Splunk Enterprise Security

Whats the best way to get bro logs from an IDS to Splunk Enterprise Security thats running on a seperate server?

ssackrider
Explorer

Right now we have another instance of splunk and bro addon running on the IDS, the bro index is then forwarded to the main Splunk/ES. Assume we need another bro addon the main server (the messages are still ugly). Is this correct? If so how do we set an addon to monitor an index? Hope we're making this harder than it needs to be..

0 Karma

hunters_splunk
Splunk Employee
Splunk Employee

Hi ssackrider,

Not sure what you mean by main Splunk/ES, but if this is your indexer, and you have already forwarded Bro logs to this server using a heavy forwarder, then you do not need to install another Bro Add-on on the indexer. However, if you also use a search head, you must also install the Bro Add-on on the search head in order to properly perform searches on indexed events.
In short, in a distributed environment, you must install the Bro Add-on on the search head, and either indexer or the heavy forwarder.
For more installation info, please refer to this section:

http://docs.splunk.com/Documentation/AddOns/released/BroIDS/Distributeddeployment#Distributed_instal...

Hope it helps, thanks!
Hunter

0 Karma
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Fastest way to demo Observability

I’ve been having a lot of fun learning about Kubernetes and Observability. I set myself an interesting ...

September Community Champions: A Shoutout to Our Contributors!

As we close the books on another fantastic month, we want to take a moment to celebrate the people who are the ...

Splunk Decoded: Service Maps vs Service Analyzer Tree View vs Flow Maps

It’s Monday morning, and your phone is buzzing with alert escalations – your customer-facing portal is running ...