All Apps and Add-ons

"Device Port" and "Port" incorrectly extracted in CSCOacs_Failed_Attempts type messages in TA for Cisco ACS

pvarelab
Path Finder

The "Device Port" and "Port" fields are incorrectly extracted in messages of the CSCOacs_Failed_Attempts kind in the Technology Add-on for Cisco Secure Access Control Server (ACS).

I have been able to solve it by adding the following to props.conf:

 

EXTRACT-acs_device_port = ,\s+Device\s+Port=(?<Device_Port>[^,]+)
EXTRACT-acs_port = ,\s+Port=(?<Port>[^,]+)

 

Has anyone had the same problem? Any other ideas?

@dshpritzCould you see if this fix could be included in a future versión of the App, please? Thanks!

Labels (2)
1 Solution

dshpritz
SplunkTrust
SplunkTrust

Added and uploaded to Splunkbase. Not sure how soon it will be visible.

View solution in original post

0 Karma

dshpritz
SplunkTrust
SplunkTrust

I added an issue to the github repo to cover this:

https://github.com/automine/TA-cisco_acs/issues/1

 

0 Karma

dshpritz
SplunkTrust
SplunkTrust

Added and uploaded to Splunkbase. Not sure how soon it will be visible.

0 Karma

pvarelab
Path Finder

It's already visible. Many thanks!

0 Karma
Get Updates on the Splunk Community!

More Ways To Control Your Costs With Archived Metrics | Register for Tech Talk

Tuesday, May 14, 2024  |  11AM PT / 2PM ET Register to Attend Join us for this Tech Talk and learn how to ...

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...