All Apps and Add-ons

Why am I getting the following error when installing the FireEye app in Splunk?: "ERROR SearchOperator:kv - Cannot compile RE errors in Splunk for FireEye app"

nilbak1
Communicator

Getting below errors in Splunk search-heads for FireEye app

 ERROR SearchOperator:kv - Cannot compile RE \"[\w-\.]{1,30})\"\s*(sid=\"(?\d*)")?\s*(stype=\"(?[\w-]{1,30})\")?\" for transform 'EXTRACT-malware-info_for_fireeye': Regex: invalid range in character class.

The fireeye app version installed is 3.1.1 on splunk 7.0.3
Not sure, why I'm getting such an error when installing FireEye app in Splunk . Please help.

Tags (2)
0 Karma
1 Solution

nilbak1
Communicator

config modified as below and and errors got vanished

EXTRACT-malware-info_for_fireeye =<malware\sname=\"(?<malware_name>[\w-]{1,30})\"\s*(sid=\"(?<malware_sid>\d*)")?\s*(stype=\"(?<malware_stype>[\w-]{1,30})\")?  

View solution in original post

nilbak1
Communicator

config modified as below and and errors got vanished

EXTRACT-malware-info_for_fireeye =<malware\sname=\"(?<malware_name>[\w-]{1,30})\"\s*(sid=\"(?<malware_sid>\d*)")?\s*(stype=\"(?<malware_stype>[\w-]{1,30})\")?  

harsmarvania57
Ultra Champion

Hi,

If you are running Fireeye 3.1.1 then fe_xml_syslog config should be like this in Fireeye app props.conf

EXTRACT-malware-info_for_fireeye = <malware\sname=\"(?<malware_name>[\w-\.]{1,30})\"\s*(sid=\"(?<malware_sid>\d*)")?\s*(stype=\"(?<malware_stype>[\w-]{1,30})\")?

However error which you have provided is not extracting capturing group into any field so your regex is invalid.

0 Karma

nilbak1
Communicator

yes, in fireeye app props.conf we have same fe_xml_syslog config , it was not modified

    EXTRACT-malware-info_for_fireeye = <malware\sname=\"(?<malware_name>[\w-\.]{1,30})\"\s*(sid=\"(?<malware_sid>\d*)")?\s*(stype=\"(?<malware_stype>[\w-]{1,30})\")?
0 Karma
Get Updates on the Splunk Community!

Upcoming Webinar: Unmasking Insider Threats with Slunk Enterprise Security’s UEBA

Join us on Wed, Dec 10. at 10AM PST / 1PM EST for a live webinar and demo with Splunk experts! Discover how ...

.conf25 technical session recap of Observability for Gen AI: Monitoring LLM ...

If you’re unfamiliar, .conf is Splunk’s premier event where the Splunk community, customers, partners, and ...

A Season of Skills: New Splunk Courses to Light Up Your Learning Journey

There’s something special about this time of year—maybe it’s the glow of the holidays, maybe it’s the ...