<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I successfully populate Cisco Security Suite with syslog data from an ESA and WSA? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/170998#M16400</link>
    <description>&lt;P&gt;Why did you copy the 'Splunk_TA_Cisco-wsa' and 'Splunk_TA_Cisco-esa' folder contents across to 'SA-cisco-wsa' and 'SA-cisco-esa' folders? Do you have both 'SA-cisco-esa' and 'Splunk_TA_Cisco-esa' folders in etc/apps?&lt;/P&gt;</description>
    <pubDate>Mon, 28 Sep 2020 19:08:07 GMT</pubDate>
    <dc:creator>jconger</dc:creator>
    <dc:date>2020-09-28T19:08:07Z</dc:date>
    <item>
      <title>How do I successfully populate Cisco Security Suite with syslog data from an ESA and WSA?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/170997#M16399</link>
      <description>&lt;P&gt;I have configured two TA applications - the Cisco ESA and Cisco WSA add-on. I have enabled these add-ons within the initial setup of Cisco Security Suite and am using splunk version 6.2 and the new version of Cisco Security Suite (3.1) . Also the latest versions of the TAs.&lt;/P&gt;

&lt;P&gt;I have copied the 'Splunk_TA_Cisco-wsa' and 'Splunk_TA_Cisco-esa' folder contents across to 'SA-cisco-wsa' and 'SA-cisco-esa' folders, respectively (within the 'SPLUNK_HOME/etc/apps' directory). &lt;/P&gt;

&lt;P&gt;I have then customised the necessary files within the 'local' folder inside the 'SA-cisco-wsa' and 'SA-cisco-esa' folders, respectively - 'inputs.conf' to point to the local directory that my FTP server points to (and where syslog files in are pushed from the ESA and WSA respectively, using the recommended squid formatting). For the ESA I have also customised the 'props.conf' and the 'eventtypes.conf'.&lt;/P&gt;

&lt;H2&gt;The customisations I have for the WSA are detailed below:&lt;/H2&gt;

&lt;H2&gt;'inputs.conf'&lt;/H2&gt;

&lt;P&gt;[monitor://C:/Program Files/Splunk/var/log/cisco-wsa/squid/]&lt;BR /&gt;
source = cisco:wsa&lt;BR /&gt;
sourcetype = cisco:wsa:squid&lt;BR /&gt;
disabled = false&lt;/P&gt;

&lt;H2&gt;host = 127.0.0.1&lt;/H2&gt;

&lt;H2&gt;'props.conf'&lt;/H2&gt;

&lt;H6&gt;#access logs in squid format&lt;/H6&gt;

&lt;P&gt;[source::...wsa.access]&lt;BR /&gt;
sourcetype = cisco:wsa:squid&lt;/P&gt;

&lt;P&gt;[cisco:wsa:squid]&lt;BR /&gt;
KV_MODE = none&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
REPORT-extract = kv_for_cisco_wsa_squid cs_url_host&lt;/P&gt;

&lt;P&gt;FIELDALIAS-src = src_ip AS src&lt;BR /&gt;
FIELDALIAS-signature = mcafee_virus_name AS signature&lt;BR /&gt;
FIELDALIAS-signature = webroot_threat_name AS signature&lt;BR /&gt;
FIELDALIAS-vendor_action = txn_result_code AS vendor_action&lt;BR /&gt;
FIELDALIAS-bytes = bytes_in AS bytes&lt;BR /&gt;
FIELDALIAS-CSS_compatibility = wbrs_score AS x_wbrs_score user AS cs_username txn_result_code AS http_result&lt;BR /&gt;
LOOKUP-vendor_info_for_cisco_wsa = cisco_wsa_vendor_info_lookup sourcetype OUTPUT vendor,product,ids_type&lt;BR /&gt;
LOOKUP-code_info = cisco_wsa_category_lookup x_webcat_code_abbr OUTPUT webcat_code_full AS vendor_category, webcat_code_full AS x_webcat_code_full,usage,severity&lt;BR /&gt;
LOOKUP-malware_action = cisco_wsa_malware_action_lookup x_webroot_scanverdict OUTPUT malware_action&lt;BR /&gt;
LOOKUP-proxy_action = cisco_wsa_proxy_action_lookup vendor_action OUTPUT action&lt;BR /&gt;
EVAL-malware_action = case(wbrs_score&amp;gt;=6 AND wbrs_score&amp;lt;=10, "allowed", wbrs_score&amp;gt;=-10 AND wbrs_score&amp;lt;=-6, "blocked", wbrs_score = "-", "allowed")&lt;BR /&gt;
EVAL-http_user_agent=coalesce(http_user_agent,vendor_suspect_user_agent)&lt;/P&gt;

