The THOR Add-on contains all event types, field extractions, transforms, tags and lookups for the THOR Splunk App.
If you use Splunk as a simple Syslog Receiver you have to install the new THOR Add-on and the new THOR App on that system.
If you use Splunk Forwarders to collect your data, you can now deploy the THOR Add-on on the Forwarders with the Deployment Manager and the lightweight THOR App on the Search Head.
Steps to get data into the Splunk App:
Use sourcetype="thor" for all your inputs (files/udp/tcp)
Recommendation:
Create an index named "thor" and add this index to the base event type definition (Settings > Event Types > "thor_events"):
sourcetype=thor AND index=thor
Categories
Security, Fraud & Compliance
Resources
Log in to report this app listing