All Apps and Add-ons

Why is Splunk Add-on for McAfee ePO data not indexing, but SQL query works in Splunk DB Connect 2?

brian_799
Explorer

Hello!

I tried to set up indexing of McAfee ePO data using the Splunk Add-on for McAfee and DB Connect 2. The database Connection works fine, when configuring the database Input in the DBX2-App, the SQL query shown in the documentation of the McAfee add-on works fine and shows appropriate results. Nevertheless, there is no data indexed - no results when I search for the defined sourcetype McAfee:epo. The health Dashboard of the dbx2-App shows a total of 1125 successful Connections for the EPO database - still there is no data actually indexed. Does anyone have a hint where the problem might be?

Thanks!

0 Karma

vidda42
Explorer

i had the same problem. it come from date format.
i change Output Timestamp Format: yyyy-MM-dd HH:mm:ss to Output Timestamp Format: epoch time.
Now McAfee ePO data is indexing

0 Karma

pj
Contributor

If your database is large/massive, you probably dont want the query above running on your entire database. Instead you might want to add a where clause on the end to only pull back the last day's worth of events. Such as:

where [EPOEvents].[ReceivedUTC] > DATEADD(day, -1, GETDATE() )
0 Karma

reswob4
Builder

I'm having this same problem and on my end it looks like the last part of the query

WHERE [EPOEvents].[AutoID] > 0

is where the issue is. It seems if I select the following parameters in inputs.conf

mode = tail
tail_follow_only = 1
tail_rising_column_name = AutoID
tail_rising_column_number = 2

that the number in the query should increase each time. In this person's question (http://answers.splunk.com/answers/234052/splunk-add-on-for-mcafee-210-with-db-connect-201.html) you can see his autoid is very large. Mine has not changed from 0. When you look at the sample data from Operations - DB Inputs - Choose and Preview Table, and convert the timestamp, you find that is is constantly pulling the OLDEST entries from ePO. So it seems that autoid number should be changed every time the query runs. But it's not on mine.

So #1, this could be your problem

2, is there a setting to fix this?

0 Karma

reswob4
Builder

So I manually increased that number in the inputs.conf and immediately started getting data. BUT the number still didn't increase so I don't know if I will keep getting data. I will check tomorrow.

0 Karma

sbochniewicz
Path Finder

I am having the same problem it looks like it worked once, imported 10,000 row, the wrong direction then stopped. Even though the logs make it seem to be running every minute.

0 Karma

sbochniewicz
Path Finder

I removed the TOP 10000 from the Query and it started working.

0 Karma

bwooden
Splunk Employee
Splunk Employee

Is it cofigured to store in the main index or other? Do you see results for "index=* sourcetype=mcafee:epo"? Are you using the AutoID rising column - and if so do you have the "where" substitution configured correctly in the query? What does your query look like?

brian_799
Explorer

i configured it to store in the main index. no results on the "index=* sourcetype=McAfee:epo" query. Interestingly i found in the "data summary" of the search app that 43,000 Events with the sourcetype "McAfee:epo" are indexed (last update: 16/07/2015 05:16:08.000 - the night after i initially configured the McAfee indexing). clicking on the sourcetype the search Shows no results, also when trying the index=*.

I am using exactle the configuration described in the splunk documentation for the McAfee addon, which is Rising column AutoID, here's the query:

