Splunk Enterprise Security

"Error 'Could not find all of the specified lookup fields in the lookup table.' for conf 'fe_cef_syslog' and lookup table 'fireeye_severity_lookup'" - how to fix?

kannanmallan
New Member

We are on Splunk Cloud 6.4. We have Splunk Enterprise Security too.

FireEye App for Splunk Enterprise v3 (ver 3.0.8) was installed. Ever since we installed that, we've been getting the below errors in all queries.

Error 'Could not find all of the specified lookup fields in the lookup table.' for conf 'fe_cef_syslog' and lookup table 'fireeye_severity_lookup'

Also, the FireEye app doesn't show any value..it shows all ZEROs..

Any help on how to fix the above issues?

In one of the posts, I read that the legacy FireEye add-on TA 3.3.0 should be disabled..will this impact the existing fireEye_CEF log formats if disabled?

0 Karma

samsingnok52
Engager

I am facing a similar issue in my splunk cloud,getting the error like "Error 'Could not find all of the specified lookup fields in the lookup table.' for conf '(?::){0}XmlWinEventLog:*' and lookup table 'identity_lookup_expanded'."

Kindly advice....

0 Karma

richgalloway
SplunkTrust
SplunkTrust

@samsingnok52 , this question is more than a year old and so you are unlikely to see many responses to your comment. You should post a new question describing your problem.

---
If this reply helps you, Karma would be appreciated.
0 Karma

TonyLeeVT
Builder

Enterprise security ships with an old TA. When that is disabled you should stop receiving those error messages.

The app most likely shows up as all zeros because the sourcetype you are using (fireEye_CEF) is incorrectly named and as a result the data is not being properly parsed.

Check out the supported sourcetypes on our details page:

Sourcetypes
===========
Supported protocols and corresponding sourcetypes are:
------------------------------------------------------
| Protocol/format                 | Sourcetype       |
|---------------------------------|------------------|
| 1)  JSON over HTTPS             | fe_json          |
| 2)  XML over HTTPS              | fe_xml           |
| 3)  CEF over SYSLOG - TCP       | fe_cef_syslog    |
| 4)  CEF over SYSLOG - UDP       | fe_cef_syslog    |
| 5)  XML over SYSLOG - TCP       | fe_xml_syslog    |
| 6)  XML over SYSLOG - UDP       | fe_xml_syslog    |
| 7)  JSON over SYSLOG - TCP      | fe_json_syslog   |
| 😎  JSON over SYSLOG - UDP      | fe_json_syslog   |
| 9)  CSV over SYSLOG - TCP       | fe_csv_syslog    |
| 10)  CSV over SYSLOG - UDP      | fe_csv_syslog    |
| HX Endpoint Appliance           | hx_cef_syslog    |
| Threat Analytics Platform (TAP) | fe_tap_json      |
| Email Threat Prevention (ETP)   | fe_etp           |
------------------------------------------------------

Source: https://splunkbase.splunk.com/app/1845/#/details

Hope that helps.

Get Updates on the Splunk Community!

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...