but this appears pretty old. So...before I go through the grueling process of manually getting field extractions, I'm betting someone else has already done the splunk-ish work. Thanks for any assistance.
I have had a few open tickets with Splunk to update the Bro-IDS Splunk app, but to no avail. PacketSled, a Bro based security tool, has alluded to the fact that they plan to publish an open source based Bro Splunk App. I also wanted to say that if you use the intel framework on Bro, you will have to add your own props and transforms entries, but there are some out on the internet others have done. I did a lot of work getting Bro logs into Azure HDInsight (Microsoft Hadoop), but am have only done the basics on writing extractions for Bro in Splunk. Thankfully the tab based delimiters make field extraction relatively painless in search time field extractions in Splunk.
Good luck, and maybe we can all find a place to share our Splunk files to help others…
Yep! I believe we've already helped a few opensource users get it working for themselves too. We also published a Bro package to help people get their data from Bro prepped in a way that it's easily consumable by Splunk here: https://packages.bro.org/packages/view/73d21892-4fb7-11e8-88be-0a645a3f3086
I know that it's making the logs into json which increases indexing costs, but there aren't really any other flexible and resilient mechanisms that I've heard of with Splunk.