Splunk Enterprise Security

Splunk Add-on for Cisco ASA: Will dropping "Built" events have any impact on Splunk Enterprise Security dashboards?

phoenixdigital
Builder

Hi All,

Just getting the community consensus here. Cisco ASA log events for Built and Teardown essentially contain the same information
http://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/116149-q...

The Cisco ASA TA does the following for each type of event
Built

  1. Extracts standard fields
  2. Extracts direction
  3. swaps around src and dest fields for Outbound connections

Teardown

  1. Extracts standard fields
  2. Extracts bytes and duration

Now, is direction really that relevant as it can be inferred from the src and dest fields?

The rest of the fields are pretty much replicated between the two types of events.

Which brings me to my main question: Will dropping "Built" events have any impact on Splunk Enterprise Security dashboards?

It would essentially halve the traffic ingested into Splunk for the firewall.

0 Karma

jcoates_splunk
Splunk Employee
Splunk Employee

To answer this question, you can use Search -> Pivot to look at the data models in question. Network Traffic and maybe Network Sessions are the most likely to be interesting. Limit to the sourcetypes in question and a reasonable timeframe, then add the fields you're concerned about. If it shows up in a data model, then ES cares about it. If it doesn't, it doesn't.

0 Karma
Get Updates on the Splunk Community!

Tips & Tricks When Using Ingest Actions

Tune in to learn about:Large scale architecture when using Ingest ActionsRegEx performance considerations ...

Announcing Our Splunk MVPs

We are excited to announce the first cohort of the Splunk MVP program. Splunk MVPs are passionate members of ...

Dashboard Studio Challenge - Learn New Tricks, Showcase Your Skills, and Win Prizes!

Reimagine what you can do with your dashboards. Dashboard Studio is Splunk’s newest dashboard builder to ...