icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Cisco ACI Add-on for Splunk Enterprise
SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_450.tgz) 009f79f7ff29f9b43d716ce1118214f27a960074022b02b8d98850e8925ffdaf SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_440.tgz) 0c5fd04a255c7879197012b14e804636602d855eec66be48d061f81b6d1585d1 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_430.tgz) 6a590da4e89238c5ebcb4f8c720195572b633a0fea064e769510de58ca23c77e SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_424.tgz) 0b9383533814e2c985cdd424394dec1f3121885fcb35d0aa955871446258a89f SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_423.tgz) 83a9c17f5d4a8ba9e8a5194927db6fd974e2bb8df9c4e30857e616111515cebd SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_422.tgz) 643d483bc9d96d31eeb54ffea55b446a3d95b3c369156654f3f7719a1c54cc41 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_421.tgz) 02e2997137b5e8670c870c84432bfe71ad42a7c24fc5b4989228dc93fe9d199d SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_420.tgz) 8b2fe1d4cb468bb4743ac4800ff876047cffde4388e7060afba1868ed716cdbd SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_411.tgz) 960239eb6ed85eb682ba77317e440d87e828cf04ed68116ff858c2250c6f9012 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_401.tgz) 4319340736ea720b9b96262a532689e9718e4ab8582a3fe5af987ec9a551cae4 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_40.tgz) 0a679885cb3d28a67a9bcbeed63f8d02369854bc388e66e47f13077516728804 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_30.tgz) 49894fee40d18a06a5d3c48572924cb0a4750d25302942f92171d828634b5970 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_22.tgz) ae54a42f4d9d63cc50add9099d3bca66af61eb8ddfcebac605d0e222d5f0617a SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_21.tgz) fb8589002b59c30473f356c451ff3be504ac57294e534f4c787f38addf2464a2 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_20.tgz) 26378073ea35ed08f298ef4e33f12af44a6de2f06ee3fa628348d364f429a4e1 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_12.tgz) 53ceeb62db90ea447020f80a702b98df82da4688285ed7350da5da7b333ad233 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_11.tgz) 7f47fd220fd717800d19eb9aabc2e1a8fa7f05c5cd0366cb3db5940023a870f9 SHA256 checksum (cisco-aci-add-on-for-splunk-enterprise_10.tgz) 8ecfc37353c1d466757145556db1d1e69a9bcdbde71e33b758a8d63045d87d5a
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Cisco ACI Add-on for Splunk Enterprise

Splunk AppInspect Passed
Admins: Please read about Splunk Enterprise 8.0 and the Python 2.7 end-of-life changes and impact on apps and upgradeshere.
Overview
Details
This technology add-on collects data from APIC (Application Policy Infrastructure Controller) to be used by the Cisco ACI App for Splunk Enterprise

Please ask questions by creating a TAC case on https://globalcontacts.cloudapps.cisco.com/contacts/contactDetails/en_US/c1o1-c2o2-c3o8
OR contact us at 1 800 553 2447 or 1 408 526 7209

ABOUT THIS APP

The Cisco ACI Add-on for Splunk Enterprise is used to gather data from Application Policy Infrastructure Controller (APIC), do indexing on it and provide the indexed data to "Cisco ACI App for Splunk Enterprise" app which runs searches on indexed data and build dashboards using it.

REQUIREMENTS

  • Splunk version supported 7.0, 7.1, 7.2, 7.3 and 8.0
  • APIC version supported 3.1, 3.2, 4.0 and 4.2(3q)
  • This main Add-on requires "Cisco ACI App for Splunk Enterprise" version 4.4.0
  • The app works for earlier versions as well, but some features may be restricted.
  • Admin user ID and password for collecting data from APIC.
  • For non-admin user account, provide 'Read-all' access privilege to the user in the APIC.

Recommended System configuration

  • Splunk search head system should have 16 GB of RAM and a octa-core CPU to run this app smoothly.

Topology and Setting up Splunk Environment

 Install main app (Cisco ACI App for Splunk Enterprise) and Add-on app (Cisco ACI Add-on for Splunk Enterprise) on a single machine.

 * Here both the app resides on a single machine.
 * Main app uses the data collected by Add-on app and builds dashboard on it

 Install Main app and Add-on app on a distributed clustered environment.
 * Install the App on a Search Head or Search Head Cluster.
 * Install and configure the Add-on on a Heavy forwarder or an Indexer. (Heavy forwarder recommended)

Installation of App

  • This app can be installed through UI using "Manage Apps" or extract zip file directly into /opt/splunk/etc/apps/ folder.
  • Restart Splunk.

