<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Datamodel not showing all actions in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424479#M5370</link>
    <description>&lt;P&gt;You may want to ensure that the tags.conf for checkpoint also is pointing to that eventtype you mention (check_point) for:&lt;BR /&gt;
tag=network tag=communicate. As an example tags.conf:&lt;BR /&gt;
[eventtype=check_point]&lt;BR /&gt;
network = enabled&lt;BR /&gt;
communicate = enabled&lt;/P&gt;

&lt;P&gt;A quick litmus test would be to just run a search with something like:&lt;BR /&gt;
"tag=network OR tag=communicate | stats values(action) by sourcetype"&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2020 01:33:25 GMT</pubDate>
    <dc:creator>kchamplin_splun</dc:creator>
    <dc:date>2020-09-30T01:33:25Z</dc:date>
    <item>
      <title>Datamodel not showing all actions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424476#M5367</link>
      <description>&lt;P&gt;Network_Traffic Traffic_By_Action isn't showing allowed or deferred.&lt;BR /&gt;
In the data model, here is the constraints:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;(`cim_Network_Traffic_indexes`) tag=network tag=communicate
action=*
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The CIM setup for Network Traffic includes the indexes: check_point network lb&lt;BR /&gt;
There is an eventtype for check_point that has the search&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;index=check_point action=*
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;and it has the tags: communicate &amp;amp; network&lt;/P&gt;

&lt;P&gt;When I search &lt;CODE&gt;index=check_point action=* | dedup action | table action&lt;/CODE&gt;, I get the following:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;action
allowed
blocked
deferred
dropped
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;But when I search &lt;CODE&gt;|tstats count from datamodel=Network_Traffic by All_Traffic.action&lt;/CODE&gt; I only get:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;All_Traffic.action  count
blocked 88
deferred    126
dropped 118
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Does anyone have any idea as to why the actions allowed or deferred aren't showing up?&lt;BR /&gt;
I've checked the macro &lt;CODE&gt;cim_traffic_actions&lt;/CODE&gt; &amp;amp; it has action&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;allowed
blocked
teardown
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:34:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424476#M5367</guid>
      <dc:creator>wgawhh5hbnht</dc:creator>
      <dc:date>2020-09-30T01:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: Datamodel not showing all actions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424477#M5368</link>
      <description>&lt;P&gt;what values do you see for 'action' when you run &lt;CODE&gt;|from datamodel:"Network_Traffic | stats count by action&lt;/CODE&gt; ? Also, on your TA, check if there is any props/transforms for actions.  Also, generally, if its possible to avoid using index= in eventtypes.conf, its better [ as you are restricting the indexes for a datamodel via CIM config]&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2019 15:44:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424477#M5368</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2019-08-01T15:44:47Z</dc:date>
    </item>
    <item>
      <title>Re: Datamodel not showing all actions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424478#M5369</link>
      <description>&lt;P&gt;For &lt;CODE&gt;|from datamodel:"Network_Traffic" | stats count by action&lt;/CODE&gt; here are the results:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;action  count
blocked 82
deferred    270
dropped 108
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;The TA is Splunk_TA_checkpoint-opseclea, no local transform &amp;amp; for props there is only this that deals with action: &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;FIELDALIAS-protocol_for_opsec = proto AS protocol
FIELDALIAS-opsec_action = te_action AS action vendor_action AS action
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;For default/props.conf here is everything with action:&lt;BR /&gt;
Splunk_TA_checkpoint-opseclea]$ grep 'action'  default/props.conf&lt;BR /&gt;&lt;BR /&gt;
    REPORT-checkpoint_action_for_checkpoint = action_as_checkpoint_action&lt;BR /&gt;
    REPORT-action_as_threat_emulation_action = action_as_threat_emulation_action&lt;BR /&gt;
    FIELDALIAS-vendor_action = action as vendor_action&lt;BR /&gt;
    LOOKUP-action_for_opsec       = checkpoint_opsec_action_lookup vendor_action OUTPUT action&lt;BR /&gt;
    REPORT-action_as_ips_action                     = action_as_threat_emulation_action&lt;BR /&gt;
    LOOKUP-action_for_av                            = te_action_lookup te_action OUTPUT action&lt;BR /&gt;
    REPORT-action_as_threat_emulation_action = action_as_threat_emulation_action&lt;BR /&gt;
    REPORT-opsec_vendor_action_field = opsec_vendor_action_field&lt;BR /&gt;
    FIELDALIAS-vendor_action = action as vendor_action&lt;BR /&gt;
    LOOKUP-action_for_opsec       = checkpoint_opsec_action_lookup vendor_action OUTPUT action&lt;BR /&gt;
    REPORT-checkpoint_action_for_checkpoint   = vendor_action_for_opsec&lt;BR /&gt;
    EVAL-look_up_key = case((Subject="File Operation"),"filesystem",(Operation="Create Object" OR Operation="Modify Object" OR Operation="Delete Object"),Operation,(Operation="Log In" OR Operation="Log Out" OR Operation="Force Log Out"),if(isnull(status),"Success",status),1==1,action)&lt;BR /&gt;
    LOOKUP-checkpoint_audit_action_lookup  = checkpoint_audit_action_lookup look_up_key OUTPUT action,app&lt;BR /&gt;
    REPORT-action_as_threat_emulation_action        = action_as_threat_emulation_action&lt;BR /&gt;
    FIELDALIAS-category_for_threat_emulation        = malware_action as category&lt;BR /&gt;
    LOOKUP-action_for_te                            = te_action_lookup te_action OUTPUT action&lt;BR /&gt;
    REPORT-action_as_anti_bot_action                = action_as_threat_emulation_action&lt;BR /&gt;
    LOOKUP-action_for_te                            = te_action_lookup te_action OUTPUT action&lt;BR /&gt;
    REPORT-action_as_anti_virus_action              = action_as_threat_emulation_action&lt;BR /&gt;
    LOOKUP-action_for_av                            = te_action_lookup te_action OUTPUT action&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:34:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424478#M5369</guid>
      <dc:creator>wgawhh5hbnht</dc:creator>
      <dc:date>2020-09-30T01:34:31Z</dc:date>
    </item>
    <item>
      <title>Re: Datamodel not showing all actions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424479#M5370</link>
      <description>&lt;P&gt;You may want to ensure that the tags.conf for checkpoint also is pointing to that eventtype you mention (check_point) for:&lt;BR /&gt;
tag=network tag=communicate. As an example tags.conf:&lt;BR /&gt;
[eventtype=check_point]&lt;BR /&gt;
network = enabled&lt;BR /&gt;
communicate = enabled&lt;/P&gt;

