This Add-on makes use of Bricata's RAW export option which transmits a continuous stream of JSON documents containing alerts and network metadata events over a TCP socket. To receive this event stream, on a Splunk Forwarder, the TA configures two of Splunk's raw TCP inputs which listen on the following ports:
The inputs.conf file included does not define a default index for the input nor does the Add-on create any indices. If you prefer to have Bricata data routed to a specific index you may create a local copy of the inputs.conf file and customize the input's index routing to your liking.
Bricata's Splunk knowledge objects are bound to the sourcetype defined by the input, bricata:raw, so changes to index routing should have no affect on them. Leveraging the power of Splunk's search-time JSON field extractions, the TA provides the following additional enrichments.
The TA can be installed by extracting the archive into the /opt/splunk/etc/apps directory and restarting Splunk. Alternatively it can be installed through the Splunk UI.
If running a distributed Splunk deployment, The TA should be installed on Splunk Forwarders that will receive the network inputs. It should also be installed on the Search Head(s) that will be used for search and analysis, including those running any CIM-dependent apps that leverage network transaction and IDS alert data.
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.