Trying to figure this app out. In the directions, all it references is "the malware event logs file generated by the Bromium server", but doesn't give any more information to go on. The only log file that is on the Bromium server that contains the information I am looking for is the "default.log" log file, however, the Splunk_TA_Bromium add-on does not parse that correctly at all.
I've also tried importing the syslog data after forwarding it to a syslog server, but that doesn't seem to work either. The props.conf file in the app has KV_MODE = xml
so I'm trying to look for an xml file, but not finding anything - definitely suggests that syslog is incorrect as well.
Can someone please try to point me in the right direction?
Hi brian,
The add-on monitors Bromium event logs, but the files may not end in .log extension. Please try to locate files with Xevts in the filenames. I think the location of the files should be configurable in Bromium, so you can also consult Bromium documentation for details.
Thanks!
Hunter Shen
Hi brian,
The add-on monitors Bromium event logs, but the files may not end in .log extension. Please try to locate files with Xevts in the filenames. I think the location of the files should be configurable in Bromium, so you can also consult Bromium documentation for details.
Thanks!
Hunter Shen
Awesome! Thanks for the help!
Don't suppose there is any Splunk app that helps parse out the Bromium syslog data then? That's contains the information I'm really interested in (file uploads, trusted file events, etc).