&lt;P&gt;A quick litmus test would be to just run a search with something like:&lt;BR /&gt;
"tag=network OR tag=communicate | stats values(action) by sourcetype"&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:33:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424479#M5370</guid>
      <dc:creator>kchamplin_splun</dc:creator>
      <dc:date>2020-09-30T01:33:25Z</dc:date>
    </item>
    <item>
      <title>Re: Datamodel not showing all actions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424480#M5371</link>
      <description>&lt;P&gt;In local/tags.conf both are enabled:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[eventtype=check_point_action]
communicate = enabled
network = enabled
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Checked splunk cmd to confirm the tags are being used &amp;amp; they are:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;Splunk_TA_checkpoint-opseclea]$ splunk cmd btool tags list --debug | grep 'Splunk_TA_checkpoint-opseclea' | egrep 'communicate|network' | sort | uniq
/opt/splunk/etc/apps/Splunk_TA_checkpoint-opseclea/local/tags.conf communicate = enabled
/opt/splunk/etc/apps/Splunk_TA_checkpoint-opseclea/local/tags.conf [eventtype=opsec_communicate]
/opt/splunk/etc/apps/Splunk_TA_checkpoint-opseclea/local/tags.conf network = enabled
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Here is the output for &lt;CODE&gt;tag=network OR tag=communicate action=* | stats values(action) by sourcetype&lt;/CODE&gt; :&lt;BR /&gt;
    sourcetype  values(action)&lt;BR /&gt;
    linux_secure    success&lt;BR /&gt;
    opendns:dnslogs &lt;BR /&gt;
    Allowed&lt;BR /&gt;
    Blocked&lt;BR /&gt;
    Proxied&lt;BR /&gt;
    opsec:anti_malware&lt;BR /&gt;&lt;BR /&gt;
    blocked&lt;BR /&gt;
    deferred&lt;BR /&gt;
    opsec:anti_virus    deferred&lt;BR /&gt;
    opsec:smartdefense&lt;BR /&gt;&lt;BR /&gt;
    blocked&lt;BR /&gt;
    deferred&lt;BR /&gt;
    opsec:threat_emulation  deferred&lt;BR /&gt;
    opsec:vpn&lt;BR /&gt;&lt;BR /&gt;
    blocked&lt;BR /&gt;
    dropped&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:34:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424480#M5371</guid>
      <dc:creator>wgawhh5hbnht</dc:creator>
      <dc:date>2020-09-30T01:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: Datamodel not showing all actions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424481#M5372</link>
      <description>&lt;P&gt;It's a bit hard to make out based on the formatting, but it looks to me like whatever sources or sourcetypes that are in in the eventtype search "opsec_communicate" is what's missing here...that said it looks like your local overrides for check_point_action eventtype should work, but in any case, if you can get tag=network or tag=communicate to actually return results for action=allowed, that will fix the DM problem.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:33:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424481#M5372</guid>
      <dc:creator>kchamplin_splun</dc:creator>
      <dc:date>2020-09-30T01:33:28Z</dc:date>
    </item>
    <item>
      <title>Re: Datamodel not showing all actions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424482#M5373</link>
      <description>&lt;P&gt;Ya, formatting is terrible, I can't upload a picture...&lt;BR /&gt;
Here is another crack at it with the action values below the sourcetype:&lt;BR /&gt;
    sourcetype  values(action)&lt;BR /&gt;
    linux_secure&lt;BR /&gt;
    success&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;opendns:dnslogs 
Allowed
Blocked
Proxied

opsec:anti_malware  
blocked
deferred

opsec:anti_virus
deferred

opsec:smartdefense  
blocked
deferred

opsec:threat_emulation
deferred

opsec:vpn   
blocked
dropped
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 01 Aug 2019 17:40:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424482#M5373</guid>
      <dc:creator>wgawhh5hbnht</dc:creator>
      <dc:date>2019-08-01T17:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: Datamodel not showing all actions</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424483#M5374</link>
      <description>&lt;P&gt;I believe the TA is overriding the action and missing the 'allowed. You can comment out FIELDALIAS-opsec_action = te_action AS action vendor_action AS action any any other related ones and see which one is causing the issue.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 01:34:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Datamodel-not-showing-all-actions/m-p/424483#M5374</guid>
      <dc:creator>lakshman239</dc:creator>
      <dc:date>2020-09-30T01:34:41Z</dc:date>
    </item>
  </channel>
</rss>

