All Apps and Add-ons

OSSEC App - What are the the next steps to configure Splunk forwarder?

Path Finder

First time I'm going to use OSSEC App. . I didn't find the CLEAN STEPS for configuring the App to get data from Splunk forwarder installed on the ossec logs source machine (It may not be OSSEC server itself. This is syslog aggregator).

  1. I have installed the splunk forwarder on syslog aggregator machine.
  2. Configured forwarder outputs.conf to send to indexer. I can see the _internal logs of forwarder in Indexer/SH machine. So the communication is setup.
  3. Install OSSEC App on Indexer/SH.

What are the next steps to configure the Splunk forwarder to send the data from log path say path1 to Indexer/SH?

I'm not finding
1. clear steps to make to working like step-1, step-2, step-3....step-n
2. There doesn't seems to be TA (add-on) app for installing on forwarder?

Kindly let me know if anyone has prepared the steps to configuration to make OSSEC work.

0 Karma


You will need to create an inputs.conf to tell the Splunk forwarder where the OSSEC files to monitor are, you can actually copy the stanzas you need from the OSSEC app inputs.conf.

For example an ossec server will need these stanzas in an inputs.conf:

disabled = 0
index = myindex
sourcetype = ossec_alerts

disabled = 0
index = myindex
sourcetype = ossec_log

disabled = 0
index = myindex
sourcetype = ossec_ar

This will tie the sourcetypes of the files monitored to the OSSEC app installed on your search head or indexer.

For more information on inputs.conf check here:

Typically this file is located in /SPLUNKINSTALL/etc/apps/APPLICATION/local
example: /opt/splunkforwarder/etc/apps/ossec_app/local/inputs.conf

0 Karma
.conf21 Now Fully Virtual!
Register for FREE Today!

We've made .conf21 totally virtual and totally FREE! Our completely online experience will run from 10/19 through 10/20 with some additional events, too!