<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco eStreamer for Splunk: What configurations should I make so that I see only IDS/IPS event logs? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281169#M33299</link>
    <description>&lt;P&gt;Thanks douglashurd, Do i have to check log flows on the splunk estreamer?&lt;/P&gt;</description>
    <pubDate>Wed, 21 Sep 2016 17:41:45 GMT</pubDate>
    <dc:creator>kiran331</dc:creator>
    <dc:date>2016-09-21T17:41:45Z</dc:date>
    <item>
      <title>Cisco eStreamer for Splunk: What configurations should I make so that I see only IDS/IPS event logs?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281164#M33294</link>
      <description>&lt;P&gt;What configurations are to be made on the Defense Center and on Cisco eStreamer for Splunk in order to get the IDS/IPS events only? Right now we are getting a huge amount of RNA logs in Splunk. We have enabled Log flows, Log packets in the application, and on the Defense Center everything is enabled. What changes do I have to make to avoid huge amount of logs? &lt;BR /&gt;
&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/1846i3930A7085A1E3467/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2016 21:21:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281164#M33294</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2016-09-16T21:21:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer for Splunk: What configurations should I make so that I see only IDS/IPS event logs?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281165#M33295</link>
      <description>&lt;P&gt;good discussion about the subject at &lt;A href="https://answers.splunk.com/answers/326978/cisco-estreamer-for-splunk-how-to-configure-inputs.html"&gt;Cisco eStreamer for Splunk: How to configure inputs.conf to release monitor file when no more data is being added?&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Sep 2016 20:10:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281165#M33295</guid>
      <dc:creator>ddrillic</dc:creator>
      <dc:date>2016-09-18T20:10:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer for Splunk: What configurations should I make so that I see only IDS/IPS event logs?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281166#M33296</link>
      <description>&lt;P&gt;I cannot see the important parts of the estreamer configuration page due to how the screen grab is cropped.  By checking the event types you make them available to a requesting client like the Cisco eStreamer App for Splunk.&lt;/P&gt;

&lt;P&gt;Uncheck them and the events will not be forwarded.&lt;/P&gt;

&lt;P&gt;On the actual eStreamer configuration options page on the Splunk console there is a box you can enable or disable to eliminate flow logs as well.&lt;/P&gt;

&lt;P&gt;In the Overview Tab on this page: &lt;A href="https://splunkbase.splunk.com/app/1629/"&gt;https://splunkbase.splunk.com/app/1629/&lt;/A&gt;  you can see the option.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2016 15:16:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281166#M33296</guid>
      <dc:creator>douglashurd</dc:creator>
      <dc:date>2016-09-20T15:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer for Splunk: What configurations should I make so that I see only IDS/IPS event logs?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281167#M33297</link>
      <description>&lt;P&gt;HI Douglashurd,&lt;/P&gt;

&lt;P&gt;What boxes i have to check on Splunk app if i have to see only IDS/IPS events but not RNS events?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2016 15:39:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281167#M33297</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2016-09-20T15:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer for Splunk: What configurations should I make so that I see only IDS/IPS event logs?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281168#M33298</link>
      <description>&lt;P&gt;Just the Intrusion Events.  I'd recommend you also check Impact Flag, Intrusion Extra data and Intrusion Event Packet Data if you want the packet payload.  Leave everything else unchecked.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2016 15:44:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281168#M33298</guid>
      <dc:creator>douglashurd</dc:creator>
      <dc:date>2016-09-20T15:44:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer for Splunk: What configurations should I make so that I see only IDS/IPS event logs?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281169#M33299</link>
      <description>&lt;P&gt;Thanks douglashurd, Do i have to check log flows on the splunk estreamer?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Sep 2016 17:41:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281169#M33299</guid>
      <dc:creator>kiran331</dc:creator>
      <dc:date>2016-09-21T17:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer for Splunk: What configurations should I make so that I see only IDS/IPS event logs?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281170#M33300</link>
      <description>&lt;P&gt;The flow on/off switch in the Splunk configuration page will only allow flow data to be sent to the Splunk platform &lt;EM&gt;if&lt;/EM&gt; Connection Events (we used to call them RNA flow events) are enabled at the Firepower Management Center eStreamer configuration page other wise they won't be available to splunk.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Sep 2016 18:21:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-eStreamer-for-Splunk-What-configurations-should-I-make-so/m-p/281170#M33300</guid>
      <dc:creator>douglashurd</dc:creator>
      <dc:date>2016-09-21T18:21:50Z</dc:date>
    </item>
  </channel>
</rss>

