<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why are fields not parsed in the Bit9 Security Platform app? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231508#M25852</link>
    <description>&lt;P&gt;And you get no additional fields when you click the "All Fields" link?&lt;/P&gt;

&lt;P&gt;And you are certain that there are items of those types within your selected time frame?&lt;/P&gt;</description>
    <pubDate>Wed, 13 Jan 2016 14:55:00 GMT</pubDate>
    <dc:creator>bit9</dc:creator>
    <dc:date>2016-01-13T14:55:00Z</dc:date>
    <item>
      <title>Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231505#M25849</link>
      <description>&lt;P&gt;Using the default configs within the app (except the inputs.conf), I am unable to get  the app to parse any fields.  Data is flowing into the index nicely, it will display the data with syntax highlighted, but no fields are parsed.  &lt;/P&gt;

&lt;P&gt;What additional changes am I missing?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 13:14:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231505#M25849</guid>
      <dc:creator>todd_miller</dc:creator>
      <dc:date>2016-01-13T13:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231506#M25850</link>
      <description>&lt;P&gt;Hello, and thank you for your interest in the Bit9 Security Platform app.&lt;/P&gt;

&lt;P&gt;I don't quite understand your question. What do you mean by "no fields are parsed?" Can you please give an example of a search you are trying to do, along with (a) what type of answers you would expect, and (b) what type of answers you are getting instead?&lt;/P&gt;

&lt;P&gt;Thank you very much.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 14:25:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231506#M25850</guid>
      <dc:creator>bit9</dc:creator>
      <dc:date>2016-01-13T14:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231507#M25851</link>
      <description>&lt;P&gt;It's quite simple actually.  I'm looking at the events coming into the bit9 index (index=bit9, last 60 minutes).  I see the event data (i.e. there are events in the index ).  Where I'm having a problem is with the data sourcing from the "Metadata Trace".  No parsing is occurring on the events (i.e. no key-value pairs are generated).  The field extractions aren't working.&lt;/P&gt;

&lt;P&gt;This is the same for "Metadata Trace" sources and "Event Trace" sources.&lt;/P&gt;

&lt;P&gt;"Net Trace" sources don't seem to have this issue.  This is Splunk 6.3.2.&lt;/P&gt;

&lt;P&gt;Here are the fields we're seeing:&lt;BR /&gt;
&lt;STRONG&gt;Selected Fields&lt;/STRONG&gt;&lt;BR /&gt;
ahost &lt;BR /&gt;
aindex&lt;BR /&gt;
asource&lt;BR /&gt;
asourcetype&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Interesting Fields&lt;/STRONG&gt;&lt;BR /&gt;
date_hour&lt;BR /&gt;
date_mday&lt;BR /&gt;
date_minute&lt;BR /&gt;
adate_month&lt;BR /&gt;
date_second&lt;BR /&gt;
adate_wday&lt;BR /&gt;
date_year&lt;BR /&gt;
date_zone&lt;BR /&gt;
linecount&lt;BR /&gt;
aProcessFileName&lt;BR /&gt;
aProcessPathName&lt;BR /&gt;
aProcessPathNameX&lt;BR /&gt;
asplunk_server&lt;BR /&gt;
asrc_nt_domain&lt;BR /&gt;
timeendpos&lt;BR /&gt;
timestartpos&lt;BR /&gt;
auser&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:25:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231507#M25851</guid>
      <dc:creator>todd_miller</dc:creator>
      <dc:date>2020-09-29T08:25:41Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231508#M25852</link>
      <description>&lt;P&gt;And you get no additional fields when you click the "All Fields" link?&lt;/P&gt;

&lt;P&gt;And you are certain that there are items of those types within your selected time frame?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 14:55:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231508#M25852</guid>
      <dc:creator>bit9</dc:creator>
      <dc:date>2016-01-13T14:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231509#M25853</link>
      <description>&lt;P&gt;There's one additional field.  But definitely no field extraction is occurring with the Metadata or Event traces.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 14:57:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231509#M25853</guid>
      <dc:creator>todd_miller</dc:creator>
      <dc:date>2016-01-13T14:57:54Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231510#M25854</link>
      <description>&lt;P&gt;And there are definitely entries from Metadata and Event within the selected time frame?&lt;/P&gt;

&lt;P&gt;The idea that Splunk could syntax-highlight the content and not extract the fields would appear to be contradictory. I've never seen this happen, so that's why I'm asking so many questions.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 15:03:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231510#M25854</guid>
      <dc:creator>bit9</dc:creator>
      <dc:date>2016-01-13T15:03:51Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231511#M25855</link>
      <description>&lt;P&gt;Questions are free my friend.  Feel free to ask away.&lt;/P&gt;

