Closed rlai0013 closed 1 year ago
Can you please share the pcap to me using external slack channel, need to see how the raw sample looks like and if we can consider this data source for a parser.
These are already the "raw" samples as seen when running tcpdump and when enabling SC4S_SOURCE_STORE_RAWMSG.
@rlai0013, Is this issue still exist ?
Hi @bparmar-splunk Yes, this issue still exists.
@rlai0013, Could you please answer following questions:
what is the source (what TA is associated to this sample)?
What is the sourcetype of the message?
@bparmar-splunk
- what is the source (what TA is associated to this sample)?
By TA I assume you mean Splunk add-on. There is no TA for this data
- What is the sourcetype of the message?
There is no TA, so no fixed sourcetype. I'm currently naming it commvault:syslog
@rlai0013, Since this parser does not have TA associated, nor it is RFC compliant. I am mentioning the parser below that parses above messages.
rewrite set_raw_commvault_audit{
set-tag("wireformat:raw_commvault_audit");
};
filter f_is_raw_commvault_audit{
tags("wireformat:raw_commvault_audit");
};
block parser app-raw-commvault_audit() {
channel {
rewrite{
r_set_splunk_dest_default(
index('netfw')
sourcetype('commvault:syslog')
vendor("commvault")
product("audit")
);
};
parser {
kv-parser(prefix(".values.") pair-separator(" ") template(t_hdr_msg));
};
parser {
regexp-parser(
prefix(".tmp.")
patterns('(?<message>(?<message_pre>AuditTrail.*)Audittime\s=\s{(?<timestamp>\d{2}\s\w{3}\s\d{4}\s\d{2}:\d{2}:\d{2})}\sSeveritylevel)')
);
};
parser {
date-parser(
format(
'%d %b %Y %H:%M:%S'
)
template("${.tmp.timestamp}")
);
};
rewrite(set_raw);
rewrite(set_raw_commvault_audit);
rewrite(r_set_source_identified);
};
};
application app-raw-commvault_audit[sc4s-raw-syslog] {
filter {
message('AuditTrail' type(string) flags(prefix));
};
parser { app-raw-commvault_audit(); };
};
Please let us know in case of any further queries.
Thanks for your help @bparmar-splunk
@bparmar-splunk Can this be added as a known-vendor sourcetype? Alternately, how can I use this parser in my environment?
@nitronarcosis, Please refer FAQ page for your query.
I notice that the latest version doesn't have the app-parser for Commvault audit trail? Is it being planned to be re-released in a future update?
Thanks, AKN
Hi @akn-br since the vendor doesn't comply with RFC we provided a local parser that we'd rather not include in to the standard SC4S configuration.
Please save this: https://github.com/splunk/splunk-connect-for-syslog/issues/1878#issuecomment-1406398473 to your local SC4S directory, for example /opt/sc4s/local/config/app_parsers
, and restart SC4S.
Hi all,
Looking to ingest some Commvault audit trail logs. Unfortunately they are not RFC compliant so they go to the fallback index. I set up a very simple app-parser to get it to the correct index, but there are some issues.
Would be great to have an app-parser created for these logs.
Here are some redacted samples:
Thanks!