Unlocking Business Value and Security Enhancements with Splunk integration

Streamline your DNS, DHCP, and IPAM Logs for improved analytics and network management


Transform your network management and security capabilities.

Organizations are continually seeking ways to improve their network management, security, and analytics capabilities. To achieve this, many turn to solutions like TCPWave and Splunk, which provide powerful tools for monitoring, analyzing, and managing network data. TCPWave's integration with Splunk offers a seamless way to stream DNS, DHCP, and IPAM logs into a single platform, unlocking numerous business advantages and security improvements.


TCPWave's integration with Splunk employs a straightforward process that ensures efficient and accurate transmission of logs. TCPWave's suite of products, including DNS, DHCP, and IPAM, generate logs containing critical information about network activities and events. It uses Universal Forwarders, lightweight agents installed on the TCPWave server, to collect and forward logs to Splunk. These forwarders gather the DNS, DHCP, and IPAM logs and securely send them to the Splunk platform. Splunk ingests the logs, indexing and storing the data for further analysis and visualization. Splunk's powerful search and analytics capabilities allow administrators to examine the logs, create customized dashboards, and generate actionable insights into network performance and security.

Integrating TCPWave with Splunk also offers several key security enhancements. Splunk's advanced analytics and alerting capabilities enable organizations to detect and respond to security threats in real-time, reducing the risk of breaches and minimizing potential damage. With insights from TCPWave logs in Splunk, administrators can identify security vulnerabilities and take proactive steps to address them before they can be exploited. Access to comprehensive log data in Splunk enables security teams to conduct thorough investigations and respond more effectively to incidents, limiting the impact on the organization. Meeting security and regulatory compliance requirements is simplified through the ability to collect, analyze, and store logs in a single platform.


Enhanced Network Visibility

  • By consolidating DNS, DHCP, and IPAM logs into a single platform, administrators can gain a comprehensive view of network activities and performance, enabling effective decision-making and network management.

Improved Troubleshooting

  • With access to real-time and historical log data in Splunk, administrators can quickly identify and resolve network issues, minimizing downtime and reducing the impact on business operations.

Streamlined Compliance Reporting

  • The ability to collect, analyze, and store logs in Splunk simplifies the process of generating compliance reports, saving time and resources.

Cost Savings

  • By automating log analysis and reducing manual intervention, organizations can save on labor costs and allocate resources more efficiently.
To get started with TCPWave's integration with Splunk
  • Using valid credentials, login to the Splunk user interface.
  • Navigate to Settings >> Data >> Forwarding and Receiving >> Configure Receiving.
  • Click New Receiving Port. Ex: In the below image added 9997 as the receiving port.
  • Navigate to Settings >> System >> Server Controls.
  • Click Restart Splunk.
To enable centralized logging on TCPWave DDI
  • Navigate to Administration >> Configuration Management >> Central Logging.
  • Under Configuration Settings, check the Enable Centralized Logging option. The system displays the Splunk option.
  • Check the Splunk option.
  • Enter Splunk Server IP under Splunk Log Host.
  • Enter configured Receiving port number under Splunk Log Port.
  • Select IPAM logs to send to Splunk appliance.
  • Select DNS logs to send to Splunk appliance.
  • Select DHCP logs to send to Splunk appliance.
  • Click on the OK to update the configuration.
  • Once the configuration is updated, log messages from the selected IPAM logs are sent to the configured Splunk appliance.
  • Central logging needs to be enabled on DNS and DHCP appliances to send the selected DNS and DHCP logs to the Splunk appliance.
  • Navigate to Network Management >> DNS Management >> DNS Appliances >> TCPWave DNS Appliances.
  • Right-click on the live appliance. From the context menu, Enable the Central Logging option.
  • Navigate to Network Management >> DHCP Management >> DHCP Appliances >> TCPWave DHCP IPv4 Appliances.
  • Right-click on the live appliance. From the context menu, Enable the Central Logging option.
Viewing Logs

To view the logs on the Splunk appliance:

  • On the Splunk server GUI, click the Splunk icon at the top left corner.
  • Navigate to Search & Reporting >> Data Summary.

The integration of TCPWave with Splunk unlocks numerous business advantages and security improvements, enabling organizations to streamline their network management, enhance their security posture, and drive better decision-making. By centralizing DNS, DHCP, and IPAM logs into a single platform, businesses can gain better visibility into their networks, improve troubleshooting capabilities, and simplify compliance reporting. Don't miss the opportunity to enhance your organization's network management and security; explore the benefits of TCPWave's Splunk integration today.