&lt;P&gt;This is just a search on Metadata and Event trace sources.  Looks like "host" and "user" are extracting:&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Selected Fields&lt;/STRONG&gt;&lt;BR /&gt;
a host 1&lt;BR /&gt;
a index 1&lt;BR /&gt;
a source 2&lt;BR /&gt;
a sourcetype 1&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Interesting Fields&lt;/STRONG&gt;&lt;/P&gt;

&lt;H1&gt;date_hour 1&lt;/H1&gt;

&lt;H1&gt;date_mday 1&lt;/H1&gt;

&lt;H1&gt;date_minute 2&lt;/H1&gt;

&lt;P&gt;a date_month 1&lt;/P&gt;

&lt;H1&gt;date_second 3&lt;/H1&gt;

&lt;P&gt;a date_wday 1&lt;/P&gt;

&lt;H1&gt;date_year 1&lt;/H1&gt;

&lt;H1&gt;date_zone 1&lt;/H1&gt;

&lt;P&gt;a eventtype 1&lt;/P&gt;

&lt;H1&gt;linecount 1&lt;/H1&gt;

&lt;P&gt;a splunk_server 4&lt;BR /&gt;
a src_nt_domain 1&lt;/P&gt;

&lt;H1&gt;timeendpos 1&lt;/H1&gt;

&lt;H1&gt;timestartpos 1&lt;/H1&gt;

&lt;H1&gt;user 1&lt;/H1&gt;</description>
      <pubDate>Tue, 29 Sep 2020 08:25:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231511#M25855</guid>
      <dc:creator>todd_miller</dc:creator>
      <dc:date>2020-09-29T08:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231512#M25856</link>
      <description>&lt;P&gt;So you can't do searches like:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;eventtype=bit9_event | top EventSubType
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;or&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;eventtype=bit9_fileCatalog | top PathName
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The reason I didn't quite understand your question was that you indicated that the data shows up correctly syntax-highlighted, which is an indication that the fields are being parsed. It's a reasonably simple JSON input - we do add some additional "color" to it through the app's config properties, but the main fields that are in the data proper should be easily discoverable by Splunk.&lt;/P&gt;

&lt;P&gt;So you get no results from the above searches?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 15:10:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231512#M25856</guid>
      <dc:creator>bit9</dc:creator>
      <dc:date>2016-01-13T15:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231513#M25857</link>
      <description>&lt;P&gt;Oh, and to make things even more complicated, parsing seemed to work when I dumped it into the "main" index inadvertently.  When I moved it to my bit9_test index, parsing died.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 15:11:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231513#M25857</guid>
      <dc:creator>todd_miller</dc:creator>
      <dc:date>2016-01-13T15:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231514#M25858</link>
      <description>&lt;P&gt;The inputs.conf file on the Splunk forwarder has to be pointing to whatever index you are sending the data. And then after you change the inputs.conf file on the Splunk forwarder, you have to restart the forwarder. Did you do those things after changing the index?&lt;/P&gt;

&lt;P&gt;(Also, the entries in eventtypes.conf are dependent on the index name, so that might be causing issues as well. You'll probably want to modify that file on the Splunk server to reflect the actual index name.)&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 15:27:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231514#M25858</guid>
      <dc:creator>bit9</dc:creator>
      <dc:date>2016-01-13T15:27:17Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231515#M25859</link>
      <description>&lt;P&gt;I updated the eventtypes for the correct index.  I've updated the inputs.conf on the forwarder and restarted the forwarder.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 15:37:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231515#M25859</guid>
      <dc:creator>todd_miller</dc:creator>
      <dc:date>2016-01-13T15:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231516#M25860</link>
      <description>&lt;P&gt;So do the &lt;CODE&gt;eventtype&lt;/CODE&gt; searches below return anything, now that they've been updated?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 15:54:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231516#M25860</guid>
      <dc:creator>bit9</dc:creator>
      <dc:date>2016-01-13T15:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231517#M25861</link>
      <description>&lt;P&gt;The base searches work but the "top" doesn't because no fields are available.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 16:03:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231517#M25861</guid>
      <dc:creator>todd_miller</dc:creator>
      <dc:date>2016-01-13T16:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231518#M25862</link>
      <description>&lt;P&gt;This, combined with your comment that it worked in one index but not in another one, makes me wonder if there's a permissions issue somewhere along the way.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2016 17:28:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231518#M25862</guid>
      <dc:creator>bit9</dc:creator>
      <dc:date>2016-01-13T17:28:19Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231519#M25863</link>
      <description>&lt;P&gt;can you post your inputs config and a couple of sample records? No extractions like this indicate a conf file error.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jan 2016 22:12:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231519#M25863</guid>
      <dc:creator>mreynov_splunk</dc:creator>
      <dc:date>2016-01-14T22:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231520#M25864</link>
      <description>&lt;P&gt;I was leaning towards this being a config file issue as well.&lt;/P&gt;

