<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: arbor pravail ddos integration in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155390#M72387</link>
    <description>&lt;P&gt;I was looking at the same today.  To Ayn's point about adding in the field name, I made a few changes (in props.conf) and slightly changed another thing or two.  It seems to be working well thus far.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[arbor_test]
EXTRACT-Extract src_port = (?i) source port (?P&amp;lt;src_port&amp;gt;\d+)
EXTRACT-category = (?i)^(?:[^ ]* ){5}(?P&amp;lt;category&amp;gt;[^ ]+)
EXTRACT-dest_ip = (?i) destination (?P&amp;lt;dest_ip&amp;gt;[^ ]+)
EXTRACT-signature = (?i) by (?P&amp;lt;signature&amp;gt;\w+\s+\w+)
EXTRACT-src_ip = (?i) host (?P&amp;lt;src_ip&amp;gt;[^ ]+)
EXTRACT-action = (?i) .*?: (?P&amp;lt;action&amp;gt;\w+)(?= )
EXTRACT-dest_port = (?i) .*?/(?P&amp;lt;dest_port&amp;gt;\d+)(?= )
EXTRACT-url = (?i),URL: (?P&amp;lt;url&amp;gt;.+)
EXTRACT-arbor_signature = (?i) by (?P&amp;lt;arbor_signature&amp;gt;.+?)\s+\w+\s+\d+
&lt;/CODE&gt;&lt;/PRE&gt;</description>
    <pubDate>Thu, 17 Sep 2015 05:26:36 GMT</pubDate>
    <dc:creator>mparks11</dc:creator>
    <dc:date>2015-09-17T05:26:36Z</dc:date>
    <item>
      <title>arbor pravail ddos integration</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155386#M72383</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;
i am Developing an app for integrating arbor  pravail ddos logs.  Extracted the fields and mapped to CIM. but when i am trying to access from security app dashboard, no reports are shown.&lt;/P&gt;

&lt;P&gt;sample log&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Oct  2 04:05:32 10.1.1.1 ddos pravail: Blocked Host: Blocked host 192.168.1.1 at 04:05 by TLS Attack Prevention using TCP/443 (HTTPS) destination 172.16.1.1 URL: &lt;A href="https://internalurl" target="test_blank"&gt;https://internalurl&lt;/A&gt;
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;props.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[arbor_test]
EXTRACT-category = (?i)^(?:[^ ]* ){5}(?P[^ ]+)
EXTRACT-dest = (?i) destination (?P[^,]+)
EXTRACT-dvc = (?i)^(?:[^ ]* ){4}(?P[^ ]+)
EXTRACT-signature = (?i) by (?P\w+\s+\w+)
EXTRACT-src = (?i) host (?P[^ ]+)
EXTRACT-action = (?i) .*?: (?P\w+)(?= )
EXTRACT-dest_port = (?i) .*?/(?P\d+)(?= )
EXTRACT-url = (?i),URL: (?P.+)
EXTRACT-arbor_signature = (?i) by (?P.+?)\s+\w+\s+\d+
LOOKUP-vendor_info_for_arbor_test = arbor_test_vendor_info_lookup.csv sourcetype OUTPUT ids_type,vendor,product,severity
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Eventtype&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[arbor_test]
search = sourcetype=arbor_test
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Tags&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[eventtype=arbor_test]
attack = enabled
ids = enabled
network = enabled
communicate = enabled
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Lookup&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;sourcetype  vendor  product ids_type    severity
arbor_test  arbor   IPS network critical
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Inputs are welcome.&lt;/P&gt;

&lt;P&gt;Sididqu.T&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 10:20:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155386#M72383</guid>
      <dc:creator>masiddiqu</dc:creator>
      <dc:date>2014-10-08T10:20:52Z</dc:date>
    </item>
    <item>
      <title>Re: arbor pravail ddos integration</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155387#M72384</link>
      <description>&lt;P&gt;I don't see any capture group names in your EXTRACT statements. When you extract fields using EXTRACT, you need to include what field name the matching text should be written to, like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;EXTRACT-foo = (?&amp;lt;somefield&amp;gt;matchingtext)
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The text after EXTRACT (in this case "foo") is not the field name, it's just a unique identifier for your EXTRACT statement.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Oct 2014 10:55:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155387#M72384</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2014-10-08T10:55:47Z</dc:date>
    </item>
    <item>
      <title>Re: arbor pravail ddos integration</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155388#M72385</link>
      <description>&lt;P&gt;@masiddiqu Out of curiousity, have you made any headway with your development? Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2014 22:54:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155388#M72385</guid>
      <dc:creator>dxmiller</dc:creator>
      <dc:date>2014-11-19T22:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: arbor pravail ddos integration</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155389#M72386</link>
      <description>&lt;P&gt;Sididqu;&lt;/P&gt;

