<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Windows Firewall log - Extraction/Transforms? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108129#M7585</link>
    <description>&lt;P&gt;Another interesting item of note, I don't see Transform_Windows_FW listed in the Splunk Web UI on the "Fields » Field transformations" page for the Windows app, yet all of the other items in that transforms.conf file listed in the brackets [] ARE listed. Huh.&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 15:01:47 GMT</pubDate>
    <dc:creator>peterfilardo</dc:creator>
    <dc:date>2020-09-28T15:01:47Z</dc:date>
    <item>
      <title>Windows Firewall log - Extraction/Transforms?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108126#M7582</link>
      <description>&lt;P&gt;We've been logging Windows Firewall activity to the default location on our 2008+ servers, and now, having Splunk, have been monitoring that file. The issue is, the data comes back in a rather unsavory view, each line looking roughly like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2013-10-21 10:58:09 ALLOW TCP 10.200.0.13 10.138.65.9 60318 9997 0 - 0 0 0 - - - SEND
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I suppose my question is about field extraction/transforms, I see that in the last few lines of   \Splunk\etc\apps\windows\default\transforms.conf include the following entry:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;###### Windows Firewall Log ######
[Transform_Windows_FW]

DELIMS = " "

FIELDS  = "date" "time" "action" "protocol" "src-ip" "dst-ip" "src-port" "dst-port" "size" "tcpflags" "tcpsyn" "tcpack" "tcpwin" "icmptype" "icmpcode" "info" "path"
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;This looks very relevant to what I need. I have the Splunk for Windows/Spunk TA for Windows apps deployed to all forwarders/search heads/indexers, I must be missing something easy. Any ideas? Version 6.0 of all components, btw.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2013 19:27:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108126#M7582</guid>
      <dc:creator>peterfilardo</dc:creator>
      <dc:date>2013-10-21T19:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log - Extraction/Transforms?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108127#M7583</link>
      <description>&lt;P&gt;The event looks normal.  Are the fields listed in Transforms not showing up as fields on the left of the search screen?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2013 19:38:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108127#M7583</guid>
      <dc:creator>lukejadamec</dc:creator>
      <dc:date>2013-10-21T19:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log - Extraction/Transforms?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108128#M7584</link>
      <description>&lt;P&gt;Sure, the text comes in exactly as it is in the log, verbatim. And sadly, no, they are not showing up as fields.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2013 19:47:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108128#M7584</guid>
      <dc:creator>peterfilardo</dc:creator>
      <dc:date>2013-10-21T19:47:04Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log - Extraction/Transforms?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108129#M7585</link>
      <description>&lt;P&gt;Another interesting item of note, I don't see Transform_Windows_FW listed in the Splunk Web UI on the "Fields » Field transformations" page for the Windows app, yet all of the other items in that transforms.conf file listed in the brackets [] ARE listed. Huh.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 15:01:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108129#M7585</guid>
      <dc:creator>peterfilardo</dc:creator>
      <dc:date>2020-09-28T15:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log - Extraction/Transforms?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108130#M7586</link>
      <description>&lt;P&gt;Try This:&lt;/P&gt;

&lt;H6&gt;Windows Firewall Log&lt;/H6&gt;

&lt;PRE&gt;&lt;CODE&gt;[Transform_Windows_FW]
DELIMS = "\s"
FIELDS  = date, time, action, protocol, src-ip, dst-ip, src-port, dst-port, size, tcpflags, tcpsyn, tcpack, tcpwin, icmptype, icmpcode, info, path
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;In the search bar, after you have saved this in the transforms.conf, put:&lt;/P&gt;

&lt;P&gt;some search | extract Transform_Windows_FW&lt;/P&gt;

&lt;P&gt;If that works then you can set it up to be automatic in the props.conf&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 15:02:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108130#M7586</guid>
      <dc:creator>ShaneNewman</dc:creator>
      <dc:date>2020-09-28T15:02:00Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log - Extraction/Transforms?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108131#M7587</link>
      <description>&lt;P&gt;Hey that search syntax works perfectly! Now I have to figure out which props.conf to edit...&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2013 16:03:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108131#M7587</guid>
      <dc:creator>peterfilardo</dc:creator>
      <dc:date>2013-10-22T16:03:08Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log - Extraction/Transforms?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108132#M7588</link>
      <description>&lt;P&gt;In the props.conf, create an entry with the name of your sourcetype in brackets&lt;/P&gt;

&lt;P&gt;[sourcetype]&lt;BR /&gt;
EXTRACT-windows_firewall = Transform_Windows_FW&lt;/P&gt;

&lt;P&gt;Once you do this, go to the main URL add "/info"&lt;/P&gt;

&lt;P&gt;The second selection from the bottom is Reload EAI Objects, selecting that will reload all the configs without restarting the instance.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 15:02:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108132#M7588</guid>
      <dc:creator>ShaneNewman</dc:creator>
      <dc:date>2020-09-28T15:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log - Extraction/Transforms?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108133#M7589</link>
      <description>&lt;P&gt;Did that work for you?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2013 03:23:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108133#M7589</guid>
      <dc:creator>ShaneNewman</dc:creator>
      <dc:date>2013-10-24T03:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log - Extraction/Transforms?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108134#M7590</link>
      <description>&lt;P&gt;The DELIMS = "\s" does not work.&lt;BR /&gt;
Changed it to DELIMS = " " and it worked for me.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Mar 2014 17:11:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108134#M7590</guid>
      <dc:creator>aelliott</dc:creator>
      <dc:date>2014-03-10T17:11:17Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log - Extraction/Transforms?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108135#M7591</link>
      <description>&lt;P&gt;I gave this a shot, but didn't quite work.  By default, the forwarder makes the "sourcetype" pfirewall.  Assuming that, would it just be:&lt;BR /&gt;
"[sourcetype]&lt;BR /&gt;
EXTRACT-windows_firewall = Transform_Windows_FW"&lt;BR /&gt;
? &lt;BR /&gt;
I don't understand where the "-windows_firewall" comes from, or what it relates to.&lt;BR /&gt;
Also, the transform above works great, I am just trying to make it automagic using props.conf .&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 06:49:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108135#M7591</guid>
      <dc:creator>b_loveless</dc:creator>
      <dc:date>2020-09-29T06:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log - Extraction/Transforms?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108136#M7592</link>
      <description>&lt;P&gt;visited &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Data/Advancedsourcetypeoverrides"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Data/Advancedsourcetypeoverrides&lt;/A&gt; too, answered a few questions, I asked above... but still doesn't seem to work.  &lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2015 23:29:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108136#M7592</guid>
      <dc:creator>b_loveless</dc:creator>
      <dc:date>2015-07-29T23:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: Windows Firewall log - Extraction/Transforms?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108137#M7593</link>
      <description>&lt;P&gt;You need to use REPORT-windows_firewall not EXTRACT.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Mar 2016 18:58:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Windows-Firewall-log-Extraction-Transforms/m-p/108137#M7593</guid>
      <dc:creator>delink</dc:creator>
      <dc:date>2016-03-28T18:58:17Z</dc:date>
    </item>
  </channel>
</rss>