&lt;H6&gt;#L4TM logs&lt;/H6&gt;

&lt;P&gt;[source::...wsa.l4tm]&lt;BR /&gt;
sourcetype = cisco:wsa:l4tm&lt;/P&gt;

&lt;P&gt;[cisco:wsa:l4tm]&lt;BR /&gt;
KV_MODE = none&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
REPORT-extract = kv_for_cisco_wsa_Firewall_l4tm,kv_for_cisco_wsa_Address_l4tm,kv_for_cisco_wsa_removed_l4tm&lt;BR /&gt;
LOOKUP-vendor_info_for_cisco_wsa = cisco_wsa_vendor_info_lookup sourcetype OUTPUT vendor,product,ids_type&lt;BR /&gt;
LOOKUP-vendor_traffic_action = cisco_wsa_traffic_action_lookup vendor_action OUTPUT action&lt;/P&gt;

&lt;H6&gt;#access logs in w3c format&lt;/H6&gt;

&lt;P&gt;[cisco:wsa:w3c]&lt;BR /&gt;
KV_MODE = none&lt;BR /&gt;
SHOULD_LINEMERGE = false&lt;BR /&gt;
REPORT-extract = auto_kv_for_cisco_wsa_w3c&lt;BR /&gt;
FIELDALIAS-src = c_ip AS src&lt;BR /&gt;
FIELDALIAS-signature = x_mcafee_virus_name AS signature&lt;BR /&gt;
FIELDALIAS-signature = x_webroot_threat_name AS signature&lt;BR /&gt;
FIELDALIAS-vendor_action = sc_result_code AS vendor_action&lt;BR /&gt;
FIELDALIAS-bytes = cs_bytes AS bytes&lt;BR /&gt;
FIELDALIAS-status = sc_http_status AS status&lt;BR /&gt;
FIELDALIAS-http_method = cs_method AS http_method&lt;BR /&gt;
FIELDALIAS-url = cs_url AS url&lt;BR /&gt;
FIELDALIAS-user = cs_username AS user&lt;BR /&gt;
FIELDALIAS-dest = s_ip AS dest&lt;BR /&gt;
FIELDALIAS-http_content_type = cs_mime_type AS http_content_type&lt;BR /&gt;
LOOKUP-vendor_info_for_cisco_wsa = cisco_wsa_vendor_info_lookup sourcetype OUTPUT vendor,product,ids_type&lt;BR /&gt;
LOOKUP-code_info = cisco_wsa_category_lookup x_webcat_code_abbr OUTPUT webcat_code_full AS x_webcat_code_full,usage,severity&lt;BR /&gt;
LOOKUP-malware_action = cisco_wsa_malware_action_lookup x_webroot_scanverdict OUTPUT malware_action&lt;BR /&gt;
LOOKUP-proxy_action = cisco_wsa_proxy_action_lookup vendor_action OUTPUT action&lt;/P&gt;

&lt;H2&gt;EVAL-malware_action = case(x_wbrs_score&amp;gt;=6 AND x_wbrs_score&amp;lt;=10, "allowed", x_wbrs_score&amp;gt;=-10 AND x_wbrs_score&amp;lt;=-6, "blocked", x_wbrs_score = "-", "allowed")&lt;/H2&gt;

&lt;H2&gt;'transforms.conf'&lt;/H2&gt;

&lt;H6&gt;Access logs in squid format&lt;/H6&gt;

