Splunk Search

Parsing Cisco ISE logs from different platforms for user authentication

jxd
Loves-to-Learn

I'm trying to build a dashboard search that will allow someone to put in an ID and it will do a lookup on the FailureReason code that is part of the Cisco ISE authentication logs that will take into account different platforms like F5, Cisco 9K, Infoblox, etc...  The FailureReason code appears in all CSCOacs_failed_attempt logs but it's located in slightly different parts of the ISE log depending on the platform that the user is trying to login to.

I have three different regex expressions, one that works on F5, one for Cisco 9K, and one for Infoblox. Is there a way that I can have the search look through the logs using the three different regex expressions and give me back the result for the one that gives a hit?

Labels (3)
0 Karma
Get Updates on the Splunk Community!

[Puzzles] Solve, Learn, Repeat: Dynamic formatting from XML events

This challenge was first posted on Slack #puzzles channelFor a previous puzzle, I needed a set of fixed-length ...

Enter the Agentic Era with Splunk AI Assistant for SPL 1.4

  🚀 Your data just got a serious AI upgrade — are you ready? Say hello to the Agentic Era with the ...

Stronger Security with Federated Search for S3, GCP SQL & Australian Threat ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...