icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Juniper Netscreen extractions
SHA256 checksum (juniper-netscreen-extractions_16.tgz) 78ffe15f4a438e16560ff3b403a652cc59521d649ffe1cd8d9b8d59f3aa0c22d SHA256 checksum (juniper-netscreen-extractions_15.tgz) 0cc40facf55ddd822ff87b55421e0711ffd6aaefaa722aaa0199e2ea3c1934b0
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Juniper Netscreen extractions

This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
Extractions for Juniper Netscreen firewall logs.

NOTE:

THERE SEEMS TO BE AN ERROR WHEN UPGRADING THROUGH THE GUI. EVERYTHING IS SET PROPERLY IN THE BUNDLE, SO I'VE OPENED A TICKET WITH SPLUNK SUPPORT TO HELP GET THIS RESOLVED. IN THE MEANTIME, YOU CAN UPDATE THE APP BY MANUALLY INSTALLING/EXTRACTING IT. WILL LET YOU KNOW ONCE THIS IS RESOLVED. THANKS.


This adds the tag "fw" and globally exports it. If you have anything existing named "fw", please either rename your existing "fw" to something else, or disable the tag in this addon by creating and then editing the file "SPLUNK_HOME/etc/apps/netscreen/local/tags.conf" once it's installed. Add the following:

[sourcetype=netscreen]
fw = disabled

then save the file and restart Splunk to pick up this change.


This is a simple package that has much more robust and detailed extractions for Juniper Netscreen style firewall logs than I was able to find anywhere else. The main difference that I was never seeing in anything else available was that the timestamps being keyed off of were not those embedded in the FW messages themselves. This keys off of the "start_time" field for regular traffic; for other traffic it uses the timestamps embedded in the message text (usually near the very end of the line). All the fields extracted are based (where possible) on the documented Splunk CIM available online.

Note that these are written expressly for the log format that I was able to observe from our firewalls in testing. It's POSSIBLE that it may not conform exactly to your format, but as far as I'm aware, it should.

Also note that this adds an explicit sourcetype of "netscreen" for the data, so you may want to alias that if you use something else.

Release Notes

Version 1.6
March 27, 2012
  • Bumped the version to make sure that the newest file is being served up. For any further GUI based upgrade issues, note that I now have a ticket open. Manual download and extraction should still work fine.

From 1.5:
- Hopefully this will clear up any installation issues. Modified the metadata file to be default.meta instead of local.meta, per the FAQ.
- Also removed some extraneous config stanzas in the meta file that might have been causing the GUI errors.
- Finally, repackaged the file as ".spl" instead of the old ".tar.gz", again, per the FAQ.

Version 1.5
March 27, 2012
  • Hopefully this will clear up any installation issues. Modified the metadata file to be default.meta instead of local.meta, per the FAQ.
  • Also removed some extraneous config stanzas in the meta file that might have been causing the GUI errors.
  • Finally, repackaged the file as ".spl" instead of the old ".tar.gz", again, per the FAQ.

If there's STILL any install errors, please let me know.


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.