&lt;P&gt;[kv_for_cisco_wsa_squid]&lt;BR /&gt;
REGEX = ([0-9.]&lt;EM&gt;) *[0-9]&lt;/EM&gt; ([0-9.]&lt;EM&gt;) ([A-Z_]&lt;/EM&gt;)/([0-9]&lt;EM&gt;) ([0-9]&lt;/EM&gt;) ([A-Z]&lt;EM&gt;) ([^ ]&lt;/EM&gt;) "?([^ "]&lt;EM&gt;)"? ([^/]&lt;/EM&gt;)/([^ ]&lt;EM&gt;) ([^ ]&lt;/EM&gt;) ([^ ]+) &amp;lt;([^,]+),([^,]+),"&lt;EM&gt;([0-9]{0,2}|-|\w+)"&lt;/EM&gt;,"([^"]+)",[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,"([^"]+)",[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,"([^"]+)",[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^&amp;gt;]+&amp;gt;\s*-\s*"?([^"]+)"?$&lt;BR /&gt;
FORMAT = src_ip::$2 txn_result_code::$3 status::$4 bytes_in::$5 http_method::$6 url::$7 user::$8 server_contact_mode::$9 dest::$10 http_content_type::$11 acltag::$12 x_webcat_code_abbr::$13 wbrs_score::$14 x_webroot_scanverdict::$15 webroot_threat_name::$16 mcafee_virus_name::$17 malware_category::$18 vendor_suspect_user_agent::$19&lt;/P&gt;

&lt;P&gt;[cisco_wsa_category_lookup]&lt;BR /&gt;
filename = cisco_wsa_category_map_lookup.csv&lt;/P&gt;

&lt;P&gt;[cisco_wsa_vendor_info_lookup]&lt;BR /&gt;
filename = cisco_wsa_vendor_lookup.csv&lt;/P&gt;

&lt;P&gt;[cisco_wsa_malware_action_lookup]&lt;BR /&gt;
filename = cisco_wsa_malware_action_lookup.csv&lt;/P&gt;

&lt;P&gt;[cisco_wsa_proxy_action_lookup]&lt;BR /&gt;
filename = cisco_wsa_proxy_action_lookup.csv&lt;/P&gt;

&lt;H6&gt;L4TM logs&lt;/H6&gt;

&lt;P&gt;[kv_for_cisco_wsa_Firewall_l4tm]&lt;BR /&gt;
REGEX = [A-Za-z]* ([A-Za-z]* +[0-9]* [0-9:]* [0-9]&lt;EM&gt;) [A-Za-z]&lt;/EM&gt;: Firewall ([A-Za-z]&lt;EM&gt;) ([A-Z]+).&lt;/EM&gt; data from ([0-9a-z.]&lt;EM&gt;)(:([0-9a-z]&lt;/EM&gt;)){0,1} to ([0-9a-z.]&lt;EM&gt;)((([A-Za-z0-9 -_]&lt;/EM&gt;))){0,1}(:([^.]+)){0,1}.&lt;BR /&gt;
FORMAT = vendor_action::$2 transport::$3 src::$4 src_port::$6 dest::$7 dest_domain::$9 dest_port::$11&lt;/P&gt;

&lt;P&gt;[kv_for_cisco_wsa_Address_l4tm]&lt;BR /&gt;
REGEX = [A-Za-z]* ([A-Za-z]* +[0-9]* [0-9:]* [0-9]&lt;EM&gt;) [A-Za-z]&lt;/EM&gt;: Address ([0-9.:]&lt;EM&gt;) [A-Za-z]&lt;/EM&gt; [A-Za-z]* ([A-Za-z0-9._-]&lt;EM&gt;)( ([A-Za-z0-9 ._-]&lt;/EM&gt;)){0,1} [A-Za-z]* [A-Za-z]* firewall ([A-Za-z ]*)&lt;BR /&gt;
FORMAT = dest::$2 dest_domain::$3 vendor_action::$5&lt;/P&gt;

&lt;P&gt;[kv_for_cisco_wsa_removed_l4tm]&lt;BR /&gt;
REGEX = [A-Za-z]* ([A-Za-z]* +[0-9]* [0-9:]* [0-9]&lt;EM&gt;) [A-Za-z]&lt;/EM&gt;: Address ([0-9.:]&lt;EM&gt;) [A-Za-z]&lt;/EM&gt; ([A-Za-z0-9.-_]&lt;EM&gt;)( ([A-Za-z0-9 .-_]&lt;/EM&gt;)){0,1} ([A-Za-z]&lt;EM&gt;) [A-Za-z ]&lt;/EM&gt;&lt;BR /&gt;
FORMAT = dest::$2 dest_domain::$3 vendor_action::$5&lt;/P&gt;

&lt;P&gt;[cisco_wsa_traffic_action_lookup]&lt;BR /&gt;
filename = cisco_wsa_traffic_action_lookup.csv&lt;/P&gt;

&lt;P&gt;[cs_url_host]&lt;BR /&gt;
SOURCE_KEY=url&lt;/P&gt;

&lt;H2&gt;REGEX=\w+://(?[^/:]+)[:/]&lt;/H2&gt;

