<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tenable Json logs are not filtering in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706905#M116894</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;P&gt;&lt;SPAN&gt;in props.conf&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;[tenable:sc:vuln]&lt;BR /&gt;TRANSFORMS-Removetenable_remove_logs = tenable_remove_logs&lt;/P&gt;&lt;P&gt;transforms.conf&lt;/P&gt;&lt;P&gt;[tenable_remove_logs]&lt;BR /&gt;SOURCE_KEY = _raw&lt;BR /&gt;REGEX = ABCSCAN&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Do you have any other TRANSFORMS-&amp;lt;class&amp;gt; or REPORTS-&amp;lt;class&amp;gt; statements in this props?&amp;nbsp; The order of processing could be creating issues.&amp;nbsp; I'm throwing hail marys since I'm at a loss.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Dec 2024 14:29:49 GMT</pubDate>
    <dc:creator>dural_yyz</dc:creator>
    <dc:date>2024-12-16T14:29:49Z</dc:date>
    <item>
      <title>Tenable Json logs are not filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706719#M116866</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I have a tenable json logs, i wrote rex and trying to send the logs to null queue, howevene it is not going to nullqueue,&lt;/P&gt;&lt;P&gt;Sample log is given below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;{&amp;nbsp;[-]&amp;nbsp;&lt;/P&gt;&lt;P&gt;SC_address: X.xx.xx&lt;BR /&gt;acceptRisk: false&lt;BR /&gt;acceptRiskRuleComment:&lt;BR /&gt;acrScore:&lt;BR /&gt;assetExposureScore:&lt;BR /&gt;baseScore:&lt;BR /&gt;bid:&lt;BR /&gt;checkType: summary&lt;BR /&gt;cpe:&lt;BR /&gt;custom_severity: false&lt;BR /&gt;cve:&lt;BR /&gt;cvssV3BaseScore:&lt;BR /&gt;cvssV3TemporalScore:&lt;BR /&gt;cvssV3Vector:&lt;BR /&gt;cvssVector:&lt;BR /&gt;description: This plugin displays, for each tested host, information about the scan itself :&lt;/P&gt;&lt;P&gt;- The version of the plugin set.&lt;BR /&gt;- The type of scanner (Nessus or Nessus Home).&lt;BR /&gt;- The version of the Nessus Engine.&lt;BR /&gt;- The port scanner(s) used.&lt;BR /&gt;- The port range scanned.&lt;BR /&gt;- The ping round trip time&lt;BR /&gt;- Whether credentialed or third-party patch management checks are possible.&lt;BR /&gt;- Whether the display of superseded patches is enabled&lt;BR /&gt;- The date of the scan.&lt;BR /&gt;- The duration of the scan.&lt;BR /&gt;- The number of hosts scanned in parallel.&lt;BR /&gt;- The number of checks done in parallel.&lt;BR /&gt;dnsName: xxxx.xx.xx&lt;BR /&gt;exploitAvailable: No&lt;BR /&gt;exploitEase:&lt;BR /&gt;exploitFrameworks:&lt;BR /&gt;family: { [+]&lt;BR /&gt;}&lt;BR /&gt;firstSeen: X&lt;BR /&gt;hasBeenMitigated: false&lt;BR /&gt;hostUUID:&lt;BR /&gt;hostUniqueness: repositoryID,ip,dnsName&lt;BR /&gt;ip: x.x.x.x&lt;BR /&gt;ips: x.x.x.x&lt;BR /&gt;keyDrivers:&lt;BR /&gt;lastSeen: x&lt;BR /&gt;macAddress:&lt;BR /&gt;netbiosName: x\x&lt;BR /&gt;operatingSystem: Microsoft Windows Server X X X X&lt;BR /&gt;patchPubDate: -1&lt;BR /&gt;pluginID: 19506&lt;BR /&gt;pluginInfo: 19506 (0/6) Nessus Scan Information&lt;BR /&gt;pluginModDate: X&lt;BR /&gt;pluginName: Nessus Scan Information&lt;BR /&gt;pluginPubDate: xx&lt;BR /&gt;pluginText: &amp;lt;plugin_output&amp;gt;Information about this scan :&lt;/P&gt;&lt;P&gt;Nessus version : 10.8.3&lt;BR /&gt;Nessus build : 20010&lt;BR /&gt;Plugin feed version : XX&lt;BR /&gt;Scanner edition used : X&lt;BR /&gt;Scanner OS : X&lt;BR /&gt;Scanner distribution : X-X-X&lt;BR /&gt;Scan type : Normal&lt;BR /&gt;Scan name : ABCSCAN&lt;BR /&gt;Scan policy used : x-161b-x-x-x-x/Internal Scanner 02 - Scan Policy (Windows &amp;amp; Linux)&lt;BR /&gt;Scanner IP : x.x.x.x&lt;BR /&gt;Port scanner(s) : nessus_syn_scanner&lt;BR /&gt;Port range : 1-5&lt;BR /&gt;Ping RTT : 14.438 ms&lt;BR /&gt;Thorough tests : no&lt;BR /&gt;Experimental tests : no&lt;BR /&gt;Scan for Unpatched Vulnerabilities : no&lt;BR /&gt;Plugin debugging enabled : no&lt;BR /&gt;Paranoia level : 1&lt;BR /&gt;Report verbosity : 1&lt;BR /&gt;Safe checks : yes&lt;BR /&gt;Optimize the test : yes&lt;BR /&gt;Credentialed checks : no&lt;BR /&gt;Patch management checks : None&lt;BR /&gt;Display superseded patches : no (supersedence plugin did not launch)&lt;BR /&gt;CGI scanning : disabled&lt;BR /&gt;Web application tests : disabled&lt;BR /&gt;Max hosts : 30&lt;BR /&gt;Max checks : 5&lt;BR /&gt;Recv timeout : 5&lt;BR /&gt;Backports : None&lt;BR /&gt;Allow post-scan editing : Yes&lt;BR /&gt;Nessus Plugin Signature Checking : Enabled&lt;BR /&gt;Audit File Signature Checking : Disabled&lt;BR /&gt;Scan Start Date : x/x/x x&lt;BR /&gt;Scan duration : X sec&lt;BR /&gt;Scan for malware : no&lt;BR /&gt;&amp;lt;/plugin_output&amp;gt;&lt;BR /&gt;plugin_id: xx&lt;BR /&gt;port: 0&lt;BR /&gt;protocol: TCP&lt;BR /&gt;recastRisk: false&lt;BR /&gt;recastRiskRuleComment:&lt;BR /&gt;repository: { [+]&lt;BR /&gt;}&lt;BR /&gt;riskFactor: None&lt;BR /&gt;sc_uniqueness: x_x.x.x.x_xxxx.xx.xx&lt;BR /&gt;seeAlso:&lt;BR /&gt;seolDate: -1&lt;BR /&gt;severity: informational&lt;BR /&gt;severity_description: Informative&lt;BR /&gt;severity_id: 0&lt;BR /&gt;solution:&lt;BR /&gt;state: open&lt;BR /&gt;stigSeverity:&lt;BR /&gt;synopsis: This plugin displays information about the Nessus scan.&lt;BR /&gt;temporalScore:&lt;BR /&gt;uniqueness: repositoryID,ip,dnsName&lt;BR /&gt;uuid: x-x-x-xx-xxx&lt;BR /&gt;vendor_severity: Info&lt;BR /&gt;version: 1.127&lt;BR /&gt;vprContext: []&lt;BR /&gt;vprScore:&lt;BR /&gt;vulnPubDate: -1&lt;BR /&gt;vulnUUID:&lt;BR /&gt;vulnUniqueness: repositoryID,ip,port,protocol,pluginID&lt;BR /&gt;xref:&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in props.conf&lt;/P&gt;&lt;P&gt;[tenable:sc:vuln]&lt;BR /&gt;TRANSFORMS-Removetenable_remove_logs = tenable_remove_logs&lt;/P&gt;&lt;P&gt;transforms.conf&lt;/P&gt;&lt;P&gt;[tenable_remove_logs]&lt;BR /&gt;SOURCE_KEY = _raw&lt;BR /&gt;REGEX = ABCSCAN&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;&lt;P&gt;It is not working. Any solution ?. i have removed&amp;nbsp;&amp;nbsp;SOURCE_KEY later , that is also not working&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 09:21:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706719#M116866</guid>
      <dc:creator>Dilsheer_P</dc:creator>
      <dc:date>2024-12-13T09:21:49Z</dc:date>
    </item>
    <item>
      <title>Re: Tenable Json logs are not filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706721#M116868</link>
      <description>&lt;P&gt;Where you have applied these settings? On an indexer or on a Heavy Forwarder?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 09:32:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706721#M116868</guid>
      <dc:creator>PaulPanther</dc:creator>
      <dc:date>2024-12-13T09:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: Tenable Json logs are not filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706722#M116869</link>
      <description>&lt;P&gt;in Heavy Forwarder&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 09:43:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706722#M116869</guid>
      <dc:creator>Dilsheer_P</dc:creator>
      <dc:date>2024-12-13T09:43:58Z</dc:date>
    </item>
    <item>
      <title>Re: Tenable Json logs are not filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706724#M116870</link>
      <description>&lt;P&gt;Okay, and I guess the data is pulled via the tenable API, right?&lt;/P&gt;&lt;P&gt;Could you try:&lt;/P&gt;&lt;P&gt;transforms.conf&lt;/P&gt;&lt;PRE&gt;&lt;SPAN&gt;[tenable_remove_logs]&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;REGEX = (?m)(ABCSCAN)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;DEST_KEY = queue&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;FORMAT = nullQueue&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;If it is not working I would increase the depth_limit for testing.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 10:15:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706724#M116870</guid>
      <dc:creator>PaulPanther</dc:creator>
      <dc:date>2024-12-13T10:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: Tenable Json logs are not filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706741#M116872</link>
      <description>&lt;P&gt;If you are not familiar with changing depth_limit check out this material.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.3.0/Admin/Limitsconf" target="_blank"&gt;https://docs.splunk.com/Documentation/Splunk/9.3.0/Admin/Limitsconf&lt;/A&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;depth_limit = &amp;lt;integer&amp;gt;
* Limits the amount of resources that are spent by PCRE
  when running patterns that will not match.
