Install and Configure NETSCOUT App
Solution Overview
The NETSCOUT App is a search-head application that summarizes NETSCOUT data into a KV store collection and a metrics index. The app is configured primarily through macros, and its scheduled searches are responsible for maintaining the summarized data used by the user interface.
Dependencies
NETSCOUT App depends on other Splunk apps for both source data and optional feature integrations.
| Dependency | Required | Purpose |
|---|---|---|
| NETSCOUT Omnis AI Streamer Add-on | Yes | Provides the NETSCOUT source data used by NETSCOUT App |
| Splunk Enterprise Security | Optional | Enables the Not in Assets and Identities Framework check and ES Alerts Integration |
| Splunk IT Service Intelligence | Optional | Enables ITSI Alerts Integration |
| Splunk_SA_CIM | Optional | Used in the Not in Splunk check |
Required Data
The modern NETSCOUT App experience expects NETSCOUT application-flow data. By default it searches:
index=netscoutoaissourcetype=netscout:omnis-application
If your environment uses a different index, sourcetype, or renamed playbook, update the app macros instead of editing searches directly.
Install the NETSCOUT Data Dependency
Install the NETSCOUT Omnis AI Streamer Add-on so that the netscout:omnis-application data searched by NETSCOUT App is available in Splunk. NETSCOUT App does not generate this source data itself; it summarizes and analyzes the data provided by that add-on.
Minimum Fields
The app source defines the following minimum fields for the sourcetype configured in AtlasNetScoutSourcetypes.
These fields are already present in the default NETSCOUT application sourcetype, netscout:omnis-application, which is why it is the recommended default. If you change the macro to point at a custom playbook or renamed sourcetype, that custom data source must still include these fields for NETSCOUT App to function correctly.
Discovery requires:
server_host_ip_addressclient_host_ip_addressapplication_nameto_server_packetsfrom_server_packetssum_of_client_latencyclient_latency_countsum_of_server_latencyserver_latency_countpeak_response_time
IP Investigation additionally requires:
successful_transactionsfailed_transactionstimeoutssum_of_all_response_timesclient_to_server_retriesserver_to_client_retriesclient_zero_windowserver_zero_windowai_sensor_nameserver_port
Configuration Macros
NETSCOUT App exposes four macros in macros.conf.
| Macro | Default | Purpose |
|---|---|---|
AtlasNetScoutIndexes | index=netscoutoais | Selects the NETSCOUT event index or indexes |
AtlasNetScoutSourcetypes | sourcetype=netscout:omnis-application | Selects the NETSCOUT sourcetype used by the app |
AtlasNetScoutMetrics | _metrics | Selects the metrics index that stores NETSCOUT App summaries |
AtlasNetScoutPrivateIPRegex | RFC1918-style private IP regex plus loopback/link-local patterns | Controls Discovery's private vs public IP classification |
Scheduled Searches
NETSCOUT App ships with two scheduled summary searches. Both run every five minutes using the schedule 1-59/5 * * * * and summarize the last five minutes of NETSCOUT data.
| Saved Search | Purpose | Output |
|---|---|---|
Atlas NETSCOUT Discovery | Maintains the Discovery lookup and writes high-level trend metrics | atlas_netscout_discovery KV store and metrics component AtlasNetScoutMetrics |
Atlas NETSCOUT Conversation Summary | Maintains conversation-level metrics used by IP Investigation | Metrics component AtlasNetScoutConversationSummary |
Atlas NETSCOUT Discovery
This search:
- Aggregates packet volume, first seen, last seen, client counts, latency totals, and peak response time by application and server IP
- Writes the latest merged state into the
atlas_netscout_discoveryKV store lookup - Calculates summary counts for IPs, connections, and volume
- Writes those summaries to the metrics index with component
AtlasNetScoutMetrics
Atlas NETSCOUT Conversation Summary
This search:
- Buckets activity into 5-minute intervals
- Summarizes server-to-client conversations by server IP, client IP, application, sensor, and server port
- Captures performance and reliability metrics such as latency totals, retries, zero-window counts, sessions, and failed connections
- Writes results to the metrics index with component
AtlasNetScoutConversationSummary
Metrics Index Design
The app defaults to _metrics, but the source comments recommend moving to a dedicated metrics index when you need stronger control over retention or role-based access.
NETSCOUT App uses metric searches in two places:
- Discovery summary sparklines read
ips,connections, andvolumefrom componentAtlasNetScoutMetrics - IP Investigation reads conversation metrics from component
AtlasNetScoutConversationSummary
If you move to a dedicated metrics index, update AtlasNetScoutMetrics and make sure users of the app can search that metrics index.
KV Store Collection
Discovery relies on a KV store collection named atlas_netscout_discovery. The corresponding lookup definition uses the same name and stores:
application_nameipto_volumefrom_volumelastactivefirstactiveclientsclient_ipssum_of_client_latencyclient_latency_countsum_of_server_latencyserver_latency_countmax_peak_response_time_usec
If Discovery appears empty while raw data is present, verify that this scheduled search is running successfully and that KV store is healthy.
Private and Public IP Classification
Discovery's Private IP and Public IP filters depend entirely on AtlasNetScoutPrivateIPRegex. If your organization uses non-standard internal ranges or you want to narrow the definition, update this macro.
This configuration affects:
- Device filtering in Discovery
- Application filtering in Discovery when applications are associated with private or public servers
Optional Enrichment Sources
Some Discovery filters and IP Investigation alert links depend on optional Splunk apps:
- Splunk Enterprise Security: Optional. Enables the Not in Assets and Identities Framework check and ES Alerts Integration
- Splunk IT Service Intelligence: Optional. Enables ITSI Alerts Integration
- Splunk_SA_CIM: Optional. Used in the Not in Splunk check
The core NETSCOUT workflows still function without these integrations.
Validate the Configuration
After configuring the app, validate it with the following checks:
- Search the configured NETSCOUT index and sourcetype and confirm the required fields exist.
- Confirm both scheduled searches complete successfully in Splunk scheduler history.
- Verify
| inputlookup atlas_netscout_discoveryreturns rows. - Verify
| mstats sum(ips) where index=\AtlasNetScoutMetrics` component=AtlasNetScoutMetrics` returns data. - Verify
| mstats sum(to_volume) where index=\AtlasNetScoutMetrics` component=AtlasNetScoutConversationSummary by server_ip client_ip` returns data.