{"id":463,"date":"2021-02-21T16:17:27","date_gmt":"2021-02-21T21:17:27","guid":{"rendered":"https:\/\/snehpatel.com\/?p=463"},"modified":"2021-03-01T19:26:00","modified_gmt":"2021-03-02T00:26:00","slug":"monitor-full-network-traffic-with-arkime-aka-moloch","status":"publish","type":"post","link":"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/","title":{"rendered":"Monitor full network traffic with Arkime aka. Moloch"},"content":{"rendered":"\n<p>Monitoring the corporate network is a crucial part to safeguard the network against malicious threat actors. One may argue that there are IDS and IPS to detect malicious traffic on the network. Those advanced security devices can indeed be useful but one cannot see the full picture of the network. For example, IDS and IPS might show the threat detected or blocked by the detection engine (signature) but one might need to investigate further to provide in-depth analysis on the incident or to look for zero-day. That is when full packet capture of the traffic can be of most use.<\/p>\n\n\n\n<p>So let us look at Arkime or formerly known as Moloch. It is an open-source tool that can index the packet capture, make it search-friendly. There are alternative tools that are available for packet capture such as Wireshark, but those cannot be compared with Arkime as such they don&#8217;t contain the capability to process packets at gigabits per second.<\/p>\n\n\n\n<p>Let&#8217;s discuss Arkime&#8217;s components. The full system is made of 3 components.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Capture<\/li><li>Viewer<\/li><li>Elasticsearch (My Fav)<\/li><\/ul>\n\n\n\n<p>As the name suggests for &#8220;capture&#8221; it is a part that is used to monitor network traffic and write that traffic as PCAP format to disk. Then the metadata is parsed and sent to elasticsearch to make it searchable using a web interface provided by the viewer component.<\/p>\n\n\n\n<p>Capturing all the traffic in the network is sweet as candy on first look but it gets bitter when you will be running it 24\/7 in a large enterprise. Since we are not compromising what we are collecting it takes lots of storage. I used the estimator on the official website and boi I was shocked. It needs a whopping 152 TB for the capture machine and another space around 30 TB for the elasticsearch machine.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"542\" data-attachment-id=\"464\" data-permalink=\"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/capture-storage-space\/#main\" data-orig-file=\"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space.png?fit=1156%2C612&amp;ssl=1\" data-orig-size=\"1156,612\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"capture-storage-space\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space.png?fit=1024%2C542&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space.png?resize=1024%2C542&#038;ssl=1\" alt=\"\" class=\"wp-image-464\" srcset=\"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space.png?resize=1024%2C542&amp;ssl=1 1024w, https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space.png?resize=300%2C159&amp;ssl=1 300w, https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space.png?resize=768%2C407&amp;ssl=1 768w, https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space.png?w=1156&amp;ssl=1 1156w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"565\" data-attachment-id=\"465\" data-permalink=\"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/capture-storage-space-elasticsearch\/#main\" data-orig-file=\"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space-elasticsearch.png?fit=1127%2C622&amp;ssl=1\" data-orig-size=\"1127,622\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"capture-storage-space-elasticsearch\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space-elasticsearch.png?fit=1024%2C565&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space-elasticsearch-1024x565.png?resize=1024%2C565&#038;ssl=1\" alt=\"\" class=\"wp-image-465\" srcset=\"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space-elasticsearch.png?resize=1024%2C565&amp;ssl=1 1024w, https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space-elasticsearch.png?resize=300%2C166&amp;ssl=1 300w, https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space-elasticsearch.png?resize=768%2C424&amp;ssl=1 768w, https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space-elasticsearch.png?w=1127&amp;ssl=1 1127w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Install and configuration are pretty simple and are clearly stated on the GitHub page. All the links can be found below.<\/p>\n\n\n\n<p><a href=\"https:\/\/arkime.