<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco eStreamer eNcore - filtering not working in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421337#M74107</link>
    <description>&lt;P&gt;Did you try this?&lt;/P&gt;

&lt;P&gt;Please accept the answer if it helped&lt;/P&gt;</description>
    <pubDate>Wed, 23 Jan 2019 07:38:46 GMT</pubDate>
    <dc:creator>dkeck</dc:creator>
    <dc:date>2019-01-23T07:38:46Z</dc:date>
    <item>
      <title>Cisco eStreamer eNcore - filtering not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421335#M74105</link>
      <description>&lt;P&gt;Good day,&lt;/P&gt;

&lt;P&gt;I'm trying to filter connection events from FMC eStreamer, i.e. I &lt;EM&gt;do not&lt;/EM&gt; need &lt;EM&gt;Allowed&lt;/EM&gt; connections in Splunk. I thought I had lurked enough into Splunk documentation and Community, but I guess - not. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; So I need help from senior admins.&lt;/P&gt;

&lt;P&gt;I had created in &lt;STRONG&gt;/opt/splunk/etc/apps/TA-eStreamer/local&lt;/STRONG&gt;&lt;BR /&gt;
&lt;STRONG&gt;props.conf&lt;/STRONG&gt;&lt;BR /&gt;
[cisco:estreamer:data]&lt;BR /&gt;
rename = fmc&lt;BR /&gt;
TRANSFORMS-send-data-to-null-queue = setnull&lt;/P&gt;

&lt;P&gt;&lt;STRONG&gt;transforms.conf&lt;/STRONG&gt;&lt;BR /&gt;
[setnull]&lt;BR /&gt;
REGEX = (fw_rule_action=Allow)&lt;BR /&gt;
DEST_KEY = queue&lt;BR /&gt;
FORMAT = nullQueue&lt;/P&gt;

&lt;P&gt;Restarted Splunk, and yet I still get&lt;BR /&gt;
rec_type=71 file_count=0 client_app="SSL client" mac_address=00:00:00:00:00:00 dest_ip=&lt;EM&gt;.&lt;/EM&gt;.&lt;EM&gt;.&lt;/EM&gt; dest_port=443 sec_intel_ip=N/A&lt;BR /&gt;
...&lt;BR /&gt;
ssl_expected_action=Unknown app_proto=HTTPS ssl_server_name="" ssl_cert_fingerprint=0000000000000000000000000000000000000000 has_ipv6=1 &lt;STRONG&gt;&lt;EM&gt;fw_rule_action=Allow&lt;/EM&gt;&lt;/STRONG&gt; ssl_rule_id=0&lt;BR /&gt;
...&lt;/P&gt;

&lt;P&gt;I'm using latest eStreamer eNcore&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/3662/" target="_blank"&gt;https://splunkbase.splunk.com/app/3662/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:54:17 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421335#M74105</guid>
      <dc:creator>halfreeman</dc:creator>
      <dc:date>2020-09-29T22:54:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer eNcore - filtering not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421336#M74106</link>
      <description>&lt;P&gt;HI,&lt;BR /&gt;
     you can discard whole rec_type  like this:&lt;/P&gt;

&lt;P&gt;transforms&lt;/P&gt;

&lt;P&gt;[discard_rec_type_71]&lt;BR /&gt;
REGEX=^rec_type=71&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;

&lt;P&gt;Props.conf&lt;/P&gt;

&lt;P&gt;[cisco:estreamer:data]&lt;BR /&gt;
TRANSFORMS-rec_type71=discard_rec_type_71&lt;/P&gt;

&lt;P&gt;Or do you try to discard fields within the rec_type=71 events? This is possible as well.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:54:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421336#M74106</guid>
      <dc:creator>dkeck</dc:creator>
      <dc:date>2020-09-29T22:54:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer eNcore - filtering not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421337#M74107</link>
      <description>&lt;P&gt;Did you try this?&lt;/P&gt;

