Deployment & Configuration
This guide provides technical instructions for establishing the data pipeline between NetFlow Optimizer (NFO) and your Splunk environment. For a successful deployment, you must install both the TA-netflow (for data parsing) and the NetFlow Analytics for Splunk App (for visualization).
1. Installation of Components
Both components can be downloaded from Splunkbase and installed via Apps > Manage Apps > Install app from file.
| Component | Installation Location | Purpose |
|---|---|---|
| TA-netflow | Search Heads, Indexers, & Forwarders | Mandatory. Handles field extraction, CIM mapping, and sets the flowintegrator sourcetype. |
| NetFlow Analytics for Splunk | Search Heads | Required for Visualization. Contains the dashboards, reports, and search macros. |
2. Configuring the Data Input (Splunk Side)
NFO sends data to Splunk in JSON or Syslog format. HTTP Event Collector (HEC) is the recommended approach for performance and security.
Method A: HTTP Event Collector (HEC) — Recommended
- In Splunk, go to Settings > Data Inputs > HTTP Event Collector.
- Click New Token and name it
NFO-HEC. - Set the Source Type to
flowintegrator. - Specify the target Index (e.g.,
flowintegrator). - Save the Token Value and ensure your HEC port (default
8088) is open.
Method B: Syslog (UDP/TCP)
- In Splunk, go to Settings > Data Inputs > UDP (or TCP).
- Specify the Port (e.g.,
10514). - Set the Source Type to
flowintegrator. - Specify the target Index (e.g.,
flowintegrator).
3. Configuring Data Output (NFO Side)
Once Splunk is ready to receive data, configure the output destination in the NFO GUI.
- Log in to the NetFlow Optimizer web interface.
- Navigate to Data Outputs and click Add New Output.
- Select the Output Type (Splunk HEC or Syslog).
- Enter your Splunk connection details (URL/Port) and paste the HEC Token if applicable.
- Select JSON as the format.
- Click Save and Start.
4. Configuring the NetFlow Analytics App
Once the data is flowing, you must update the app's search macro to point to your data index.
- In Splunk, go to Settings > Advanced Search > Search Macros.
- Find the
netflow_indexmacro. - Change the Definition to match your index and sourcetype:
definition = index=flowintegrator sourcetype=flowintegrator - Click Save. Your dashboards will now begin to populate.
5. Verification
To confirm that the data is flowing and being correctly parsed by the TA, run the following search in Splunk:
index=flowintegrator sourcetype=flowintegrator | head 10
What to check:
- Verify that fields such as
src_ip,dest_ip,bytes, andpacketsare correctly extracted in the Interesting Fields sidebar. - Ensure the
nfc_idfield is present (e.g.,20062for Network Conversations or20067for Top Traffic), as this is what powers the specific dashboard views.