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/arkime.com<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/arkime\/arkime\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/arkime\/arkime<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/arkime.com\/estimators\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/arkime.com\/estimators<\/a><\/p>\n\n\n\n<p>Demo: <a href=\"https:\/\/demo.arkime.com\/?date=-1\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/demo.arkime.com\/?date=-1<\/a>  (Username and password are both <strong>arkime<\/strong>)<\/p>\n\n\n\n<p>Extra: <a href=\"https:\/\/www.sans.org\/reading-room\/whitepapers\/forensics\/implementing-full-packet-capture-37392\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.sans.org\/reading-room\/whitepapers\/forensics\/implementing-full-packet-capture-37392<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Monitoring the corporate network is a crucial part to safeguard the network against malicious threat actors. One may argue that there are IDS and IPS to detect malicious traffic on the network. Those advanced security devices can indeed be useful but one cannot see the full picture of the network. For example, IDS and IPS &#8230; <a title=\"Monitor full network traffic with Arkime aka. Moloch\" class=\"read-more\" href=\"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/\" aria-label=\"Read more about Monitor full network traffic with Arkime aka. Moloch\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[64,63,6,59],"tags":[70,66,69,72,71,65,67,68,42],"class_list":["post-463","post","type-post","status-publish","format-standard","hentry","category-monitoring","category-network","category-opensource","category-security","tag-arkime","tag-forensics","tag-moloch","tag-moloch-packet-capture","tag-moloch-traffic-analyzer","tag-monitoring","tag-network","tag-network-monitoring","tag-opensource"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Monitor full network traffic with Arkime aka. Moloch - Sneh Patel<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Monitor full network traffic with Arkime aka. Moloch - Sneh Patel\" \/>\n<meta property=\"og:description\" content=\"Monitoring the corporate network is a crucial part to safeguard the network against malicious threat actors. One may argue that there are IDS and IPS to detect malicious traffic on the network. Those advanced security devices can indeed be useful but one cannot see the full picture of the network. For example, IDS and IPS ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/\" \/>\n<meta property=\"og:site_name\" content=\"Sneh Patel\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-21T21:17:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-02T00:26:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space-1024x542.png\" \/>\n<meta name=\"author\" content=\"Sneh Patel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sneh Patel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2021\\\/02\\\/21\\\/monitor-full-network-traffic-with-arkime-aka-moloch\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2021\\\/02\\\/21\\\/monitor-full-network-traffic-with-arkime-aka-moloch\\\/\"},\"author\":{\"name\":\"Sneh Patel\",\"@id\":\"https:\\\/\\\/snehpatel.com\\\/#\\\/schema\\\/person\\\/a39105bc63f7e11a0e07b12a4c3dda73\"},\"headline\":\"Monitor full network traffic with Arkime aka. Moloch\",\"datePublished\":\"2021-02-21T21:17:27+00:00\",\"dateModified\":\"2021-03-02T00:26:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2021\\\/02\\\/21\\\/monitor-full-network-traffic-with-arkime-aka-moloch\\\/\"},\"wordCount\":359,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/#\\\/schema\\\/person\\\/a39105bc63f7e11a0e07b12a4c3dda73\"},\"image\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2021\\\/02\\\/21\\\/monitor-full-network-traffic-with-arkime-aka-moloch\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/snehpatel.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/capture-storage-space-1024x542.png\",\"keywords\":[\"Arkime\",\"forensics\",\"moloch\",\"moloch packet capture\",\"moloch traffic analyzer\",\"monitoring\",\"network\",\"network monitoring\",\"opensource\"],\"articleSection\":[\"Monitoring\",\"Network\",\"opensource\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2021\\\/02\\\/21\\\/monitor-full-network-traffic-with-arkime-aka-moloch\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2021\\\/02\\\/21\\\/monitor-full-network-traffic-with-arkime-aka-moloch\\\/\",\"url\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2021\\\/02\\\/21\\\/monitor-full-network-traffic-with-arkime-aka-moloch\\\/\",\"name\":\"Monitor full network traffic with Arkime aka. Moloch - Sneh Patel\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2021\\\/02\\\/21\\\/monitor-full-network-traffic-with-arkime-aka-moloch\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2021\\\/02\\\/21\\\/monitor-full-network-traffic-with-arkime-aka-moloch\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/snehpatel.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/capture-storage-space-1024x542.png\",\"datePublished\":\"2021-02-21T21:17:27+00:00\",\"dateModified\":\"2021-03-02T00:26:00+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2021\\\/02\\\/21\\\/monitor-full-network-traffic-with-arkime-aka-moloch\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/snehpatel.com\\\/index.php\\\/2021\\\/02\\\/21\\\/monitor-full-network-traffic-with-arkime-aka-moloch\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/snehpatel.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/capture-storage-space.png?fit=1156%2C612&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/snehpatel.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/capture-storage-space.png?fit=1156%2C612&ssl=1\",\"width\":1156,\"height\":612},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/snehpatel.com\\\/#website\",\"url\":\"https:\\\/\\\/snehpatel.com\\\/\",\"name\":\"Sneh Patel\",\"description\":\"Cyber Security Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/snehpatel.com\\\/#\\\/schema\\\/person\\\/a39105bc63f7e11a0e07b12a4c3dda73\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/snehpatel.