&lt;P&gt;&lt;CODE&gt;[monitor://D:\Bit9\LogFiles\*.bt9]&lt;BR /&gt;
disabled = false&lt;BR /&gt;
followTail = 0&lt;BR /&gt;
index = bit9_test&lt;BR /&gt;
&lt;/CODE&gt;&lt;BR /&gt;
Here's an example of an event:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;{ [-] 
    ABId: 
    ABState: 
    BanName: 
    Bit9Server:  &amp;lt;redacted&amp;gt;
    CLVersion: 
    EventParam1:  381 
    EventParam2:  Dec 22 2015 12:00AM 
    EventParam3: 
    EventSubType:  Old events were deleted 
    EventSubTypeId:  107 
    EventType:  Server Management 
    EventTypeId:  0 
    FileHash: 
    FileHashType: 
    FileName: 
    FileThreat: 
    FileTrust: 
    HostIP: 
    HostId: 
    HostName:  System 
    IndicatorName: 
    InstallerHash: 
    InstallerHashType: 
    LocStringId:  247 
    Message:  Deleting 381 events older than Dec 22 2015 12:00AM. 
    MessageTime:  1/19/2016 8:00:51 AM 
    PathName: 
    Platform: 
    Policy: 
    PolicyId: 
    Priority:  Notice 
    ProcessFileName: 
    ProcessHash: 
    ProcessHashType: 
    ProcessKey: 
    ProcessPathName: 
    ProcessThreat: 
    ProcessTrust: 
    ProcessUsageCounter: 
    RootName: 
    RuleName: 
    RuleType: 
    Timestamp:  1/19/2016 8:00:51 AM 
    UpdaterName: 
    UsageCounter: 
    UserName:  System 
    UserSid:  2 
}
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Same thing in raw text:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;{ "Timestamp": "1/19/2016 8:00:51 AM", "MessageTime": "1/19/2016 8:00:51 AM", "Bit9Server": "&amp;lt;redacted&amp;gt;", "EventType": "Server Management", "EventSubType": "Old events were deleted", "EventTypeId": "0", "EventSubTypeId": "107", "Message": "Deleting 381 events older than Dec 22 2015 12:00AM.", "HostName": "System", "PathName": "", "FileName": "", "ProcessPathName": "", "ProcessFileName": "", "FileHash": "", "FileHashType": "", "InstallerHash": "", "InstallerHashType": "", "HostIP": "", "Policy": "", "Platform": "", "RuleName": "", "BanName": "", "UpdaterName": "", "Priority": "Notice", "UserName": "System", "ProcessHash": "", "ProcessHashType": "", "RootName": "", "RuleType": "", "FileTrust": "", "FileThreat": "", "UsageCounter": "", "ProcessTrust": "", "ProcessThreat": "", "ProcessUsageCounter": "", "CLVersion": "", "EventParam1": "381", "EventParam2": "Dec 22 2015 12:00AM", "EventParam3": "", "HostId": "", "PolicyId": "", "UserSid": "2", "ABId": "", "ABState": "", "LocStringId": "247", "ProcessKey": "", "IndicatorName": "" }
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 19 Jan 2016 13:23:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231520#M25864</guid>
      <dc:creator>todd_miller</dc:creator>
      <dc:date>2016-01-19T13:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: Why are fields not parsed in the Bit9 Security Platform app?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231521#M25865</link>
      <description>&lt;P&gt;And we're fixed!&lt;/P&gt;

&lt;P&gt;Looks like the issue was due to a sourcetype of 'bit9' that we are using for CEF ingestion of logs via syslog.  I moved the sourcetype over to bit9_test and it appears the props/transforms are working correctly.  Once I can eliminate the CEF ingestion I can move back to bit9 and life shall be good.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jan 2016 16:02:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Why-are-fields-not-parsed-in-the-Bit9-Security-Platform-app/m-p/231521#M25865</guid>
      <dc:creator>todd_miller</dc:creator>
      <dc:date>2016-01-20T16:02:51Z</dc:date>
    </item>
  </channel>
</rss>

