Here is the migration guide from 3.1 to 4 for reference:
http://docs.splunk.com/Documentation/AddOns/released/OPSEC-LEA/Releasehistory#Migration_guide
Ensure appropriate starttime is set for a smoother transition!
... View more
Here is the migration guide from 3.1 to 4 for reference:
http://docs.splunk.com/Documentation/AddOns/released/OPSEC-LEA/Releasehistory#Migration_guide
Ensure appropriate starttime is set for a smoother transition!
... View more
Reproduced the problem and filed a bug with dev. It's going to take a while, but we will address this. I will update this thread with any news.
... View more
You are not using the sourcetype the addon expects, the link you provided recommends extending existing sourcetype
You are using indexed_extractions, which are an index time setting, so once your data is indexed, there is nothing you can do to fix it, you would need to re-ingest. But before you do that, try to start by setting your sourcetype to aws:cloudwatch.
... View more
Which version are you on? What does your data look like?
I appreciate the sentiment, but this addon is working fine for many customers, so this must be an edge case. Our addons go through compehensive testing, but we cannot catch everything.
We do love our customers, so we are here to help.
... View more
I confirmed CN setting logic in the addon based on the server type and all looks right there. We only do it once when pulling the cert. Your input is correct based on that logic. Upon further research, this may be an issue on the OPSEC side: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk110514
Do we know that the OPSEC server is thinking of itself as dedicated? Might it be configured as primary?
... View more
Let's be careful with these assumptions, cn name depends on type of server. Please note, the addon was revamped for 4.0, so assumptions from previous versions may be dangerous.
... View more
Your config looks right, but the fact that it tries to connect to cn=cp_mgmt means the code thinks you are working with Primary Management Server vs a dedicated server. See section 2 for more detail: http://docs.splunk.com/Documentation/AddOns/released/OPSEC-LEA/Troubleshoot
Did you change Log Server Type at any point?
... View more
This error means that the addon does not have the certificate which needs to be downloaded from OPSEC side in order to establish secure communication.
In OPSEC LEA addon v 4 this should happen automatically as part of the install.
Did you upgrade from an older version?
Did you follow the installation steps here: http://docs.splunk.com/Documentation/AddOns/released/OPSEC-LEA/Setup2?
Note: upgrade will not work, addon needs to be installed fresh
... View more
This looks like an issue with file encoding and/or moving file between systems. Is this how the file looks like on the source machine as well? Is your SEP admin doing some weird copy/paste?
If this is indeed how your data will end up looking like, I suggest creating a local copy of transforms.conf and adding to each space delimiter in REGEXes and optional match for null. Something like this: [\s*|null]
... View more
The improvements are in performance and error handling as well as reducing configuration problems by removing direct loggrabber configuration access. There are ways to filter out data, see below. Additional filtering options will be available down the road.
... View more
You can select the type of data you want downloaded from the checkpoint device - when configuring an input:
In the Data menu, choose the data you want to collect for the input.
Non-Audit: Collects all event types except audit events.
Firewall Events: Collects firewall events only.
Firewall Audit:Collects audit events only.
SmartDefense (Smart Defense): Collects Smart Defense events only.
VPN (Virtual Private Network): Collects VPN events only.
... View more
we are actually working on an upgrade, but feel free to use indexed_extractions instead by setting sourcetype to bluecoat:proxysg:access:file
... View more
sounds like you were using bluecoat:proxysg:access:file sourcetype to leverage INDEXED_EXTRACTIONS. is that correct?
if so, you can try to use sourcetype bluecoat:proxysg:access:syslog with the recommended log format configured (default bcereportermain_v1) on the bluecoat side: http://docs.splunk.com/Documentation/AddOns/latest/BlueCoatProxySG/Sourcetypes
... View more
yes, you need to edit outputs.conf on your forwarder: http://docs.splunk.com/Documentation/Forwarder/6.4.0/Forwarder/Configureforwardingwithoutputs.conf
... View more
some more reading on this error:
https://answers.splunk.com/answers/5590/could-not-send-data-to-the-output-queue.html
https://answers.splunk.com/answers/7582/tailingprocessor-could-not-send-data-to-output-queue-parsingqueue-retrying.html
... View more