<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Add-on for OSSEC: OSSEC &amp; Splunk Integration? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290076#M34606</link>
    <description>&lt;P&gt;Have you had any success ?&lt;/P&gt;

&lt;P&gt;I'm experiencing a similar issue using "Splunk Add-on for OSSEC" &lt;BR /&gt;
events are received by splunk and some fields are extracted to the CIM but fields like the &lt;BR /&gt;
src and src_user are not. &lt;/P&gt;

&lt;P&gt;This causes a number of alerts/ dashboards to report the  in Splunk ES to report the system and the as unknown.&lt;/P&gt;</description>
    <pubDate>Wed, 07 Feb 2018 06:20:52 GMT</pubDate>
    <dc:creator>pfgrobler</dc:creator>
    <dc:date>2018-02-07T06:20:52Z</dc:date>
    <item>
      <title>Splunk Add-on for OSSEC: OSSEC &amp; Splunk Integration?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290067#M34597</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;

&lt;P&gt;I'm trying this:&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/2808/"&gt;Splunk Add-on for OSSEC&lt;/A&gt;&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/300/"&gt;Reporting and Management for OSSEC&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Some logs not parsing property and the log structure itself that parsed have many duplicates information in fields.&lt;BR /&gt;
I mean these logs do not give me super results for monitoring and &lt;STRONG&gt;to be trust in 80% i can get more useful information from raw data than with the processed add-on&lt;/STRONG&gt;.&lt;/P&gt;

&lt;P&gt;And it seems to me that I need somehow reconfigure  OSSEC conf.&lt;BR /&gt;
(but I'm not found any information, off splunk docs have little information about it) &lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;My question&lt;/STRONG&gt;: if u can, give me more information about OSSEC &amp;amp; Splunk Integration, some blogs, other implementations. tricks to better monitor by OSSEC.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jan 2018 21:03:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290067#M34597</guid>
      <dc:creator>test_qweqwe</dc:creator>
      <dc:date>2018-01-06T21:03:32Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for OSSEC: OSSEC &amp; Splunk Integration?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290068#M34598</link>
      <description>&lt;P&gt;I can send screenshots if you will request it.&lt;BR /&gt;
I am not did it before, coz there are many confidential information and i was lazy to paint it &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jan 2018 01:10:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290068#M34598</guid>
      <dc:creator>test_qweqwe</dc:creator>
      <dc:date>2018-01-07T01:10:58Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for OSSEC: OSSEC &amp; Splunk Integration?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290069#M34599</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;

&lt;P&gt;Can you give some details/examples on "logs not getting parsed properly" ? We have the same combination you mentioned and so far it has served well. The app "Reporting and Management for OSSEC" has some transforms/field extractions which we need for custom dashboards, whereas "Splunk add-on for OSSEC" does a good job for CIM compatibility of OSSEC data, so we use both in different capacity.&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;~ Abhi&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 14:19:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290069#M34599</guid>
      <dc:creator>att35</dc:creator>
      <dc:date>2018-01-09T14:19:54Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for OSSEC: OSSEC &amp; Splunk Integration?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290070#M34600</link>
      <description>&lt;P&gt;I need some times for it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;Anyway, can you help with understanding some OSSEC logs as:&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;&lt;P&gt;How to see all possible signatures?&lt;BR /&gt;
Coz, I can only by &lt;CODE&gt;stats count by signature&lt;/CODE&gt; and it's not okay&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Where can I get information about &lt;CODE&gt;Alert level&lt;/CODE&gt;?&lt;BR /&gt;
&lt;A href="https://ossec-docs.readthedocs.io/en/latest/manual/rules-decoders/rule-levels.html"&gt;https://ossec-docs.readthedocs.io/en/latest/manual/rules-decoders/rule-levels.html&lt;/A&gt; it is?&lt;/P&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;For example№1 log that not parsed:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Jan  6 05:27:24 172.16.9.25 Jan  6 05:27:00 %hostname% ossec: Alert Level: 3; Rule: 516 - System Audit event.; Location: (%hostname%) %ip%-&amp;gt;rootcheck; classification:  ossec,rootcheck,; System Audit: SSH Hardening - 9: Wrong Maximum number of authentication attempts {PCI_DSS: 2.2.4}. File: /etc/ssh/sshd_config. Reference: 9 .
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;UL&gt;
&lt;LI&gt;What another &lt;CODE&gt;PCI DSS requirements&lt;/CODE&gt; monitoring OSSEC?&lt;/LI&gt;
&lt;LI&gt;And what the &lt;CODE&gt;Reference: 9&lt;/CODE&gt; and &lt;CODE&gt;Hardening - 9:&lt;/CODE&gt;? What it mean? It's a same aka numeric?&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Where I can get information about it and what I need to know? What I &lt;CODE&gt;must have&lt;/CODE&gt; need to know?&lt;BR /&gt;
I need some share experience, some advice if you can &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2018 11:16:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290070#M34600</guid>
      <dc:creator>test_qweqwe</dc:creator>
      <dc:date>2018-01-10T11:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for OSSEC: OSSEC &amp; Splunk Integration?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290071#M34601</link>
      <description>&lt;P&gt;For example№2 log that not parsed:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;classification: syslog,attacks,; srcip: %ip% user: - ; 2017 Dec 07 13:03:16 WinEvtLog: Security: AUDIT_SUCCESS(4624): Microsoft-Windows-Security-Auditing: %username% %dns_name% %host_name% An account was successfully logged on. Subject: Security ID: S-1-0-0 Account Name: - Account Domain: - Logon ID: 0x0 Logon Type: 3 New Logon: Security ID: S-1-5-21-1877622112-2052110481-2879200121-1111 Account Name: %username% Account Domain: %dns_name% Logon ID: 0x9b1473a Logon GUID: {00000000-0000-0000-0000-000000000000} Process Information: Process ID: 0x0 Process Name: - Network Information: Workstation Name: NIZHYN Source Network Address: %ip% Source Port: 50149 Detailed Authentication Information: Logon Process: NtLmSsp Authentication Package: NTLM Transited Services: - Package Name (NTLM only): NTLM V2 Key Length: 128 This event is generated when a logon session is created. It is generated on the computer that was accessed.
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;It's field &lt;CODE&gt;body&lt;/CODE&gt; and there is useful information like %username%, &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Microsoft-Windows-Security-Auditing: %username%
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;but it not parsed in fields.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2018 12:31:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290071#M34601</guid>
      <dc:creator>test_qweqwe</dc:creator>
      <dc:date>2018-01-10T12:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for OSSEC: OSSEC &amp; Splunk Integration?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290072#M34602</link>
      <description>&lt;P&gt;For example№3 log that not parsed:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Jan  4 14:56:14 172.16.9.25 Jan  4 14:55:22 %host_name% ossec: Alert Level: 7; Rule: 2932 - New Yum package installed.; Location: %host_name%-&amp;gt;/var/log/messages; classification:  syslog,yum,config_changed,; Jan  4 14:55:21 srv25sec yum[23540]: Installed: kernel-3.10.0-693.11.1.el7.x86_64
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This part not parsed in field&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Installed: kernel-3.10.0-693.11.1.el7.x86_64
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 10 Jan 2018 14:57:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290072#M34602</guid>
      <dc:creator>test_qweqwe</dc:creator>
      <dc:date>2018-01-10T14:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for OSSEC: OSSEC &amp; Splunk Integration?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290073#M34603</link>
      <description>&lt;P&gt;Bump! Up! &lt;/P&gt;</description>
      <pubDate>Sat, 13 Jan 2018 15:30:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290073#M34603</guid>
      <dc:creator>test_qweqwe</dc:creator>
      <dc:date>2018-01-13T15:30:46Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for OSSEC: OSSEC &amp; Splunk Integration?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290074#M34604</link>
      <description>&lt;P&gt;Do you feed the same data into splunk twice ?&lt;/P&gt;

