All Apps and Add-ons

What to do about NGFW logs via syslog

mwoods2
New Member

I've looked at a few apps for Cisco Firepower and it's still not clear to me what I need.

We have the NGFW which are managed via FTD. We get eStreamer events which are parsed via eNcore. That all seems to be working well. But for the actual firewall events (permits/denies/etc), those are being sent via syslog to a syslog forwarder. The events are being ingested, but are not being parsed correctly for searching so rather than the fields we need, the event is basically one big raw blob.

Anyone know what we'd need for the extracts for this? I've looked at this app and it seems to match, but it's not really clear to me.

So any help is appreciated.

Thanks!

0 Karma

rajindurbal
Path Finder

Good Evening @mwoods2 ,

Can you tell us which firepower version you are using? You may need a different version of the add-on depending on the version you are running.

https://splunkbase.splunk.com/app/3662/

0 Karma
Get Updates on the Splunk Community!

Welcome to the Splunk Community!

(view in My Videos) We're so glad you're here! The Splunk Community is place to connect, learn, give back, and ...

Tech Talk | Elevating Digital Service Excellence: The Synergy of Splunk RUM & APM

Elevating Digital Service Excellence: The Synergy of Real User Monitoring and Application Performance ...

Adoption of RUM and APM at Splunk

    Unleash the power of Splunk Observability   Watch Now In this can't miss Tech Talk! The Splunk Growth ...