<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Why are the data models intrusion and malware only working in the app search? in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Why-are-the-data-models-intrusion-and-malware-only-working-in/m-p/341976#M101335</link>
    <description>&lt;P&gt;My guess would be that your app that is responsible for providing the eventtype/tags of ids and attack, does not meet the naming requirements of the App Imports regex in ES.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rest /services/apps/local/SplunkEnterpriseSecuritySuite/import splunk_server=local
| rename title AS master
| fields master, import
| mvexpand import
| join type=left import [| rest /services/apps/local splunk_server=local
| fields title, disabled | rename title AS import]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you app is not listed here proceed to &lt;BR /&gt;
a. renaming your app so the regex picks it up&lt;BR /&gt;
b. modifying the regex so it can pick up your non-standard naming convention.&lt;/P&gt;

&lt;P&gt;You can modify the regex in the UI under settings/data inputs/ App Imports or via conf file... Here is the default example... /opt/splunk/etc/apps/SplunkEnterpriseSecuritySuite/default/inputs.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[app_imports_update://update_es]
app_regex         = (appsbrowser)|(search)|([ST]A-.*)|(Splunk_[ST]A_.*)|(DA-ESS-.*)|(Splunk_DA-ESS_.*)
app_exclude_regex = sideview_utils
app_include_list  = Splunk_DA-ESS_PCICompliance
apps_to_update    = (SA-.*)|(Splunk_SA_.*)
# Leave this disabled, this input will be enabled in setup
disabled          = 1
interval          = 60
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope this helps: Here is a link the docs on this:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/ES/4.7.4/Install/ImportCustomApps"&gt;https://docs.splunk.com/Documentation/ES/4.7.4/Install/ImportCustomApps&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 02 Feb 2018 04:12:20 GMT</pubDate>
    <dc:creator>jwelch_splunk</dc:creator>
    <dc:date>2018-02-02T04:12:20Z</dc:date>
    <item>
      <title>Why are the data models intrusion and malware only working in the app search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-are-the-data-models-intrusion-and-malware-only-working-in/m-p/341975#M101334</link>
      <description>&lt;P&gt;Hi, I'm using Security enterprise but the datamodels intrusion and malware are not working but if I use the app search I see results.&lt;/P&gt;

&lt;P&gt;Can anyone help me?&lt;span class="lia-inline-image-display-wrapper" image-alt="alt text"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/4257i86385B3DDE3A60A5/image-size/large?v=v2&amp;amp;px=999" role="button" title="alt text" alt="alt text" /&gt;&lt;/span&gt;&lt;/P&gt;

&lt;P&gt;I upload the result for the same search on different app.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 22:18:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-are-the-data-models-intrusion-and-malware-only-working-in/m-p/341975#M101334</guid>
      <dc:creator>paola92</dc:creator>
      <dc:date>2018-01-31T22:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: Why are the data models intrusion and malware only working in the app search?</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Why-are-the-data-models-intrusion-and-malware-only-working-in/m-p/341976#M101335</link>
      <description>&lt;P&gt;My guess would be that your app that is responsible for providing the eventtype/tags of ids and attack, does not meet the naming requirements of the App Imports regex in ES.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;| rest /services/apps/local/SplunkEnterpriseSecuritySuite/import splunk_server=local
| rename title AS master
| fields master, import
| mvexpand import
| join type=left import [| rest /services/apps/local splunk_server=local
| fields title, disabled | rename title AS import]
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;If you app is not listed here proceed to &lt;BR /&gt;
a. renaming your app so the regex picks it up&lt;BR /&gt;
b. modifying the regex so it can pick up your non-standard naming convention.&lt;/P&gt;

&lt;P&gt;You can modify the regex in the UI under settings/data inputs/ App Imports or via conf file... Here is the default example... /opt/splunk/etc/apps/SplunkEnterpriseSecuritySuite/default/inputs.conf&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;[app_imports_update://update_es]
app_regex         = (appsbrowser)|(search)|([ST]A-.*)|(Splunk_[ST]A_.*)|(DA-ESS-.*)|(Splunk_DA-ESS_.*)
app_exclude_regex = sideview_utils
app_include_list  = Splunk_DA-ESS_PCICompliance
apps_to_update    = (SA-.*)|(Splunk_SA_.*)
# Leave this disabled, this input will be enabled in setup
disabled          = 1
interval          = 60
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope this helps: Here is a link the docs on this:&lt;BR /&gt;
&lt;A href="https://docs.splunk.com/Documentation/ES/4.7.4/Install/ImportCustomApps"&gt;https://docs.splunk.com/Documentation/ES/4.7.4/Install/ImportCustomApps&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 04:12:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Why-are-the-data-models-intrusion-and-malware-only-working-in/m-p/341976#M101335</guid>
      <dc:creator>jwelch_splunk</dc:creator>
      <dc:date>2018-02-02T04:12:20Z</dc:date>
    </item>
  </channel>
</rss>