SELECT TOP 10000 [EPOEvents].[ReceivedUTC] as [timestamp], [EPOEvents].[AutoID], [EPOEvents].[ThreatName] as [signature], [EPOEvents].[ThreatType] as [threat_type], [EPOEvents].[ThreatEventID] as [signature_id], [EPOEvents].[ThreatCategory] as [category], [EPOEvents].[ThreatSeverity] as [severity_id], [EPOEventFilterDesc].[Name] as [event_description], [EPOEvents].[DetectedUTC] as [detected_timestamp], [EPOEvents].[TargetFileName] as [file_name], [EPOEvents].[AnalyzerDetectionMethod] as [detection_method], [EPOEvents].[ThreatActionTaken] as [vendor_action], [EPOEvents].[ThreatHandled] as [threat_handled], [EPOEvents].[TargetUserName] as [logon_user], [EPOComputerProperties].[UserName] as [user], [EPOComputerProperties].[DomainName] as [dest_nt_domain], [EPOEvents].[TargetHostName] as [dest_dns], [EPOEvents].[TargetHostName] as [dest_nt_host], [EPOComputerProperties].[IPHostName] as [fqdn], [dest_ip] = ( convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOComputerProperties].[IPV4x] + 2147483648))),1,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOComputerProperties].[IPV4x] + 2147483648))),2,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOComputerProperties].[IPV4x] + 2147483648))),3,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOComputerProperties].[IPV4x] + 2147483648))),4,1))) ), [EPOComputerProperties].[SubnetMask] as [dest_netmask], [EPOComputerProperties].[NetAddress] as [dest_mac], [EPOComputerProperties].[OSType] as [os], [EPOComputerProperties].[OSServicePackVer] as [sp], [EPOComputerProperties].[OSVersion] as [os_version], [EPOComputerProperties].[OSBuildNum] as [os_build], [EPOComputerProperties].[TimeZone] as [timezone], [EPOEvents].[SourceHostName] as [src_dns], [src_ip] = ( convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOEvents].[SourceIPV4] + 2147483648))),1,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOEvents].[SourceIPV4] + 2147483648))),2,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOEvents].[SourceIPV4] + 2147483648))),3,1)))+'.'+convert(varchar(3),convert(tinyint,substring(convert(varbinary(4),convert(bigint,([EPOEvents].[SourceIPV4] + 2147483648))),4,1))) ), [EPOEvents].[SourceMAC] as [src_mac], [EPOEvents].[SourceProcessName] as [process], [EPOEvents].[SourceURL] as [url], [EPOEvents].[SourceUserName] as [source_logon_user], [EPOComputerProperties].[IsPortable] as [is_laptop], [EPOEvents].[AnalyzerName] as [product], [EPOEvents].[AnalyzerVersion] as [product_version], [EPOEvents].[AnalyzerEngineVersion] as [engine_version], [EPOEvents].[AnalyzerEngineVersion] as [dat_version], [EPOProdPropsView_VIRUSCAN].[datver] as [vse_dat_version], [EPOProdPropsView_VIRUSCAN].[enginever64] as [vse_engine64_version], [EPOProdPropsView_VIRUSCAN].[enginever] as [vse_engine_version], [EPOProdPropsView_VIRUSCAN].[hotfix] as [vse_hotfix], [EPOProdPropsView_VIRUSCAN].[productversion] as [vse_product_version], [EPOProdPropsView_VIRUSCAN].[servicepack] as [vse_sp] FROM [EPOEvents] left join [EPOLeafNode] on [EPOEvents].[AgentGUID] = [EPOLeafNode].[AgentGUID] left join [EPOProdPropsView_VIRUSCAN] on [EPOLeafNode].[AutoID] = [EPOProdPropsView_VIRUSCAN].[LeafNodeID] left join [EPOComputerProperties] on [EPOLeafNode].[AutoID] = [EPOComputerProperties].[ParentID] left join [EPOEventFilterDesc] on [EPOEvents].[ThreatEventID] = [EPOEventFilterDesc].[EventId] and (EPOEventFilterDesc.Language='0409') WHERE [EPOEvents].[AutoID] > 0
0 Karma

bwooden
Splunk Employee
Splunk Employee

Do you get results if you search by index time instead? Try "index=* sourcetype=mcafee:epo _index_earliest=-7d"

0 Karma

brian_799
Explorer

No search results on this query as well. Interestingly, the search data summary still shows the same amount of indexed Events for sourcetype McAfee:epo with the same value in "last updated" after three days in which i left the app running with the initial configuration.

0 Karma

bwooden
Splunk Employee
Splunk Employee

And you're running the search from an Administrator account or User account ? Does this search return any results:
| metadata type=sourcetypes | search sourcetype=mcafee*

0 Karma

riqbal
Communicator

We have the same senerio.
Database connection is working fine.
query is returing data.
but no data is getting indexed.

the about query is also showing no results

0 Karma

brian_799
Explorer

this seems to be the same info as shown in the search data summary. it's basically two things that currently worry me:

  1. there seems to be some data indexed with the sourcetype mcafee:epo but searching it does not display results
  2. there is no new mcafee:epo data indexed, the last indexed data is still from the time when i first created the dbconnect data Input.
0 Karma

brian_799
Explorer

Administrator account.
The search from above Returns the following:

firstTime↕ lastTime↕ recentTime↕ sourcetype↕ totalCount↕ type↕ 
1436968562  1437023762  1437016568  mcafee:epo  43811  sourcetypes 
0 Karma
Get Updates on the Splunk Community!

Introducing Splunk Enterprise 9.2

WATCH HERE! Watch this Tech Talk to learn about the latest features and enhancements shipped in the new Splunk ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...

Routing logs with Splunk OTel Collector for Kubernetes

The Splunk Distribution of the OpenTelemetry (OTel) Collector is a product that provides a way to ingest ...