&lt;P&gt;Please accept the answer if it helped&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2019 07:38:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421337#M74107</guid>
      <dc:creator>dkeck</dc:creator>
      <dc:date>2019-01-23T07:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer eNcore - filtering not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421338#M74108</link>
      <description>&lt;P&gt;Alas &lt;EM&gt;rec_type=71&lt;/EM&gt; are for all kinds of messages - Allow, Trust, Block. Block with reset.&lt;/P&gt;

&lt;P&gt;I.e.&lt;BR /&gt;
rec_type=71 file_count=0 client_app="SSL client" mac_address=00:00:00:00:00:00 dest_ip=&lt;EM&gt;.&lt;/EM&gt;.&lt;EM&gt;.&lt;/EM&gt; &lt;BR /&gt;
...&lt;BR /&gt;
ssl_server_name="" ssl_cert_fingerprint=0000000000000000000000000000000000000000 has_ipv6=1 &lt;STRONG&gt;fw_rule_action="Block with reset"&lt;/STRONG&gt; ssl_rule_id=0 netbios_domain="" fw_rule="Bacis access - Deny Traffic"&lt;BR /&gt;
...&lt;/P&gt;

&lt;P&gt;Actually I either need to discard messages with &lt;EM&gt;fw_rule_action=&lt;/EM&gt; equals &lt;EM&gt;Allow&lt;/EM&gt; or &lt;EM&gt;Trust&lt;/EM&gt; or keep only &lt;BR /&gt;
&lt;EM&gt;Block&lt;/EM&gt; and *Block with reset"&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:54:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421338#M74108</guid>
      <dc:creator>halfreeman</dc:creator>
      <dc:date>2020-09-29T22:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer eNcore - filtering not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421339#M74109</link>
      <description>&lt;P&gt;You could try :&lt;/P&gt;

&lt;P&gt;[discard_rec_type_71]&lt;BR /&gt;
REGEX=fw_rule_action=("Allow"|"Trust")&lt;BR /&gt;
DEST_KEY=queue&lt;BR /&gt;
FORMAT=nullQueue&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:56:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421339#M74109</guid>
      <dc:creator>dkeck</dc:creator>
      <dc:date>2020-09-29T22:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer eNcore - filtering not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421340#M74110</link>
      <description>&lt;P&gt;No success.&lt;/P&gt;

&lt;P&gt;Btw, just in case I tried "REGEX=^rec_type=71" and it worked - all such messages were filter out. So in general the idea is correct.&lt;/P&gt;

&lt;P&gt;The question is in specific REGEX?&lt;/P&gt;

