-
Notifications
You must be signed in to change notification settings - Fork 111
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
app-parser for Commvault audit trail #1878
Comments
Can you please share the pcap to me using external slack channel, need to see how the raw sample looks like and if we can consider this data source for a parser. |
These are already the "raw" samples as seen when running tcpdump and when enabling SC4S_SOURCE_STORE_RAWMSG. |
@rlai0013, |
Hi @bparmar-splunk |
@rlai0013,
|
By TA I assume you mean Splunk add-on. There is no TA for this data
There is no TA, so no fixed sourcetype. I'm currently naming it commvault:syslog |
@rlai0013,
Please let us know in case of any further queries. |
Thanks for your help @bparmar-splunk |
@bparmar-splunk Can this be added as a known-vendor sourcetype? Alternately, how can I use this parser in my environment? |
@nitronarcosis, |
I notice that the latest version doesn't have the app-parser for Commvault audit trail? Is it being planned to be re-released in a future update? Thanks, |
Hi @akn-br since the vendor doesn't comply with RFC we provided a local parser that we'd rather not include in to the standard SC4S configuration. Please save this: #1878 (comment) to your local SC4S directory, for example |
Hi all,
Looking to ingest some Commvault audit trail logs. Unfortunately they are not RFC compliant so they go to the fallback index. I set up a very simple app-parser to get it to the correct index, but there are some issues.
Would be great to have an app-parser created for these logs.
Here are some redacted samples:
Thanks!
The text was updated successfully, but these errors were encountered: