There are a couple of things to check.
1 - since you have a custom index, make sure that it is a searched by default. Within Splunk, click Settings -> Access controls -> Roles -> choose a role your account belongs to -> scroll to the bottom and observe the indexes searched by default.
This is necessary as the Cisco Security Suite does not specify the index in the searches; rather, we rely on the index being a default searchable index.
As an alternative, you can make a change to eventtypes.conf to include your custom index. All the searches in the Cisco Security Suite specify an eventtype. To do this, copy
$SPLUNK_HOME/etc/apps/SA-cisco-asa/default/eventtypes.conf
To
$SPLUNK_HOME/etc/apps/SA-cisco-asa/local/eventtypes.conf
Modify like so:
[cisco-firewall]
search = index=your_custom_index (sourcetype="cisco:asa" OR sourcetype="cisco:pix" OR sourcetype="cisco:fwsm")
2 - since you are sending multiple types of data in on UDP, make sure that you force the sourcetype for Cisco ASA. Here is how to do this:
Navigate to the $SPLUNK_HOME/etc/apps/Splunk_TA_cisco-asa directory.
Create a new directory named local.
Navigate into the $SPLUNK_HOME/etc/apps/Splunk_TA_cisco-asa/default directory.
Copy the props.conf configuration file and place it into the previously created
$SPLUNK_HOME/etc/apps/Splunk_TA_cisco-asa/local directory.
Navigate into the $SPLUNK_HOME/etc/apps/Splunk_TA_cisco-asa/local directory.
Open the props.conf configuration file.
Remove the # (commented out markers) at the beginning of the below text in the props.conf file.
** Note: If you have the data going to a different port or protocol then make the appropriate adjustments, such as if you have cisco asa data being received on tcp port 515, then replace source::udp:514 with source::tcp:515.
#[source::udp:514]
#TRANSFORMS-force_sourcetype_for_cisco = force_sourcetype_for_cisco_\asa,force_sourcetype_for_cisco_pix,force_sourcetype_for_cisco_fwsm
Save the props.conf configuration file.
Restart the Splunk Service/Daemon.
... View more