Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Cisco ACI Add-on for Splunk Enterprise
SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_421.tgz) 02e2997137b5e8670c870c84432bfe71ad42a7c24fc5b4989228dc93fe9d199d SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_420.tgz) 8b2fe1d4cb468bb4743ac4800ff876047cffde4388e7060afba1868ed716cdbd SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_411.tgz) 960239eb6ed85eb682ba77317e440d87e828cf04ed68116ff858c2250c6f9012 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_401.tgz) 4319340736ea720b9b96262a532689e9718e4ab8582a3fe5af987ec9a551cae4 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_40.tgz) 0a679885cb3d28a67a9bcbeed63f8d02369854bc388e66e47f13077516728804 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_30.tgz) 49894fee40d18a06a5d3c48572924cb0a4750d25302942f92171d828634b5970 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_22.tgz) ae54a42f4d9d63cc50add9099d3bca66af61eb8ddfcebac605d0e222d5f0617a SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_21.tgz) fb8589002b59c30473f356c451ff3be504ac57294e534f4c787f38addf2464a2 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_20.tgz) 26378073ea35ed08f298ef4e33f12af44a6de2f06ee3fa628348d364f429a4e1 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_12.tgz) 53ceeb62db90ea447020f80a702b98df82da4688285ed7350da5da7b333ad233 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_11.tgz) 7f47fd220fd717800d19eb9aabc2e1a8fa7f05c5cd0366cb3db5940023a870f9 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_10.tgz) 8ecfc37353c1d466757145556db1d1e69a9bcdbde71e33b758a8d63045d87d5a
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Cisco ACI Add-on for Splunk Enterprise

Overview
Details
This technology add-on collects data from APIC (Application Policy Infrastructure Controller) to be used by the Cisco ACI App for Splunk Enterprise

Please ask questions by creating a TAC case on https://globalcontacts.cloudapps.cisco.com/contacts/contactDetails/en_US/c1o1-c2o2-c3o8
OR contact us at 1 800 553 2447 or 1 408 526 7209

REQUIREMENTS


• Splunk version 6.3, 6.4 and 6.5
• APIC system running 1.1(4e), 2.0(x), 2.1(1h) and 2.1(1i) Version
• Admin user ID and password for collecting data from APIC.


RECOMMENDED SYSTEM CONFIGURATION


• Splunk search head system should have 16 GB of RAM and a octa-core CPU to run this app smoothly.


TOPOLOGY AND ENVIRONMENT SETTING


Install main app (Cisco ACI App for Splunk Enterprise) and Add-on app (Cisco ACI Add-on for Splunk Enterprise) on a single machine.
• Here both the app resides on a single machine.
• Main app uses the data collected by Add-on app and builds dashboard on it


HOW TO INSTALL


• This Add-on app can be installed through UI using "Manage Apps" or extract zip file directly into /opt/splunk/etc/apps/ folder.
• Restart Splunk.
• Note: If the previous version of App is already installed, remove the TA_cisco-ACI folder from Splunk app folder before installation of newer version.


HOW TO CONFIGURE


Step 1: SSL Configuration:
• The SSL Connection with APIC is enabled by default. Users first need to create custom certificate with proper Domain name for APIC and load the updated certificate for SSL verification.
• The procedure to create a custom certificate for Cisco ACI for HTTPS Access is given in below link:
Custom Certificate for Cisco ACI HTTPS Access

• If users wants to disable SSL verification follow the procedure given in next section.

To disable the SSL verification do the following steps:
    Open config.ini file at $APP_HOME/TA_cisco-ACI/bin/ directory 
    Set ENABLE_SSL = False  
    Open acisession.py file at $APP_HOME/TA_cisco-ACI/bin/ directory
    Set verify_ssl = False (line 443)

Step 2: Enter APIC Credentials:
• Login to Splunk: http://your_splunk_host:port, Go to the Apps->Manage Apps and open "Setup" screen for Cisco ACI Add-on for Splunk Enterprise. It will open a set up screen which will ask for ACI credentials. Please provide IP address/domain name, Username, Password and Save.
• Only app Version 3.0 & 4.0 supports multiple APIC entries. Provide more ACI credentials through setup screen. Have max 5 APIC's configured for better performance.
• Splunk REST API will encrypt the password and store it in app itself(local/passwords.conf) in encrypted form. Data collector script will fetch these credentials through REST API to connect to the APIC.
• Whenever User wants to change the credentials, he/she needs to remove the current entry from directory TA_cisco-ACI/local/passwords.conf first. Restart the Splunk. Provide the credentials through Setup screen.

Step 3: Enable Collector Scripts:
• User also needs to modify "default/inputs.conf" according to the following guidelines.
• This file contains filename paths which are different based on your OS platform.The app is configured to work for Unix/Linux/MacOS systems.

If you are running this app on a Windows system, perform the following step:
    • Copy the file "default/inputs.conf.WINDOWS" to "local/inputs.conf"

• Each entry in default/input.conf contains a field "passAuth" with default value admin. This field can contain any splunk user with admin rights.
• Enable Data collector Scripts through UI (Settings->Data inputs->Local inputs->Scripts).

• On Windows enable following collector scripts:

• $SPLUNK_HOME\etc\apps\TA_cisco-ACI\bin\collect.py -health fvTenant fvAp fvEPg fvAEPg fvBD vzFilter vzEntry vzBrCP fvCtx l3extOut fabricHealthTotal fabricNode eqptcapacityPolEntry5min eqptFabP eqptLeafP eqptCh eqptLC eqptFt eqptPsu eqptSupC ethpmPhysIf

• $SPLUNK_HOME\etc\apps\TA_cisco-ACI\bin\collect.py -authentication aaaSessionLR

• $SPLUNK_HOME\etc\apps\TA_cisco-ACI\bin\collect.py -classInfo faultInst topSystem compVm compHv fvCEp fvRsCons fvRsProv fvRsVm fvRsHyper fvRsPathAtt vmmCtrlrP compHostStats1h compRcvdErrPkts1h compTrnsmtdErrPkts1h fvRsCEpToPathEp dbgEpgToEpgRslt dbgEpToEpRslt dbgAcTrail aaaUser aaaRemoteUser l1PhysIf

• $SPLUNK_HOME\etc\apps\TA_cisco-ACI\bin\collect.py -classInfo aaaModLR faultRecord eventRecord

• $SPLUNK_HOME\etc\apps\TA_cisco-ACI\bin\collect.py -stats fvAp eqptEgrTotal5min eqptIngrTotal5min fvCEp l2IngrBytesAg15min l2EgrBytesAg15min

• $SPLUNK_HOME\etc\apps\TA_cisco-ACI\bin\collect.py -microseg  fvAEPg fvAp fvRsDomAtt

• On Linux enable following collector scripts:

• ./bin/collect.py -health fvTenant fvAp fvEPg fvAEPg fvBD vzFilter vzEntry vzBrCP fvCtx l3extOut fabricHealthTotal fabricNode eqptcapacityPolEntry5min eqptFabP eqptLeafP eqptCh eqptLC eqptFt eqptPsu eqptSupC ethpmPhysIf

• ./bin/collect.py -authentication aaaSessionLR

• ./bin/collect.py -classInfo faultInst topSystem compVm compHv fvCEp fvRsCons fvRsProv fvRsVm fvRsHyper fvRsPathAtt vmmCtrlrP compHostStats1h compRcvdErrPkts1h compTrnsmtdErrPkts1h fvRsCEpToPathEp dbgEpgToEpgRslt dbgEpToEpRslt dbgAcTrail aaaUser aaaRemoteUser l1PhysIf
• ./bin/collect.py -classInfo aaaModLR faultRecord eventRecord

• ./bin/collect.py -stats fvAp eqptEgrTotal5min eqptIngrTotal5min fvCEp l2IngrBytesAg15min l2EgrBytesAg15min

• ./bin/collect.py -microseg  fvAEPg fvAp fvRsDomAtt

NOTE: For Version 4.0 there will be 6 collector scripts which needs to be enabled.

• Don't restart splunk right after enabling collector scripts. Restarting will interrupt the process of pulling data from APIC.
• Open the app, Landing page is Home page. The main app dashboard can take some time before the data is populated in all panels. Follow the Test Installation procedure.


FOR MORE INFO


• Login to Splunk: http://your_splunk_host:port
• Complete instruction is also available as “Setup Guide” tab in Cisco ACI App for Splunk Enterprise.


TEST INSTALLATION


Search with "index="apic" | stats count by sourcetype" command and make sure you see following sourcetypes
cisco:apic:health
cisco:apic:stats
cisco:apic:class
cisco:apic:authentication

If you don't see these sourcetypes, have a look at the messages output by the scripted input: collect.py. Here is a sample search that will show them:

index=_internal component="ExecProcessor" collect.py "ACI Error:" | table _time host log_level message

Fetching additional data
If user wants to fetch additional data and is familiar with ACI Object model, he/she can add new stanza in default/inputs.conf file. Example is shown below:

[script://./bin/Collect.py -classInfo]
sourcetype=cisco:apic:class
index=apic
interval=450
passAuth=admin


SUPPORT


• This app is supported by Cisco Systems.
• Please ask questions by creating a TAC case on https://globalcontacts.cloudapps.cisco.com/contacts/contactDetails/en_US/c1o1-c2o2-c3o8 OR contact us at 1 800 553 2447 or 1 408 526 7209
• Alternatively, send us an email to ashegde2@cisco.com; nilaysh@cisco.com

Release Notes

Version 4.2.1
July 13, 2018

v4.2.1
- New features and updates
- APIC Redundancy and HA
- Optimized data pull from APIC.
- APIC CPU and Memory monitoring

Version 4.2.0
July 12, 2018

v4.2.0
- New features and updates
- APIC Redundancy and HA
- Optimized data pull from APIC.
- APIC CPU and Memory monitoring

Version 4.1.1
Sept. 22, 2017

Version 4.1 Updates (compatible with ACI app v4.1):
Updated scripts
Revised inputs.conf - script calls
Updated sample data files

For Technical Support: contact aci-splunk-app@cisco.com OR create a case with Cisco TAC.

Version 4.0.1
March 31, 2017

All features existing in the version 4.0
Updated sample data files to reflect current APIC version data
Minor bug fixes

Version 4.0
Jan. 19, 2017

The features developed in this release include: *Multi-Pod integration * Micro-segmentation support * Supports multiple APIC's * Enabled SSL connection with APIC.

Version 3.0
Oct. 20, 2016

The features developed in this release include: * Supports multiple APIC's * Enabled SSL connection with APIC.

Version 2.2
Sept. 9, 2016

RELEASE NOTES
The features developed in this release include:
* Migrating the existing Cisco ACI Add-on application for Splunk from using ACI Python SDK to ACI REST APIs.
* Enabled SSL connection with APIC.
There is no impact on the existing Cisco ACI application due to the changes done in Cisco ACI Add-on.

Version 2.1
July 14, 2016

RELEASE NOTES
The features developed in this release include:
Migrating the existing Cisco ACI Add-on application for Splunk from using ACI Python SDK to ACI REST APIs.
There is no impact on the existing Cisco ACI application due to the changes done in Cisco ACI Add-on.

Version 2.0
July 5, 2016

The features developed in this release include:
Migrating the existing Cisco ACI Add-on application for Splunk from using ACI Python SDK to ACI REST APIs.
There is no impact on the existing Cisco ACI application due to the changes done in Cisco ACI Add-on.

Version 1.2
April 29, 2016

Version 1.1
April 1, 2015

Version 1.0
Oct. 31, 2014

186
Installs
1,936
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2018 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.