&lt;P&gt;Here is whole typical "Allow" message:&lt;BR /&gt;
rec_type=71 web_app=Weborama dest_port=443 file_count=0 dest_autonomous_system=0 sec_intel_ip=N/A netflow_src=00000000-0000-0000-0000-000000000000 http_response=0 dest_bytes=992 user_agent="" dns_resp_id=0 event_type=1003 dns_rec_id=0 client_app="SSL client" ssl_flow_error=0 legacy_ip_address=0.0.0.0 event_usec=0 vlan_id=0 ssl_actual_action=Unknown dns_query="" dest_ip_country=france snmp_out=0 ssl_flow_status=Unknown event_desc="Flow Statistics" src_mask=0 num_ioc=0 rec_type_desc="Connection Statistics" sensor=Onego event_subtype=1 security_context=00000000000000000000000000000000 sinkhole_uuid=00000000-0000-0000-0000-000000000000 &lt;STRONG&gt;fw_rule_action=Allow&lt;/STRONG&gt; dest_pkts=4 fw_policy=00000000-0000-0000-0000-00005c47a1f6 url=&lt;A href="https://adv.solution.weborama.fr" target="_blank"&gt;https://adv.solution.weborama.fr&lt;/A&gt; tcp_flags=0 mac_address=00:00:00:00:00:00 has_ipv6=1 ssl_server_cert_status="Not Checked" fw_rule_reason=N/A ssl_version=Unknown dns_ttl=0 ssl_rule_id=0 app_proto=HTTPS ssl_flow_messages=0 ssl_cert_fingerprint=0000000000000000000000000000000000000000 iface_ingress=inside src_tos=0 referenced_host="" iface_egress=outside monitor_rule_1=N/A monitor_rule_3=N/A monitor_rule_2=N/A monitor_rule_5=N/A monitor_rule_4=N/A monitor_rule_7=N/A monitor_rule_6=N/A monitor_rule_8=0 instance_id=1 dest_ip=91.216.195.18 ip_layer=0 last_pkt_sec=1548241758 ssl_session_id=0000000000000000000000000000000000000000000000000000000000000000 src_pkts=6 sec_intel_event=No dest_mask=0 snmp_in=0 rec_type_simple=RNA first_pkt_sec=1548241758 fw_rule="Extended access" ssl_policy_id=00000000000000000000000000000000 url_category=Uncategorized url_reputation="Risk unknown" ssl_url_category=0 ip_proto=TCP ssl_flow_flags=0 src_bytes=2022 event_sec=1548241938 sec_zone_ingress=Sanctum ssl_cipher_suite=TLS_NULL_WITH_NULL_NULL netbios_domain="" src_autonomous_system=0 client_version="" src_ip_country=unknown ssl_ticket_id=0000000000000000000000000000000000000000 dest_tos=0 src_port=52189 http_referrer="" sec_zone_egress=Exodus src_ip=192.168.111.111 user=blahblahuser ips_count=0 ssl_server_name="" ssl_expected_action=Unknown connection_id=28348&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:54:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421340#M74110</guid>
      <dc:creator>halfreeman</dc:creator>
      <dc:date>2020-09-29T22:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer eNcore - filtering not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421341#M74111</link>
      <description>&lt;P&gt;Actually - this one worked just need to remove quote marks REGEX=fw_rule_action=(Allow|Trust).&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:54:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421341#M74111</guid>
      <dc:creator>halfreeman</dc:creator>
      <dc:date>2020-09-29T22:54:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer eNcore - filtering not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421342#M74112</link>
      <description>&lt;P&gt;Great pls accept the answer &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jan 2019 11:43:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421342#M74112</guid>
      <dc:creator>dkeck</dc:creator>
      <dc:date>2019-01-23T11:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer eNcore - filtering not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421343#M74113</link>
      <description>&lt;P&gt;Small update, if you are interessed:&lt;/P&gt;

&lt;P&gt;you can add this to make sure its only valid for rec_type 71&lt;/P&gt;

&lt;P&gt;^rec_type=71.*?fw_rule_action=(Allow|Trust)&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:56:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/421343#M74113</guid>
      <dc:creator>dkeck</dc:creator>
      <dc:date>2020-09-29T22:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer eNcore - filtering not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/658733#M111397</link>
      <description>&lt;P&gt;hello, am looking for reference of field "rec_type" and what is actually means?&lt;BR /&gt;I tried searching cisco documentation but no luck. Please share with me? the link &lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/160294"&gt;@halfreeman&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/139011"&gt;@dkeck&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 10:53:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/658733#M111397</guid>
      <dc:creator>rajashaey</dc:creator>
      <dc:date>2023-09-26T10:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco eStreamer eNcore - filtering not working</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/658831#M111418</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firesight/540/api/estreamer/EventStreamerIntegrationGuide/IS-DCRecords.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firesight/540/api/estreamer/EventStreamerIntegrationGuide/IS-DCRecords.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;maybe this helps?&lt;BR /&gt;&lt;BR /&gt;I am not really familiar with estreamer in details. What I understood from a splunk perspective is that, rec_type is the main identifier for the firewall events. The TA also use it to break the events. In the python script you are able to filter out rec_types and fields, based on rec_types.&lt;BR /&gt;&lt;BR /&gt;David&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2023 08:37:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Cisco-eStreamer-eNcore-filtering-not-working/m-p/658831#M111418</guid>
      <dc:creator>dkeck</dc:creator>
      <dc:date>2023-09-27T08:37:19Z</dc:date>
    </item>
  </channel>
</rss>

