<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Firewall Add-on in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Firewall-Add-on/m-p/95051#M6463</link>
    <description>&lt;P&gt;Yes, that is correct, with the slashes and I did restart Splunk.&lt;/P&gt;</description>
    <pubDate>Fri, 16 Mar 2012 21:45:01 GMT</pubDate>
    <dc:creator>ahammond</dc:creator>
    <dc:date>2012-03-16T21:45:01Z</dc:date>
    <item>
      <title>Cisco Firewall Add-on</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Firewall-Add-on/m-p/95048#M6460</link>
      <description>&lt;P&gt;Have Security Suite and Firewall addon installed, ASA sending syslog to UDP:514 with sourcetype blank.  Default Transform for source type not working, source type is being set to udp:514 not cisco_firewall or cisco_asa&lt;/P&gt;

&lt;P&gt;Mar 16 17:35:33 10.0.10.1 :%ASA-session-4-106023: Deny udp src&lt;/P&gt;

&lt;P&gt;Have added /local/transforms.conf&lt;/P&gt;

&lt;P&gt;[force_sourcetype_for_cisco_asa]&lt;BR /&gt;
DEST_KEY = MetaData:Sourcetype&lt;BR /&gt;
REGEX = %ASA-\w+-\w+&lt;BR /&gt;
FORMAT = sourcetype::cisco_asa&lt;/P&gt;

&lt;P&gt;Why are default transforms not working?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 11:31:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Firewall-Add-on/m-p/95048#M6460</guid>
      <dc:creator>ahammond</dc:creator>
      <dc:date>2020-09-28T11:31:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firewall Add-on</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Firewall-Add-on/m-p/95049#M6461</link>
      <description>&lt;P&gt;the REGEX above is incorrect, you used "w" instead of regex char class "\w"&lt;BR /&gt;
change your regex to be %ASA-\w+-\w+-&lt;BR /&gt;
(or maybe the slash just didnt show up in your post because this forum code takes a single slash as a special char??)&lt;/P&gt;

&lt;P&gt;you could "normalize" the event info by using a SEDCMD in default props for this source definition and replace ":%ASA-session" with "%ASA". see if this helps the app find the data you need, etc.&lt;/P&gt;

&lt;P&gt;EDIT - i believe there are other posts about this issue.&lt;BR /&gt;
see this post, should fix the problem&lt;BR /&gt;
&lt;A href="http://splunk-base.splunk.com//answers/42936/cisco-asa-logging-format-change"&gt;http://splunk-base.splunk.com//answers/42936/cisco-asa-logging-format-change&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2012 21:24:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Firewall-Add-on/m-p/95049#M6461</guid>
      <dc:creator>cvajs</dc:creator>
      <dc:date>2012-03-16T21:24:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firewall Add-on</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Firewall-Add-on/m-p/95050#M6462</link>
      <description>&lt;P&gt;You did restart Splunk after that change? Also, I'm assuming this is just due to the formatting on answers.splunk.com, but, you did put "%ASA-\w+-\w+" correct? Not without the slashes?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2012 21:39:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Firewall-Add-on/m-p/95050#M6462</guid>
      <dc:creator>tmeader</dc:creator>
      <dc:date>2012-03-16T21:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firewall Add-on</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Firewall-Add-on/m-p/95051#M6463</link>
      <description>&lt;P&gt;Yes, that is correct, with the slashes and I did restart Splunk.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Mar 2012 21:45:01 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Firewall-Add-on/m-p/95051#M6463</guid>
      <dc:creator>ahammond</dc:creator>
      <dc:date>2012-03-16T21:45:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firewall Add-on</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Firewall-Add-on/m-p/95052#M6464</link>
      <description>&lt;P&gt;Hmm, not sure what to tell you. That overloaded REGEX for force_sourcetype_for_cisco_asa will DEFINITELY match the new format. You aren't using a distributed environment at all are you? Separate indexer and search head? If by chance you are, these changes will need to be made on the indexer, since that where the sourcetype metadata is written. Also, just to be clear, you added that under the [ciscoapp]/local directory right? Not under /etc/system/local?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 11:32:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Cisco-Firewall-Add-on/m-p/95052#M6464</guid>
      <dc:creator>tmeader</dc:creator>
      <dc:date>2020-09-28T11:32:05Z</dc:date>
    </item>
  </channel>
</rss>

