Security

How do I install the Cisco CSA add-on?

Will_Hayes
Splunk Employee
Splunk Employee

How do I install and configure the Cisco Client Security Agent add-on on SplunkBase:

http://www.splunkbase.com/apps/All/4.x/Add-On/app:Cisco+Client+Security+Agent+Add+On

0 Karma

Will_Hayes
Splunk Employee
Splunk Employee

For starters these instructions are for the CSA not the ASA. CSA is the Client Security Agent. What you want is the Cisco Firewall Add-on found here:

http://splunkbase.splunk.com/apps/All/4.x/Add-On/app:Cisco+Firewalls

Unpack that archive into SPLUNK_HOME/etc/apps/ restart Splunk, point your firewall to the port you specified in data inputs and off you go.

Thanks for the colorful commentary, it brightened my day 🙂

0 Karma

jackd12
New Member

What the hell does this all mean? This is ridiculous for starters. I have spent over an hour trying to get Splunk to work with the ASA. I could have installed a linux machine and easily activated syslog by now. I'm rather disappointed with Splunk. What does all this data mean and why is it so hard to find a clear reference to all this? So much technical gibberish with no reference as to what it means. What a waste.

0 Karma

Will_Hayes
Splunk Employee
Splunk Employee

To install this add-on, unpack this file into $SPLUNK_HOME/etc/apps and restart.

The field extractions are set to sourcetype=cisco_csa there is also a host extraction for the clients name that requires a sourcetype of cisco_csa. The Reports use eventtype=cisco_csa. By default this eventtype is created with the search = sourcetype=cisco_csa.

If you already have the CSA log indexed under a different sourcetype you will need to update the props.conf and eventtypes.conf files in the local directory of this app.

In props.conf create the following entry, replacing the stanza name with your CSA sourcetype:

[enter_sourcetype_here]
TRANSFORMS = csa_hostoverride
REPORT-extract = csafields
SHOULD_LINEMERGE = false

In eventtypes.conf create the following entry, replacing the search terms with your CSA sourcetype:

[cisco_csa]
search =
tags = cisco client_security

The sample reports in this add-on rely on the search: eventtype=cisco_csa in order to report on CSA data. There is one scheduled search included in this add-on which creates an cache for the dashboard every 3 hours with a Splunk enterprise license. To change the schedule you can edit the following search under the manager:

Cisco Client Security Agent - DataCube

Get Updates on the Splunk Community!

Index This | I am a number, but when you add ‘G’ to me, I go away. What number am I?

March 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...

What’s New in Splunk App for PCI Compliance 5.3.1?

The Splunk App for PCI Compliance allows customers to extend the power of their existing Splunk solution with ...

Extending Observability Content to Splunk Cloud

Register to join us !   In this Extending Observability Content to Splunk Cloud Tech Talk, you'll see how to ...