<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Add-on for Check Point OPSEC LEA 4.0.0: How to filter firewall events during collection now that fw1-loggrabber.conf has been removed? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216302#M23454</link>
    <description>&lt;P&gt;Hi aosso, You can configure the forwarder with props and transforms config to drop any events matching a certain pattern. More info can be found here &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.1/Forwarding/Routeandfilterdatad"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.1/Forwarding/Routeandfilterdatad&lt;/A&gt; , but essentially&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;# props
[loggrabber_sourcetype]
TRANSFORMS-null= setnull

# transforms
[setnull]
REGEX = (drop|reject|block)
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You'll want to modify the regex to match only the events you want, but this will prompt splunk to filter out such events, thus avoiding the license hit at index time.&lt;/P&gt;

&lt;P&gt;Please let me know if this answers your question!&lt;/P&gt;</description>
    <pubDate>Wed, 22 Jun 2016 12:46:12 GMT</pubDate>
    <dc:creator>muebel</dc:creator>
    <dc:date>2016-06-22T12:46:12Z</dc:date>
    <item>
      <title>Splunk Add-on for Check Point OPSEC LEA 4.0.0: How to filter firewall events during collection now that fw1-loggrabber.conf has been removed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216301#M23453</link>
      <description>&lt;P&gt;With previous versions of the Splunk Add-on for Check Point OPSEC LEA, we could manually configure fw1-loggrabber.conf in order to filter what events we collected from the device, example:&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;FW1_FILTER_RULE="action=drop,reject,block"&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;The new version 4.0.0 has this feature removed:&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;2016-06-02    ADDON-8992   Remove support for direct configuration of lea_loggrabber. fw1-loggrabber.conf has been removed.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;What should be the correct way to filter the collected events in order to not fill the license with unwanted events?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 09:59:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216301#M23453</guid>
      <dc:creator>aosso</dc:creator>
      <dc:date>2020-09-29T09:59:27Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Check Point OPSEC LEA 4.0.0: How to filter firewall events during collection now that fw1-loggrabber.conf has been removed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216302#M23454</link>
      <description>&lt;P&gt;Hi aosso, You can configure the forwarder with props and transforms config to drop any events matching a certain pattern. More info can be found here &lt;A href="http://docs.splunk.com/Documentation/Splunk/6.4.1/Forwarding/Routeandfilterdatad"&gt;http://docs.splunk.com/Documentation/Splunk/6.4.1/Forwarding/Routeandfilterdatad&lt;/A&gt; , but essentially&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;# props
[loggrabber_sourcetype]
TRANSFORMS-null= setnull

# transforms
[setnull]
REGEX = (drop|reject|block)
DEST_KEY = queue
FORMAT = nullQueue
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;You'll want to modify the regex to match only the events you want, but this will prompt splunk to filter out such events, thus avoiding the license hit at index time.&lt;/P&gt;

&lt;P&gt;Please let me know if this answers your question!&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 12:46:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216302#M23454</guid>
      <dc:creator>muebel</dc:creator>
      <dc:date>2016-06-22T12:46:12Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Check Point OPSEC LEA 4.0.0: How to filter firewall events during collection now that fw1-loggrabber.conf has been removed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216303#M23455</link>
      <description>&lt;P&gt;I didn't go for this path at first as this way we are actually downloading all events from the CMA while in previous version we only downloaded the filtered events.&lt;/P&gt;

&lt;P&gt;So it would be nice to be able to keep doing that, just to reduce network traffic between the CMA and Splunk.&lt;/P&gt;

&lt;P&gt;Meanwhile, applying this solution works until we can apply filters to the collecting process &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;#props.conf
[opsec]
TRANSFORMS-drops = opsecnull, opsecparsing

#transforms.conf
[opsecnull]
REGEX = .
DEST_KEY = queue
FORMAT = nullQueue

[opsecparsing]
REGEX = (drop|reject|block)
DEST_KEY = queue
FORMAT = indexQueue
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 23 Jun 2016 10:24:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216303#M23455</guid>
      <dc:creator>aosso</dc:creator>
      <dc:date>2016-06-23T10:24:10Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Check Point OPSEC LEA 4.0.0: How to filter firewall events during collection now that fw1-loggrabber.conf has been removed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216304#M23456</link>
      <description>&lt;P&gt;You can't just pick the type that you want anymore?  How is that an improvement?  Seriously?  Checkpoint logs are huge, and filtering this way puts a load on whatever server is doing that processing. Argh...&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2016 11:14:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216304#M23456</guid>
      <dc:creator>a212830</dc:creator>
      <dc:date>2016-06-23T11:14:35Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Check Point OPSEC LEA 4.0.0: How to filter firewall events during collection now that fw1-loggrabber.conf has been removed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216305#M23457</link>
      <description>&lt;P&gt;You can select the type of data you want downloaded from the checkpoint device - when configuring an input:&lt;/P&gt;

&lt;P&gt;In the Data menu, choose the data you want to collect for the input. &lt;BR /&gt;
 Non-Audit: Collects all event types except audit events.&lt;BR /&gt;
 Firewall Events: Collects firewall events only.&lt;BR /&gt;
 Firewall Audit:Collects audit events only.&lt;BR /&gt;
 SmartDefense (Smart Defense): Collects Smart Defense events only.&lt;BR /&gt;
 VPN (Virtual Private Network): Collects VPN events only.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2016 17:13:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216305#M23457</guid>
      <dc:creator>mreynov_splunk</dc:creator>
      <dc:date>2016-06-27T17:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Check Point OPSEC LEA 4.0.0: How to filter firewall events during collection now that fw1-loggrabber.conf has been removed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216306#M23458</link>
      <description>&lt;P&gt;The improvements are in performance and error handling as well as reducing configuration problems by removing direct loggrabber configuration access. There are ways to filter out data, see below. Additional filtering options will be available down the road.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2016 17:17:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216306#M23458</guid>
      <dc:creator>mreynov_splunk</dc:creator>
      <dc:date>2016-06-27T17:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Check Point OPSEC LEA 4.0.0: How to filter firewall events during collection now that fw1-loggrabber.conf has been removed?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216307#M23459</link>
      <description>&lt;P&gt;Hi, thanks for your reply.&lt;/P&gt;

&lt;P&gt;We only want to collect firewall events that match the following action types: "action=drop,reject,block".&lt;/P&gt;

&lt;P&gt;Just configuring the input for firewall events will also collect "action=allow" and other action types, events that we don't need and that, by volume, kills our enterprise license in about 8-9 hours. Also, the fact that on every connection we are downloading everything, puts an extra load on the Splunk server, as we have to filter the events on indexing time.&lt;/P&gt;

&lt;P&gt;As said previously, doing a quick props/transform job works, but it would be nice to have more configuration flexibility as we had on previous versions.&lt;/P&gt;

&lt;P&gt;Regards &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jun 2016 17:53:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Check-Point-OPSEC-LEA-4-0-0-How-to-filter/m-p/216307#M23459</guid>
      <dc:creator>aosso</dc:creator>
      <dc:date>2016-06-27T17:53:05Z</dc:date>
    </item>
  </channel>
</rss>

