<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Windows Firewall log file pfirewall.log in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Firewall-log-file-pfirewall-log/m-p/131203#M26971</link>
    <description>&lt;P&gt;hi, it seem not work for me. &lt;BR /&gt;
By the way, could you tell me how to data input the pfirewall.log file to splunk and how to search the contain of file?&lt;BR /&gt;
I used Splunk Enterprise 7.0 with windows server 2012r2&lt;/P&gt;</description>
    <pubDate>Thu, 23 Nov 2017 01:16:44 GMT</pubDate>
    <dc:creator>hafizuddin</dc:creator>
    <dc:date>2017-11-23T01:16:44Z</dc:date>
    <item>
      <title>Splunk Windows Firewall log file pfirewall.log</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Firewall-log-file-pfirewall-log/m-p/131200#M26968</link>
      <description>&lt;P&gt;Hello, &lt;BR /&gt;
I'm very new to Splunk and trying to use it to gather local Windows Firewall Log file information.  I thought I'd start by telling Splunk to index the Firewall Log file on the server itself (standard location C:\Windows\System32\Logfiles\Firewall\pfirewall.log) and am having difficulties.  Although I have been able successfully to import the file for indexing it appears that Splunk is unaware of the field names associated with the file contents.&lt;/P&gt;

&lt;P&gt;How do I tell Splunk to ignore the first 3 lines of the file?&lt;BR /&gt;
How do I advise Splunk that the field names that should be associated with the data in lines 6 through 'n' are in Line 4 after the words '#Fields: ' ?&lt;BR /&gt;
I'd like to be able to search on src-ip or dst-port etc&lt;/P&gt;

&lt;P&gt;The top of the file looks like so (I've left in some example data):&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;#Version: 1.5
#Software: Microsoft Windows Firewall
#Time Format: Local
#Fields: date time action protocol src-ip dst-ip src-port dst-port size tcpflags tcpsyn tcpack tcpwin icmptype icmpcode info path

2014-04-13 22:51:26 DROP UDP 10.1.2.3 224.0.0.252 51632 5355 54 - - - - - - - RECEIVE 
2014-04-13 22:51:38 DROP UDP 10.1.4.8 10.1.255.255 138 138 237 - - - - - - - RECEIVE
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;I'm using Splunk 6.0.3 installed on a Windows Server 2008 R2 Core server&lt;/P&gt;

&lt;P&gt;Any assistance/pointers/hints gratefully received.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2014 19:02:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Firewall-log-file-pfirewall-log/m-p/131200#M26968</guid>
      <dc:creator>cmcknz77</dc:creator>
      <dc:date>2014-04-14T19:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Windows Firewall log file pfirewall.log</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Firewall-log-file-pfirewall-log/m-p/131201#M26969</link>
      <description>&lt;P&gt;index the files as it is.&lt;/P&gt;

&lt;P&gt;Use the GUI field extraction. Then find out the parameters and calculate.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Apr 2014 19:33:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Firewall-log-file-pfirewall-log/m-p/131201#M26969</guid>
      <dc:creator>linu1988</dc:creator>
      <dc:date>2014-04-14T19:33:34Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Windows Firewall log file pfirewall.log</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Firewall-log-file-pfirewall-log/m-p/131202#M26970</link>
      <description>&lt;P&gt;Welcome new Splunk user!!&lt;/P&gt;

&lt;P&gt;This is very similar to IIS logs.  This is what worked for me:&lt;/P&gt;

&lt;P&gt;Note: Before making changes to your conf files, copy them to the local directory.&lt;/P&gt;

&lt;P&gt;In your transforms.conf file:&lt;BR /&gt;
&lt;CODE&gt;&lt;BR /&gt;
[msfw-ignore-comments]&lt;BR /&gt;
REGEX = ^#(?:Version|Software|Fields|Date):\s.*$&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;BR /&gt;
&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;In your props.conf:&lt;BR /&gt;
&lt;CODE&gt;&lt;BR /&gt;
[your-sourcetype]&lt;BR /&gt;
KV_MODE = none&lt;BR /&gt;
CHECK_FOR_HEADER = false&lt;BR /&gt;
TRANSFORMS-commentsToNull = msfw-ignore-comments&lt;BR /&gt;
TIME_FORMAT = %Y-%m-%d %H:%M:%S&lt;BR /&gt;
&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Let us know if this works for you.&lt;/P&gt;

&lt;P&gt;--Barak&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:28:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Firewall-log-file-pfirewall-log/m-p/131202#M26970</guid>
      <dc:creator>barakreeves</dc:creator>
      <dc:date>2020-09-28T16:28:34Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Windows Firewall log file pfirewall.log</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Firewall-log-file-pfirewall-log/m-p/131203#M26971</link>
      <description>&lt;P&gt;hi, it seem not work for me. &lt;BR /&gt;
By the way, could you tell me how to data input the pfirewall.log file to splunk and how to search the contain of file?&lt;BR /&gt;
I used Splunk Enterprise 7.0 with windows server 2012r2&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2017 01:16:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Firewall-log-file-pfirewall-log/m-p/131203#M26971</guid>
      <dc:creator>hafizuddin</dc:creator>
      <dc:date>2017-11-23T01:16:44Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Windows Firewall log file pfirewall.log</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Firewall-log-file-pfirewall-log/m-p/131204#M26972</link>
      <description>&lt;P&gt;hi, it seem not work for me. &lt;BR /&gt;
I can't search the source IP either dest ip&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2017 04:36:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Splunk-Windows-Firewall-log-file-pfirewall-log/m-p/131204#M26972</guid>
      <dc:creator>hafizuddin</dc:creator>
      <dc:date>2017-11-27T04:36:18Z</dc:date>
    </item>
  </channel>
</rss>