&lt;H2&gt;The customisations I have for the ESA are detailed below: &lt;/H2&gt;

&lt;H2&gt;'eventtypes.conf'&lt;/H2&gt;

&lt;P&gt;[cisco_esa]&lt;BR /&gt;
search = sourcetype = cisco_esa&lt;/P&gt;

&lt;H2&gt;tags = cisco e-mail security&lt;/H2&gt;

&lt;H2&gt;'inputs.conf'&lt;/H2&gt;

&lt;P&gt;[monitor://C:/Program Files/Splunk/var/log/cisco-esa/squid/]&lt;BR /&gt;
disabled = false&lt;BR /&gt;
followTrail = 0&lt;BR /&gt;
sourcetype = cisco_esa&lt;/P&gt;

&lt;H2&gt;host = 127.0.0.1&lt;/H2&gt;

&lt;H2&gt;'props.conf'&lt;/H2&gt;

&lt;P&gt;[cisco_esa]&lt;/P&gt;

&lt;H2&gt;REPORT-ironport = get_mid, get_to, get_from, get_icid, get_dcid, get_attach_name, get_attach_size, get_subject1, get_subject2, get_subject3&lt;/H2&gt;

&lt;P&gt;Log files are being received succesfully - I can see them in the FTP directory being pushed across from the WSA and ESA. I can also perform searches of the sourcetypes 'cisco:wsa:squid' within the WSA TA and 'cisco:esa:squid' within the ESA TA and these both return expected logs which correspond to test traffic pushed through and modifications made on both gateways.&lt;/P&gt;

&lt;P&gt;The problem is, however, that nothing in the Cisco Security suite populates apart from 2 panes on the summary page: under ‘security events statistics by sourcetype’ and ‘security event statistics by host’ – This shows, respectively, the sourcetype ‘cisco:wsa:squid’ and the local host 127.0.0.1&lt;/P&gt;

&lt;P&gt;If anyone has any ideas why this might be the case or is able to offer suggestions or point out errors in my configurations, I would be greatly appreciative.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:07:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/170997#M16399</guid>
      <dc:creator>tleaton</dc:creator>
      <dc:date>2020-09-28T19:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: How do I successfully populate Cisco Security Suite with syslog data from an ESA and WSA?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/170998#M16400</link>
      <description>&lt;P&gt;Why did you copy the 'Splunk_TA_Cisco-wsa' and 'Splunk_TA_Cisco-esa' folder contents across to 'SA-cisco-wsa' and 'SA-cisco-esa' folders? Do you have both 'SA-cisco-esa' and 'Splunk_TA_Cisco-esa' folders in etc/apps?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:08:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/170998#M16400</guid>
      <dc:creator>jconger</dc:creator>
      <dc:date>2020-09-28T19:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: How do I successfully populate Cisco Security Suite with syslog data from an ESA and WSA?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/170999#M16401</link>
      <description>&lt;P&gt;Thank you very much for this post - this got me thinking - I copied the 'Splunk_TA_Cisco-&lt;STRONG&gt;&lt;EM&gt;' folders across to the 'Splunk_CiscoSecuritySuite/appserver/addons' as per one of your earlier posts here '&lt;A href="http://answers.splunk.com/answers/125863/splunk-6-cisco-security-suite-3-0-app-config-files-needed.html" target="_blank"&gt;http://answers.splunk.com/answers/125863/splunk-6-cisco-security-suite-3-0-app-config-files-needed.html&lt;/A&gt;'. I then renamed them to 'TA-cisco-&lt;/EM&gt;&lt;/STRONG&gt;'. Just for good measure I then renamed them to the same within the apps directory although presumably they are not required in this directory? Are only 'SA-cisco-esa' and 'SA-cisco-wsa' are required within etc/apps ?&lt;/P&gt;

&lt;P&gt;Anyhow this is now working and I can see data for the WSA on Security Suite! However, I still can't see data for the ESA - presumably this is something wrong with my configuration in the 'props.conf', the 'inputs.conf' or the 'eventtypes.conf' within the local directory inside the 'Splunk_CiscoSecuritySuite/appserver/addons/TA-cisco-&lt;STRONG&gt;&lt;EM&gt;' or within 'etc/apps/SA-cisco-&lt;/EM&gt;&lt;/STRONG&gt;' ? &lt;/P&gt;

&lt;P&gt;My final question is, does the configuration need to be the same in both of these locations (for me the local folder within both of these locations contains the same configuration files) ?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:08:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/170999#M16401</guid>
      <dc:creator>tleaton</dc:creator>
      <dc:date>2020-09-28T19:08:09Z</dc:date>
    </item>
    <item>
      <title>Re: How do I successfully populate Cisco Security Suite with syslog data from an ESA and WSA?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/171000#M16402</link>
      <description>&lt;P&gt;With Cisco Security Suite 3.1, you no longer need the SA-cisco-* folders.  Your setup should look like this:&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;$SPLUNK_HOME/etc/apps/Splunk_CiscoSecuirtySuite
$SPLUNK_HOME/etc/apps/Splunk_TA_Cisco-wsa
$SPLUNK_HOME/etc/apps/Splunk_TA_Cisco-esa
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 10 Mar 2015 15:14:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/171000#M16402</guid>
      <dc:creator>jconger</dc:creator>
      <dc:date>2015-03-10T15:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: How do I successfully populate Cisco Security Suite with syslog data from an ESA and WSA?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/171001#M16403</link>
      <description>&lt;P&gt;Thank you. Do you have an idea of what the issue might be with the ESA configuration as I'm still to have this view populating with data.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 10:09:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/171001#M16403</guid>
      <dc:creator>tleaton</dc:creator>
      <dc:date>2015-03-12T10:09:19Z</dc:date>
    </item>
    <item>
      <title>Re: How do I successfully populate Cisco Security Suite with syslog data from an ESA and WSA?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/171002#M16404</link>
      <description>&lt;P&gt;Looks like your sourcetype is wrong for ESA.  Check out the documentation here -&amp;gt; &lt;A href="http://docs.splunk.com/Documentation/AddOns/released/CiscoESA/Configureinputsonasingleinstance" target="_blank"&gt;http://docs.splunk.com/Documentation/AddOns/released/CiscoESA/Configureinputsonasingleinstance&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;The Cisco Security Suite relies on certain eventtypes - which are based on the Splunk_TA_Cisco-esa eventtypes.conf - which are defined by the inputs.conf sourcetypes.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 19:09:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/171002#M16404</guid>
      <dc:creator>jconger</dc:creator>
      <dc:date>2020-09-28T19:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: How do I successfully populate Cisco Security Suite with syslog data from an ESA and WSA?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/171003#M16405</link>
      <description>&lt;P&gt;Thank you very much, this is now working. I set the source correctly as per the link you send me - needed to be cisco:esa:mailtext; also I needed to change the source type inside the data inputs -&amp;gt; files and directories, and finally I copied the 'eventtypes.conf', 'transforms.conf', 'props.conf' and 'tags.conf' from default into local (once they had been generated with the corect source type).&lt;/P&gt;

&lt;P&gt;I will now close of this question - however one last quick query - do you know whether the Cisco Security Suite has a built in view for monitoring syslog data pertaining to changes that have been made to policies on the WSA and ESA? - because the all the views I have founds are regarding web/email transactions, blocked messages/traffic, website categories etc, but I would like to have a panel which lists events concerning any alteration to the policies on the gateways.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2015 17:21:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/171003#M16405</guid>
      <dc:creator>tleaton</dc:creator>
      <dc:date>2015-03-12T17:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: How do I successfully populate Cisco Security Suite with syslog data from an ESA and WSA?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/171004#M16406</link>
      <description>&lt;P&gt;The "single instance " doc was removed-- 17 Apr 2015&lt;/P&gt;</description>
      <pubDate>Fri, 17 Apr 2015 13:11:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/171004#M16406</guid>
      <dc:creator>ssackrider</dc:creator>
      <dc:date>2015-04-17T13:11:20Z</dc:date>
    </item>
    <item>
      <title>Re: How do I successfully populate Cisco Security Suite with syslog data from an ESA and WSA?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/171005#M16407</link>
      <description>&lt;P&gt;I think you may mean:  cisco:esa:textmail&lt;BR /&gt;
Instead of what is written:  cisco:esa:mailtext&lt;/P&gt;

&lt;P&gt;Unless this has changed in the past year.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2016 12:27:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/How-do-I-successfully-populate-Cisco-Security-Suite-with-syslog/m-p/171005#M16407</guid>
      <dc:creator>TonyLeeVT</dc:creator>
      <dc:date>2016-03-15T12:27:46Z</dc:date>
    </item>
  </channel>
</rss>

