<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FireEye Built in Dashboards Not Working in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153880#M13913</link>
    <description>&lt;P&gt;Same with me, src_ip and malware_name (though name is) are not extracted.  fe_appliance and alert_id are also fine&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 16:40:44 GMT</pubDate>
    <dc:creator>ccsfdave</dc:creator>
    <dc:date>2020-09-28T16:40:44Z</dc:date>
    <item>
      <title>FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153875#M13908</link>
      <description>&lt;P&gt;I installed the FireEye application and configured my WebMPS sensors to post alerts to Splunk per the instructions. I've reviewed the Splunkd log and can see where the events are making their way to Splunk.&lt;BR /&gt;
The default FireEye dashboards have no results. I know the events are in the index because if I search for index=fe, my events show up. &lt;/P&gt;

&lt;P&gt;Inspecting one of the dashboards shows the following query being run with no results:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;search index=fe sourcetype="fe_xml" fe_appliance=* src_ip=* malware_name=* alert_id=* | rename severity AS fe_severity | eval fe_severity=replace(fe_severity,"\"","") | lookup severity fe_severity | rename severity AS SEVERITY | table alert_id fe_appliance src_ip dest_ip malware_name malware_stype SEVERITY
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If I run this query manually, I get no results. If I start backing parameters of the query off, I get results at&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=fe sourcetype="fe_xml" fe_appliance=*
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;As soon as src_ip=* is tacked onto the search, results stop coming in.&lt;/P&gt;

&lt;P&gt;I haven't modified any of the FireEye application files, and I've triple-checked that my sensors are sending data to Splunk in the Extended XML format. Does anyone have any ideas why this isn't working correctly? Thanks!&lt;/P&gt;

&lt;P&gt;EDIT:&lt;/P&gt;

&lt;P&gt;Looks like the src_ip isn't being extracted. I wonder if the event format changed? Here's an edited raw event:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;?xml version="1.0" encoding="utf-8"?&amp;gt;&amp;lt;alerts appliance="ApplianceName" msg="extended" product="Web MPS" version="7.0.2.156588" xmlns="hxxp://www.fireeye.com/alert/2011/AlertSchema" xmlns:xsi="hxxp://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="hxxp://www.fireeye.com/alert/2011/AlertSchema FireEyeAlert.xsd"&amp;gt;&amp;lt;alert id="405294" name="infection-match" severity="minr"&amp;gt;&amp;lt;explanation analysis="content" protocol="tcp"&amp;gt;&amp;lt;malware-detected&amp;gt;&amp;lt;malware name="Local.Infection" sid="600104" stype="bot-command"/&amp;gt;&amp;lt;/malware-detected&amp;gt;&amp;lt;cnc-services&amp;gt;&amp;lt;cnc-service port="80" protocol="tcp"&amp;gt;&amp;lt;address&amp;gt;141.101.117.X&amp;lt;/address&amp;gt;&amp;lt;channel&amp;gt;GET /efax_7132159010.doc hxxp/1.1::~~Accept: */*::~~User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; InfoPath.3; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)::~~Accept-Encoding: gzip, deflate::~~Host: slash.ma::~~Connection: Keep-Alive::~~Cookie: __cfduid=db3535ebf75b3f2976167c05678ac6e631392738961234::~~::~~&amp;lt;/channel&amp;gt;&amp;lt;/cnc-service&amp;gt;&amp;lt;/cnc-services&amp;gt;&amp;lt;/explanation&amp;gt;&amp;lt;src vlan="0"&amp;gt;&amp;lt;ip&amp;gt;192.168.12.150&amp;lt;/ip&amp;gt;&amp;lt;host&amp;gt;host.domain.local&amp;lt;/host&amp;gt;&amp;lt;port&amp;gt;58268&amp;lt;/port&amp;gt;&amp;lt;mac&amp;gt;00:15:c7:00:00:00&amp;lt;/mac&amp;gt;&amp;lt;/src&amp;gt;&amp;lt;dst&amp;gt;&amp;lt;ip&amp;gt;141.101.117.x&amp;lt;/ip&amp;gt;&amp;lt;mac&amp;gt;00:1b:54:f7:00:00&amp;lt;/mac&amp;gt;&amp;lt;port&amp;gt;80&amp;lt;/port&amp;gt;&amp;lt;/dst&amp;gt;&amp;lt;occurred&amp;gt;2014-02-18T18:00:16Z&amp;lt;/occurred&amp;gt;&amp;lt;interface label="A1" mode="tap"&amp;gt;pether3&amp;lt;/interface&amp;gt;&amp;lt;alert-url&amp;gt;hxxps://sensor/event_stream/events_for_bot?ev_id=405294&amp;amp;amp;lms_iden=00:E0:81:C3:00:00&amp;lt;/alert-url&amp;gt;&amp;lt;action&amp;gt;notified&amp;lt;/action&amp;gt;&amp;lt;/alert&amp;gt;&amp;lt;/alerts&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 17 Feb 2014 19:25:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153875#M13908</guid>
      <dc:creator>wbkendall</dc:creator>
      <dc:date>2014-02-17T19:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153876#M13909</link>
      <description>&lt;P&gt;I'd check to make sure the fe_appliance, src_ip, malware_name and alert_id fields are being extracted.  I'd do a search for index=fe sourcetype="fe_xml" and see if the field shows up on the left hand side.&lt;/P&gt;

