<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ingesting ArcSight Windows and Linux Logs to Splunk with Splunk Add-ons in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328895#M39384</link>
    <description>&lt;P&gt;Thanks for your response Cusello! We actually have heavily customized pre-existing TA's that we are trying to leverage and the reason we want to be able to use the TAs.&lt;/P&gt;</description>
    <pubDate>Fri, 14 Apr 2017 14:35:32 GMT</pubDate>
    <dc:creator>Anewec</dc:creator>
    <dc:date>2017-04-14T14:35:32Z</dc:date>
    <item>
      <title>Ingesting ArcSight Windows and Linux Logs to Splunk with Splunk Add-ons</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328893#M39382</link>
      <description>&lt;P&gt;I am trying to forward Windows and Linux logs directly from ArcSight logger to our Splunk environment. Since Arcsight converts logs to CEF format, I know the Splunk Add-ons for Windows and Linux will not work. From ArcSight, the logs are sent to Syslog server and then forwarded to Splunk.&lt;/P&gt;

&lt;P&gt;What is the best way to get the Splunk Windows and Linux TA working with the ArcSight Win and Nix logs?&lt;/P&gt;

&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2017 21:34:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328893#M39382</guid>
      <dc:creator>Anewec</dc:creator>
      <dc:date>2017-04-12T21:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting ArcSight Windows and Linux Logs to Splunk with Splunk Add-ons</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328894#M39383</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
I ingested logs sent by Arcsight by syslog without TAs, I only enabled a network input using the correct sourcetypes (WinEventLog:Security, ...).&lt;BR /&gt;
The only problem is to separate logs if they are different, you have to override sourcetype by regex.&lt;BR /&gt;
Beware, if you'receiving logs from Arcsight extractions that Archsight has a limit to 50,000 events.&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe &lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 07:36:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328894#M39383</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-04-13T07:36:03Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting ArcSight Windows and Linux Logs to Splunk with Splunk Add-ons</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328895#M39384</link>
      <description>&lt;P&gt;Thanks for your response Cusello! We actually have heavily customized pre-existing TA's that we are trying to leverage and the reason we want to be able to use the TAs.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2017 14:35:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328895#M39384</guid>
      <dc:creator>Anewec</dc:creator>
      <dc:date>2017-04-14T14:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting ArcSight Windows and Linux Logs to Splunk with Splunk Add-ons</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328896#M39385</link>
      <description>&lt;P&gt;did you tried to use an intermediate Forwarder (or also one of the indexers) to receive syslogs from Arcsight (not using Splunk), pre parse logs writing them on a file and then ingest logs from the file using the existing TAs?&lt;BR /&gt;
We used this workaround and runs!&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2017 14:39:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328896#M39385</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-04-14T14:39:42Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting ArcSight Windows and Linux Logs to Splunk with Splunk Add-ons</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328897#M39386</link>
      <description>&lt;P&gt;the data is currently coming to a heavy forwarder also the rsyslog server and then we are forwarding to Splunk. So pre-parse the logs on the HF, re-write to file on the HF before forwarding? Do you have any configurations u can share? Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2017 18:21:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328897#M39386</guid>
      <dc:creator>Anewec</dc:creator>
      <dc:date>2017-04-14T18:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting ArcSight Windows and Linux Logs to Splunk with Splunk Add-ons</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328898#M39387</link>
      <description>&lt;P&gt;We pre parsed logs out of Splunk using a php script and then we ingested in the usual way (TAs).&lt;BR /&gt;
Bye.&lt;BR /&gt;
Giuseppe&lt;/P&gt;</description>
      <pubDate>Sat, 15 Apr 2017 05:42:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328898#M39387</guid>
      <dc:creator>gcusello</dc:creator>
      <dc:date>2017-04-15T05:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting ArcSight Windows and Linux Logs to Splunk with Splunk Add-ons</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328899#M39388</link>
      <description>&lt;P&gt;I'm afraid there's no easy answer to this.&lt;BR /&gt;
There are multiple way to do achieve it.&lt;BR /&gt;
To go the Logger -&amp;gt; Splunk way , syslog and CEF , you probably better start with TA-cef , which will at least parse correctly CEF fields, then you'll have work to map the fields back to something that would mean something, probably focusing on making CIM compliant fields + some additionals for eventcode for exemple.&lt;BR /&gt;
Of course, you can also do a simple regex to change the sourcetype at index time to avoid having only one sourcetype coming from logger. &lt;/P&gt;</description>
      <pubDate>Sat, 15 Apr 2017 13:57:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328899#M39388</guid>
      <dc:creator>maraman_splunk</dc:creator>
      <dc:date>2017-04-15T13:57:39Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting ArcSight Windows and Linux Logs to Splunk with Splunk Add-ons</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328900#M39389</link>
      <description>&lt;P&gt;If you use a connector appliance to manage your ArcSight connectors you can just add a new destination and point it at your Splunk server.&lt;/P&gt;

&lt;P&gt;Add Destination &amp;gt; Create a new destination &amp;gt; Raw Syslog. Enter IP/Host, Port, Protocol (UDP), and select 'false' for metadata.&lt;/P&gt;

&lt;P&gt;Enable a UDP syslog listener on the port you specified for your destination and have Splunk read the file.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://answers.splunk.com/answers/34472/how-to-get-data-data-from-arcsight-connectors.html#answer-218064"&gt;This was my feedback in this similar question&lt;/A&gt; &lt;/P&gt;

&lt;P&gt;I had this configuration working for a transition from arcsight to Splunk. You'll need a little bit of custom parsing on the Splunk side to get everything correct.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2017 21:27:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-ArcSight-Windows-and-Linux-Logs-to-Splunk-with-Splunk/m-p/328900#M39389</guid>
      <dc:creator>dflodstrom</dc:creator>
      <dc:date>2017-10-20T21:27:24Z</dc:date>
    </item>
  </channel>
</rss>

