<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Does the Splunk Add-on for Check Point OPSEC LEA support the CPLogToSyslog format? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Does-the-Splunk-Add-on-for-Check-Point-OPSEC-LEA-support-the/m-p/384368#M46757</link>
    <description>&lt;P&gt;per CP Solution ID, sk11539: How to export Check Point logs to a Syslog server using CPLogToSyslog. I've configured our management server to send FW logs to syslogd, but the current Add-on for Check Point OPSEC LEA v4.3.1 does not appear to support the new log format. This also prevents us from normalizing the syslog data to support the Common Information Model for Enterprise Security. &lt;/P&gt;

&lt;P&gt;Does anyone happen to have an ETA to fully support this new log format? &lt;/P&gt;

&lt;P&gt;Here is an example of the two formats.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;sourcetype=opsec&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;time=1533315360|loc=1280|fileid=1533279600|action=accept|orig=192.168.1.201|i/f_dir=inbound|i/f_name=eth0|has_accounting=0|logId=0|log_type=connection|log_sequence_num=1|is_first_for_luuid=131072|log_version=5|origin_sic_name=cn=cp_mgmt,o=gw-e0c5cb..8ah3wt|uuid=&amp;lt;5b648920,00000000,c901a8c0,c0000002&amp;gt;|product=VPN-1 &amp;amp; FireWall-1|__policy_id_tag=product=VPN-1 &amp;amp; FireWall-1[db_tag={1866F03E-955A-2C4C-91BD-22FA52339AB9};mgmt=gw-e0c5cb;date=1532556482;policy_name=Standard]|inzone=Internal|outzone=Local|service_id=FW1_lea|src=192.168.1.250|s_port=46108|dst=192.168.1.201|service=18184|proto=tcp|match_id=2|match_table.match_id=2|layer_uuid=8a5e96fb-c793-457f-b78f-c667074223a5|match_table.layer_uuid=8a5e96fb-c793-457f-b78f-c667074223a5|layer_name=Network|match_table.layer_name=Network|rule_uid=88caafe8-df4c-4239-9087-75a612de2c9b|match_table.rule_uid=88caafe8-df4c-4239-9087-75a612de2c9b|rule_name=Splunk LEA|match_table.rule_name=Splunk LEA|rule_action=2|match_table.rule_action=2|parent_rule=0|match_table.parent_rule=0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;sourcetype=syslog.opsec&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Aug  3 10:00:21 192.168.1.201  Fri Aug  3 10:00:21  Log host CPLogToSyslog:  ContentVersion: 5; Uuid: {0x5b648a23,0x0,0xc901a8c0,0xc0000001}; SequenceNum: 1; Flags: 49152; Action: accept; Origin: 192.168.1.201; IfDir: &amp;lt;; InterfaceName: eth0; Alert: ; LogId: 0; OriginSicName: cn=cp_mgmt,o=gw-e0c5cb..8ah3wt; OriginSicName: cn=cp_mgmt,o=gw-e0c5cb..8ah3wt; log_type: connection; is_first_for_luuid: 131072; inzone: Local; outzone: Internal; service_id: cp_udp_85FA60B6_96D2_4AD7_ABCE_61C392C2F3F1; src: 192.168.1.201; dst: 192.168.1.250; proto: 17; match_id: 3; match_table.match_id: 3; layer_uuid: 8a5e96fb-c793-457f-b78f-c667074223a5; match_table.layer_uuid: 8a5e96fb-c793-457f-b78f-c667074223a5; layer_name: Network; match_table.layer_name: Network; rule_uid: 725d9a70-e3a2-4e3f-b313-737c6d53c754; match_table.rule_uid: 725d9a70-e3a2-4e3f-b313-737c6d53c754; rule_name: SIEM logging; match_table.rule_name: SIEM logging; rule_action: 2; match_table.rule_action: 2; parent_rule: 0; match_table.parent_rule: 0; aba_customer: SMC User; date: 3Aug2018; hour: 10:00:19; type: connection; Interface: &amp;gt; eth0; ProductName: VPN-1 &amp;amp; FireWall-1; svc: 9514; sport_svc: 53164;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Using simple field extractions, we've been able to identify all the notable fields, but I'm sure there's a bit more that's required here.&lt;/P&gt;

&lt;P&gt;Sample current props + transforms&lt;BR /&gt;
&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[syslog.opsec]
REPORT-extractfields = extract_opsec_fields
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[extract_opsec_fields]
DELIMS = ";", ":"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Fri, 03 Aug 2018 17:13:55 GMT</pubDate>
    <dc:creator>georgen_splunk</dc:creator>
    <dc:date>2018-08-03T17:13:55Z</dc:date>
    <item>
      <title>Does the Splunk Add-on for Check Point OPSEC LEA support the CPLogToSyslog format?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Does-the-Splunk-Add-on-for-Check-Point-OPSEC-LEA-support-the/m-p/384368#M46757</link>
      <description>&lt;P&gt;per CP Solution ID, sk11539: How to export Check Point logs to a Syslog server using CPLogToSyslog. I've configured our management server to send FW logs to syslogd, but the current Add-on for Check Point OPSEC LEA v4.3.1 does not appear to support the new log format. This also prevents us from normalizing the syslog data to support the Common Information Model for Enterprise Security. &lt;/P&gt;

&lt;P&gt;Does anyone happen to have an ETA to fully support this new log format? &lt;/P&gt;