&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 15:54:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153876#M13909</guid>
      <dc:creator>bosburn_splunk</dc:creator>
      <dc:date>2020-09-28T15:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153877#M13910</link>
      <description>&lt;P&gt;I couldn't post an event other than by editing the original post, but I now have one of the events in my post. I'm wondering if the format changed?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2014 19:17:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153877#M13910</guid>
      <dc:creator>wbkendall</dc:creator>
      <dc:date>2014-02-18T19:17:21Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153878#M13911</link>
      <description>&lt;P&gt;I am having the same issue with src_ip not being extracted.  Did you ever figure this one out?&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2014 20:01:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153878#M13911</guid>
      <dc:creator>ccsfdave</dc:creator>
      <dc:date>2014-05-19T20:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153879#M13912</link>
      <description>&lt;P&gt;Thanks Brian.  It appears that src_ip and malware_name are not being extracted properly.  fe_appliance and alert_id are fine.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:40:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153879#M13912</guid>
      <dc:creator>TonyLeeVT</dc:creator>
      <dc:date>2020-09-28T16:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153880#M13913</link>
      <description>&lt;P&gt;Same with me, src_ip and malware_name (though name is) are not extracted.  fe_appliance and alert_id are also fine&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:40:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153880#M13913</guid>
      <dc:creator>ccsfdave</dc:creator>
      <dc:date>2020-09-28T16:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153881#M13914</link>
      <description>&lt;P&gt;Keep in mind that there are different "names" within the events.  For example:&lt;/P&gt;

&lt;P&gt;One "name" contained within the &lt;ALERT&gt; tag:&lt;BR /&gt;
&lt;ALERT id="26523" name="malware-callback" severity="crit"&gt;&lt;/ALERT&gt;&lt;/ALERT&gt;&lt;/P&gt;

&lt;P&gt;Another "name" contained within the &lt;MALWARE&gt; tag:&lt;BR /&gt;
&lt;MALWARE-DETECTED&gt;&lt;BR /&gt;
&lt;MALWARE name="FireEye-TestEvent-SIG-MC" sid="2345" stype="bot-command"&gt;&lt;/MALWARE&gt;&lt;/MALWARE-DETECTED&gt;&lt;/MALWARE&gt;&lt;/P&gt;

&lt;P&gt;The root cause of the field extraction issue may be located in the props.conf or the transforms.conf file?&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2014 20:25:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153881#M13914</guid>
      <dc:creator>TonyLeeVT</dc:creator>
      <dc:date>2014-05-20T20:25:22Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153882#M13915</link>
      <description>&lt;P&gt;I am trying to extract the src_ip and malware_name fields and when I have Splunk write the regex in the "Interactive Field Extractor", it can't find the src_ip line probably because it is only pulling in the first 15 lines.  Can I get this expanded?  I could upload a screen shot if this is not clear...&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:40:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153882#M13915</guid>
      <dc:creator>ccsfdave</dc:creator>
      <dc:date>2020-09-28T16:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153883#M13916</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Try using the Universal fix before this one.  I believe that should solve the problem no matter the version of FE OS.  This will be left here just in case the other solution does not work for you.&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Here is the fix for FireEye &lt;STRONG&gt;&lt;EM&gt;(pre-OS 7.1)&lt;/EM&gt;&lt;/STRONG&gt; appliances.  This should work if your wMPS (NX) appliances are any version prior to 7.1.  I will post a universal fix (that works for all appliances) if possible.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;From the Splunk GUI:&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;
App -&amp;gt; Manage Apps -&amp;gt; View Objects -&amp;gt; Search box:  "EXTRACT-src-dst"&lt;/P&gt;

