Splunk Search

Parsing Cisco ISE logs from different platforms for user authentication

jxd
Loves-to-Learn

I'm trying to build a dashboard search that will allow someone to put in an ID and it will do a lookup on the FailureReason code that is part of the Cisco ISE authentication logs that will take into account different platforms like F5, Cisco 9K, Infoblox, etc...  The FailureReason code appears in all CSCOacs_failed_attempt logs but it's located in slightly different parts of the ISE log depending on the platform that the user is trying to login to.

I have three different regex expressions, one that works on F5, one for Cisco 9K, and one for Infoblox. Is there a way that I can have the search look through the logs using the three different regex expressions and give me back the result for the one that gives a hit?

Labels (3)
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Unlocking Unified Insights: New Gigamon Federated Search App for Splunk

In today’s data-heavy environment, organizations are caught in a data distribution dilemma. As data volumes ...

GA: New Data Management App in Splunk Platform

Streamlining Data Management: Introducing a unified experience in Splunk Managing data at scale shouldn’t feel ...

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...