* Use this to limit the depth of nested backtracking in an internal PCRE
  function, match(). If set too low, PCRE might fail to correctly match
  a pattern.
* Default: 1000&lt;/LI-CODE&gt;&lt;P&gt;Your match is 1500+ characters into your event.&amp;nbsp; I know you have sanitized it so you need to check your true data to get the right count.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Dec 2024 14:13:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706741#M116872</guid>
      <dc:creator>dural_yyz</dc:creator>
      <dc:date>2024-12-13T14:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: Tenable Json logs are not filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706836#M116887</link>
      <description>&lt;P&gt;I did the changes, it is not working. Still data in indexing&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 07:19:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706836#M116887</guid>
      <dc:creator>Dilsheer_P</dc:creator>
      <dc:date>2024-12-16T07:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: Tenable Json logs are not filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706841#M116888</link>
      <description>&lt;P&gt;I tried this as well and increased the&amp;nbsp;&lt;SPAN&gt;depth_limit as well in limits.conf on HF under tenable addon local directory. still not working&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;[rex]

depth_limit=10000&lt;/LI-CODE&gt;
&lt;P&gt;&lt;SPAN&gt;my character limit is 9450 character total in an event. Still not&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 15:06:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706841#M116888</guid>
      <dc:creator>Dilsheer_P</dc:creator>
      <dc:date>2024-12-16T15:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: Tenable Json logs are not filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706905#M116894</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;P&gt;&lt;SPAN&gt;in props.conf&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;[tenable:sc:vuln]&lt;BR /&gt;TRANSFORMS-Removetenable_remove_logs = tenable_remove_logs&lt;/P&gt;&lt;P&gt;transforms.conf&lt;/P&gt;&lt;P&gt;[tenable_remove_logs]&lt;BR /&gt;SOURCE_KEY = _raw&lt;BR /&gt;REGEX = ABCSCAN&lt;BR /&gt;DEST_KEY = queue&lt;BR /&gt;FORMAT = nullQueue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Do you have any other TRANSFORMS-&amp;lt;class&amp;gt; or REPORTS-&amp;lt;class&amp;gt; statements in this props?&amp;nbsp; The order of processing could be creating issues.&amp;nbsp; I'm throwing hail marys since I'm at a loss.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2024 14:29:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/706905#M116894</guid>
      <dc:creator>dural_yyz</dc:creator>
      <dc:date>2024-12-16T14:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: Tenable Json logs are not filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/707374#M116949</link>
      <description>&lt;P&gt;Parameter DEPTH_LIMIT must be set in transforms.conf&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;DEPTH_LIMIT = &amp;lt;integer&amp;gt;
* Only set in transforms.conf for REPORT and TRANSFORMS field extractions.
   For EXTRACT type field extractions, set this in props.conf.
* Optional. Limits the amount of resources that are spent by PCRE
  when running patterns that do not match.
* Use this to limit the depth of nested backtracking in an internal PCRE
  function, match(). If set too low, PCRE might fail to correctly match a
  pattern.
* Default: 1000&lt;/PRE&gt;&lt;P&gt;&lt;A href="https://docs.splunk.com/Documentation/Splunk/9.4.0/Admin/Transformsconf" target="_blank"&gt;transforms.conf - Splunk Documentation&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 11:15:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/707374#M116949</guid>
      <dc:creator>PaulPanther</dc:creator>
      <dc:date>2024-12-20T11:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: Tenable Json logs are not filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/707375#M116950</link>
      <description>&lt;P&gt;This shouldn't be the case. With such a simple pattern there is not much backtracking. It would be important if there were wildcards, alternatives and such. With a pretty straightforward match it's not it.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 11:31:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/707375#M116950</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-12-20T11:31:25Z</dc:date>
    </item>
    <item>
      <title>Re: Tenable Json logs are not filtering</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/707385#M116952</link>
      <description>&lt;P&gt;OK. Please describe your ingestion process.&lt;/P&gt;&lt;P&gt;Where do the events come from? How are they received/pulled? On which component?&lt;/P&gt;&lt;P&gt;Where does the event stream go to from there? What components are involved and in what order?&lt;/P&gt;&lt;P&gt;Where are you putting your settings?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Dec 2024 12:54:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Tenable-Json-logs-are-not-filtering/m-p/707385#M116952</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2024-12-20T12:54:16Z</dc:date>
    </item>
  </channel>
</rss>

