<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco CSA Indexing Issue in Security</title>
    <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19419#M633</link>
    <description>&lt;P&gt;v4.3.1 on sles 11.1&lt;/P&gt;

&lt;P&gt;i have my cisco csa v5.2.0.278 alerts going to splunk via udp 162 (snmp traps)&lt;/P&gt;

&lt;P&gt;the raw data (via splunk view) looks like this&lt;BR /&gt;
0\x82\u0002\xC3\u0002\u0001\u0001\u0004\u0006public\xA7\x82\u0002\xB4\u0002\u0003\u001b3\xFA\u0002\u0001&lt;/P&gt;

&lt;P&gt;and the Client Security App doesnt display anything. i set the source type to cisco_csa, so why this App not working?&lt;/P&gt;

&lt;P&gt;the raw data from tcpdump for a snmp trap is:&lt;BR /&gt;
16:56:05.188160 IP (tos 0x0, ttl 128, id 24807, offset 0, flags [none], proto UDP (17), length 762) venom.prod.org.cplscrambler-lg &amp;gt; SPLUNK.PROD.ORG.snmptrap:  { SNMPv2c { V2Trap(715) R=1783164  system.sysUpTime.0=116503972 S:1.1.4.1.0=E:8590.3.1 E:8590.2.1=10317498 E:8590.2.2=1374 E:8590.2.3="HOSTB.prod.org" E:8590.2.4="2012-04-04 16:56:00.000" E:8590.2.5=2 E:8590.2.6=179 E:8590.2.7= E:8590.2.8= E:8590.2.9= E:8590.2.10= E:8590.2.11="The 'Service Control Manager' service logged event code 7036 into the system event log: The Ati HotKey Poller service entered the stopped state. " E:8590.2.12=1658 E:8590.2.13="10.132.194.174" E:8590.2.14="W" E:8590.2.15= E:8590.2.16= E:8590.2.17="NT Event log" E:8590.2.18="" E:8590.2.19=280 E:8590.2.20="CSA Service Monitoring" E:8590.2.21= E:8590.2.22= E:8590.2.23=0 } }&lt;/P&gt;</description>
    <pubDate>Wed, 04 Apr 2012 20:36:29 GMT</pubDate>
    <dc:creator>cvajs</dc:creator>
    <dc:date>2012-04-04T20:36:29Z</dc:date>
    <item>
      <title>Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19419#M633</link>
      <description>&lt;P&gt;v4.3.1 on sles 11.1&lt;/P&gt;

&lt;P&gt;i have my cisco csa v5.2.0.278 alerts going to splunk via udp 162 (snmp traps)&lt;/P&gt;

&lt;P&gt;the raw data (via splunk view) looks like this&lt;BR /&gt;
0\x82\u0002\xC3\u0002\u0001\u0001\u0004\u0006public\xA7\x82\u0002\xB4\u0002\u0003\u001b3\xFA\u0002\u0001&lt;/P&gt;

&lt;P&gt;and the Client Security App doesnt display anything. i set the source type to cisco_csa, so why this App not working?&lt;/P&gt;

&lt;P&gt;the raw data from tcpdump for a snmp trap is:&lt;BR /&gt;
16:56:05.188160 IP (tos 0x0, ttl 128, id 24807, offset 0, flags [none], proto UDP (17), length 762) venom.prod.org.cplscrambler-lg &amp;gt; SPLUNK.PROD.ORG.snmptrap:  { SNMPv2c { V2Trap(715) R=1783164  system.sysUpTime.0=116503972 S:1.1.4.1.0=E:8590.3.1 E:8590.2.1=10317498 E:8590.2.2=1374 E:8590.2.3="HOSTB.prod.org" E:8590.2.4="2012-04-04 16:56:00.000" E:8590.2.5=2 E:8590.2.6=179 E:8590.2.7= E:8590.2.8= E:8590.2.9= E:8590.2.10= E:8590.2.11="The 'Service Control Manager' service logged event code 7036 into the system event log: The Ati HotKey Poller service entered the stopped state. " E:8590.2.12=1658 E:8590.2.13="10.132.194.174" E:8590.2.14="W" E:8590.2.15= E:8590.2.16= E:8590.2.17="NT Event log" E:8590.2.18="" E:8590.2.19=280 E:8590.2.20="CSA Service Monitoring" E:8590.2.21= E:8590.2.22= E:8590.2.23=0 } }&lt;/P&gt;</description>
      <pubDate>Wed, 04 Apr 2012 20:36:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19419#M633</guid>
      <dc:creator>cvajs</dc:creator>
      <dc:date>2012-04-04T20:36:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19420#M634</link>
      <description>&lt;P&gt;snmp traps are binary then your have to convert it in ascii : &lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Data/SendSNMPeventstoSplunk"&gt;receive and index SNMP traps&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2012 10:19:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19420#M634</guid>
      <dc:creator>MarioM</dc:creator>
      <dc:date>2012-04-05T10:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19421#M635</link>
      <description>&lt;P&gt;binary? tcpdump shows ascii data.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2012 13:39:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19421#M635</guid>
      <dc:creator>cvajs</dc:creator>
      <dc:date>2012-04-05T13:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19422#M636</link>
      <description>&lt;P&gt;as per my answer to index snmp traps you need to follow the instructions from the link.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2012 13:45:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19422#M636</guid>
      <dc:creator>MarioM</dc:creator>
      <dc:date>2012-04-05T13:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19423#M637</link>
      <description>&lt;P&gt;and tcpdump actually decode snmp traps,Splunk donot...&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2012 13:51:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19423#M637</guid>
      <dc:creator>MarioM</dc:creator>
      <dc:date>2012-04-05T13:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19424#M638</link>
      <description>&lt;P&gt;i am working on alternate solution, using snmptrapd and my syslog-ng. snmptrapd is not dynamic enough to handle numerous snmp traps from different hosts, etc. thnx.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2012 14:57:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19424#M638</guid>
      <dc:creator>cvajs</dc:creator>
      <dc:date>2012-04-05T14:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19425#M639</link>
      <description>&lt;P&gt;i think you didnot read the instructions that exactly same but snmptrapd with splunk instead of syslog-ng...&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2012 16:34:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19425#M639</guid>
      <dc:creator>MarioM</dc:creator>
      <dc:date>2012-04-05T16:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19426#M640</link>
      <description>&lt;P&gt;i read the directions, still doesnt work. the raw log file has a bunch of ascii data but Splunk only shows part of it for some reason. when i say "syslog-ng" i mean i use -Ls with snmptrapd instead of -Lf, this allows me to have better control over where the data goes, etc.&lt;/P&gt;

&lt;P&gt;snmptrapd -M /usr/share/snmp/mibs -m +ALL -Lf /logs/snmp/hostA --disableAuthorization=yes&lt;/P&gt;

&lt;P&gt;or&lt;/P&gt;

&lt;P&gt;snmptrapd -M /usr/share/snmp/mibs -m +ALL -Ls 0 --disableAuthorization=yes&lt;/P&gt;