&lt;P&gt;Once into the ossec event type via syslog and the "Splunk Add-on for OSSEC"&lt;BR /&gt;
 and then  a second time via "Reporting and Management for OSSEC"&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 05:57:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290074#M34604</guid>
      <dc:creator>pfgrobler</dc:creator>
      <dc:date>2018-02-07T05:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for OSSEC: OSSEC &amp; Splunk Integration?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290075#M34605</link>
      <description>&lt;P&gt;Abhi &lt;BR /&gt;
Are you passing in the same data twice once via &lt;BR /&gt;
"Splunk Add-on for OSSEC" and also via "Reporting and Management for OSSEC"&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 06:13:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290075#M34605</guid>
      <dc:creator>pfgrobler</dc:creator>
      <dc:date>2018-02-07T06:13:38Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for OSSEC: OSSEC &amp; Splunk Integration?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290076#M34606</link>
      <description>&lt;P&gt;Have you had any success ?&lt;/P&gt;

&lt;P&gt;I'm experiencing a similar issue using "Splunk Add-on for OSSEC" &lt;BR /&gt;
events are received by splunk and some fields are extracted to the CIM but fields like the &lt;BR /&gt;
src and src_user are not. &lt;/P&gt;

&lt;P&gt;This causes a number of alerts/ dashboards to report the  in Splunk ES to report the system and the as unknown.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2018 06:20:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290076#M34606</guid>
      <dc:creator>pfgrobler</dc:creator>
      <dc:date>2018-02-07T06:20:52Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for OSSEC: OSSEC &amp; Splunk Integration?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290077#M34607</link>
      <description>&lt;P&gt;Also, did u use format log - splunk? it's not helped me, but change a little parsing of logs.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;&amp;lt;syslog_output&amp;gt;
  &amp;lt;server&amp;gt;10.0.0.1&amp;lt;/server&amp;gt;
  &amp;lt;port&amp;gt;514&amp;lt;/port&amp;gt;
  &amp;lt;format&amp;gt;splunk&amp;lt;/format&amp;gt;
&amp;lt;/syslog_output&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;U can use: &lt;CODE&gt;default&lt;/CODE&gt;, &lt;CODE&gt;cef&lt;/CODE&gt;, &lt;CODE&gt;splunk&lt;/CODE&gt;, &lt;CODE&gt;json&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2018 19:28:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-OSSEC-OSSEC-Splunk-Integration/m-p/290077#M34607</guid>
      <dc:creator>test_qweqwe</dc:creator>
      <dc:date>2018-02-12T19:28:11Z</dc:date>
    </item>
  </channel>
</rss>