&lt;P&gt;Have you completed this app? &lt;BR /&gt;
I too am looking for possible Arbor Pravail integration...&lt;/P&gt;

&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2015 21:29:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155389#M72386</guid>
      <dc:creator>nychawk</dc:creator>
      <dc:date>2015-06-15T21:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: arbor pravail ddos integration</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155390#M72387</link>
      <description>&lt;P&gt;I was looking at the same today.  To Ayn's point about adding in the field name, I made a few changes (in props.conf) and slightly changed another thing or two.  It seems to be working well thus far.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[arbor_test]
EXTRACT-Extract src_port = (?i) source port (?P&amp;lt;src_port&amp;gt;\d+)
EXTRACT-category = (?i)^(?:[^ ]* ){5}(?P&amp;lt;category&amp;gt;[^ ]+)
EXTRACT-dest_ip = (?i) destination (?P&amp;lt;dest_ip&amp;gt;[^ ]+)
EXTRACT-signature = (?i) by (?P&amp;lt;signature&amp;gt;\w+\s+\w+)
EXTRACT-src_ip = (?i) host (?P&amp;lt;src_ip&amp;gt;[^ ]+)
EXTRACT-action = (?i) .*?: (?P&amp;lt;action&amp;gt;\w+)(?= )
EXTRACT-dest_port = (?i) .*?/(?P&amp;lt;dest_port&amp;gt;\d+)(?= )
EXTRACT-url = (?i),URL: (?P&amp;lt;url&amp;gt;.+)
EXTRACT-arbor_signature = (?i) by (?P&amp;lt;arbor_signature&amp;gt;.+?)\s+\w+\s+\d+
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 17 Sep 2015 05:26:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155390#M72387</guid>
      <dc:creator>mparks11</dc:creator>
      <dc:date>2015-09-17T05:26:36Z</dc:date>
    </item>
    <item>
      <title>Re: arbor pravail ddos integration</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155391#M72388</link>
      <description>&lt;P&gt;NETSCOUT Arbor has released an official Splunk Technical Add-On for NETSCOUT Arbor Edge Defense, also for Availability Protection System. Both of these projects were formerly known as Pravail.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://github.com/arbor/TA_netscout_aed"&gt;https://github.com/arbor/TA_netscout_aed&lt;/A&gt;&lt;BR /&gt;
,NETSCOUT Arbor has posted an official Splunk Technical Add-On for NETSCOUT Arbor Edge Defense, also Availability Protection System, both formerly known as Pravail.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://github.com/arbor/TA_netscout_aed"&gt;https://github.com/arbor/TA_netscout_aed&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 21:26:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155391#M72388</guid>
      <dc:creator>wnorthway</dc:creator>
      <dc:date>2019-07-05T21:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: arbor pravail ddos integration</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155392#M72389</link>
      <description>&lt;P&gt;NETSCOUT Arbor has released an official Splunk Technical Add-On for NETSCOUT Arbor Edge Defense, also for Availability Protection System. Both of these projects were formerly known as Pravail.&lt;/P&gt;

&lt;P&gt;&lt;A href="https://github.com/arbor/TA_netscout_aed"&gt;https://github.com/arbor/TA_netscout_aed&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jul 2019 21:27:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155392#M72389</guid>
      <dc:creator>wnorthway</dc:creator>
      <dc:date>2019-07-05T21:27:57Z</dc:date>
    </item>
    <item>
      <title>Re: arbor pravail ddos integration</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155393#M72390</link>
      <description>&lt;P&gt;You need a &lt;CODE&gt;metadata&lt;/CODE&gt; directory with a &lt;CODE&gt;default.meta&lt;/CODE&gt; file that has this in it:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[]
access = read : [ * ], write : [ admin ]
export = system
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Sat, 06 Jul 2019 20:30:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/arbor-pravail-ddos-integration/m-p/155393#M72390</guid>
      <dc:creator>woodcock</dc:creator>
      <dc:date>2019-07-06T20:30:49Z</dc:date>
    </item>
  </channel>
</rss>