&lt;P&gt;Click on the top hyperlink and replace the current contents with the following:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;&amp;lt;src\svlan=\"\d+\"\&amp;gt;&amp;lt;ip&amp;gt;(?&amp;lt;src_ip&amp;gt;[0-9.]+)&amp;lt;/ip&amp;gt;&amp;lt;host&amp;gt;(?&amp;lt;src_host&amp;gt;.*)&amp;lt;/host&amp;gt;&amp;lt;port&amp;gt;(?&amp;lt;src_port&amp;gt;\d+)&amp;lt;/port&amp;gt;&amp;lt;mac&amp;gt;(?&amp;lt;src_mac&amp;gt;[\w:]+)&amp;lt;/mac&amp;gt;&amp;lt;/src&amp;gt;&amp;lt;dst&amp;gt;&amp;lt;ip&amp;gt;(?&amp;lt;dest_ip&amp;gt;[0-9.]+)&amp;lt;/ip&amp;gt;&amp;lt;mac&amp;gt;(?&amp;lt;dest_mac&amp;gt;[\w:]+)&amp;lt;/mac&amp;gt;&amp;lt;port&amp;gt;(?&amp;lt;dest_port&amp;gt;\d+)&amp;lt;/port&amp;gt;&amp;lt;/dst&amp;gt;&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Alternatively, you can also change this directly in the props.conf file:&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Original:&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;
&lt;CODE&gt;EXTRACT-src-dst = \&amp;lt;src\svlan=\"\d+\"\&amp;gt;\&amp;lt;ip\&amp;gt;(?&amp;lt;src_ip&amp;gt;[0-9.]+)\&amp;lt;/ip\&amp;gt;\&amp;lt;port\&amp;gt;(?&amp;lt;src_port&amp;gt;\d+)\&amp;lt;/port\&amp;gt;\&amp;lt;mac\&amp;gt;(?&amp;lt;src_mac&amp;gt;[\w:]+)\&amp;lt;/mac\&amp;gt;\&amp;lt;/src\&amp;gt;\&amp;lt;dst\&amp;gt;\&amp;lt;ip\&amp;gt;(?&amp;lt;dest_ip&amp;gt;[0-9.]+)\&amp;lt;/ip\&amp;gt;\&amp;lt;mac\&amp;gt;(?&amp;lt;dest_mac&amp;gt;[\w:]+)\&amp;lt;/mac\&amp;gt;\&amp;lt;port\&amp;gt;(?&amp;lt;dest_port&amp;gt;\d+)\&amp;lt;/port\&amp;gt;\&amp;lt;/dst\&amp;gt;&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Change to:&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;
&lt;CODE&gt;EXTRACT-src-dst = &amp;lt;src\svlan=\"\d+\"\&amp;gt;&amp;lt;ip&amp;gt;(?&amp;lt;src_ip&amp;gt;[0-9.]+)&amp;lt;/ip&amp;gt;&amp;lt;host&amp;gt;(?&amp;lt;src_host&amp;gt;.*)&amp;lt;/host&amp;gt;&amp;lt;port&amp;gt;(?&amp;lt;src_port&amp;gt;\d+)&amp;lt;/port&amp;gt;&amp;lt;mac&amp;gt;(?&amp;lt;src_mac&amp;gt;[\w:]+)&amp;lt;/mac&amp;gt;&amp;lt;/src&amp;gt;&amp;lt;dst&amp;gt;&amp;lt;ip&amp;gt;(?&amp;lt;dest_ip&amp;gt;[0-9.]+)&amp;lt;/ip&amp;gt;&amp;lt;mac&amp;gt;(?&amp;lt;dest_mac&amp;gt;[\w:]+)&amp;lt;/mac&amp;gt;&amp;lt;port&amp;gt;(?&amp;lt;dest_port&amp;gt;\d+)&amp;lt;/port&amp;gt;&amp;lt;/dst&amp;gt;&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Notice that the old regex did not take into account the &lt;HOST&gt; tag which broke the parsing.  Thanks.&lt;/HOST&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Remember to restart splunkd after making this change:&lt;/STRONG&gt;  &lt;CODE&gt;/opt/splunk/bin/splunk restart splunkd&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2014 14:39:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153883#M13916</guid>
      <dc:creator>TonyLeeVT</dc:creator>
      <dc:date>2014-05-21T14:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153884#M13917</link>
      <description>&lt;P&gt;Thanks so much Tony,  I am running 7.1.1 so if you get a chance for the universal fix, that would be great.  In the mean time, I am going to see if the above works or can be manipulated to work for me.&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2014 15:55:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153884#M13917</guid>
      <dc:creator>ccsfdave</dc:creator>
      <dc:date>2014-05-21T15:55:40Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153885#M13918</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;A Universal Solution (Works for any version of FireEye OS) should be below:&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;FireEye 7.1 and later uses "Pretty print" for the XML.  While this increases the readability for humans, it does break the Splunk parsing in the current app.  We can account for the extra carriage returns, line feeds, and tabs using the following:  &lt;CODE&gt;([\r\n]*)\s*&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;There appear to be two Extraction parameters that need a slight modification to make all of the dashboards function again:  &lt;STRONG&gt;&lt;EM&gt;EXTRACT-src-dst&lt;/EM&gt;&lt;/STRONG&gt; and &lt;STRONG&gt;&lt;EM&gt;EXTRACT-malwaredetected&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;From the Splunk GUI:&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;App -&amp;gt; Manage Apps -&amp;gt; View Objects -&amp;gt; Search box:  "&lt;STRONG&gt;EXTRACT-src-dst&lt;/STRONG&gt;"&lt;/P&gt;

