Security

Splunk for Cisco Firewalls and Flat-files

sbusby
New Member

I have all syslog from switches, routers, ASAs and FWSMs received via UDP/514 being written to a flat file and rotated daily. Today Splunk is indexing this data, but I was interested in seeing what the additional Cisco Security Apps could show me.

When I installed the applications it appears to want to listen in on a new UDP or TCP port, how can specify this application use the existing flat-file?

0 Karma

kenth
Splunk Employee
Splunk Employee

You could force the sourcetype "cisco_asa" on your flatfile index easily enough by either doing it in the apps props.conf or just set it when you add your file to be indexed. If you do that those logs should be included in what the app does.

0 Karma

sbusby
New Member

Since the flat file includes syslog from routers, switches, ASAs, FWSMs, etc wouldn't this classify ALL traffic as cisco_asa?

0 Karma
Get Updates on the Splunk Community!

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...