Warning

This app is archived. App archiving documentation

Add-on for Bro-IDS app icon

Add-on for Bro-IDS

This is a simple Add-on which sourcetypes and does index-time field extraction for Bro-IDS logs.

Built by
splunk product badge

Latest Version 2.2.2
April 23, 2014
Compatibility
Splunk Enterprise
Platform Version: 9.4, 9.3, 9.2, 9.1, 9.0, 8.2, 8.1, 8.0, 7.3, 7.2, 7.1, 7.0
CIM Version: 3.x
Rating

5

(3)

Log in to rate this app
Support
Add-on for Bro-IDS support icon
Not Supported
This is a simple Add-on which sourcetypes and does index-time field extraction for Bro-IDS logs. Rather than trying to know all the fields in all of the Bro log files, This add-on simply does header field extraction from the "#fields" line in [name].log for any file that matches '/.../bro/logs/*/*', and changes the sourcetype to bro_[name]. This should make this add-on less prone to breaking when the output format of Bro changes, or when log types are added and/or removed. Another benefit is that if log format changes, old and new logs will both continue to have correct fields. The downside to this approach are the same as any index-time field extraction. Index size may be increased and search performance may be reduced, and once the logs are input they are stuck with the fields they came with. Some parts may be inspired by or derived from the Security Onion app by Brad Shoop and TA-Bro by Cedric Le Roux

Categories

IT Operations, Security, Fraud & Compliance

Created By

Robert Dunn

Type

addon

Downloads

1,903

Resources

Log in to report this app listing