Skip to content

Commit eb4400c

Browse files
authored
Merge pull request #3700 from splunk/auto-ta-update-403
Automated Splunk TA Update 403
2 parents 0fbf9b9 + b12935d commit eb4400c

File tree

2 files changed

+17
-8
lines changed

2 files changed

+17
-8
lines changed

contentctl.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -249,8 +249,8 @@ apps:
249249
- uid: 1467
250250
title: Cisco Networks Add-on
251251
appid: TA-cisco_ios
252-
version: 2.7.8
253-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/add-on-for-cisco-network-data_278.tgz
252+
version: 2.7.9
253+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/add-on-for-cisco-network-data_279.tgz
254254
githash: d6fac80e6d50ae06b40f91519a98489d4ce3a3fd
255255
test_data_caches:
256256
- base_url: https://media.githubusercontent.com/media/splunk/attack_data/master/

data_sources/cisco_ios_logs.yml

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,22 @@ id: 9e4c8d7b-6f5e-4a3d-b2c1-0a9b8c7d6e5f
33
version: 1
44
date: '2025-08-21'
55
author: Michael Haag, Splunk
6-
description: Data source object for Cisco IOS system logs. Cisco IOS logs provide operational and security telemetry from Cisco network devices (IOS, IOS XE, IOS XR, NX-OS, WLC, and APs). The Cisco Networks Add-on for Splunk (TA-cisco_ios) normalizes these events by setting proper sourcetypes and extracting fields for switches, routers, controllers, and access points; deploy the TA on indexers/HFs and search heads, and the Cisco Networks (cisco_ios) App on search heads. Supported platforms include Catalyst, ASR, ISR, Nexus, CRS, and other IOS-based devices, enabling consistent investigation, alerting, and reporting in Splunk Enterprise and Splunk Cloud. This data is ingested via SYSLOG.
6+
description: Data source object for Cisco IOS system logs. Cisco IOS logs provide
7+
operational and security telemetry from Cisco network devices (IOS, IOS XE, IOS
8+
XR, NX-OS, WLC, and APs). The Cisco Networks Add-on for Splunk (TA-cisco_ios) normalizes
9+
these events by setting proper sourcetypes and extracting fields for switches, routers,
10+
controllers, and access points; deploy the TA on indexers/HFs and search heads,
11+
and the Cisco Networks (cisco_ios) App on search heads. Supported platforms include
12+
Catalyst, ASR, ISR, Nexus, CRS, and other IOS-based devices, enabling consistent
13+
investigation, alerting, and reporting in Splunk Enterprise and Splunk Cloud. This
14+
data is ingested via SYSLOG.
715
source: cisco:ios
816
sourcetype: cisco:ios
917
separator: null
1018
supported_TA:
1119
- name: Cisco Networks Add-on
1220
url: https://splunkbase.splunk.com/app/1467
13-
version: 2.7.8
21+
version: 2.7.9
1422
fields:
1523
- _time
1624
- aci_message_text
@@ -81,7 +89,8 @@ fields:
8189
output_fields:
8290
- user
8391
- dest
84-
example_log: 'Aug 20 17:10:21.639: %AAA-6-USERNAME_CONFIGURATION: user with username: attacker configured
85-
Aug 20 17:10:21.664: %AAA-6-USER_PRIVILEGE_UPDATE: username: attacker privilege updated with priv-15
86-
Aug 20 17:10:21.665: %PARSER-5-CFGLOG_LOGGEDCMD: User:ec2-user logged command:username attacker privilege 15 secret *
87-
Aug 20 17:10:21.665: %PARSER-5-CFGLOG_LOGGEDCMD: User:ec2-user logged command:!config: USER TABLE MODIFIED'
92+
example_log: 'Aug 20 17:10:21.639: %AAA-6-USERNAME_CONFIGURATION: user with username:
93+
attacker configured Aug 20 17:10:21.664: %AAA-6-USER_PRIVILEGE_UPDATE: username:
94+
attacker privilege updated with priv-15 Aug 20 17:10:21.665: %PARSER-5-CFGLOG_LOGGEDCMD:
95+
User:ec2-user logged command:username attacker privilege 15 secret * Aug 20 17:10:21.665:
96+
%PARSER-5-CFGLOG_LOGGEDCMD: User:ec2-user logged command:!config: USER TABLE MODIFIED'

0 commit comments

Comments
 (0)