<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: how to pull the logs from Cisco Cloud Web Security storage architecture in Reporting</title>
    <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172969#M10603</link>
    <description>&lt;P&gt;Would you mind posting your stanza from inputs.conf and the changes you made to the s3util.py?&lt;/P&gt;

&lt;P&gt;I have my bucket ID, CWS accessKey and and secretKey (downloaded via .cvs file from our Log Extraction page on our Scansafe portal).  But I see nothing about a session key.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Wed, 29 Apr 2015 12:21:14 GMT</pubDate>
    <dc:creator>jeremyarcher</dc:creator>
    <dc:date>2015-04-29T12:21:14Z</dc:date>
    <item>
      <title>how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172961#M10595</link>
      <description>&lt;P&gt;Need to pull the logs from the Cisco Cloud Web Security storage architecture  using splunk&lt;/P&gt;

&lt;P&gt;Cisco ScanCenter allows you to extract your data logs from the Cisco Cloud Web Security storage architecture.&lt;BR /&gt;
Configure secure and fully automated extraction of data logs for import and analysis with your SIEM platform&lt;BR /&gt;
S3-compatible API. The log extraction service uses Amazon Simple Storage Service (S3) protocol only for&lt;BR /&gt;
the purpose of API compatibility; it does not use Amazon Web Services.&lt;/P&gt;

&lt;P&gt;Please suggest&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jan 2015 09:23:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172961#M10595</guid>
      <dc:creator>82padarthi</dc:creator>
      <dc:date>2015-01-05T09:23:49Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172962#M10596</link>
      <description>&lt;P&gt;Yes - you can get Cloud Web Security (CWS) data into Splunk! The Cisco CSW PM team worked with Splunk’s newly released AWS Add-on – which can gather log data from generic AWS S3 buckets – to enable users to pull CWS logs into Splunk in the newest CWS release. The AWS add-on is available at &lt;A href="https://apps.splunk.com/app/1876/" target="_blank"&gt;https://apps.splunk.com/app/1876/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Cisco's CWS engineers advise the below configuration change to the Splunk connector: &lt;/P&gt;

&lt;HR /&gt;

&lt;P&gt;You can configure all input parameters through Splunk Web or manually in inputs.conf, with the exception of host_name and is_secure, which can only be configured in inputs.conf.&lt;/P&gt;

&lt;P&gt;When you configure inputs manually in inputs.conf, create a stanza using the following template and add it to $SPLUNK_HOME/etc/apps/Splunk_TA_aws/local/inputs.conf. If the file or path does not exist, create it. If needed, the path to copy the default input.conf file is /opt/splunk/etc/apps/Splunk_TA_aws/default.&lt;/P&gt;

&lt;P&gt;[aws_s3://]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
sourcetype = aws:s3&lt;BR /&gt;
interval = 180&lt;BR /&gt;
is_secure = True&lt;BR /&gt;
host_name = vault.scansafe.com&lt;BR /&gt;
bucket_name = [INSERT CWS ACCOUNT ID HERE]&lt;/P&gt;

&lt;P&gt;Here  is a unique stanza name, and  can be any string. The bucket name will be the customer’s account ID so where bucket name is referenced please insert the CWS account ID.&lt;/P&gt;

&lt;P&gt;Also, in the file&lt;/P&gt;

&lt;P&gt;/opt/splunk/etc/apps/Splunk_TA_aws/bin/taaws/s3util.py&lt;/P&gt;

&lt;P&gt;change the connect_s3 line to:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;         def connect_s3(key_id,secret_key,session_key,host="vault.scansafe.com",is_secure=True):
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;More information on the CWS Log Extraction capability can be found in the CWS Admin Guide or online help.&lt;/P&gt;

&lt;P&gt;Please contact your Cisco account team for more details on CWS Log Extraction or, contact your Splunk account team for more information on the AWS S3 connector.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 18:34:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172962#M10596</guid>
      <dc:creator>friea</dc:creator>
      <dc:date>2020-09-28T18:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172963#M10597</link>
      <description>&lt;P&gt;Thanks friea for your support&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jan 2015 04:04:22 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172963#M10597</guid>
      <dc:creator>82padarthi</dc:creator>
      <dc:date>2015-01-07T04:04:22Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172964#M10598</link>
      <description>&lt;P&gt;Can i create my own app and copy s3util.py in bin directory . i can use inputs.conf with stanza given above. Amazon AWS app uses lot of stanzas in inputs.conf &lt;/P&gt;</description>
      <pubDate>Mon, 19 Jan 2015 16:08:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172964#M10598</guid>
      <dc:creator>laleet_pandey</dc:creator>
      <dc:date>2015-01-19T16:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172965#M10599</link>
      <description>&lt;P&gt;We can get a accessKey and secretKey from cisco CWS can you give mapping between parameters below and keys extracted from cisco CWS&lt;/P&gt;

