<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Log Exporter guide in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/133138#M97048</link>
    <description>&lt;P&gt;Hi&amp;nbsp;@big&lt;/P&gt;
&lt;P&gt;Do you know if you have an option to configure on the SIEM to close abounded connections on it's own after certain TTL?&lt;/P&gt;
&lt;P&gt;Log Exporter opens a new connection only in case of existing connection is failing, if you are sure the I/S is good and the Syslog server is configured properly, I suggest to work with our support to troubleshoot the problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 03 Nov 2021 13:49:37 GMT</pubDate>
    <dc:creator>Miri_Ofir</dc:creator>
    <dc:date>2021-11-03T13:49:37Z</dc:date>
    <item>
      <title>Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9035#M96900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-left: .15in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;Hello All,&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;We have recently released the Log Exporter solution.&lt;BR /&gt;A few posts have already gone up and the full documentation can be found at &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk122323"&gt;sk122323&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;However, I've received&amp;nbsp;a few questions both on and offline and decided to create a sort of log exporter guide.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;But before I begin I’d like to point out that I’m not a Checkpoint spokesperson, nor is this an official checkpoint thread.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;I was part of the Log Exporter team and am creating this post as a public service.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;I’ll try to only focus on the current release, and please remember anything I might say regarding future releases is not binding or guaranteed. &lt;BR /&gt;Partly because I’m not the one who makes those decisions, and partly because priorities will shift based on customer feedback, resource limitations and a dozen other factors. The current plans and the current roadmap is likely to drastically change over time.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;And just for the fun of it, I’ll mostly use the question-answer format in this post (simply because I like it and it’s convenient).&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 0in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;Log Exporter – what is it?&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 0in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;Performance&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 0in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;Filters&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 0in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;Filters: Example 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 0in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;Filters: Example 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 0in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;Gosh darn it, I forgot something! (I'll edit and fill this in later)&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: 0in;"&gt;&lt;SPAN style="font-size: 12.0pt; color: windowtext;"&gt;Feature request&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2018 17:06:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9035#M96900</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-03-22T17:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9036#M96901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H1 style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;Log Exporter – what is it?&lt;/SPAN&gt;&lt;/H1&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;&amp;nbsp; &amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;So... what is it?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;Check Point "Log Exporter" is an easy and secure method for exporting Check Point logs in few standard protocols and formats.&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;STRONG&gt;&lt;EM&gt;Which protocols do you support?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;UDP and TCP.&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;We also support secure connections (TLS) using mutual authentication.&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;STRONG&gt;&lt;EM&gt;What formats do you support?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;At this time we support CEF, LEEF, Syslog and also a “generic” format.&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;EM&gt;&lt;STRONG&gt;Why isn’t field X covered in your CEF mapping?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;We developed our CEF mapping (choosing which checkpoint field is mapped to which CEF variable) in collaboration with Micro Focus (the owners of ArcSight), and it represents what we believe to be the best overall coverage of all the major fields from across our blades. However, since there are only a set number of available CEF variable we had to pick and choose which fields we wished to map. &lt;BR /&gt;If you feel a specific field should be given higher priority, or if you don’t use some blades and would rather remap those variable to other fields you can simply create a user-defined mapping file that reflects your own preferences.&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;EM&gt;&lt;STRONG&gt;What’s the deal with LEEF – is it support or not?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;Yes… with some caveats.&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;We are not yet fully LEEF compliant in that the timestamp is sent in epoch (which is not supported by LEEF). We do however have an ongoing collaboration with IBM and they plan to update LEEF to support epoch format as well.&lt;BR /&gt;Once they do that we will be LEEF compliant.&lt;BR /&gt;Unfortunately, I don’t have access to any of their timetables and don’t know when they are actually going to do this.