<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302892#M66909</link>
    <description>&lt;P&gt;That’s  rubbish!&lt;BR /&gt;
You may need to change the access policy for your Splunk user so that it has list* and get* permissions on the bucket containing the logs, but there is no reason a bucket in your s3 account can not be retrieved by Splunk with the correct policy settings. &lt;/P&gt;</description>
    <pubDate>Fri, 12 Jan 2018 17:25:09 GMT</pubDate>
    <dc:creator>nickhills</dc:creator>
    <dc:date>2018-01-12T17:25:09Z</dc:date>
    <item>
      <title>Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302890#M66907</link>
      <description>&lt;P&gt;Has anyone been able to successfully setup Cisco Umbrella(OpenDNS, Cloud) and the AWS Splunk Add-on?&lt;/P&gt;

&lt;P&gt;I have setup Cisco Umbrella using the Amazon S3. The bucket is syncing data according to Cisco Umbrella.&lt;BR /&gt;
&lt;A href="https://support.umbrella.com/hc/en-us/articles/115004685266"&gt;https://support.umbrella.com/hc/en-us/articles/115004685266&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;My problems start with the configuration of Splunk Addon Inputs error:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;S3ResponseError: 403 Forbidden &amp;lt;?xml version="1.0" encoding="UTF-8"?&amp;gt; &amp;lt;Error&amp;gt;&amp;lt;Code&amp;gt;AccessDenied&amp;lt;/Code&amp;gt;&amp;lt;Message&amp;gt;Access Denied&amp;lt;/Message&amp;gt;&amp;lt;RequestId&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 11 Jan 2018 20:26:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302890#M66907</guid>
      <dc:creator>kennymann</dc:creator>
      <dc:date>2018-01-11T20:26:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302891#M66908</link>
      <description>&lt;P&gt;After opening a ticket with Cisco Umbrella. This is the answer I received.&lt;/P&gt;

&lt;P&gt;"Hello Kenny,&lt;BR /&gt;
Currently it's not possible to retrieve Cisco managed S3 log files with Splunk. This is due to the restrictive permissions on the bucket itself. The Splunk AWS module expects to be able to list all buckets, which it cannot - as the Cisco Managed buckets are restricted to that singular bucket. However, you can access the logs with the Amazon cli tool. And other third party tools like S3 Browser."&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2018 14:58:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302891#M66908</guid>
      <dc:creator>kennymann</dc:creator>
      <dc:date>2018-01-12T14:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302892#M66909</link>
      <description>&lt;P&gt;That’s  rubbish!&lt;BR /&gt;
You may need to change the access policy for your Splunk user so that it has list* and get* permissions on the bucket containing the logs, but there is no reason a bucket in your s3 account can not be retrieved by Splunk with the correct policy settings. &lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2018 17:25:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302892#M66909</guid>
      <dc:creator>nickhills</dc:creator>
      <dc:date>2018-01-12T17:25:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302893#M66910</link>
      <description>&lt;P&gt;I think he's referring to the Cisco provided S3 instance i.e. managed/owned by Cisco Umbrella service.&lt;/P&gt;</description>
      <pubDate>Wed, 30 May 2018 03:40:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302893#M66910</guid>
      <dc:creator>rajeevlalla</dc:creator>
      <dc:date>2018-05-30T03:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302894#M66911</link>
      <description>&lt;P&gt;Cisco doesn't allow listing on the root of the bucket, and the Splunk AWS app doesn't allow you to type in a bucket_id. Luckily you can manually enter the bucket id in local/inputs.conf. Here is an example that sets a sourcetype compatible  with &lt;A href="https://splunkbase.splunk.com/app/3926/"&gt;TA-cisco-umbrella&lt;/A&gt;. This assumes your S3 bucket is &lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;s3://YOUR-CISCO-S3-BUCKET/YOUR-INCREDIBLY-LONG-FOLDER-NAME&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;Everything in ALL-CAPS should be replaced. Don't forget the trailing slash (/) after the key_name&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[aws_s3://ANY-NAME-YOU-WANT]
start_by_shell = false
aws_account = YOUR-ACCOUNT-NAME-CREATE-IN-UI
sourcetype = opendns:s3
initial_scan_datetime = default
max_items = 100000
max_retries = 3
polling_interval = 30
interval = 30
recursion_depth = -1
character_set = auto
is_secure = True
host_name = s3.amazonaws.com
ct_blacklist = ^$
ct_excluded_events_index =
key_name = YOUR-INCREDIBLY-LONG-FOLDER-NAME/
bucket_name = YOUR-CISCO-S3-BUCKET
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 04 Sep 2018 20:30:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302894#M66911</guid>
      <dc:creator>BonMot</dc:creator>
      <dc:date>2018-09-04T20:30:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302895#M66912</link>
      <description>&lt;P&gt;Hi BonMot,&lt;/P&gt;

&lt;P&gt;Thanks for your post but i tried exactly this and it is still not working? Anything else you can suggest?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Oct 2018 20:26:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302895#M66912</guid>
      <dc:creator>hrithiktej</dc:creator>
      <dc:date>2018-10-12T20:26:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302896#M66913</link>
      <description>&lt;P&gt;Umbrella suport replied to me the same that due to permission issues it is not possible to ingest the logs using this app. So i followed the work around mentioned in this article&lt;/P&gt;

&lt;P&gt;&lt;A href="https://support.umbrella.com/hc/en-us/articles/360001388406-Configuring-Splunk-with-a-Cisco-managed-S3-Bucket"&gt;https://support.umbrella.com/hc/en-us/articles/360001388406-Configuring-Splunk-with-a-Cisco-managed-S3-Bucket&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;and now i have it all working&lt;/P&gt;

&lt;P&gt;his article covers the basics of getting Splunk up and running so it is able to consume the logs from your Cisco-managed S3 bucket. You will:&lt;/P&gt;

&lt;P&gt;1) Set up your Cisco-managed S3 bucket in your dashboard.&lt;/P&gt;

&lt;P&gt;2) Create a cron job to retrieve files from the bucket and store them locally on your server.&lt;/P&gt;

&lt;P&gt;3) Configure Splunk to read from a local directory.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 18:07:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302896#M66913</guid>
      <dc:creator>hrithiktej</dc:creator>
      <dc:date>2018-10-17T18:07:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302897#M66914</link>
      <description>&lt;P&gt;I also tried this with no luck. Logs always show 403 Forbidden. settings are verified by working with s3browser.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jan 2019 22:17:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302897#M66914</guid>
      <dc:creator>david_rose</dc:creator>
      <dc:date>2019-01-17T22:17:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302898#M66915</link>
      <description>&lt;P&gt;@ David rose&lt;/P&gt;

&lt;P&gt;TRY THIS workaround it works&lt;BR /&gt;
The work around mentioned in this article&lt;/P&gt;

&lt;P&gt;&lt;A href="https://support.umbrella.com/hc/en-us/articles/360001388406-Configuring-Splunk-with-a-Cisco-managed-S3-Bucket"&gt;https://support.umbrella.com/hc/en-us/articles/360001388406-Configuring-Splunk-with-a-Cisco-managed-S3-Bucket&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;and now i have it all working&lt;/P&gt;

&lt;P&gt;I am downloading logs onto my syslog servers with a cron job to run after every 10mins and from there i have the splunk reading them.&lt;/P&gt;

&lt;P&gt;If u need help with cron job let me know&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 09:58:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302898#M66915</guid>
      <dc:creator>hrithiktej</dc:creator>
      <dc:date>2019-01-18T09:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302899#M66916</link>
      <description>&lt;P&gt;Thanks.  If I can't use the existing aws add on, i might as well create a modular input.  Just trying not to invent the wheel if I don't have to. &lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 14:34:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302899#M66916</guid>
      <dc:creator>david_rose</dc:creator>
      <dc:date>2019-01-18T14:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302900#M66917</link>
      <description>&lt;P&gt;When you are running this on your Splunk instance is it downloading the csv.gz files?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 14:58:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302900#M66917</guid>
      <dc:creator>hmorales1</dc:creator>
      <dc:date>2019-03-15T14:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302901#M66918</link>
      <description>&lt;P&gt;Yes below are the examples of files getting downloaded, and i am downloading it to my syslog server and then from there the splunk UF reads and forwards to my splunk indexer&lt;/P&gt;

&lt;P&gt;-rw-r--r--. 1 root root  628 Mar 15 14:50 2019-03-15-14-40-2593.csv.gz&lt;BR /&gt;
-rw-r--r--. 1 root root  683 Mar 15 14:50 2019-03-15-14-40-32fa.csv.gz&lt;BR /&gt;
-rw-r--r--. 1 root root  844 Mar 15 14:50 2019-03-15-14-40-7f7d.csv.gz&lt;BR /&gt;
-rw-r--r--. 1 root root  930 Mar 15 14:50 2019-03-15-14-40-b3ab.csv.gz&lt;BR /&gt;
-rw-r--r--. 1 root root  798 Mar 15 14:50 2019-03-15-14-40-dcd8.csv.gz&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 15:01:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302901#M66918</guid>
      <dc:creator>hrithiktej</dc:creator>
      <dc:date>2019-03-15T15:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302902#M66919</link>
      <description>&lt;P&gt;Awesome, I'm getting the same thing!&lt;/P&gt;

&lt;P&gt;Question how are you cleaning these folders up? are you running a cron job?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 15:47:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302902#M66919</guid>
      <dc:creator>hmorales1</dc:creator>
      <dc:date>2019-03-26T15:47:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Umbrella Log Management with  App: Splunk Add-on for AWS</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302903#M66920</link>
      <description>&lt;P&gt;Nope i manually clean up after every 30 days. You can setup a cron job for 30 days cleanup. Because in umbrella bucket we have set the log retention for 30 days, so if clean up anything it downloads complete 30 days of log folders again, so once anything gets older than 30 days i delete them.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 16:11:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Umbrella-Log-Management-with-App-Splunk-Add-on-for-AWS/m-p/302903#M66920</guid>
      <dc:creator>hrithiktej</dc:creator>
      <dc:date>2019-03-26T16:11:06Z</dc:date>
    </item>
  </channel>
</rss>