&lt;P&gt;Click on the top hyperlink and replace the current contents with the following:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;&amp;lt;src\svlan=\"\d+\"\&amp;gt;([\r\n]*)\s*&amp;lt;ip&amp;gt;(?&amp;lt;src_ip&amp;gt;[0-9.]+)&amp;lt;/ip&amp;gt;([\r\n]*)\s*&amp;lt;host&amp;gt;(?&amp;lt;src_host&amp;gt;.*)&amp;lt;/host&amp;gt;([\r\n]*)\s*&amp;lt;port&amp;gt;(?&amp;lt;src_port&amp;gt;\d+)&amp;lt;/port&amp;gt;([\r\n]*)\s*&amp;lt;mac&amp;gt;(?&amp;lt;src_mac&amp;gt;[\w:]+)&amp;lt;/mac&amp;gt;([\r\n]*)\s*&amp;lt;/src&amp;gt;([\r\n]*)\s*&amp;lt;dst&amp;gt;([\r\n]*)\s*&amp;lt;ip&amp;gt;(?&amp;lt;dest_ip&amp;gt;[0-9.]+)&amp;lt;/ip&amp;gt;([\r\n]*)\s*&amp;lt;mac&amp;gt;(?&amp;lt;dest_mac&amp;gt;[\w:]+)&amp;lt;/mac&amp;gt;([\r\n]*)\s*&amp;lt;port&amp;gt;(?&amp;lt;dest_port&amp;gt;\d+)&amp;lt;/port&amp;gt;([\r\n]*)\s*&amp;lt;/dst&amp;gt;&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Notice that the old regex did not take into account the &lt;CODE&gt;&amp;lt;host&amp;gt;&lt;/CODE&gt; tag which also broke the parsing.  This new one does.&lt;/P&gt;

&lt;P&gt;&lt;BR /&gt;Now change EXTRACT-malwaredetected...&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;From the Splunk GUI:&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;App -&amp;gt; Manage Apps -&amp;gt; View Objects -&amp;gt; Search box:  "&lt;STRONG&gt;EXTRACT-malwaredetected&lt;/STRONG&gt;"&lt;/P&gt;