&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;EM&gt;&lt;STRONG&gt;I use Splunk, and I didn’t notice CIM in the listed formats – what gives?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;We plan to release a Splunk application which will support CIM in a future Log Exporter release.&lt;BR /&gt;In the meantime, the Generic format will give good field extraction results.&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;EM&gt;&lt;STRONG&gt;I can’t find the policy name field. Where is it?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;The policy name field doesn’t actually exist as a unique field. It is part of the __policy_id_tag which is not really all that readable. In this release, we are filtering out this field by default, and plan to address this in a future release.&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;(if you really need this field you can remove the filter from the mapping file, bear in mind you’ll have to somehow parse the field to extract the relevant information.)&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;EM&gt;&lt;STRONG&gt;What about the domain name field?&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;Same answer as above.&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;&lt;EM&gt;&lt;STRONG&gt;In my SmartLog each log has a type such as log, alert, control etc.&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;Where can I find this information?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="margin-left: .15in;"&gt;This information is contained in the flags fields. Unfortunately, it’s not human readable (just a bunch of bits). For now, we are filtering this field out by default and plan to address this in a future release.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2018 17:06:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9036#M96901</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-03-22T17:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9037#M96902</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H1&gt;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;Performance&lt;/SPAN&gt;&lt;/H1&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;What is the CPU usage of the Log Exporter?&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; What is the memory consumption?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;How many logs/second can I export?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, those are really good questions.&lt;/P&gt;&lt;P&gt;Unfortunately, I don’t have any official answers.&lt;/P&gt;&lt;P&gt;I can give some anecdotal answers and specific examples or comments I’ve heard from customers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you tested this in your environment I encourage you to add your results/comments below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On a Smart-1 405 running R80.10 with CEF format over TCP, we saw ~18.2K logs/sec with a CPU usage of ~115% (1.15 out of 4 cores).&lt;/P&gt;&lt;P&gt;On a different environment running on a Smart-1 410 with CEF format over TLS we saw ~21.5K logs/sec with a CPU usage of ~115%&lt;/P&gt;&lt;P&gt;Another customer who compared the new solution to CPLogToSyslog stated that the new solution used fewer resources – but didn’t go into specifics.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again – these are anecdotal examples and not official numbers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our focus in this release was to make sure the log exporter was not the bottleneck – to make sure it can outperform the indexer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2018 17:06:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9037#M96902</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-03-22T17:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9038#M96903</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H1&gt;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;Filters&lt;/SPAN&gt;&lt;/H1&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;First of you need to know that Checkpoint logs are arranged in a key:value format.&lt;BR /&gt;source:1.2.3.4 action:drop [key]:[value]&lt;BR /&gt;I’ll use this information in some of my answers.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;My SIEM charges me based on storage/throughput – how can I reduce the number of logs I’m sending them?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;We know that the access logs (VPN-1 &amp;amp; Firewall-1) comprise the bulk of the logs for most customers. And in many cases, those are not really the interesting logs.&lt;BR /&gt;We added the option to filter out those logs. In the targetconfiguration.xml file you can find the filter_out_by_connection parameter. If you set this to true, your access log will not be sent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;That’s great! But I don’t really need the Application Control logs either. I only want the IPS logs to be sent. How can I do that?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, you can’t do that in this release.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;But I can see the different blades which are filtered out! What happens if I just add the Application Control blade there? Won’t that work?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;It probably will. But this isn’t recommended or supported. It wasn’t tested and could have unexpected results. &lt;BR /&gt;This is something we plan to address in future releases, but for now, it’s not supported.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;The only thing that really interests me is why my users are blocked. Can I send out just the drop logs?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, in this release, we don’t support value based filters. We can only filter based on the field (key).&lt;BR /&gt;Again we plan to address value based filters in a future release.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;So what type of filters can you do?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I’m glad you asked! Let’s look at some examples.