<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Indexing Huawei Firewall device logs into Splunk in Deployment Architecture</title>
    <link>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/526169#M18133</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/58363"&gt;@eidil&lt;/a&gt;&amp;nbsp;.. some devices, like cisco firewall, will have apps/add-ons, technical addons, etc,.. they are generally created by Splunk or Device owners themselves/or some Splunk Consultants, Engineers, Developers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;in the same way, some devices,..generally new or not famous devices, i know &lt;SPAN&gt;huawei devices are famous, but it may happen at times that, these devices may not have&lt;/SPAN&gt;&amp;nbsp;addons on SplunkBase.&amp;nbsp;&lt;/P&gt;&lt;P&gt;so, the alternative approaches are - As&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;suggested clearly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As per understanding, firewall devices are good candidate for Syslog - Splunk integration.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 23 Oct 2020 04:39:01 GMT</pubDate>
    <dc:creator>inventsekar</dc:creator>
    <dc:date>2020-10-23T04:39:01Z</dc:date>
    <item>
      <title>Indexing Huawei Firewall device logs into Splunk</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/525964#M18126</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to ingest huawei USG6650 device logs but it seems that no app is available in splunk base for this purpose. Is there any other way/guide for this?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 04:49:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/525964#M18126</guid>
      <dc:creator>eidil</dc:creator>
      <dc:date>2020-10-22T04:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Huawei Firewall device logs into Splunk</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/526040#M18131</link>
      <description>&lt;P&gt;There are several ways to get data into Splunk.&lt;/P&gt;&lt;P&gt;1) Install a Universal Forwarder on the device to send logs to Splunk&lt;/P&gt;&lt;P&gt;2) Have the device send syslog events to Splunk via rsyslog, syslog-ng, or Splunk Connect for Syslog&lt;/P&gt;&lt;P&gt;3) Write a script that uses the device's API to extract data and index it in Splunk&lt;/P&gt;&lt;P&gt;4) Use Splunk DB Connect to extract data from the device's SQL database&lt;/P&gt;&lt;P&gt;5) Have the device send events directly to Splunk using HTTP Event Collector (HEC)&lt;/P&gt;&lt;P&gt;Which one you use will depend on the device and it's capabilities.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 14:05:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/526040#M18131</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-10-22T14:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Huawei Firewall device logs into Splunk</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/526157#M18132</link>
      <description>&lt;P&gt;Sorry for the confusion, but my intention is to know how the huawei device data can be indexed in splunk and populated with important fields/formats that can be used for such as ESS app.&lt;/P&gt;&lt;P&gt;seems that for cisco appliances, you can use TA-cisco-app for the logs to be populated with important fields. Any alternatives for huawei devices?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2020 01:45:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/526157#M18132</guid>
      <dc:creator>eidil</dc:creator>
      <dc:date>2020-10-23T01:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Huawei Firewall device logs into Splunk</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/526169#M18133</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/58363"&gt;@eidil&lt;/a&gt;&amp;nbsp;.. some devices, like cisco firewall, will have apps/add-ons, technical addons, etc,.. they are generally created by Splunk or Device owners themselves/or some Splunk Consultants, Engineers, Developers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;in the same way, some devices,..generally new or not famous devices, i know &lt;SPAN&gt;huawei devices are famous, but it may happen at times that, these devices may not have&lt;/SPAN&gt;&amp;nbsp;addons on SplunkBase.&amp;nbsp;&lt;/P&gt;&lt;P&gt;so, the alternative approaches are - As&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/213957"&gt;@richgalloway&lt;/a&gt;&amp;nbsp;suggested clearly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As per understanding, firewall devices are good candidate for Syslog - Splunk integration.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2020 04:39:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/526169#M18133</guid>
      <dc:creator>inventsekar</dc:creator>
      <dc:date>2020-10-23T04:39:01Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Huawei Firewall device logs into Splunk</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/526218#M18136</link>
      <description>Yes, and I listed five such alternatives. In each, however, you must extract fields yourself.</description>
      <pubDate>Fri, 23 Oct 2020 12:43:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/526218#M18136</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-10-23T12:43:39Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Huawei Firewall device logs into Splunk</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/759672#M29871</link>
      <description>&lt;P&gt;Regarding the same topic, please, for Huawei equipment, is there no automatic method or recommended method for parsing?&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2026 20:27:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/759672#M29871</guid>
      <dc:creator>nedra</dc:creator>
      <dc:date>2026-03-25T20:27:40Z</dc:date>
    </item>
    <item>
      <title>Re: Indexing Huawei Firewall device logs into Splunk</title>
      <link>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/759688#M29878</link>
      <description>&lt;P&gt;Existence of pre-made add-ons depends highly on the solution importance/popularity/market share etc.&lt;/P&gt;&lt;P&gt;Vendors will invest their time and resources into supporting a solution only if it's "significant" enough. People will make community-driven add-ons only if the solution is popular enough (and they are not bound by some contractual clauses so that even if they create something in-house they cannot share it).&lt;/P&gt;&lt;P&gt;This is true for every product on the market, regardless of whether we're talking in Splunk's context or any other product.&lt;/P&gt;&lt;P&gt;So apparently this is one of the solutions that didn't hit the threshold of popularity/importance so no ready-made solutions exist.&lt;/P&gt;&lt;P&gt;In Splunk's case however you're not limited to out-of-the-box integrations. You can do stuff manually even if ready-made solutions don't exist.&lt;/P&gt;&lt;P&gt;You have two problems to tackle.&lt;/P&gt;&lt;P&gt;First is how to get data from your source (in your case - the firewall) to Splunk. With network equipment it's usually the syslog method. Ingesting syslog is a typical task and there is plethora of information all around the internet about it.&lt;/P&gt;&lt;P&gt;Second is parsing - you have to parse specific fields from the events. This can be more time-consuming to do properly but can be done in several ways - manually using props/transforms, via Splunk's webgui, ussing Add-on Builder...&lt;/P&gt;&lt;P&gt;So it's not that just because there is no ready-made add-on, the data can't be used.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Mar 2026 09:01:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Deployment-Architecture/Indexing-Huawei-Firewall-device-logs-into-Splunk/m-p/759688#M29878</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2026-03-26T09:01:28Z</dc:date>
    </item>
  </channel>
</rss>

