Splunk® Enterprise Security

Data Source Integration Manual

Acrobat logo Download manual as PDF

This documentation does not apply to the most recent version of ES. Click here for the latest version.
Acrobat logo Download topic as PDF


I edited the transforms from Splunk Web and now I have content in the local directory. How do I merge this with the default content?

You can merge content from the local directory by copying the stanzas from the file in local directory into the corresponding file in the default directory.

For example say you want to merge the following:

The local transforms file (local/transforms.conf) includes:


   REGEX = (.)
   FORMAT = product::"Proxy"

The default transforms file (default/transforms.conf) includes:

   REPORT-0auto_kv_for_bluecoat = auto_kv_for_bluecoat

The combined transforms file (in default/transforms.conf) would look like this:

   REPORT-0auto_kv_for_bluecoat = auto_kv_for_bluecoat
   REGEX = (.)
   FORMAT = product::"Proxy"

Once you have migrated all the stanzas, make sure to delete the files in the local directory.

My source data is mostly tab-delimited, but the first three fields are space-delimited... these fields contain the date and time, the log host, and the log type. What should I do?

Put these fields into one field called log_header and ignore it. The fields are not necessary for the add-on to function.

My Nessus data appears to have incorrect time stamps. How do I fix this?

By default, infrequently indexed data like Nessus is indexed using current time to make it automatically available to time-sensitive vulnerability tracking searches, so that it will be seen as more than raw data.

To index using the individual scan ending times, edit TA-Nessus/defaults/prop.conf, comment the "Index w/ current time" section, and uncomment the "Index w/ ReportHost StopTime" option (as follows):

  ## Index w/ current time
  ## vs. Index w/ ReportHost StopTime
  TIME_PREFIX = end_time="
  TIME_FORMAT = %a %b  %d %H:%M:%S %Y

If the Nessus data appears properly in the Search bar but is not appearing in Vulnerability Center, the data is too old to be searched for notable events. Clone these three searches:

  • Network -- Vulnerability Scanner Detection (by event) -- Rule
  • Network -- Vulnerability Scanner Detection (by targets) -- Rule
  • Network -- Vulnerability Tracker -- Lookup Gen

and then manually run the clones a single time across the time period covering the newly imported Nessus scans.

Known Issues

Splunk fails to extract values spanning multiple lines

Splunk fails to automatically extract values when those values span multiple lines. The fields are extracted with the correct name but the value is left empty if the original value includes multiple lines.

To work around this issue, create a transform that extracts the entire field. Below is a transform that extracts the multi-line field "message" for the source type "acme_firewall":

In transforms.conf:

   REGEX = ,\s+message=\"(.*?)(\",\s+\S+\=)
   FORMAT = message::"$1"

Then, enable the transform in default/props.conf in the add-on folder:

   REPORT-0 message_for_acme_firewall = message_for_acme_firewall
Last modified on 05 May, 2014
Example 2: OSSEC
More resources

This documentation applies to the following versions of Splunk® Enterprise Security: 3.1, 3.1.1, 3.2, 3.2.1, 3.2.2, 3.3.0, 3.3.1, 3.3.2, 3.3.3

Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters