<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA versus FTD parsing in Splunk Search</title>
    <link>https://community.splunk.com/t5/Splunk-Search/Cisco-ASA-versus-FTD-parsing/m-p/679346#M232231</link>
    <description>&lt;P&gt;I don't think that's the right app to read those events.&amp;nbsp; In any case, the app you have installed had its latest release in 2018 and references no Splunk version higher than 7.1, so it looks abandoned.&lt;/P&gt;&lt;P&gt;Instead, it looks like the&amp;nbsp; "Cisco Secure eStreamer Client Add-On for Splunk" (&lt;A href="https://splunkbase.splunk.com/app/3662" target="_blank"&gt;https://splunkbase.splunk.com/app/3662&lt;/A&gt;) might extract fields from records with FTD in them.&amp;nbsp; It seems like it focuses on events 430001, 430002, 430003 and 430005.&amp;nbsp; Still, it's worth a shot.&lt;/P&gt;&lt;P&gt;Indeed, right now you could see if you have those - try a search like&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=&amp;lt;your cisco index&amp;gt; FTD (430001 OR 430002 OR 430003 OR 430005)&lt;/LI-CODE&gt;&lt;P&gt;If that returns a few items (or lots), then the app I mention above should turn that into useful fields.&lt;/P&gt;&lt;P&gt;If that search does NOT return any events, ... well, widen the time frame.&amp;nbsp; These seem like they might be less common events, not run of the mill "every tcp session makes 42 zillion of them" so it's possible there's only a few per day or something.&lt;/P&gt;&lt;P&gt;In any case, happy splunking and I hope you find what you need!&lt;/P&gt;&lt;P&gt;-Rich&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 01 Mar 2024 21:32:49 GMT</pubDate>
    <dc:creator>Richfez</dc:creator>
    <dc:date>2024-03-01T21:32:49Z</dc:date>
    <item>
      <title>Cisco ASA versus FTD parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Cisco-ASA-versus-FTD-parsing/m-p/679332#M232226</link>
      <description>&lt;P&gt;&lt;FONT size="3"&gt;We have both Cisco ASA and FTD firewalls.&amp;nbsp; The ASA is parsing fine where the appropriate fields are extracted.&amp;nbsp; As for the FTD logs, I don't get the same treatment for the data.&amp;nbsp; I downloaded the&amp;nbsp;&lt;STRONG&gt;Cisco Firepower Threat Defense FTD sourcetype&lt;/STRONG&gt; app and installed it on the search heads because I only had the&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;Splunk Add-on for Cisco ASA&lt;/STRONG&gt;.&amp;nbsp; That didn't change anything.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Mar&lt;/SPAN&gt; &lt;SPAN class=""&gt;1&lt;/SPAN&gt; &lt;SPAN class=""&gt;18:44:20&lt;/SPAN&gt; &lt;SPAN class=""&gt;USxx-xx-FW01&lt;/SPAN&gt; &lt;SPAN class=""&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;%&lt;STRONG&gt;ASA&lt;/STRONG&gt;-6-&lt;SPAN class=""&gt;302014&lt;/SPAN&gt;:&lt;/SPAN&gt; &lt;SPAN class=""&gt;Teardown&lt;/SPAN&gt; &lt;SPAN class=""&gt;TCP&lt;/SPAN&gt; &lt;SPAN class=""&gt;connection&lt;/SPAN&gt; &lt;SPAN class=""&gt;3111698504&lt;/SPAN&gt; &lt;SPAN class=""&gt;for&lt;/SPAN&gt; &lt;SPAN class=""&gt;wan:208.87.237.180/8082&lt;/SPAN&gt; &lt;SPAN class=""&gt;to&lt;/SPAN&gt; &lt;SPAN class=""&gt;cm-data:12.11.60.44/60113&lt;/SPAN&gt; &lt;SPAN class=""&gt;duration&lt;/SPAN&gt; &lt;SPAN class=""&gt;0:00:00&lt;/SPAN&gt; &lt;SPAN class=""&gt;bytes&lt;/SPAN&gt; &lt;SPAN class=""&gt;327&lt;/SPAN&gt; &lt;SPAN class=""&gt;TCP&lt;/SPAN&gt; &lt;SPAN class=""&gt;FINs&lt;/SPAN&gt; &lt;SPAN class=""&gt;from&lt;/SPAN&gt; &lt;SPAN class=""&gt;wan&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Mar 1 13:45:09 MXxx-EG-FTD01 : %&lt;STRONG&gt;FTD&lt;/STRONG&gt;-6-&lt;SPAN class=""&gt;302014&lt;/SPAN&gt;: Teardown TCP connection 125127915 for CTL_Internet:194.26.135.230/41903 to CTL_Internet:123.243.123.218/33445 duration 0:00:30 bytes 0 Failover primary closed&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;As you can see the msgs are identical for both FWs but the ASA has lots of interest fields where the FTD only has a few.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2024 18:50:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Cisco-ASA-versus-FTD-parsing/m-p/679332#M232226</guid>
      <dc:creator>FPERVIL</dc:creator>
      <dc:date>2024-03-01T18:50:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA versus FTD parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Cisco-ASA-versus-FTD-parsing/m-p/679346#M232231</link>
