Skip to content

Latest commit

 

History

History
30 lines (24 loc) · 1.24 KB

File metadata and controls

30 lines (24 loc) · 1.24 KB

Download and Configure Splunk Add-on Apps

Download and install Snort 3 JSON Alerts image01 image02

Download and install Cybercheft App (to covert the b64_data fields into readable text) image03

Configure the Snort 3 JSON Alerts add-on

To tell Splunk where the log files are stored that Snort 3 generated so Splunk can ingest them.

sudo mkdir /opt/splunk/etc/apps/TA_Snort3_json/local 
sudo touch /opt/splunk/etc/apps/TA_Snort3_json/local/inputs.conf 
sudo nano /opt/splunk/etc/apps/TA_Snort3_json/local/inputs.conf

Enter the following configs into this inputs.conf file

[monitor:///var/log/snort/*alert_json.txt*] 
sourcetype = snort3:alert:json

image04

Restart the Splunk so when it starts, it will scan the /var/log/snort directory for json files, assign them sourcetype of "snort3:alert:json", and ingest them so we can search them.

cd /opt/splunk/bin/
./splunk restart