Security

How do I install the Cisco CSA add-on?

Will_Hayes
Splunk Employee
Splunk Employee

How do I install and configure the Cisco Client Security Agent add-on on SplunkBase:

http://www.splunkbase.com/apps/All/4.x/Add-On/app:Cisco+Client+Security+Agent+Add+On

0 Karma

Will_Hayes
Splunk Employee
Splunk Employee

For starters these instructions are for the CSA not the ASA. CSA is the Client Security Agent. What you want is the Cisco Firewall Add-on found here:

http://splunkbase.splunk.com/apps/All/4.x/Add-On/app:Cisco+Firewalls

Unpack that archive into SPLUNK_HOME/etc/apps/ restart Splunk, point your firewall to the port you specified in data inputs and off you go.

Thanks for the colorful commentary, it brightened my day 🙂

0 Karma

jackd12
New Member

What the hell does this all mean? This is ridiculous for starters. I have spent over an hour trying to get Splunk to work with the ASA. I could have installed a linux machine and easily activated syslog by now. I'm rather disappointed with Splunk. What does all this data mean and why is it so hard to find a clear reference to all this? So much technical gibberish with no reference as to what it means. What a waste.

0 Karma

Will_Hayes
Splunk Employee
Splunk Employee

To install this add-on, unpack this file into $SPLUNK_HOME/etc/apps and restart.

The field extractions are set to sourcetype=cisco_csa there is also a host extraction for the clients name that requires a sourcetype of cisco_csa. The Reports use eventtype=cisco_csa. By default this eventtype is created with the search = sourcetype=cisco_csa.

If you already have the CSA log indexed under a different sourcetype you will need to update the props.conf and eventtypes.conf files in the local directory of this app.

In props.conf create the following entry, replacing the stanza name with your CSA sourcetype:

[enter_sourcetype_here]
TRANSFORMS = csa_hostoverride
REPORT-extract = csafields
SHOULD_LINEMERGE = false

In eventtypes.conf create the following entry, replacing the search terms with your CSA sourcetype:

[cisco_csa]
search =
tags = cisco client_security

The sample reports in this add-on rely on the search: eventtype=cisco_csa in order to report on CSA data. There is one scheduled search included in this add-on which creates an cache for the dashboard every 3 hours with a Splunk enterprise license. To change the schedule you can edit the following search under the manager:

Cisco Client Security Agent - DataCube

Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

May 2026 Splunk Expert Sessions: Security & Observability

Level Up Your Operations: May 2026 Splunk Expert Sessions Whether you are refining your security posture or ...

Network to App: Observability Unlocked [May & June Series]

In today’s digital landscape, your environment is no longer confined to the data center. It spans complex ...

SPL2 Deep Dives, AppDynamics Integrations, SAML Made Simple and Much More on Splunk ...

Splunk Lantern is Splunk’s customer success center that provides practical guidance from Splunk experts on key ...