&lt;P&gt;Click on the top hyperlink and replace the current contents with the following:&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;&amp;lt;malware-detected&amp;gt;([\r\n]*)\s*&amp;lt;malware\sname=\"(?&amp;lt;malware_name&amp;gt;.*)\"\s+sid=\"(?&amp;lt;malware_sid&amp;gt;.*)\"\s+stype=\"(?&amp;lt;malware_stype&amp;gt;.*)\"/&amp;gt; in _raw&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Remember to restart splunkd after making this change:&lt;/STRONG&gt;  &lt;CODE&gt;/opt/splunk/bin/splunk restart splunkd&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Let me know if this works for you.  Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2014 16:48:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153885#M13918</guid>
      <dc:creator>TonyLeeVT</dc:creator>
      <dc:date>2014-05-21T16:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153886#M13919</link>
      <description>&lt;P&gt;No problem Dave.  Let me know if the Universal fix works for you.  I tested it on FireEye OS 6.2 and 7.1 and it seems to be working.&lt;/P&gt;</description>
      <pubDate>Wed, 21 May 2014 22:18:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153886#M13919</guid>
      <dc:creator>TonyLeeVT</dc:creator>
      <dc:date>2014-05-21T22:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153887#M13920</link>
      <description>&lt;P&gt;So others don't need to to make this change...  We patched the Splunk for FireEye app to version 2.0.8 (making the change above) and pushed it to the Splunk apps site.  I also created a howto for installation on Splunk v6 as a stopgap until the new app is completed.  See the instructions below:&lt;/P&gt;

&lt;P&gt;&lt;A href="http://securitysynapse.com/2014/05/stopgap-splunk-for-fireeye-v2-app.html"&gt;http://securitysynapse.com/2014/05/stopgap-splunk-for-fireeye-v2-app.html&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Let us know if you have any issues in the mean time,&lt;BR /&gt;
-Tony&lt;/P&gt;</description>
      <pubDate>Thu, 22 May 2014 13:32:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153887#M13920</guid>
      <dc:creator>TonyLeeVT</dc:creator>
      <dc:date>2014-05-22T13:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153888#M13921</link>
      <description>&lt;P&gt;Side note, some of the events may or may not have a "host" field in them, which provides some inconsistencies with how the src-dst extractions work.  My workaround just put another field extraction in place to catch the ones that didn't have a host field:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;src\svlan=\"\d+\"\&amp;gt;([\r\n]*)\s*&amp;lt;ip&amp;gt;(?&amp;lt;src_ip&amp;gt;[0-9.]+)&amp;lt;/ip&amp;gt;([\r\n]*)\s*&amp;lt;port&amp;gt;(?&amp;lt;src_port&amp;gt;\d+)&amp;lt;/port&amp;gt;([\r\n]*)\s*&amp;lt;mac&amp;gt;(?&amp;lt;src_mac&amp;gt;[\w:]+)&amp;lt;/mac&amp;gt;([\r\n]*)\s*&amp;lt;/src&amp;gt;([\r\n]*)\s*&amp;lt;dst&amp;gt;([\r\n]*)\s*&amp;lt;ip&amp;gt;(?&amp;lt;dest_ip&amp;gt;[0-9.]+)&amp;lt;/ip&amp;gt;([\r\n]*)\s*&amp;lt;mac&amp;gt;(?&amp;lt;dest_mac&amp;gt;[\w:]+)&amp;lt;/mac&amp;gt;([\r\n]*)\s*&amp;lt;port&amp;gt;(?&amp;lt;dest_port&amp;gt;\d+)&amp;lt;/port&amp;gt;([\r\n]*)\s*&amp;lt;/dst&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 16 Jul 2014 14:19:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153888#M13921</guid>
      <dc:creator>srioux</dc:creator>
      <dc:date>2014-07-16T14:19:35Z</dc:date>
    </item>
    <item>
      <title>Re: FireEye Built in Dashboards Not Working</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153889#M13922</link>
      <description>&lt;P&gt;Thanks for hanging in there.  Please try out our new app designed to work with Splunk v6.  We increased the number of FireEye appliances we support and drastically increased the number of protocols you can use to send data to Splunk.  Download it here:  &lt;A href="http://apps.splunk.com/app/1845/"&gt;http://apps.splunk.com/app/1845/&lt;/A&gt;.  It is still in BETA, but we are accepting user feedback at:  Tony.Lee -at- FireEye.com.  Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 26 Aug 2014 19:14:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/FireEye-Built-in-Dashboards-Not-Working/m-p/153889#M13922</guid>
      <dc:creator>TonyLeeVT</dc:creator>
      <dc:date>2014-08-26T19:14:55Z</dc:date>
    </item>
  </channel>
</rss>