&lt;P&gt;the latter cmd logs the same data as the 1st, but Splunk seems to have a problem showing/parsing the 1st.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2012 18:05:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19426#M640</guid>
      <dc:creator>cvajs</dc:creator>
      <dc:date>2012-04-05T18:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19427#M641</link>
      <description>&lt;P&gt;Splunk shows just this for the source data of an event (why does it truncate the data?)&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2012-04-05 15:38:29 syslog.prod.org [UDP: [10.219.0.134]:1086-&amp;gt;[10.222.1.253]]:
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;but the raw log file shows this for same event&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;2012-04-05 15:38:29 syslog.prod.org [UDP: [10.219.0.134]:1086-&amp;gt;[10.222.1.253]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (124678725) 14 days, 10:19:47.25       SNMPv2-MIB::snmpTrapOID.0 = OID: CSAMC-SNMPv2-MIB::csaTraps.1        CSAMC-SNMPv2-MIB::eventID = INTEGER: 10329635   CSAMC-SNMPv2-MIB::ruleID = Wrong Type (should be INTEGER): NULL      CSAMC-SNMPv2-MIB::hostName = STRING: "hostB.prod.org"   CSAMC-SNMPv2-MIB::eventTime = STRING: "2012-04-05 15:38:29.617"      CSAMC-SNMPv2-MIB::severityCode = INTEGER: 2     CSAMC-SNMPv2-MIB::eventCode = INTEGER: 164   CSAMC-SNMPv2-MIB::processName = STRING: "&amp;lt;remote application&amp;gt;"  CSAMC-SNMPv2-MIB::fileName = Wrong Type (should be OCTET STRING): NULL       CSAMC-SNMPv2-MIB::sourceIPAddress = Wrong Type (should be IpAddress): NULL      CSAMC-SNMPv2-MIB::destinationIPAddress = Wrong Type (should be IpAddress): NULL      CSAMC-SNMPv2-MIB::eventText = STRING: "The process '&amp;lt;remote application&amp;gt;' has triggered too many log records in the last few minutes. Further messages will be logged at a decreased rate for 10 minutes."        CSAMC-SNMPv2-MIB::hostID = INTEGER: 209 CSAMC-SNMPv2-MIB::currentHostIPAddress = Wrong Type (should be IpAddress): STRING: "10.132.194.158"  CSAMC-SNMPv2-MIB::hostOSType = STRING: "W"      CSAMC-SNMPv2-MIB::sourcePort = Wrong Type (should be INTEGER): NULL  CSAMC-SNMPv2-MIB::destinationPort = Wrong Type (should be INTEGER): NULL        CSAMC-SNMPv2-MIB::eventType = STRING: "Administrative"       CSAMC-SNMPv2-MIB::ruleDescription = Wrong Type (should be OCTET STRING): NULLCSAMC-SNMPv2-MIB::ruleModuleID = Wrong Type (should be INTEGER): NULL   CSAMC-SNMPv2-MIB::ruleModuleName = Wrong Type (should be OCTET STRING): NULL CSAMC-SNMPv2-MIB::buttonCode = Wrong Type (should be INTEGER): NULL     CSAMC-SNMPv2-MIB::userName = STRING: "myDOMAIN\\WSecGat_Px"   CSAMC-SNMPv2-MIB::flags = INTEGER: 0
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (124679186) 14 days, 10:19:51.86       SNMPv2-MIB::snmpTrapOID.0 = OID: CSAMC-SNMPv2-MIB::csaTraps.1        CSAMC-SNMPv2-MIB::eventID = INTEGER: 10329637   CSAMC-SNMPv2-MIB::ruleID = INTEGER: 1374    CSAMC-SNMPv2-MIB::hostName = STRING: "hostA.prod.org"    CSAMC-SNMPv2-MIB::eventTime = STRING: "2012-04-05 15:38:29.999"      CSAMC-SNMPv2-MIB::severityCode = INTEGER: 2     CSAMC-SNMPv2-MIB::eventCode = INTEGER: 179      CSAMC-SNMPv2-MIB::processName = Wrong Type (should be OCTET STRING): NULL    CSAMC-SNMPv2-MIB::fileName = Wrong Type (should be OCTET STRING): NULL       CSAMC-SNMPv2-MIB::sourceIPAddress = Wrong Type (should be IpAddress): NULL      CSAMC-SNMPv2-MIB::destinationIPAddress = Wrong Type (should be IpAddress): NULL      CSAMC-SNMPv2-MIB::eventText = STRING: "The 'Service Control Manager' service logged event code 7036 into the system event log: The LiveUpdate service entered the running state. "   CSAMC-SNMPv2-MIB::hostID = INTEGER: 2206     CSAMC-SNMPv2-MIB::currentHostIPAddress = Wrong Type (should be IpAddress): STRING: "10.10.10.10"   CSAMC-SNMPv2-MIB::hostOSType = STRING: "W"      CSAMC-SNMPv2-MIB::sourcePort = Wrong Type (should be INTEGER): NULL CSAMC-SNMPv2-MIB::destinationPort = Wrong Type (should be INTEGER): NULL CSAMC-SNMPv2-MIB::eventType = STRING: "NT Event log"CSAMC-SNMPv2-MIB::ruleDescription = ""   CSAMC-SNMPv2-MIB::ruleModuleID = INTEGER: 280   CSAMC-SNMPv2-MIB::ruleModuleName = STRING: "CSA Service Monitoring"  CSAMC-SNMPv2-MIB::buttonCode = Wrong Type (should be INTEGER): NULL     CSAMC-SNMPv2-MIB::userName = Wrong Type (should be OCTET STRING): NULL       CSAMC-SNMPv2-MIB::flags = INTEGER: 
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 05 Apr 2012 19:46:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19427#M641</guid>
      <dc:creator>cvajs</dc:creator>
      <dc:date>2012-04-05T19:46:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19428#M642</link>
      <description>&lt;P&gt;this looks like a bug. when i create the source from file and preview it, Splunk correctly shows each event, but when i finish setting up the source and look at the data from a search it only shows that 1st line, not all of the event data.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2012 20:06:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19428#M642</guid>
      <dc:creator>cvajs</dc:creator>
      <dc:date>2012-04-05T20:06:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19429#M643</link>
      <description>&lt;P&gt;what your props.conf looks like?&lt;/P&gt;</description>
      <pubDate>Fri, 06 Apr 2012 05:28:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19429#M643</guid>
      <dc:creator>MarioM</dc:creator>
      <dc:date>2012-04-06T05:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19430#M644</link>
      <description>&lt;P&gt;which props?&lt;/P&gt;

