I was able to successfully install the latest Sourcefire app (2.0) into
my Splunk 4.3 environment. The app works for the most part but does not
log or index any pcap data.
I have pcap enabled in eStreamer (Intrusion Event Packet Data) in the
Sourcefire Defense Center and I have changed inputs.conf to read:
disabled = false
interval = 0
source = estreamer_pcap.py
sourcetype = estreamer_pcap
I can see that estreamer_pcap.py is running every minute but
estreamer_pcap.log is always empty.
INFO ExecProcessor - Ran script: python
/usr/local/splunk/etc/apps/Sourcefire/bin/estreamer.py, took 79.97
milliseconds to run, 0 bytes read
I do see single packets getting written to /tmp/tmp.pcap and the
following command successfully produces pcap data:
./ssl_test_pcap.pl x.x.x.x -o splunk_pcap -tshark=/usr/sbin/tshark -f
However, I can't figure out why 'estreamer_pcap.log' is always empty.
Any help or suggestions would be greatly appreciated.
Did you find a solution to this? I am facing the exact same issue.
I was able to fix it. Was missing perl-XML-Parser perl module. Also, had to install tshark and updated inputs.conf file disabled=false for monitoring of estreamers_pcap.log