All Apps and Add-ons

Mcafee IPS Field Extraction

kcobrien1
New Member

I'm trying to extract the fields of the mcafee ips syslogs being sent to Splunk. Here is a raw log if someone can help me create the regex. Still learning up about this.

7:00:51.000 PM Dec 6 19:00:53 192.168.1.30 SyslogAlertForwarder: 2011-12-06 19:00:51 EST Medium Mcafee-Sensor-01 ARP: ARP Spoofing Detected 0x42400100 N/A N/A N/A PolicyViolation Outbound Suspicious N/A N/A

host=shared-syslog-001.server.company.com Options| sourcetype=mcafee_ips Options| source=/var/log/syslog/system-192.168.1.30.log Options

Tags (2)
0 Karma

kcobrien1
New Member

Successful exploits

index=XXX sourcetype=mcafee_ips | rex ".\s(?\S?)\s(?\S*?)\s(?\S*?):(?.?)\s(?\dx.?)\s\s?(?.?)\s(?.?)\s(?\d*?)\s(?\S*?)\s(?\S*?)\s(?(Blocked|May\be\successful|Suspicious|Successful))\s(?.?)\s(?.?)$" | search policy="Exploit" status="Successful"

0 Karma

kcobrien1
New Member

index=XXX sourcetype=mcafee_ips | rex ".\s(?\S?)\s(?\S*?)\s(?\S*?):(?.?)\s(?\dx.?)\s\s?(?.?)\s(?.?)\s(?\d*?)\s(?\S*?)\s(?\S*?)\s(?(Blocked|May\be\successful|Suspicious|Successful))\s(?.?)\s(?.?)$"

Still working this puppy but this will break out the fields so you can start choosing what you want to do next. More to come.

0 Karma
Get Updates on the Splunk Community!

Updated Team Landing Page in Splunk Observability

We’re making some changes to the team landing page in Splunk Observability, based on your feedback. The ...

New! Splunk Observability Search Enhancements for Splunk APM Services/Traces and ...

Regardless of where you are in Splunk Observability, you can search for relevant APM targets including service ...

Webinar Recap | Revolutionizing IT Operations: The Transformative Power of AI and ML ...

The Transformative Power of AI and ML in Enhancing Observability   In the realm of IT operations, the ...