&lt;P&gt;Here is an example of the two formats.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;sourcetype=opsec&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;time=1533315360|loc=1280|fileid=1533279600|action=accept|orig=192.168.1.201|i/f_dir=inbound|i/f_name=eth0|has_accounting=0|logId=0|log_type=connection|log_sequence_num=1|is_first_for_luuid=131072|log_version=5|origin_sic_name=cn=cp_mgmt,o=gw-e0c5cb..8ah3wt|uuid=&amp;lt;5b648920,00000000,c901a8c0,c0000002&amp;gt;|product=VPN-1 &amp;amp; FireWall-1|__policy_id_tag=product=VPN-1 &amp;amp; FireWall-1[db_tag={1866F03E-955A-2C4C-91BD-22FA52339AB9};mgmt=gw-e0c5cb;date=1532556482;policy_name=Standard]|inzone=Internal|outzone=Local|service_id=FW1_lea|src=192.168.1.250|s_port=46108|dst=192.168.1.201|service=18184|proto=tcp|match_id=2|match_table.match_id=2|layer_uuid=8a5e96fb-c793-457f-b78f-c667074223a5|match_table.layer_uuid=8a5e96fb-c793-457f-b78f-c667074223a5|layer_name=Network|match_table.layer_name=Network|rule_uid=88caafe8-df4c-4239-9087-75a612de2c9b|match_table.rule_uid=88caafe8-df4c-4239-9087-75a612de2c9b|rule_name=Splunk LEA|match_table.rule_name=Splunk LEA|rule_action=2|match_table.rule_action=2|parent_rule=0|match_table.parent_rule=0
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;sourcetype=syslog.opsec&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Aug  3 10:00:21 192.168.1.201  Fri Aug  3 10:00:21  Log host CPLogToSyslog:  ContentVersion: 5; Uuid: {0x5b648a23,0x0,0xc901a8c0,0xc0000001}; SequenceNum: 1; Flags: 49152; Action: accept; Origin: 192.168.1.201; IfDir: &amp;lt;; InterfaceName: eth0; Alert: ; LogId: 0; OriginSicName: cn=cp_mgmt,o=gw-e0c5cb..8ah3wt; OriginSicName: cn=cp_mgmt,o=gw-e0c5cb..8ah3wt; log_type: connection; is_first_for_luuid: 131072; inzone: Local; outzone: Internal; service_id: cp_udp_85FA60B6_96D2_4AD7_ABCE_61C392C2F3F1; src: 192.168.1.201; dst: 192.168.1.250; proto: 17; match_id: 3; match_table.match_id: 3; layer_uuid: 8a5e96fb-c793-457f-b78f-c667074223a5; match_table.layer_uuid: 8a5e96fb-c793-457f-b78f-c667074223a5; layer_name: Network; match_table.layer_name: Network; rule_uid: 725d9a70-e3a2-4e3f-b313-737c6d53c754; match_table.rule_uid: 725d9a70-e3a2-4e3f-b313-737c6d53c754; rule_name: SIEM logging; match_table.rule_name: SIEM logging; rule_action: 2; match_table.rule_action: 2; parent_rule: 0; match_table.parent_rule: 0; aba_customer: SMC User; date: 3Aug2018; hour: 10:00:19; type: connection; Interface: &amp;gt; eth0; ProductName: VPN-1 &amp;amp; FireWall-1; svc: 9514; sport_svc: 53164;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Using simple field extractions, we've been able to identify all the notable fields, but I'm sure there's a bit more that's required here.&lt;/P&gt;

&lt;P&gt;Sample current props + transforms&lt;BR /&gt;
&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[syslog.opsec]
REPORT-extractfields = extract_opsec_fields
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[extract_opsec_fields]
DELIMS = ";", ":"
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Fri, 03 Aug 2018 17:13:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Does-the-Splunk-Add-on-for-Check-Point-OPSEC-LEA-support-the/m-p/384368#M46757</guid>
      <dc:creator>georgen_splunk</dc:creator>
      <dc:date>2018-08-03T17:13:55Z</dc:date>
    </item>
    <item>
      <title>Re: Does the Splunk Add-on for Check Point OPSEC LEA support the CPLogToSyslog format?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Does-the-Splunk-Add-on-for-Check-Point-OPSEC-LEA-support-the/m-p/384369#M46758</link>
      <description>&lt;P&gt;an Enhancement request has been filed with our Products team to support this new format in the future, please open a Support case and reference  ADDON-18988 for current status. &lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 18:43:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Does-the-Splunk-Add-on-for-Check-Point-OPSEC-LEA-support-the/m-p/384369#M46758</guid>
      <dc:creator>georgen_splunk</dc:creator>
      <dc:date>2018-08-03T18:43:51Z</dc:date>
    </item>
    <item>
      <title>Re: Does the Splunk Add-on for Check Point OPSEC LEA support the CPLogToSyslog format?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Does-the-Splunk-Add-on-for-Check-Point-OPSEC-LEA-support-the/m-p/384370#M46759</link>
      <description>&lt;P&gt;There is an app that supports using Check Point log exporter (sk122323, sending logs via syslog): &lt;A href="https://splunkbase.splunk.com/app/4180"&gt;https://splunkbase.splunk.com/app/4180&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;This should allow you to collect logs via syslog and have them normalized to the CIM. &lt;/P&gt;</description>
      <pubDate>Fri, 28 Sep 2018 12:54:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Does-the-Splunk-Add-on-for-Check-Point-OPSEC-LEA-support-the/m-p/384370#M46759</guid>
      <dc:creator>tkopchak</dc:creator>
      <dc:date>2018-09-28T12:54:04Z</dc:date>
    </item>
  </channel>
</rss>

