Getting Data In
Highlighted

Forward specific Events to Nessus Security Center

Path Finder

Hello

We want to forward (and index in Splunk) some Events (Windows Event Logs) to Nessus Security Center Log Correlation Engine.

I've tried the following settings on the Indexer:

"D:\splunk\etc\system\local\props.conf"

[WinEventLog://Application]
TRANSFORMS-routing1=nessus

[WinEventLog://Security]
TRANSFORMS-routing2=nessus

[WinEventLog://System]
TRANSFORMS-routing3=nessus

"D:\splunk\etc\system\local\transforms.conf"

[nessus]
REGEX = .
DEST_KEY=_TCP_ROUTING
FORMAT=nessusforwarder

"D:\splunk\etc\system\local\outputs.conf"

[tcpout] 
defaultGroup = nothing
disabled = 0 

[tcpout:nessusforwarder] 
disabled = 0 
server = xx.xx.xx.xx:9445
sendCookedData = false
indexAndForward = true

Does't work like this, any hints what's wrong in my config?

0 Karma
Highlighted

Re: Forward specific Events to Nessus Security Center

SplunkTrust
SplunkTrust

as you have discovered, this only works on forwarders. Not indexers.

http://docs.splunk.com/Documentation/Splunk/6.5.2/Forwarding/Forwarddatatothird-partysystemsd

indexAndForward is a bit misleading. It only works on heavy forwarders and peers in a cluster can't also be heavy forwarders.

View solution in original post

0 Karma
Highlighted

Re: Forward specific Events to Nessus Security Center

Path Finder

thank you jkat54. 😕

0 Karma
Speak Up for Splunk Careers!

We want to better understand the impact Splunk experience and expertise has has on individuals' careers, and help highlight the growing demand for Splunk skills.