      <description>&lt;P&gt;I don't think that's the right app to read those events.&amp;nbsp; In any case, the app you have installed had its latest release in 2018 and references no Splunk version higher than 7.1, so it looks abandoned.&lt;/P&gt;&lt;P&gt;Instead, it looks like the&amp;nbsp; "Cisco Secure eStreamer Client Add-On for Splunk" (&lt;A href="https://splunkbase.splunk.com/app/3662" target="_blank"&gt;https://splunkbase.splunk.com/app/3662&lt;/A&gt;) might extract fields from records with FTD in them.&amp;nbsp; It seems like it focuses on events 430001, 430002, 430003 and 430005.&amp;nbsp; Still, it's worth a shot.&lt;/P&gt;&lt;P&gt;Indeed, right now you could see if you have those - try a search like&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;index=&amp;lt;your cisco index&amp;gt; FTD (430001 OR 430002 OR 430003 OR 430005)&lt;/LI-CODE&gt;&lt;P&gt;If that returns a few items (or lots), then the app I mention above should turn that into useful fields.&lt;/P&gt;&lt;P&gt;If that search does NOT return any events, ... well, widen the time frame.&amp;nbsp; These seem like they might be less common events, not run of the mill "every tcp session makes 42 zillion of them" so it's possible there's only a few per day or something.&lt;/P&gt;&lt;P&gt;In any case, happy splunking and I hope you find what you need!&lt;/P&gt;&lt;P&gt;-Rich&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2024 21:32:49 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Cisco-ASA-versus-FTD-parsing/m-p/679346#M232231</guid>
      <dc:creator>Richfez</dc:creator>
      <dc:date>2024-03-01T21:32:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA versus FTD parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Cisco-ASA-versus-FTD-parsing/m-p/679347#M232232</link>
      <description>&lt;P&gt;Splunk doesn't apply any inherent extraction for data as you illustrated. (By default, it extracts key-value pairs connected by equal (=) sign, and some structured raw events such as JSON.) &amp;nbsp;If you see more fields in ASA feeds, it must be the doing of &lt;STRONG&gt;Splunk Add-on for Cisco ASA&lt;/STRONG&gt;. &amp;nbsp;You need to open up that add-on and see what it is doing. &amp;nbsp;Then, you can copy it if that is within copyrights. &amp;nbsp;Or you can develop your own extraction strategy to emulate what &lt;STRONG&gt;Splunk Add-on for Cisco ASA&lt;/STRONG&gt;&amp;nbsp;does, or more.&lt;/P&gt;&lt;P&gt;Given that the two data sources are so close in format, there is also a possibility that &lt;STRONG&gt;Splunk Add-on for Cisco ASA&lt;/STRONG&gt;&amp;nbsp;has some configuration you can tweak to include the FTD data type. &amp;nbsp;Consult its documentation, or contact the developers.&lt;/P&gt;&lt;P&gt;This board used to have an app forum that I no longer see. &amp;nbsp;Maybe it is now&amp;nbsp;&lt;A href="https://community.splunk.com/t5/Splunk-Dev/bd-p/dev-splunk-platform" target="_blank"&gt;Splunk Dev&lt;/A&gt;? &amp;nbsp;You can if&amp;nbsp;&lt;STRONG&gt;Splunk Add-on for Cisco ASA&lt;/STRONG&gt;&amp;nbsp;developers are in that forum.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2024 21:36:59 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Cisco-ASA-versus-FTD-parsing/m-p/679347#M232232</guid>
      <dc:creator>yuanliu</dc:creator>
      <dc:date>2024-03-01T21:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA versus FTD parsing</title>
      <link>https://community.splunk.com/t5/Splunk-Search/Cisco-ASA-versus-FTD-parsing/m-p/696492#M236717</link>
      <description>&lt;P&gt;We have had this same issue in our environment.&amp;nbsp; The fix we have come up with is to create an app for the 4300X events that are specific to cisco:ftd where we parse out all the fields (you can use kvmode=auto for these, but some fields like url don't get extracted correctly since they oftentimes have '=' in the url string).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to address the other message IDs that match number/format with cisco:asa, we make a 'custom' app and update it each time we update Splunk_TA_cisco-asa.&amp;nbsp; In that app (we named it Splunk_TA_cisco-asa-ftd) we just copy over the /default/ and /local/ props.conf files and change the sourcetype declaration from [cisco:asa] to [cisco:ftd].&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other files (like transforms) aren't needed because splunk already has those definitions in the Splunk_TA_cisco-asa app, you just need to tell it to do all the eval/extract/transform/etc functions from props.conf for the other sourcetype.&amp;nbsp;&amp;nbsp;If you use eventtypes, you should also update that. We updated Splunk_TA_cisco-asa/local/eventtypes.conf to use 'sourcetype IN (cisco:asa, cisco:ftd)' to address that issue in the 'standard' app.&lt;/P&gt;&lt;P&gt;I know that seems like a lot of customization, but after doing the customization / upgrade a few times, it's not so bad.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Aug 2024 14:52:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Search/Cisco-ASA-versus-FTD-parsing/m-p/696492#M236717</guid>
      <dc:creator>gurlest</dc:creator>
      <dc:date>2024-08-16T14:52:13Z</dc:date>
    </item>
  </channel>
</rss>