&lt;P&gt;i dont have a system/local props&lt;BR /&gt;
i dont have a local app props&lt;/P&gt;

&lt;P&gt;i have this props&lt;BR /&gt;
/opt/splunk/etc/apps/Splunk_CiscoClientSecurityAgent/default&lt;/P&gt;

&lt;P&gt;[cisco_csa]&lt;BR /&gt;
TRANSFORMS = csa_hostoverride&lt;BR /&gt;
REPORT-extract = csafields&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 11:38:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19430#M644</guid>
      <dc:creator>cvajs</dc:creator>
      <dc:date>2020-09-28T11:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19431#M645</link>
      <description>&lt;P&gt;you could try adding TRUNCATE=0 in your cisco_csa stanza&lt;/P&gt;</description>
      <pubDate>Sun, 08 Apr 2012 09:37:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19431#M645</guid>
      <dc:creator>MarioM</dc:creator>
      <dc:date>2012-04-08T09:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19432#M646</link>
      <description>&lt;P&gt;TRUNCATE=0 to default props in CSA app, but Splunk still shows:&lt;BR /&gt;
2012-04-09 11:24:34 myHost.prod.org [UDP: [10.8.0.134]:1086-&amp;gt;[10.1.1.53]]:&lt;/P&gt;

&lt;P&gt;props.conf&lt;BR /&gt;
[cisco_csa]&lt;BR /&gt;
TRANSFORMS = csa_hostoverride&lt;BR /&gt;
REPORT-extract = csafields&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
TRUNCATE=0&lt;/P&gt;

&lt;P&gt;transfroms.conf&lt;BR /&gt;
[csafields]&lt;BR /&gt;
REGEX = ^[^\|]+\|([^\|]+)\|([^\|]+)\|([^\|]+)\|([^\|]+)\|([^\|]+)\|([^\|]+)&lt;BR /&gt;
FORMAT = nbtname::$1 ip::$2 ruleid::$3 code::$4 remotetime::$5 alert::$6&lt;/P&gt;

&lt;P&gt;[csa_hostoverride]&lt;BR /&gt;
DEST_KEY = MetaData:Host&lt;BR /&gt;
REGEX = ^[^\|]+\|([^\|]+)\|([^\|]+)\|([^\|]+)\|([^\|]+)\|([^\|]+)\|([^\|]+)&lt;BR /&gt;
FORMAT = host::$1&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 11:38:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19432#M646</guid>
      <dc:creator>cvajs</dc:creator>
      <dc:date>2020-09-28T11:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19433#M647</link>
      <description>&lt;P&gt;anyone have an idea as to why splunk does this?&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2012 12:28:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19433#M647</guid>
      <dc:creator>cvajs</dc:creator>
      <dc:date>2012-04-10T12:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19434#M648</link>
      <description>&lt;P&gt;I think you need to configure event breaking. Splunk is probably breaking events because it finds what it views as timestamps after the first line you pasted, and default behaviour is for Splunk to create a new event when it finds a valid timestamp on a new line.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2012 12:51:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19434#M648</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-04-10T12:51:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19435#M649</link>
      <description>&lt;P&gt;i dont quite understand. if i manually add the source and do a "Preview" of the log data it shows the events correctly, so why would it mess up event breaking after that?&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2012 12:58:12 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19435#M649</guid>
      <dc:creator>cvajs</dc:creator>
      <dc:date>2012-04-10T12:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19436#M650</link>
      <description>&lt;P&gt;I don't know in detail how the preview data functionality works so I don't know, sorry. But, the default behaviour for event breaking in Splunk is that the first time a timestamp is encountered on a new line, Splunk breaks and creates a new event.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2012 13:03:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19436#M650</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-04-10T13:03:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19437#M651</link>
      <description>&lt;P&gt;so i need to tell the preview that my event is "DATE \n EVENT_DATA \n"&lt;BR /&gt;
(not that way exactly, but you get my point). oddly, if i write snmptrapd out to syslog then Splunk will read those events from syslog file fine, but CSA app still doesnt work with that data.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2012 13:29:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19437#M651</guid>
      <dc:creator>cvajs</dc:creator>
      <dc:date>2012-04-10T13:29:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco CSA Indexing Issue</title>
      <link>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19438#M652</link>
      <description>&lt;P&gt;Yes, you need to configure line merging in props.conf.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Apr 2012 13:37:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Cisco-CSA-Indexing-Issue/m-p/19438#M652</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2012-04-10T13:37:56Z</dc:date>
    </item>
  </channel>
</rss>

