- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Hello,
I've installed the TA on my search head only (Distributed deployment).
I send ESA textmail and http logs over TCP syslog and my heavy forwarder inputs.conf is configured as this:
[tcp://514]
connection_host = dns
index = securityidx
source = maillog
sourcetype = ironport
queueSize = 10MB
I modified the TA local/props.conf on my search head :
######## TextMail Log Extractions ########
[ironport] #instead of [source::...xx]
sourcetype = cisco:esa:textmail
I can see logs coming in with the sourcetype "ironport", but it is not overridden.
What am I doing wrong?
Do I need to install the TA on my indexers as well?
Thanks
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

rpille is right about which Splunk instances the TA should reside.
Yet the props you've defined on the search head is an input phase configuration. Since the search head is not involved in the input, that configuration is ignored. The source type update via props.conf needs to take place on the heavy forwarder and be scoped to a source because parsing phase configurations with a sourcetype setting must be scoped to a source.
[source::tcp:514]
sourcetype = cisco:esa:textmail
This extra props may be skipped by updating the local inputs.conf on the heavy forwarder (to set source type further upstream)
[tcp://514]
sourcetype = cisco:esa:textmail
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

The Splunk Cisco-esa TA needs to be installed in you HWF, all indexers and the SH's. If you have a dedicated SH for Splunk Enterprise Security module, the TA needs to be installed there also.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

rpille is right about which Splunk instances the TA should reside.
Yet the props you've defined on the search head is an input phase configuration. Since the search head is not involved in the input, that configuration is ignored. The source type update via props.conf needs to take place on the heavy forwarder and be scoped to a source because parsing phase configurations with a sourcetype setting must be scoped to a source.
[source::tcp:514]
sourcetype = cisco:esa:textmail
This extra props may be skipped by updating the local inputs.conf on the heavy forwarder (to set source type further upstream)
[tcp://514]
sourcetype = cisco:esa:textmail
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

thank you all for your explanation but it does not work at all.
So far I've installed the TA on my heavy forwarder and my search head with the same local/props.conf configuration:
[ironport]
rename = cisco:esa:textmail
and the logs are still coming with the sourcetype=ironport
how can I troubleshoot this? Do I also need to install the TA on my indexer ??
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

That is a search time configuration. It allows knowledge objects to work for both source types.
To have the source type identified correctly for new data as it is indexed, you will need to set the source type correctly on the first machine that does parsing.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

My answer above is for indexing the data with correct source type (cisco:asa:textmail). If you're trying to rename ironport during search time operations (for data already indexed as ironport) you may update your props.conf on the search head with this configuration.
[ironport]
rename = cisco:esa:textmail
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


You need to install the add-on on your data collection node as well.
This table can be a bit confusing, but the comments column should help make clear that the add-on should be installed where you are collecting data, whatever node of your deployment that might be. http://docs.splunk.com/Documentation/AddOns/released/CiscoESA/Distributeddeployment Only if you do not use a heavy forwarder for data collection do you also need to install this add-on on your indexers, but you should be fine without it there in your case.