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2018 17:06:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9038#M96903</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-03-22T17:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9039#M96904</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H1 style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;Filters: Example 1&lt;/SPAN&gt;&lt;/H1&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;&lt;SPAN style="font-size: 12.0pt;"&gt;The customer&lt;/SPAN&gt;&lt;SPAN style="font-size: 12.0pt;"&gt; wants to get identity awareness logs. He need to save a record going back at least one year, however, he has a storage problem.&lt;BR /&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="border: 0px; color: windowtext; font-weight: inherit; font-size: 12.0pt;"&gt;We start by looking at a sample IDA log.&lt;BR /&gt; &lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/64005_ida-logs.png" style="height: auto;" /&gt;&lt;BR /&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let’s analyze the raw data:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&amp;lt;134&amp;gt;1 2018-03-21 17:25:25 MDS-72 CheckPoint 13752 - [action:"Update"; flags:"150784"; ifdir:"inbound"; logid:"160571424"; loguid:"{0x5ab27965,0x0,0x5b20a8c0,0x7d5707b6}"; origin:"192.168.32.91"; originsicname:"CN=GW91,O=Domain2_Server..cuggd3"; sequencenum:"1"; time:"1521645925"; version:"5"; auth_method:"Machine Authentication (Active Directory)"; auth_status:"Successful Login"; authentication_trial:"this is a reauthentication for session 9a026bba"; client_name:"Active Directory Query"; client_version:"R80.10"; domain_name:"spec.mgmt"; endpoint_ip:"192.168.32.69"; identity_src:"AD Query"; identity_type:"machine"; product:"Identity Awareness"; snid:"9a026bba"; src:"192.168.32.69"; src_machine_group:"All Machines"; src_machine_name:"yonatanad";]&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;It contains a lot of relevant information, but some of those fields are probably not really relevant. Either because they contain information which is always static in my organization or information which is not IDA related.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I wanted to boil it down into the relevant information I’d probably end up with something closer to this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;action:"Update"; origin:"192.168.32.91"; time:"1521645925"; auth_status:"Successful Login"; domain_name:"spec.mgmt"; identity_src:"AD Query"; identity_type:"machine"; snid:"9a026bba"; src:"192.168.32.69"; src_machine_group:"All Machines"; src_machine_name:"yonatanad";&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Went down from 755 bits to around 323 bits, which is a reduction of ~60% in the log size.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I map out the relevant fields:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;action, origin, time, auth_status, domain_name, identity_src, identity_type, snid, src, src_machine_group, src_machine_name.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I then create a user-defined mapping file with those fields and set the exportAllFields parameter to false. Now only fields which appear in my mapping file will be sent (a sort of whitelist approach).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However this isn’t enough, as it will mean that I’ll get many logs from other blades which will be mostly empty - only containing those fields which exist in almost all logs such as action, origin, src, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if I want to make sure I only get Identity Awareness logs I’ll pick one (or more) of the fields which are unique to the Identity Awareness blade, such as the identity_src or identity_type fields and give those fields the ‘required’ attribute in the mapping file.&lt;/P&gt;&lt;P&gt;Now only logs which contain this field will be sent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The end result is that the customer has reduced his output to only IDA logs which only contain the bare minimum of what he actually needs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2018 17:06:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9039#M96904</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-03-22T17:06:56Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9040#M96905</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;H1 style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;Filters: Example 2&lt;/SPAN&gt;&lt;/H1&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The customer has a very large deployment and has hundreds of GB of logs per day.&lt;/P&gt;&lt;P&gt;His vendor charges him per bit sent, and the customer is looking to reduce his footprint anyway he can.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;He needs all his logs, so filtering out logs is not an option. Instead, he’s looking to reduce the size of each log sent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The whitelist approach won’t work this time as there are simply too many different fields. Instead, the customer is trying to identify fields which don’t contain relevant information and filter them out (a sort of blacklist approach).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let’s start with a random sample log.