<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120185#M9175</link>
    <description>&lt;P&gt;Luke, &lt;BR /&gt;
Scenario 2 assumes that the SPLUNK output is a common event format for all systems. &lt;/P&gt;

&lt;P&gt;This is not exactly correct because the SPLUNK CEF is different than the ArcSight CEF so you still need special formatting from the SPLUNK output EVEN IF the original Log source was in a CEF format. &lt;/P&gt;

&lt;P&gt;At this point CEF becomes subjective as to which is the correct CEF. &lt;/P&gt;

&lt;P&gt;ArcSight Inc. is considered the originators of the Common Event Format with their flagship SEIM product ArcSight ESM. From there came a lot of copycats of which SPLUNK was one of them. &lt;/P&gt;

&lt;P&gt;SPLUNK CEF does not follow the same standard as ArcSight CEF who originated it. Therefore, special formatting needs to be done in order to make the SPLUNK out put match the ArcSight CEF format thus the reason that the SPLUNK app for CEF was developed.&lt;/P&gt;

&lt;P&gt;The delivery, timing and performance monitoring issues still exist however even when the SPLUNK output is formatted for CEF data.&lt;/P&gt;

&lt;P&gt;The question I have is can SPLUNK app for CEF create a true, clean data stream that can be channeled to Arcsight without all the above mentioned issues?&lt;/P&gt;</description>
    <pubDate>Tue, 24 Feb 2015 16:05:30 GMT</pubDate>
    <dc:creator>jtsapos</dc:creator>
    <dc:date>2015-02-24T16:05:30Z</dc:date>
    <item>
      <title>SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120166#M9156</link>
      <description>&lt;P&gt;According to the SPLUNK App for CEF documentation: &lt;/P&gt;

&lt;P&gt;3) Use the guided search wizard included in the Splunk App for CEF to define what the output will look like in CEF by selecting a data model, mapping data model attributes to fields where necessary (a good amount of this work will be done automatically), creating any new static fields you need, and defining the name of the syslog receiver that will receive the data. &lt;/P&gt;

&lt;H2&gt;4) Using the search description that you defined with the Splunk App for CEF, Splunk Enterprise writes the data in CEF to the syslog receiver you specified, for use by HP ArcSight or another compatible tool.&lt;/H2&gt;

&lt;P&gt;You mention that the SPLUNK app for CEF provides a &lt;STRONG&gt;continuous export of the data&lt;/STRONG&gt; from SPLUNK which sounds great, but the question I have on this is "Do you have to map every event one by one first or is there some way to just get a full export of the SPLUNK data all at once?"&lt;/P&gt;

&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2014 15:16:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120166#M9156</guid>
      <dc:creator>jtsapos</dc:creator>
      <dc:date>2014-11-19T15:16:24Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120167#M9157</link>
      <description>&lt;P&gt;No answer?&lt;BR /&gt;
It seeams that the application is bad and the document doesn't contain lot of information regarding the configuration of the data model&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2015 12:47:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120167#M9157</guid>
      <dc:creator>danje57</dc:creator>
      <dc:date>2015-02-17T12:47:21Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120168#M9158</link>
      <description>&lt;P&gt;Not very encouraging then, is it?&lt;/P&gt;

&lt;P&gt;I'm surprised we cannot get an answer for this SPLUNK app from the SPLUNK team...&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2015 14:33:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120168#M9158</guid>
      <dc:creator>jtsapos</dc:creator>
      <dc:date>2015-02-18T14:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120169#M9159</link>
      <description>&lt;P&gt;I suspect the problem is that people don't understand what this means: "Do you have to map every event one by one first or is there some way to just get a full export of the SPLUNK data all at once?"&lt;/P&gt;

&lt;P&gt;Could you clarify? The app doesn't export a single event but all events within the selected data-model. By event, do you mean data-model?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2015 22:14:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120169#M9159</guid>
      <dc:creator>LukeMurphey</dc:creator>
      <dc:date>2015-02-18T22:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120170#M9160</link>
      <description>&lt;P&gt;By event I mean every event with an event ID. From the description above, it looks like data model is translated into events?&lt;/P&gt;

&lt;P&gt;In any case though, it looks like you create a "search description" within the SPLUNK app for CEF and using that search description SPLUNK Enterprise writes the data in CEF to the Syslog receiver you specify.&lt;/P&gt;

&lt;P&gt;What about other receivers such as Sourcefire, Tripwire, Symantec, Mcafee, etc.?&lt;/P&gt;

&lt;P&gt;SPLUNK app for CEF looks like it may work for Syslog data but I don't know about other different log types.&lt;/P&gt;

&lt;P&gt;Also, I have info from others out in the field regarding the SPLUNK to ArcSight integration:&lt;/P&gt;

&lt;P&gt;"Two things it doesn't seem to address is the timing issues and health monitoring. It's aim is to fix the formatting issues so you can use a standard ArcSight connector in a standard configuration but it doesn't seem to address any other the other issues with relaying events through Splunk. Two of the biggest problems with relaying your events through Splunk is the timing issues it creates with late events and the lack of device/health monitoring that you would normally have if you were getting it straight from a An ArcSight connector. I can elaborate further if needed but it is my understanding that the Splunk CEF app only addresses formatting it doesn't address delivery, event time or health monitoring issues which plague that configuration."&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 14:42:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120170#M9160</guid>
      <dc:creator>jtsapos</dc:creator>
      <dc:date>2015-02-19T14:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120171#M9161</link>
      <description>&lt;P&gt;I think that the documentation is not enough detailled.&lt;/P&gt;

&lt;P&gt;1) Splunk App for CEF (SACEF)&lt;/P&gt;

&lt;P&gt;Normally the goal of this application, if I'm correct, will be to translate data from incoming data received by Splunk, using a Data Modal, wich is a query in the Splunk database, that select event we want to translate into CEF format. This CEF format is then sent to a syslog server or an ArcSight Connector.&lt;/P&gt;

&lt;P&gt;The main problem I think here, is that we need to create a Data Model for all logs to send via CEF format.&lt;/P&gt;

&lt;P&gt;I mean, we have to indicate to SACEF all datasource to translate into the CEF format. This mean that we need to modify the Data Model for each new sourcetype we want to translate in to CEF.&lt;/P&gt;

&lt;P&gt;I'm correct?&lt;/P&gt;

&lt;P&gt;2) Receiving CEF into Splunk&lt;/P&gt;

&lt;P&gt;Now, I'll be surprise how to configure Splunk to receive and understand logs from CEF flow, such as from ArcSight Connector or ArcSight Logger?&lt;/P&gt;

&lt;P&gt;I found this Splunk App ==&amp;gt; &lt;A href="https://apps.splunk.com/app/487/"&gt;https://apps.splunk.com/app/487/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;But again a think the document is not enough detailled ... &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;  Where to install it? (on the Indexer? on the head search? on the Universal Forwarder?&lt;/P&gt;

&lt;P&gt;Lot of application or network security devices work with CEF syslog flow. I'm surprise that Splunk doesn't have a document that describe how to configure it...&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 15:10:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120171#M9161</guid>
      <dc:creator>danje57</dc:creator>
      <dc:date>2015-02-19T15:10:35Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120172#M9162</link>
      <description>&lt;P&gt;From your comment above: "I mean, we have to indicate to SACEF all data sources to translate into the CEF format. This mean that we need to modify the Data Model for each new sourcetype we want to translate in to CEF."&lt;/P&gt;

&lt;P&gt;Even if you can somehow get these data models configured correctly you still have timing and delivery issues as well as health monitoring issues...&lt;/P&gt;

&lt;P&gt;For security monitoring you cannot sacrifice accurate event times or correct delivery of events. You will have loss of data integrity which is unacceptable when reporting security events.&lt;/P&gt;

&lt;P&gt;Is there any way that SPLUNK can look at some of these data integrity issues when trying to integrate with ArcSight?&lt;/P&gt;

&lt;P&gt;Does the SPLUNK team agree or disagree that there are data integrity issues with the SPLUNK ---&amp;gt; ArcSight integration?&lt;/P&gt;

&lt;P&gt;Any feedback is appreciated.. Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 15:23:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120172#M9162</guid>
      <dc:creator>jtsapos</dc:creator>
      <dc:date>2015-02-19T15:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120173#M9163</link>
      <description>&lt;P&gt;Yes, I agree.&lt;/P&gt;

&lt;P&gt;I read a doc that explain how to use a heavy forwarder for such thing... but it doesn't support CEF...&lt;/P&gt;

&lt;P&gt;I don't know if a Splunk Professional Service read the forum to explain how to deal with this difficulties...&lt;/P&gt;</description>
      <pubDate>Thu, 19 Feb 2015 15:52:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120173#M9163</guid>
      <dc:creator>danje57</dc:creator>
      <dc:date>2015-02-19T15:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120174#M9164</link>
      <description>&lt;P&gt;I'm confused on why you would use Splunk App for CEF as well as the CIM extraction utilities. Are you saying that you just want to ingest CEF events into Splunk and then send them on to another device (in the same format)?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2015 07:46:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120174#M9164</guid>
      <dc:creator>LukeMurphey</dc:creator>
      <dc:date>2015-02-20T07:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120175#M9165</link>
      <description>&lt;P&gt;BTW: if that is the case, I think a much simpler solution exists. I'll provide an answer if you confirm that is the scenario you are looking to fulfill.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2015 07:47:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120175#M9165</guid>
      <dc:creator>LukeMurphey</dc:creator>
      <dc:date>2015-02-20T07:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120176#M9166</link>
      <description>&lt;P&gt;Hi Luke,&lt;/P&gt;

&lt;P&gt;Yes, this is a first use case.&lt;/P&gt;

&lt;P&gt;Another one should be sending logs that are not in cef format. Transforming logs that are not in cef and send it to arcsight in a cef format.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2015 08:35:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120176#M9166</guid>
      <dc:creator>danje57</dc:creator>
      <dc:date>2015-02-20T08:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120177#M9167</link>
      <description>&lt;P&gt;Yes, as danje57 explains below. &lt;/P&gt;

&lt;P&gt;The goal is to take the SPLUNK output and send it to ArcSight for correlation and monitoring.&lt;/P&gt;

&lt;P&gt;Do you have a better way to do this without using the SPLUNK cef app?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Feb 2015 12:26:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120177#M9167</guid>
      <dc:creator>jtsapos</dc:creator>
      <dc:date>2015-02-20T12:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120178#M9168</link>
      <description>&lt;P&gt;There are two scenarios here that are similar but need a different solution. Basically, the difference between the two scenarios is whether or not the events are already in CEF format. If they are received in CEF format, then the Splunk App for CEF is unnecessary since no translation is necessary to make the events into CEF format.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Scenario 1: CEF data needs translation&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;In this scenario, logs need to be forwarded to a device that accepts CEF but the log themselves are not CEF. Thus, they need to be translated into CEF. It would look something like this:&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/154i20B5B40D215C8A7C/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;Recommended solution:&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;Use the Splunk App for CEF. You need to use the app for CEF because the files are not in CEF format and thus needs to be translated into CEF. CEF does not support arbitrary fields (like Splunk allows). Thus, you need to know all of the fields that you want to export and assign them to CEF fields. This is why the app uses data-models. Data-models require you to know what the fields are beforehand and knowing the fields beforehand is necessary in order to make a valid CEF event.&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;Scenario 2: CEF data does not need translation (because it started out in CEF format)&lt;/STRONG&gt;&lt;/P&gt;

&lt;P&gt;In this scenario, the logs are generated in CEF and provided to Splunk but they need to be forwarded to a device that accepts CEF. Thus, no translation is necessary. It would look something like this:&lt;/P&gt;

&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/155iBDD6A33D84E60A05/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;&lt;EM&gt;Recommended solution:&lt;/EM&gt;&lt;/P&gt;

&lt;P&gt;Use &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/admin/Outputsconf"&gt;outputs.conf&lt;/A&gt; to forward the events on to the destination device. In this case, the Splunk App for CEF is unnecessary because no translation step is required since the events are already CEF events.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Feb 2015 09:19:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120178#M9168</guid>
      <dc:creator>LukeMurphey</dc:creator>
      <dc:date>2015-02-21T09:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120179#M9169</link>
      <description>&lt;P&gt;Ok, I think I see what you mean now. Just added an answer outlining the two use cases.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Feb 2015 09:20:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120179#M9169</guid>
      <dc:creator>LukeMurphey</dc:creator>
      <dc:date>2015-02-21T09:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120180#M9170</link>
      <description>&lt;P&gt;Hi, thanks -- that helps me understand the question.&lt;/P&gt;

&lt;P&gt;1) The app works by modeling data that has been received into Splunk and then emitting a CEF formatted stream. Its functionality hasn't got anything to do with event IDs, at least as we understand them.&lt;BR /&gt;
2) If your receiver doesn't want CEF over syslog, then you probably don't need this app, and can use Splunk's native syslog output or outputcsv or pull from one of our APIs instead. You may still find the app handy as an example of how you can manipulate data for such an output though.&lt;BR /&gt;
3) I agree that the app is not intended or designed for that purpose. A better way to handle such a use case is to do it in Splunk directly and pass the results to the next system down the pipeline.&lt;/P&gt;</description>
      <pubDate>Sun, 22 Feb 2015 00:50:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120180#M9170</guid>
      <dc:creator>jcoates_splunk</dc:creator>
      <dc:date>2015-02-22T00:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120181#M9171</link>
      <description>&lt;P&gt;Thank you, I've updated the docs to try and clarify the point of confusion about what App for CEF does.&lt;/P&gt;

&lt;P&gt;It's not accurate to say that you need to alter your data model for every sourcetype that you want to send... rather you might add a transform to that sourcetype. Much of the time, you'll find that this is already done because the Add-on or App that helped gather the data is Common Information Model compliant. An example might help:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;You install the Windows Add-on, the CIM, and the App for CEF... now you've got several data models for concepts like Authentication and Change Analysis, and you can use the App for CEF to just grab any Change Analysis events and send them to on your SIEM.&lt;/LI&gt;
&lt;LI&gt;Then you install the Cisco ASA Add-on, and since it's CIM-compliant too, any reconfigurations to your ASA devices also get caught by the Change Analysis model and sent to the SIEM.&lt;/LI&gt;
&lt;LI&gt;Then you install the Oracle Database Add-on, same thing...&lt;/LI&gt;
&lt;LI&gt;Then you point it at your home-grown middleware... and you just need to tag the change analysis events to have the same thing happen.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Sun, 22 Feb 2015 01:05:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120181#M9171</guid>
      <dc:creator>jcoates_splunk</dc:creator>
      <dc:date>2015-02-22T01:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120182#M9172</link>
      <description>&lt;P&gt;Spot on and thank you.&lt;/P&gt;</description>
      <pubDate>Sun, 22 Feb 2015 01:07:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120182#M9172</guid>
      <dc:creator>jcoates_splunk</dc:creator>
      <dc:date>2015-02-22T01:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120183#M9173</link>
      <description>&lt;P&gt;Luke,&lt;BR /&gt;
Probably scenario 1 is what we are looking at when talking about logs from IDS, Firewalls, Mcafee, Windows, etc. So translation is probably necessary however even with this we still have the problem of delivery, timing and performance monitoring.&lt;/P&gt;

&lt;P&gt;I have feedback from others out in the field regarding the SPLUNK to ArcSight integration:&lt;/P&gt;

&lt;P&gt;"Two things it doesn't seem to address is the timing issues and health monitoring. It's aim is to fix the formatting issues so you can use a standard ArcSight connector in a standard configuration but it doesn't seem to address any other the other issues with relaying events through Splunk. &lt;/P&gt;

&lt;P&gt;Two of the biggest problems with relaying your events through Splunk is the timing issues it creates with late events and the lack of device/health monitoring that you would normally have if you were getting it straight from a An ArcSight connector. &lt;/P&gt;

&lt;P&gt;I can elaborate further if needed but it is my understanding that the Splunk CEF app only addresses formatting it doesn't address delivery, event time or health monitoring issues which plague that configuration."&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2015 15:07:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120183#M9173</guid>
      <dc:creator>jtsapos</dc:creator>
      <dc:date>2015-02-23T15:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120184#M9174</link>
      <description>&lt;P&gt;With all these additional steps required to finally get something over to ArcSight for correlation, you can imagine there must be some loss of data integrity somewhere along the way.&lt;/P&gt;

&lt;P&gt;I have feedback from others out in the field regarding the SPLUNK to ArcSight integration:&lt;/P&gt;

&lt;P&gt;"Two things it doesn't seem to address is the timing issues and health monitoring. It's aim is to fix the formatting issues so you can use a standard ArcSight connector in a standard configuration but it doesn't seem to address any other the other issues with relaying events through Splunk.&lt;/P&gt;

&lt;P&gt;Two of the biggest problems with relaying your events through Splunk is the timing issues it creates with late events and the lack of device/health monitoring that you would normally have if you were getting it straight from a An ArcSight connector.&lt;/P&gt;

&lt;P&gt;I can elaborate further if needed but it is my understanding that the Splunk CEF app only addresses formatting it doesn't address delivery, event time or health monitoring issues which plague that configuration."&lt;/P&gt;

&lt;P&gt;For security monitoring you cannot sacrifice accurate event times or correct delivery of events. You will have loss of data integrity which is unacceptable when reporting security events.&lt;/P&gt;

&lt;P&gt;Is there any way that SPLUNK can look at some of these data integrity issues when trying to integrate with ArcSight?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2015 15:28:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120184#M9174</guid>
      <dc:creator>jtsapos</dc:creator>
      <dc:date>2015-02-23T15:28:59Z</dc:date>
    </item>
    <item>
      <title>Re: SPLUNK App for CEF: Do you have to map every event one by one or is there a way to get a full export of Splunk data all at once?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120185#M9175</link>
      <description>&lt;P&gt;Luke, &lt;BR /&gt;
Scenario 2 assumes that the SPLUNK output is a common event format for all systems. &lt;/P&gt;

&lt;P&gt;This is not exactly correct because the SPLUNK CEF is different than the ArcSight CEF so you still need special formatting from the SPLUNK output EVEN IF the original Log source was in a CEF format. &lt;/P&gt;

&lt;P&gt;At this point CEF becomes subjective as to which is the correct CEF. &lt;/P&gt;

&lt;P&gt;ArcSight Inc. is considered the originators of the Common Event Format with their flagship SEIM product ArcSight ESM. From there came a lot of copycats of which SPLUNK was one of them. &lt;/P&gt;

&lt;P&gt;SPLUNK CEF does not follow the same standard as ArcSight CEF who originated it. Therefore, special formatting needs to be done in order to make the SPLUNK out put match the ArcSight CEF format thus the reason that the SPLUNK app for CEF was developed.&lt;/P&gt;

&lt;P&gt;The delivery, timing and performance monitoring issues still exist however even when the SPLUNK output is formatted for CEF data.&lt;/P&gt;

&lt;P&gt;The question I have is can SPLUNK app for CEF create a true, clean data stream that can be channeled to Arcsight without all the above mentioned issues?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2015 16:05:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/SPLUNK-App-for-CEF-Do-you-have-to-map-every-event-one-by-one-or/m-p/120185#M9175</guid>
      <dc:creator>jtsapos</dc:creator>
      <dc:date>2015-02-24T16:05:30Z</dc:date>
    </item>
  </channel>
</rss>

