Splunk Search

How to extract user and source ip from Cisco Syslog message?

jthomp7626
New Member
X_wan-network` sourcetype=wan_syslog EventType=local6.warning "Login" | rex field=_raw “(?\w+;(?\w+)”
| table _time,host, user, Source, WAN_site_name, EventMessage  | rename host as Node, WAN_site_name as Site_Name, user as User, EventMessage as Message | chart count over User , Source by Site_Name useother=f usenull=f 
| sort - _time
0 Karma

woodcock
Esteemed Legend

If you sourcetype your events the way that the Cisco apps expect it, then the field extractions should work. The sourcetypes are like cisco:ios, etc. If you show a valid raw event, I will give you the RegEx you need, but really, it should already be there for you.

0 Karma

adonio
Ultra Champion

hi jthomp7626,
There are Add-on built for most (if not all) Cisco products with all extractions pre configured.
check splunkbase and search for cisco, pick the right add on and Splunk your data

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...