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&amp;lt;134&amp;gt;1 2018-03-21 18:09:26 MDS-72 CheckPoint 13752 - [action:"Accept"; conn_direction:"Outgoing"; flags:"6307840"; ifdir:"inbound"; ifname:"eth1"; logid:"320"; loguid:"{0x5a9fba17,0x0,0x5b20a8c0,0x149c}"; origin:"192.168.32.91"; originsicname:"CN=GW91,O=Domain2_Server..cuggd3"; sequencenum:"1"; time:"1521648566"; version:"5"; __policy_id_tag:"product=VPN-1 &amp;amp; FireWall-1[db_tag={BACD59B6-0BBC-A544-A5F9-A136152F0B37};mgmt=Domain2_Server;date=1520501096;policy_name=Standard\]"; aggregated_log_count:"242539"; bytes:"17427"; client_inbound_bytes:"5647"; client_inbound_packets:"65"; client_outbound_bytes:"11780"; client_outbound_packets:"62"; connection_count:"121149"; creation_time:"1520417303"; dst:"111.11.11.21"; duration:"1231263"; hll_key:"6523019790322755370"; inzone:"Internal"; last_hit_time:"1521648533"; layer_name:"Network"; layer_name:"Application"; layer_uuid:"d2787740-4872-4342-a0c1-58470e2d9bef"; layer_uuid:"cdeb4bd1-f11f-4d36-a78f-03cfa317d06d"; match_id:"1"; match_id:"16777219"; parent_rule:"0"; parent_rule:"0"; rule_action:"Accept"; rule_action:"Accept"; rule_name:"Network_Rule_One"; rule_name:"Appi_Cleanup rule"; rule_uid:"51419c04-5fc4-4263-8cca-e5d14f2dcf56"; rule_uid:"5440fb90-dd92-4e6a-8191-8957c279f3a9"; outzone:"External"; packets:"127"; product:"VPN-1 &amp;amp; FireWall-1"; proto:"17"; protocol:"DNS-UDP"; server_inbound_bytes:"11780"; server_inbound_packets:"62"; server_outbound_bytes:"5647"; server_outbound_packets:"65"; service:"53"; service_id:"domain-udp"; sig_id:"12"; src:"10.32.91.190"; update_count:"2054"; ]&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;We are starting out at 1549 bits.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Right off the bat, we need to decide if we need the header.&lt;/P&gt;&lt;P&gt;No? Let’s remove it for 55bits (per log).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next, I notice that the default field separator is semi-colon+space. I can reduce this to just the semi-colon for an extra 53bits.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now we try to identify fields which don’t interest me. Obviously, this is customer specific but I’d say that these fields can probably safely be removed in most cases:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;flags, originsicname, sequencenum, version, __policy_id_tag, layer_uuid, server_inbound_bytes, server_inbound_packets, server_outbound_bytes, server_outbound_packets &lt;EM&gt;( those are duplicates of client_outbound which already exists)&lt;/EM&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I could be much more aggressive with what I cut out but this is a good start.&lt;/P&gt;&lt;P&gt;Down to 982bits.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the next step is something that’s a bit more extreme but is from an actual use case where it was done.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is no point in sending out client_inbound_packets:"65" which has a large key and small value when I can just as easily send out F11:”65”.&lt;/P&gt;&lt;P&gt;I can create a mapping file on the receiving end (assuming the SIEM supports this) which knows to translate F11 back into the relevant key field.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I create the relevant mapping file where fields which I want to cut get the ‘&amp;lt;exported&amp;gt;false&amp;lt;/exported&amp;gt;’ property, and the rest of the fields will be mapped to relevant alpha-numeric codes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We end up with:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;F1:"Accept";F2:"Outgoing";F3:"inbound";F4:"eth1";F5:"320";F6:"{0x5a9fba17,0x0,0x5b20a8c0,0x149c}";F7:"192.168.32.91";F8:"1521648566";F9:"242539";F10:"17427";F11:"5647";F12:"65";F13:"11780";F14:"62";F15:"121149";F16:"1520417303";F17:"111.11.11.21";F18:"1231263";F19:"6523019790322755370";F20:"Internal";F21:"1521648533";F22:"Network";F22:"Application";F23:"1";F23:"16777219";F24:"0";F24:"0";F25:"Accept";F25:"Accept";F26:"Network_Rule_One";F26:"Appi_Cleanup rule";F27:"51419c04-5fc4-4263-8cca-e5d14f2dcf56";F27:"5440fb90-dd92-4e6a-8191-8957c279f3a9";F28:"External";F29:"127";F30:"VPN-1 &amp;amp; FireWall-1";F31:"17";F32:"DNS-UDP";F33:"53";F34:"domain-udp";F35:"12";F36:"10.32.91.190";F37:"2054";&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;687bits. We started with 1549bits so a reduction of ~55%&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And I can get better results if I’m willing to be fairly aggressive with my field filters.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: As was correctly pointed out, the unit of measurement is not actually bits, but bytes (number of characters&amp;nbsp;as given by a text editor word count).&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2018 17:07:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9040#M96905</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-03-22T17:07:03Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9041#M96906</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;Gosh darn it, I forgot something! (I'll edit and fill this in later)&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;Edit:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;I want to talk about callback functions.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;This feature was tested and is officially supported, however, we felt it was better to limit its exposure, which is why it's not present in the sk, and why I didn't mention it previously.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;This feature was added reluctantly and only because&amp;nbsp;the benefits it added in usability outstripped the potential detrimental impact. &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;It's a flexible and powerful tool which allowed us to add support for various use cases.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;Basically, we added some predefined functions for value manipulation within the mapping and definition&amp;nbsp;files. This feature already exists&amp;nbsp;in the mapping files, and anyone who digs around will see it and can figure this out on their own, we just didn't document it officially to discourage&amp;nbsp;users from making changes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;There are two main reasons to limit the exposure - first off, this is somewhat of a wildcard and we are fairly certain that if you try hard, you can probably find a way to break the product with the callback functions, and second they have an impact on performance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;Each usage&amp;nbsp;has a very small impact, but they can stack up rapidly with indiscriminate use. Especially if you have multiple callbacks per logs, with thousands of logs per second.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;so while I'm going to give a short review of the callback&amp;nbsp;functions, I wouldn't recommend using them indiscriminately.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;The callback functions that we added are as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;/P&gt;&lt;UL style="padding-left: 30px;"&gt;&lt;LI style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;replace_value: Swap values based on a key:value&amp;nbsp;chart. We use this to map the checkpoint severity (and other fields) to 3'rd party severity (CEF, LEEF,etc.)&lt;BR /&gt;&lt;/SPAN&gt;Example:&lt;BR /&gt;&amp;lt;field&amp;gt;&amp;lt;origName&amp;gt;app_risk&amp;lt;/origName&amp;gt;&amp;lt;dstName&amp;gt;cp_app_risk&amp;lt;/dstName&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;lt;callback&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;name&amp;gt;replace_value&amp;lt;/name&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;args&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;arg key="default" value="Unknown"/&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;arg key="0" value="Unknown"/&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;arg key="1" value="Low"/&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;arg key="2" value="Low"/&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;arg key="3" value="Medium"/&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;arg key="4" value="High"/&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;arg key="5" value="Very-High"/&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;/args&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;lt;/callback&amp;gt;&lt;BR /&gt;&amp;lt;/field&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;append_string: Append a string to the end of a string. We used this to transform the Linux time from seconds (checkpoint format) to milliseconds (CEF format)&lt;BR /&gt;Example:&lt;BR /&gt;&amp;lt;field&amp;gt;&amp;lt;origName&amp;gt;time&amp;lt;/origName&amp;gt;&amp;lt;dstName&amp;gt;rt&amp;lt;/dstName&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;lt;callback&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;name&amp;gt;append_string&amp;lt;/name&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;args&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;arg key="append" value="000"/&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;/args&amp;gt;&lt;BR /&gt;&amp;nbsp; &amp;lt;/callback&amp;gt;&lt;BR /&gt;&amp;lt;/field&amp;gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;format_timestamp: Change the time format. We used this to transform the time from Linux time (checkpoint format) to human readable (syslog format).&lt;BR /&gt;Example:&lt;BR /&gt;&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;&amp;lt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: brown;"&gt;callback&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;&amp;gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;&amp;lt;&lt;/SPAN&gt;&lt;SPAN style="color: brown;"&gt;name&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;&amp;gt;format_timestamp&amp;lt;/&lt;/SPAN&gt;&lt;SPAN style="color: brown;"&gt;name&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;&amp;gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: brown;"&gt;args&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;&amp;gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;lt;&lt;/SPAN&gt;&lt;SPAN style="color: brown;"&gt;arg&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt; &lt;STRONG&gt;key=&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: green;"&gt;"format"&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt; &lt;STRONG&gt;value=&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: green;"&gt;"MY CUSTOM FORMAT"&lt;/SPAN&gt;&lt;SPAN style="color: black;"&gt;/&amp;gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;/&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: brown;"&gt;args&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;&amp;gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;&amp;lt;/&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: brown;"&gt;callback&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt;&amp;gt;&lt;BR /&gt;&lt;BR /&gt;The default format if none is used is: &lt;SPAN style="color: green;"&gt;"%Y-%m-%dT%H:%M:%SZ"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;Hope this post is helpful, and please be mindful of your usage of callback functions.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2018 17:07:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9041#M96906</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-03-22T17:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9042#M96907</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV class="" style="border: 0px; font-weight: inherit; padding: 30px 50px;"&gt;&lt;H1 style="border: 0px; font-weight: inherit; margin: 0px 0px 0px 0in;"&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;Feature request&lt;/SPAN&gt;&lt;/H1&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;So, did we miss anything? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;(of course we did! This was just the first release, we still have lots of features we want to add...)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;Feel free to reply to this post with any suggestions and requests you have for future releases of this solution.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;We take customer feedback very seriously, and it can often help us prioritize some features over others.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;It will also help us if you can try to categorize your requests by importance - how urgent and/or important each request is?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;Please remember that we can only do so many things at any given time, and so correctly prioritizing features is always a challenge.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;I truly hope you found this (long) post helpful.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;If you have any other questions leave a comment and I'll try to address it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: windowtext; border: 0px; font-weight: inherit; font-size: 12pt;"&gt;&amp;nbsp;Yonatan&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV style="border: 0px; font-weight: inherit; font-size: 14px;"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Mar 2018 17:07:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9042#M96907</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-03-22T17:07:21Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9043#M96908</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for this discussion - very helpfull !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2018 09:36:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9043#M96908</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-03-23T09:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9044#M96909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Yonatan,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this good looking tool going to replace the LEA connection in the near future?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, Maarten&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2018 22:06:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9044#M96909</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-03-23T22:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9045#M96910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Maarten,&lt;/P&gt;&lt;P&gt;I'm not entirely sure what you mean by that, but I'll say that while this tool does open up some new possibilities, and we might take advantage of them in the future, I'm not aware of anything along those lines that is planned for the near future.&lt;/P&gt;&lt;P&gt;But keep in mind that I already mentioned I'm not the one who makes those decisions, so it's possible that something is in the road map and I'm just not aware of it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do have several improvements and features that we wish to add to this tool and they will probably be done first (we've already started working on some things, but nothing I can share).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regads,&lt;/P&gt;&lt;P&gt;&amp;nbsp;Yonatan&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Mar 2018 15:03:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9045#M96910</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-03-24T15:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9046#M96911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What I mean by that is that the LEA (OPSEC) connection currently is used to send instant log information to other systems that are mainly used for SIEM solutions. As I have seen some entries on LogEport mentioning similar functionality, but with additional lfiltering on top, it looks to me all the info getting to the log can be exported as well.&lt;/P&gt;&lt;P&gt;Currently the LEA connection is missing out some of the information, some log-in records ie and also not all fields seem to reach the external system.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So that's what I mean by it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, Maarten.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 24 Mar 2018 18:44:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9046#M96911</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-03-24T18:44:20Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9047#M96912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I&amp;nbsp;believe the plan is to build new functionality/enhancements into the Log Exporter tool versus extend LEA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;That doesn't mean LEA goes away, but different and more integrations will be possible with Log Exporter over time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Mar 2018 23:18:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9047#M96912</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-03-30T23:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9048#M96913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was recently asked about JSON support for the log exporter, and my initial reaction was that it isn't supported in the current release.&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, after looking into this a bit more, I found that although some basic manipulation of the configuration files I'm able to reformat the logs into a format that passes JSON validators.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, just because the output passes validators doesn't actually make it useful.&lt;/P&gt;&lt;P&gt;It's formatted as json, but a very basic and simplified form of json.&lt;BR /&gt;An example log would look like this:&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;{"action":"Drop", "ifdir":"inbound", "ifname":"eth1", "loguid":"{0x0,0x0,0x0,0x0}", "origin":"192.168.32.91",&amp;nbsp; "time":"1522592600", "version":"5", "dst":"10.32.30.255", "message_info":"Address spoofing", "product":"VPN-1 &amp;amp; FireWall-1", "proto":"17", "s_port":"137", "service":"137", "src":"10.32.30.20", "":""}&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing that should be noted is that we do have duplicate keys, and while this is compliant with the RFC, it is not recommended&amp;nbsp;(but can't be helped with the current release).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was wondering if anyone has a use case where such json output would be useful, and if so what specifically are the requirements? does it just have to just be json compliant or is there anything specific that you'd be looking for?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For those that are interested here is the configuration I used to transformat&amp;nbsp;the log to a json format:&lt;/P&gt;&lt;P&gt;&amp;lt;start_message_body&amp;gt;{"&amp;lt;/start_message_body&amp;gt;&lt;BR /&gt;&amp;lt;end_message_body&amp;gt;":""}&amp;lt;/end_message_body&amp;gt;&lt;BR /&gt;&amp;lt;message_separator&amp;gt;&amp;amp;#10;&amp;lt;/message_separator&amp;gt;&amp;lt;!-- &amp;amp;#10;=='\n' --&amp;gt;&lt;BR /&gt;&amp;lt;fields_separatator&amp;gt;, "&amp;lt;/fields_separatator&amp;gt;&lt;BR /&gt;&amp;lt;field_value_separatator&amp;gt;":&amp;lt;/field_value_separatator&amp;gt;&lt;BR /&gt;&amp;lt;value_encapsulation_start&amp;gt;&amp;amp;quot;&amp;lt;/value_encapsulation_start&amp;gt;&lt;BR /&gt;&amp;lt;value_encapsulation_end&amp;gt;&amp;amp;quot;&amp;lt;/value_encapsulation_end&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: It adds an empty "":"" at the end of the log for convenience.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd be interested to hear feedback about json related use cases.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;Yonatan&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Apr 2018 14:47:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9048#M96913</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-04-01T14:47:37Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9049#M96914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Without thinking on this subject at length, one of the possible use cases will be integration with cloud services native logging and enforcement systems. We could, conceivably, output the json formatted events to the AWS CloudWatch to have native integrated metrics, alarms etc..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Apr 2018 15:45:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9049#M96914</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-04-01T15:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9050#M96915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But would any of those applications actually be able to make sense of the data?&lt;/P&gt;&lt;P&gt;Just because it can officially be called 'json' doesn't mean it's can actually be parsed into useful data. That's what I meant when I asked if there are any requirements other than just being 'json'?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Apr 2018 18:06:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9050#M96915</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-04-01T18:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9051#M96916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It looks like in AWS' case, they do not much care what data you are logging to them, so long as it is in JSON:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://aws.amazon.com/about-aws/whats-new/2015/01/20/amazon-cloudwatch-logs-json-log-format-support/" title="https://aws.amazon.com/about-aws/whats-new/2015/01/20/amazon-cloudwatch-logs-json-log-format-support/"&gt;Amazon CloudWatch Logs JSON Log Format Support&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You pretty much defining filters in CloudWatch yourself to look for patterns in your logs and define metrics, alerts and events based on those:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/FilterAndPatternSyntax.html" title="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/FilterAndPatternSyntax.html"&gt;Filter and Pattern Syntax - Amazon CloudWatch Logs&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 01 Apr 2018 18:19:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9051#M96916</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-04-01T18:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9052#M96917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to have the CMA's IP address as origin IP instead of the MDS IP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R.P. de Beer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Apr 2018 09:17:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9052#M96917</guid>
      <dc:creator>RPdeBeer</dc:creator>
      <dc:date>2018-04-24T09:17:59Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9053#M96918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Yonatan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you mind telling me what format to use to send logs from R77.30.03 endpoint management server to R80.10 gateway management server?&amp;nbsp; It would be helpful if you could provide an example using this script.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;cp_log_export add name &amp;lt;name&amp;gt; [domain-server &amp;lt;domain-server&amp;gt;] target-server &amp;lt;target-server&amp;gt; target-port &amp;lt;target-port&amp;gt; protocol &amp;lt;(udp|tcp)&amp;gt; format &amp;lt;(syslog)|(cef)&amp;gt; [optional arguments]&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;D. Roddy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Apr 2018 22:31:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9053#M96918</guid>
      <dc:creator>Dan_Roddy</dc:creator>
      <dc:date>2018-04-24T22:31:50Z</dc:date>
    </item>
    <item>
      <title>Re: Log Exporter guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9054#M96919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Rutger-Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11pt; color: #000000;"&gt;We are aware of this issue. It was a limitation on the first release.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11pt; color: #000000;"&gt;Because domains are actually aliases (on the network level) the exporter sends out the logs with the server’s IP which is the MDS IP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11pt; color: #000000;"&gt;This is addressed in R80.20, and we will possibly also address this in the next release for R80.10 as well.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11pt; color: #000000;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11pt; color: #000000;"&gt;&amp;nbsp;Yonatan&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Apr 2018 07:19:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Log-Exporter-guide/m-p/9054#M96919</guid>
      <dc:creator>Yonatan_Philip</dc:creator>
      <dc:date>2018-04-29T07:19:18Z</dc:date>
    </item>
  </channel>
</rss>

