Skip to content

Sourcetypes for the Splunk Add-on for Cisco ISE

The Cisco ISE logs record information useful for auditing, fault management, and troubleshooting. The Splunk Add-on for Cisco ISE provides the index-time and search-time knowledge for Cisco log events in the following format:

Sourcetype Description CIM data models
cisco:ise:syslog cisco-ise-system-statistics n/a
cisco-ise-authentication Authentication
cisco-ise-passed-authentication Authentication
cisco-ise-failed-authentication Authentication
cisco-ise-guest-authentication Authentication
cisco-ise-guest-authentication-failed n/a
cisco-ise-profiler n/a
cisco-ise-provision-succeeded n/a
cisco-ise-provision-failed n/a
cisco-ise-alarm n/a
cisco-ise-alert Alerts
cisco-ise-change n/a
cisco-ise-endpoint-service Endpoint Service
cisco-ise-traffic Network Traffic
cisco-ise-change-all Change:All_Changes
cisco-ise-change-account Change:Account_Management
cisco-ise-inventory Inventory
cisco-ise-guest-authentication-failed-attempts Authentication

If all the following conditions are true, the Splunk Add-on for Cisco ISE automatically sets the source type for Cisco ISE records as cisco:ise:syslog:

  • Your Splunk platform consumes syslog data either directly or through a syslog aggregator.
  • You configured your Cisco ISE devices to send logs either directly to your Splunk platform instance or syslog to your aggregator.
  • The Cisco ISE records include sourcetype=syslog.

If you have configured the Splunk platform to acquire your Cisco ISE log data in a different way, you should manually set the sourcetype to cisco:ise:syslog at the input phase. For more information about configuring sourcetypes, see the Configure sourcetypes chapter in the Getting Data In manual, part of the Splunk Enterprise documentation.