Just have the one server, and yes:
drwxr-xr-x 8 splunk splunk 4.0K Apr 29 18:23 Splunk_CiscoSecuritySuite/
drwx--x--x 9 splunk splunk 4.0K Oct 8 11:52 Splunk_TA_cisco-asa/
drwx--x--x 9 root root 4.0K Oct 8 09:31 Splunk_TA_cisco-wsa/
And I've been changing everything in 'Splunk_TA_cisco-wsa'. My props and transforms are still default.
# cat props.conf
[source::udp:514]
TRANSFORMS-change_cisco_wsa = set_sourcetype_cisco_wsa, set_index_cisco_wsa
root@splunk: local # cat transforms.conf
######Access logs in squid format######
[kv_for_cisco_wsa_squid]
REGEX = ([0-9.]*) *[0-9]* ([0-9.]*) ([A-Z_]*)/([0-9]*) ([0-9]*) ([A-Z]*) ([^ ]*) ([^ ]*) ([^/]*)/([^ ]*) ([^ ]*) ([^ ]+) <([^,]+),([^,]+),"*([0-9]{0,2}|\-|\w+)"*,"([^"]+)",[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,"([^"]+)",[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,"([^"]+)",[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^,]+,[^>]+>\s*\-\s*"?([^"]+)"?$
FORMAT = src_ip::$2 txn_result_code::$3 status::$4 bytes_in::$5 http_method::$6 url::$7 user::$8 server_contact_mode::$9 dest::$10 http_content_type::$11 acltag::$12 x_webcat_code_abbr::$13 wbrs_score::$14 x_webroot_scanverdict::$15 webroot_threat_name::$16 mcafee_virus_name::$17 malware_category::$18 vendor_suspect_user_agent::$19
[cisco_wsa_category_lookup]
filename = cisco_wsa_category_map_lookup.csv
[cisco_wsa_vendor_info_lookup]
filename = cisco_wsa_vendor_lookup.csv
[cisco_wsa_malware_action_lookup]
filename = cisco_wsa_malware_action_lookup.csv
[cisco_wsa_proxy_action_lookup]
filename = cisco_wsa_proxy_action_lookup.csv
######L4TM logs######
[kv_for_cisco_wsa_Firewall_l4tm]
REGEX = [A-Za-z]* ([A-Za-z]* +[0-9]* [0-9:]* [0-9]*) [A-Za-z]*: Firewall ([A-Za-z]*) ([A-Z]+).* data from ([0-9a-z.]*)(:([0-9a-z]*)){0,1} to ([0-9a-z.]*)(\(([A-Za-z0-9 -\_]*)\)){0,1}(:([^.]+)){0,1}.
FORMAT = vendor_action::$2 transport::$3 src::$4 src_port::$6 dest::$7 dest_domain::$9 dest_port::$11
[kv_for_cisco_wsa_Address_l4tm]
REGEX = [A-Za-z]* ([A-Za-z]* +[0-9]* [0-9:]* [0-9]*) [A-Za-z]*: Address ([0-9.:]*) [A-Za-z]* [A-Za-z]* ([A-Za-z0-9.\_\-]*)( \([A-Za-z0-9 .\_\-]*\)){0,1} [A-Za-z]* [A-Za-z]* firewall ([A-Za-z ]*)
FORMAT = dest::$2 dest_domain::$3 vendor_action::$5
[kv_for_cisco_wsa_removed_l4tm]
REGEX = [A-Za-z]* ([A-Za-z]* +[0-9]* [0-9:]* [0-9]*) [A-Za-z]*: Address ([0-9.:]*) [A-Za-z]* ([A-Za-z0-9.\-\_]*)( \([A-Za-z0-9 .\-\_]*\)){0,1} ([A-Za-z]*) [A-Za-z ]*
FORMAT = dest::$2 dest_domain::$3 vendor_action::$5
[cisco_wsa_traffic_action_lookup]
filename = cisco_wsa_traffic_action_lookup.csv
########W3C Logs########
##Uncomment the following lines and follow the instructions provided on http://docs.splunk.com/Documentation/AddOns/released/CiscoWSA/Configurew3clogfieldextractions.
[auto_kv_for_cisco_wsa_w3c]
DELIMS = " "
FIELDS = timestamp,x_elapsed_time,s_ip,x_acltag,c_ip,sc_result_code,x_resultcode_httpstatus,sc_http_status,cs_mime_type,cs-bytes,sc-bytes,cs_method,cs_url,cs_username,x_webcat_code_abbr,x_wbrs_score,x_req_dvs_scanverdict,x_webroot_threat_name,x_mcafee_virus_name
Using btool I see them getting listed. Though I'm not seeing any real red flags about them. Stepped through the link you provided.
... View more