This article describes how to install and configure Splunk for NetScaler for Windows Operating System to view Application Firewall reports.
Note: In Splunk 6.1, the configuration file is called ipfix.conf. NetScaler 10.1 and Splunk are not currently compatible.
To configure Splunk for NetScaler, complete the following procedures:
Get the relevant installation package from the Splunk website.
http://www.splunk.com/download?r=/product
Run the Splunk installer and follow the installation wizard.
Download the Splunk for NetScaler application from http://splunk-base.splunk.com/apps/22345/splunk-for-citrix-netscaler-with-appflow.
Note: If this hyperlink does not work, the application might be updated. To confirm this, click Find More Apps as shown in the screen shot in Step 5.
Log on to Splunk.
Go to App > Manage Apps.
Install the application from the Splunk for NetScaler application file that you downloaded earlier.
Upload the application tgz file.
Open the <SPLUNK DIRECTORY>\etc\apps\SplunkforCitrixNetScaler\default folder. Modify the inputs.conf file for Windows usage.
Note: Add hash (#) at the beginning of the lines to change the lines for the linux package as comments, as shown in the following screen shot.
Open the NetScaler Configuration Utility.
Expand the System node.
Expand the Auditing node.
Select the Policies node.
Click Add.
In the Create Auditing Policy dialog box, provide a name for the policy and create a new server.
Provide the IP address of the server where Splunk is installed and port 514.
Note: Splunk must listen on this port.
Click Create.
Bind the policy at a global level.
Open Splunk > Manager > Data Inputs > UDP.
Ensure that UDP port is 514, and the Source type is set as ns_log.
Open App > Manage Apps.
Open Splunk for Citrix NetScaler.
Open App Firewall. If App Firewall is configured correctly, and if there are violation blocks, a graph similar to the following screen shot should be displayed.