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/snehpatel.com\\\/#\\\/schema\\\/person\\\/a39105bc63f7e11a0e07b12a4c3dda73\",\"name\":\"Sneh Patel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/snehpatel.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/snehpatel.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/snehpatel.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1\",\"width\":672,\"height\":222,\"caption\":\"Sneh Patel\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/snehpatel.com\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1\"},\"sameAs\":[\"http:\\\/\\\/snehpatel.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Monitor full network traffic with Arkime aka. Moloch - Sneh Patel","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/","og_locale":"en_US","og_type":"article","og_title":"Monitor full network traffic with Arkime aka. Moloch - Sneh Patel","og_description":"Monitoring the corporate network is a crucial part to safeguard the network against malicious threat actors. One may argue that there are IDS and IPS to detect malicious traffic on the network. Those advanced security devices can indeed be useful but one cannot see the full picture of the network. For example, IDS and IPS ... Read more","og_url":"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/","og_site_name":"Sneh Patel","article_published_time":"2021-02-21T21:17:27+00:00","article_modified_time":"2021-03-02T00:26:00+00:00","og_image":[{"url":"https:\/\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space-1024x542.png","type":"","width":"","height":""}],"author":"Sneh Patel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sneh Patel","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/#article","isPartOf":{"@id":"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/"},"author":{"name":"Sneh Patel","@id":"https:\/\/snehpatel.com\/#\/schema\/person\/a39105bc63f7e11a0e07b12a4c3dda73"},"headline":"Monitor full network traffic with Arkime aka. Moloch","datePublished":"2021-02-21T21:17:27+00:00","dateModified":"2021-03-02T00:26:00+00:00","mainEntityOfPage":{"@id":"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/"},"wordCount":359,"commentCount":0,"publisher":{"@id":"https:\/\/snehpatel.com\/#\/schema\/person\/a39105bc63f7e11a0e07b12a4c3dda73"},"image":{"@id":"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/#primaryimage"},"thumbnailUrl":"https:\/\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space-1024x542.png","keywords":["Arkime","forensics","moloch","moloch packet capture","moloch traffic analyzer","monitoring","network","network monitoring","opensource"],"articleSection":["Monitoring","Network","opensource","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/","url":"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/","name":"Monitor full network traffic with Arkime aka. Moloch - Sneh Patel","isPartOf":{"@id":"https:\/\/snehpatel.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/#primaryimage"},"image":{"@id":"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/#primaryimage"},"thumbnailUrl":"https:\/\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space-1024x542.png","datePublished":"2021-02-21T21:17:27+00:00","dateModified":"2021-03-02T00:26:00+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/snehpatel.com\/index.php\/2021\/02\/21\/monitor-full-network-traffic-with-arkime-aka-moloch\/#primaryimage","url":"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space.png?fit=1156%2C612&ssl=1","contentUrl":"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2021\/02\/capture-storage-space.png?fit=1156%2C612&ssl=1","width":1156,"height":612},{"@type":"WebSite","@id":"https:\/\/snehpatel.com\/#website","url":"https:\/\/snehpatel.com\/","name":"Sneh Patel","description":"Cyber Security Blog","publisher":{"@id":"https:\/\/snehpatel.com\/#\/schema\/person\/a39105bc63f7e11a0e07b12a4c3dda73"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/snehpatel.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/snehpatel.com\/#\/schema\/person\/a39105bc63f7e11a0e07b12a4c3dda73","name":"Sneh Patel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2020\/09\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1","url":"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2020\/09\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1","contentUrl":"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2020\/09\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1","width":672,"height":222,"caption":"Sneh Patel"},"logo":{"@id":"https:\/\/i0.wp.com\/snehpatel.com\/wp-content\/uploads\/2020\/09\/cropped-Slide4-1.jpg?fit=672%2C222&ssl=1"},"sameAs":["http:\/\/snehpatel.com"]}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/posts\/463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/comments?post=463"}],"version-history":[{"count":2,"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/posts\/463\/revisions"}],"predecessor-version":[{"id":475,"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/posts\/463\/revisions\/475"}],"wp:attachment":[{"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/media?parent=463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/categories?post=463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/snehpatel.com\/index.php\/wp-json\/wp\/v2\/tags?post=463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}