Security

How do I install the Cisco CSA add-on?

Will_Hayes
Splunk Employee
Splunk Employee

How do I install and configure the Cisco Client Security Agent add-on on SplunkBase:

http://www.splunkbase.com/apps/All/4.x/Add-On/app:Cisco+Client+Security+Agent+Add+On

0 Karma

Will_Hayes
Splunk Employee
Splunk Employee

For starters these instructions are for the CSA not the ASA. CSA is the Client Security Agent. What you want is the Cisco Firewall Add-on found here:

http://splunkbase.splunk.com/apps/All/4.x/Add-On/app:Cisco+Firewalls

Unpack that archive into SPLUNK_HOME/etc/apps/ restart Splunk, point your firewall to the port you specified in data inputs and off you go.

Thanks for the colorful commentary, it brightened my day 🙂

0 Karma

jackd12
New Member

What the hell does this all mean? This is ridiculous for starters. I have spent over an hour trying to get Splunk to work with the ASA. I could have installed a linux machine and easily activated syslog by now. I'm rather disappointed with Splunk. What does all this data mean and why is it so hard to find a clear reference to all this? So much technical gibberish with no reference as to what it means. What a waste.

0 Karma

Will_Hayes
Splunk Employee
Splunk Employee

To install this add-on, unpack this file into $SPLUNK_HOME/etc/apps and restart.

The field extractions are set to sourcetype=cisco_csa there is also a host extraction for the clients name that requires a sourcetype of cisco_csa. The Reports use eventtype=cisco_csa. By default this eventtype is created with the search = sourcetype=cisco_csa.

If you already have the CSA log indexed under a different sourcetype you will need to update the props.conf and eventtypes.conf files in the local directory of this app.

In props.conf create the following entry, replacing the stanza name with your CSA sourcetype:

[enter_sourcetype_here]
TRANSFORMS = csa_hostoverride
REPORT-extract = csafields
SHOULD_LINEMERGE = false

In eventtypes.conf create the following entry, replacing the search terms with your CSA sourcetype:

[cisco_csa]
search =
tags = cisco client_security

The sample reports in this add-on rely on the search: eventtype=cisco_csa in order to report on CSA data. There is one scheduled search included in this add-on which creates an cache for the dashboard every 3 hours with a Splunk enterprise license. To change the schedule you can edit the following search under the manager:

Cisco Client Security Agent - DataCube

Get Updates on the Splunk Community!

Introducing the 2024 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...

Introducing the 2024 Splunk MVPs!

We are excited to announce the 2024 cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Splunk Custom Visualizations App End of Life

The Splunk Custom Visualizations apps End of Life for SimpleXML will reach end of support on Dec 21, 2024, ...