<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Getting &amp;quot;engine fatal&amp;quot; error in Minemeld. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/getting-quot-engine-fatal-quot-error-in-minemeld/m-p/146989#M98801</link>
    <description>&lt;P&gt;Hi Luigi, this is in reference to ticket&amp;nbsp;00632153. &amp;nbsp;Two issues here:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. While attempting to work on issue #2, I noticed that I am getting an "engine fatal" error in Minemeld. Version is 9.34. Have restarted engine, but the issue is still there.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. I would like to build a custom exclusion for the below Amazon IP list so that addresses are dynamically updated and can be allowed by Minemeld and an access rule in our Palo Alto that points to it. Is this possible in 9.3.4 or do I &amp;nbsp;need an upgrade?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Amazon list:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://ip-ranges.amazonaws.com/ip-ranges.json" target="_blank"&gt;https://ip-ranges.amazonaws.com/ip-ranges.json&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Article you wrote about how to do this. Want to make sure that this is still the best way to do this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/MineMeld-Discussions/What-s-new-in-MineMeld-0-9-9/m-p/76690#U76690" target="_blank"&gt;https://live.paloaltonetworks.com/t5/MineMeld-Discussions/What-s-new-in-MineMeld-0-9-9/m-p/76690#U76690&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for all your help!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 09 Mar 2017 22:12:16 GMT</pubDate>
    <dc:creator>BobHarrison</dc:creator>
    <dc:date>2017-03-09T22:12:16Z</dc:date>
    <item>
      <title>Getting "engine fatal" error in Minemeld.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-quot-engine-fatal-quot-error-in-minemeld/m-p/146989#M98801</link>
      <description>&lt;P&gt;Hi Luigi, this is in reference to ticket&amp;nbsp;00632153. &amp;nbsp;Two issues here:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. While attempting to work on issue #2, I noticed that I am getting an "engine fatal" error in Minemeld. Version is 9.34. Have restarted engine, but the issue is still there.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. I would like to build a custom exclusion for the below Amazon IP list so that addresses are dynamically updated and can be allowed by Minemeld and an access rule in our Palo Alto that points to it. Is this possible in 9.3.4 or do I &amp;nbsp;need an upgrade?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Amazon list:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://ip-ranges.amazonaws.com/ip-ranges.json" target="_blank"&gt;https://ip-ranges.amazonaws.com/ip-ranges.json&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Article you wrote about how to do this. Want to make sure that this is still the best way to do this?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/MineMeld-Discussions/What-s-new-in-MineMeld-0-9-9/m-p/76690#U76690" target="_blank"&gt;https://live.paloaltonetworks.com/t5/MineMeld-Discussions/What-s-new-in-MineMeld-0-9-9/m-p/76690#U76690&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for all your help!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2017 22:12:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-quot-engine-fatal-quot-error-in-minemeld/m-p/146989#M98801</guid>
      <dc:creator>BobHarrison</dc:creator>
      <dc:date>2017-03-09T22:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: Getting "engine fatal" error in Minemeld.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-quot-engine-fatal-quot-error-in-minemeld/m-p/147070#M98802</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/48629"&gt;@BobHarrison&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;there is a builtin prototype to monitor that URL aleady, it's called&amp;nbsp;&lt;EM&gt;aws.AMAZON&lt;/EM&gt;. There a many ways you can use this Miner, following are the 2 most common use cases:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;1. Direct EDL for PAN-OS&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;If you want to create a feed for those AMAZON IP ranges, you can go in &lt;EM&gt;CONFIG &amp;gt;&amp;nbsp;IMPORT&lt;/EM&gt;, paste the following snippet and then press &lt;EM&gt;APPEND (and COMMIT :-))&lt;/EM&gt;. You can then point PAN-OS EDL to https://&amp;lt;minemeld&amp;gt;/feeds/feedAmazonIPs.&lt;/P&gt;
&lt;PRE&gt;nodes:
  amazonIPs:
    inputs: []
    output: true
    prototype: aws.AMAZON
  feedAmazonIPs:
    inputs:
      - amazonIPs
    output: false
    prototype: stdlib.feedHCGreenWithValue
&lt;/PRE&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;2. WHITELIST in MINEMELD&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;If instead you would like to use those IP Ranges for whitelisting indicators directly on MineMeld you can use the following snippet:&lt;/P&gt;
&lt;PRE&gt;nodes:
  wlAmazonIPs:
    inputs: []
    output: true
    prototype: aws.AMAZON&lt;/PRE&gt;
&lt;P&gt;This will create a Miner for AMAZON IPs that you can connect to IPv4 aggregators to automatically remove Amazon IPs from the feeds. The trick here is the "&lt;STRONG&gt;wl&lt;/STRONG&gt;" prefix in the name of the Miner. Aggregators treat as whitelist all the indicators coming from Miner starting with &lt;STRONG&gt;wl&lt;/STRONG&gt;. See the example graph below, &lt;EM&gt;aggregatorIPv4&lt;/EM&gt; automatically removes indicators sent by &lt;EM&gt;ransomwaretacker_RW_IPBL&lt;/EM&gt; overlapping the ranges coming from &lt;EM&gt;wlAmazonIPs&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2017-03-10 at 11.57.43.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8088i7C4C17B56A948317/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2017-03-10 at 11.57.43.png" alt="Screen Shot 2017-03-10 at 11.57.43.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2017 11:01:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-quot-engine-fatal-quot-error-in-minemeld/m-p/147070#M98802</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-03-10T11:01:31Z</dc:date>
    </item>
    <item>
      <title>Re: Getting "engine fatal" error in Minemeld.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-quot-engine-fatal-quot-error-in-minemeld/m-p/147145#M98803</link>
      <description>&lt;P&gt;Hi Luigi, thanks for your input.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. I am still getting "engine-fatal" issue in Minemeld?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. What is the preferred method of the two? Currently we are using minemeld by having a DENY access-list that points to "Emerging threats feed", "high confidence feed", etc. &amp;nbsp;Should I be creating a second access-list that is a PERMIT list that points to the url of our minemeld server?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2017 19:18:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-quot-engine-fatal-quot-error-in-minemeld/m-p/147145#M98803</guid>
      <dc:creator>BobHarrison</dc:creator>
      <dc:date>2017-03-10T19:18:47Z</dc:date>
    </item>
    <item>
      <title>Re: Getting "engine fatal" error in Minemeld.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-quot-engine-fatal-quot-error-in-minemeld/m-p/147173#M98804</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/48629"&gt;@BobHarrison&lt;/a&gt;,&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;please, could you download and send me the minemeld-engine.log file from SYSTEM &amp;gt; DASHBAORD &amp;gt; ENGINE &amp;gt; LOGS ? My email address is lmori@paloaltonetworks.com&lt;/LI&gt;
&lt;LI&gt;It depends on your what is your ultimate goal. If you would like to allow all the traffic going to any AMAZON service, then the best way to do it is a new EDL pointing to the new feed. If instead you want to be sure that your OSINT feeds are not blacklisting any Amazon IP address, then you should go for solution 2) - whitelist inside MineMeld.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Sat, 11 Mar 2017 00:13:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-quot-engine-fatal-quot-error-in-minemeld/m-p/147173#M98804</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-03-11T00:13:03Z</dc:date>
    </item>
  </channel>
</rss>

