All Apps and Add-ons

Cisco ASA fields extraction

obatard
New Member

Hello,

I have to analyze a flat log file of a CISCO asa syslog.
I uploaded the file via the Data input option.

Splunk doesn't recognize the fields like SRC/DST IP and port while I installed the Cisco Firewall app. The cisco_asa source type is not available into the list of source type during the upload.

Do you have an idea ?

Thanks

0 Karma

obatard
New Member

I found the solution.

  • First, create a file inputs.conf if it doesn't exist in /opt/splunk/etc/apps/Splunk_CiscoFirewalls/local/[inputs.conf]

  • Set into the file
    [monitor:///path_to_the_directory_to_be_monitored]
    disabled = false
    sourcetype = cisco_asa
    index = main

  • In Splunk, go to settings, data inputs, Add data. Next, click on "A file or directory of files" and click "Next"
    Select "Skip preview", write the same full path than in the inputs.conf file. Let the source type on Automatic and the index on main.

  • Wait to the data to be indexed

    • Think to add fields (src/dst ip etc... in the left pan) in the search app

Regards,

0 Karma
Get Updates on the Splunk Community!

Stay Connected: Your Guide to May Tech Talks, Office Hours, and Webinars!

Take a look below to explore our upcoming Community Office Hours, Tech Talks, and Webinars this month. This ...

They're back! Join the SplunkTrust and MVP at .conf24

With our highly anticipated annual conference, .conf, comes the fez-wearers you can trust! The SplunkTrust, as ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had two releases of new security content via the Enterprise ...