All Apps and Add-ons

SmartDefense IPS logs

_smp_
Builder

We have moved our Checkpoint input method from Opsec to CEF. After we made this change, it seems there are many times when a single IPS event in the Checkpoint Log Viewer results in multiple Splunk events. In some cases, it appears like I can tie them together with | transaction loguid, but this isn't always a reliable field. I was wondering if anyone found a reliable way to correlate IPS events in CEF format with Splunk?

0 Karma

torstein
Engager

Hi @_smp_ ,

Did you find a solution to this problem?

0 Karma

_smp_
Builder

It's been so long since I thought about this I can't recall how it came out. I think the issue I had with the loguid field is that I was seeing the same value from different hosts. I took a look at my dashboards and my transaction command has both the host and loguid fields.

But the answer for me is |transaction. Unfortunately, our firewall index is so large that the performance of these searches is really poor.

Tags (1)
Get Updates on the Splunk Community!

Your Guide to Splunk Digital Experience Monitoring

A flawless digital experience isn't just an advantage, it's key to customer loyalty and business success. But ...

Data Management Digest – November 2025

  Welcome to the inaugural edition of Data Management Digest! As your trusted partner in data innovation, the ...

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...