixes
Added TCP stream value.
Dashboard which visualize network data from the Splunk App for Stream.
VLAN ID has been added
pcap2csv.sh repaired
Round Trip Time Panel and Microburst Dashboard has been added
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.