&lt;P&gt;key_id = ?&lt;BR /&gt;
secret_key = ?&lt;BR /&gt;
session_key = ?&lt;BR /&gt;
host="vault.scansafe.com",&lt;BR /&gt;
is_secure=True&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:05:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172965#M10599</guid>
      <dc:creator>laleet_pandey</dc:creator>
      <dc:date>2020-09-28T19:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172966#M10600</link>
      <description>&lt;P&gt;Did you ever get this data?  I'm working on the same.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2015 15:36:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172966#M10600</guid>
      <dc:creator>jeremyarcher</dc:creator>
      <dc:date>2015-04-24T15:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172967#M10601</link>
      <description>&lt;P&gt;Hey 82padarthi, just wondering if you ever got this working?&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 00:33:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172967#M10601</guid>
      <dc:creator>jeremyarcher</dc:creator>
      <dc:date>2015-04-29T00:33:31Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172968#M10602</link>
      <description>&lt;P&gt;Yes its working for me... &lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 06:27:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172968#M10602</guid>
      <dc:creator>82padarthi</dc:creator>
      <dc:date>2015-04-29T06:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172969#M10603</link>
      <description>&lt;P&gt;Would you mind posting your stanza from inputs.conf and the changes you made to the s3util.py?&lt;/P&gt;

&lt;P&gt;I have my bucket ID, CWS accessKey and and secretKey (downloaded via .cvs file from our Log Extraction page on our Scansafe portal).  But I see nothing about a session key.&lt;/P&gt;

&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2015 12:21:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172969#M10603</guid>
      <dc:creator>jeremyarcher</dc:creator>
      <dc:date>2015-04-29T12:21:14Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172970#M10604</link>
      <description>&lt;P&gt;i keep getting error when i enable disable input from UI&lt;BR /&gt;
Error occurred attempting to disable : In handler 'aws_s3': The following required arguments are missing: aws_account, bucket_name..&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:42:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172970#M10604</guid>
      <dc:creator>shaileshmali</dc:creator>
      <dc:date>2020-09-28T19:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172971#M10605</link>
      <description>&lt;P&gt;Hey shailseshami, maybe we can figure this out together.  Did you use the App UI to set up your initial configuration including the "Friendly Name", "Access Key" and "Secret Key"?  I did and do not have this error you're reporting.&lt;/P&gt;

&lt;P&gt;The best that I can tell this UI 'Set up' modifies the $SPLUNK_HOME/etc/apps/Splunk_TA_aws/local/app.conf file.  However, it isn't clear to me how this file is used in s3util.py.&lt;/P&gt;

&lt;P&gt;For me, I did use the App's "Set Up" UI to add my "Friendly Name", "AWS Account Key ID" and "AWS Account Secret Key".  &lt;/P&gt;

&lt;P&gt;Also, it wasn't clear to me from the instructions provided in the OP if this line needed to be changed with the variables from my specific configuration:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;  def connect_s3(key_id,secret_key,session_key,host="vault.scansafe.com",is_secure=True):
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Do I add my Key ID, Secret Key in this line?  If so, what is the Session key?  &lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:42:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172971#M10605</guid>
      <dc:creator>jeremyarcher</dc:creator>
      <dc:date>2020-09-28T19:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172972#M10606</link>
      <description>&lt;P&gt;I used UI to to configure &lt;BR /&gt;
"Friendly Name", "AWS Account Key ID" and "AWS Account Secret Key". i am not using proxy&lt;/P&gt;

&lt;P&gt;inputs.conf looks like this &lt;BR /&gt;
[aws_s3://]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
sourcetype = aws:s3&lt;BR /&gt;
interval = 180&lt;BR /&gt;
is_secure = True&lt;BR /&gt;
host_name = vault.scansafe.com&lt;BR /&gt;
bucket_name = &lt;I&gt;&lt;/I&gt;&lt;/P&gt;

&lt;P&gt;When i check data input AWS S3  from UI ,  i see these details. &lt;BR /&gt;
  Input Name -  no data&lt;BR /&gt;
  AWS account - no data&lt;BR /&gt;
  S3 bucket- no data&lt;BR /&gt;
  S3 key name - this field shows bucket id here&lt;BR /&gt;
  Source type - aws:s3&lt;BR /&gt;
&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:42:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172972#M10606</guid>
      <dc:creator>laleet_pandey</dc:creator>
      <dc:date>2020-09-28T19:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172973#M10607</link>
      <description>&lt;P&gt;Ok. Same as me then.  I'm assuming that you did populate the "bucket_name =  " with your Bucket ID from the Scansafe Log Extraction portal?&lt;/P&gt;

&lt;P&gt;My stanza appears as:&lt;/P&gt;

&lt;P&gt;[aws_s3://]&lt;BR /&gt;
disabled = 0&lt;BR /&gt;
sourcetype = aws:s3&lt;BR /&gt;
interval = 20&lt;BR /&gt;
is_secure = True&lt;BR /&gt;
host_name = vault.scansafe.com&lt;BR /&gt;
bucket_name = 216XXXXX547&lt;/P&gt;

&lt;P&gt;I'm unable to get to the AWS S3 data inputs section at all as I get an error:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;An error occurred while rendering the page template. See web_service.log for more details
View more information about your request (request ID = 55410b45a818a5f1a390) in Search

This page was linked to from http://vmprdlog01:8000/en-US/manager/launcher/adddata/selectsource?modinput=1&amp;amp;input_mode=1&amp;amp;input_type=aws_s3.
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:42:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172973#M10607</guid>
      <dc:creator>jeremyarcher</dc:creator>
      <dc:date>2020-09-28T19:42:59Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172974#M10608</link>
      <description>&lt;P&gt;CWS log collection is working now . I followed steps below&lt;/P&gt;

&lt;P&gt;1)  Update s3util.py &lt;BR /&gt;
    file path  /opt/splunk/etc/apps/Splunk_TA_aws/bin/taaws/s3util.py&lt;BR /&gt;
    change the connect_s3 line to:&lt;BR /&gt;
    def connect_s3(key_id,secret_key,session_key,host="vault.scansafe.com",is_secure=True):&lt;/P&gt;

&lt;P&gt;2) Use app UI setup option to configure &lt;BR /&gt;
    Friendly Name = test&lt;BR /&gt;
    AWS Account Key ID = Enter key ID&lt;BR /&gt;
    AWS Account Secret Key = Enter Secret key&lt;/P&gt;

&lt;P&gt;3) Create inputs.conf  file in app local directory &lt;BR /&gt;
/opt/splunk/etc/apps/Splunk_TA_aws/local&lt;/P&gt;

&lt;P&gt;[aws_s3://CWSlogExtraction_input]&lt;BR /&gt;
aws_account = test (same as Friendly Name used in step2)&lt;BR /&gt;
sourcetype = aws:s3&lt;BR /&gt;
initial_scan_datetime = default&lt;BR /&gt;
max_items = 100000&lt;BR /&gt;
max_retries = 10&lt;BR /&gt;
queueSize = 128KB&lt;BR /&gt;
persistentQueueSize = 24MB&lt;BR /&gt;
interval = 18000&lt;BR /&gt;
recursion_depth = -1&lt;BR /&gt;
character_set = auto&lt;BR /&gt;
is_secure = True&lt;BR /&gt;
host_name = vault.scansafe.com&lt;BR /&gt;
bucket_name = Enter bucket id&lt;BR /&gt;
key_name = cws-logs/&lt;/P&gt;

&lt;P&gt;4) Restart splunk service&lt;/P&gt;

&lt;P&gt;5) To verify the files are being accessed and indexed from the cloud bucket, access the "aws_s3.log"  and verify the entries in the log show the files contained in the bucket.&lt;/P&gt;

&lt;P&gt;6) Check on Searchhead index=main  and source starting with source="s3://&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:43:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172974#M10608</guid>
      <dc:creator>shaileshmali</dc:creator>
      <dc:date>2020-09-28T19:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172975#M10609</link>
      <description>&lt;P&gt;Excellent work.  This worked for me as well.  I was hoping they would be formatted in something like a squid format but it's great to at least have this working.  &lt;/P&gt;

&lt;P&gt;Nicely done.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Apr 2015 02:14:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172975#M10609</guid>
      <dc:creator>jeremyarcher</dc:creator>
      <dc:date>2015-04-30T02:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172976#M10610</link>
      <description>&lt;P&gt;Thanks to others here I am able to get log files.  However, they are almost all as follows:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;#Fields: datatime   c-ip    cs(X-Forwarded-For) cs-username cs-method   cs-uri-scheme   cs-host cs-uri-port cs-uri-path cs-uri-query    cs(User-Agent)  cs(Content-Type)    cs-bytes    sc-bytes    sc-status   sc(Content-Type)    s-ip    x-ss-category   x-ss-last-rule-name x-ss-last-rule-action   x-ss-block-type x-ss-block-value    x-ss-external-ip    x-ss-referer-host
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 08 Jun 2015 21:03:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172976#M10610</guid>
      <dc:creator>jeremyarcher</dc:creator>
      <dc:date>2015-06-08T21:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172977#M10611</link>
      <description>&lt;P&gt;Great news ... a brand new Cisco Cloud Web Security (CWS) Add-on For Splunk Enterprise was just published at &lt;A href="https://splunkbase.splunk.com/app/2791/"&gt;https://splunkbase.splunk.com/app/2791/&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 14 Jul 2015 00:38:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172977#M10611</guid>
      <dc:creator>friea</dc:creator>
      <dc:date>2015-07-14T00:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: how to pull the logs from Cisco Cloud Web Security storage architecture</title>
      <link>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172978#M10612</link>
      <description>&lt;P&gt;This add-on was very straight forward to setup. I ran into a lot of issues with the AWS Add-on version 3.0.0 and this CWS Add-on saved me a lot of headaches. Highly recommend it. &lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2016 15:16:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Reporting/how-to-pull-the-logs-from-Cisco-Cloud-Web-Security-storage/m-p/172978#M10612</guid>
      <dc:creator>ryanoconnor</dc:creator>
      <dc:date>2016-03-22T15:16:48Z</dc:date>
    </item>
  </channel>
</rss>