  • Note: If the previous version of App is already installed, remove the TA_cisco-ACI folder from Splunk app folder before installation of newer version or the user can upgrade the app from Splunk UI.
    If the user upgrades the app, it should be ensured that index, sourcetype and interval must be mentioned for each input in local/inputs.conf

Upgradation of App/Add-on

Please disable all the scripted inputs before upgrading Add-on(TA_cisco-ACI).
Download the App package
From the UI navigate to Apps->Manage Apps
In the top right corner select "Install app from file"
Select "Choose File" and select the App package
Check Upgrade App
Select "Upload" and follow the prompts.
#### OR
* If newer version is available on splunkbase, then App/Add-on can be updated from UI also.
* From the UI navigate to Apps->Manage Apps OR click on gear icon
* Search for Cisco ACI App/Add-on
* Click on 'Update to <version>' under Version Column.

Post upgradation steps

Upgrading the Add-on(TA_cisco-ACI) to v4.5.0 from any version

Please follow the below steps.

  • In inputs.conf file under TA_cisco-ACI/local folder, if stanza containing '-stats' is present, then perform following steps.
  • Change following Classes:
    • eqptEgrTotal5min to eqptEgrTotal15min
    • eqptIngrTotal5min to eqptIngrTotal15min
    • procCPU5min to procCPU15min
    • procMem5min to procMem15min
  • Restart splunk
    ##### OR
  • Remove that whole stanza and save the file.
  • Restart splunk

  • Follow below steps if you are collecting data using Certificate Based Authentication in v4.3.0 OR v4.4.0 and Upgrading Add-on to v4.5.0

  • Take Backup of your Private key.
  • You need to convert your Private key to RSA Private key by running following command in cmd.

    • openssl rsa -in <old_private_key>.key -out <private_key>.key
      (Keep the name same for newly generated private_key).
  • Enable all the scripted inputs.

  • Note: If scrpits are already enabled then first disable and then re-enable all the scripted inputs.

Uninstallation of App

This section provides the steps to uninstall App from a standalone Splunk platform installation.

  • (Optional) If you want to remove data from Splunk database, you can use the below Splunk CLI clean command to remove indexed data from an app before deleting the app.

    • $SPLUNK_HOME/bin/splunk clean eventdata -index <index_name>
  • Delete the app and its directory. The app and its directory are typically located in the folder $SPLUNK_HOME/etc/apps/<appname> or run the following command in the CLI:

    • $SPLUNK_HOME/bin/splunk remove app [appname] -auth <splunk username>:<splunk password>
  • You may need to remove user-specific directories created for your app by deleting any files found here: $SPLUNK_HOME/bin/etc/users/*/<appname>

  • Restart the Splunk platform.You can navigate to Settings -> Server controls and click the restart button in splunk web UI or use the following splunk CLI command to restart splunk:

    • $SPLUNK_HOME/bin/splunk restart

Configuration of App

  • After installation, navigate to Manage Apps by clicking on Gear icon next to Apps on the Splunk homepage.
  • Click on "Setup" button under Actions section for "Cisco ACI Add-on for Splunk Enterprise"
  • It will open a set up screen which will ask for ACI credentials.
  • The app provides 3 different modes to collect the data in Splunk. The common fields are APIC Hostname or IP address, APIC Port (optional) and Username. The different modes are:

  • Password based Authentication

    • The user can configure the app using default aproach i.e. using Password.
    • To setup APIC with Password based authentication, follow below given steps.
    • On the setup screen, enable "Password based Authentication" checkbox.
    • Enter APIC hostname or IP address of the APIC
    • Enter port of the APIC. ex:8000(this step is optional)
    • Enter username and password which is used to login to the APIC.
    • Click on Save button at the bottom of the page.
  • Certificate based Authentication

    • The user needs to provide Certificate Name (as uploaded on APIC) and Path of RSA Private Key (path to the RSA private key, present on Splunk, of the certificate uploaded on APIC) on the setup page to collect data.
    • The procedure to create and configure custom certificate for certificate based authentication is given in below link:
      https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/4-x/basic-configuration/Cisco-APIC-Basic-Configuration-Guide-401/Cisco-APIC-Basic-Configuration-Guide-401_chapter_011.pdf
    • Convert Private key to RSA Private key by running following command in cmd.
    • openssl rsa -in <private_key>.key -out <rsa_private_key>.key

    • To setup APIC with Certificate based authentication, follow below given steps.

    • On the setup screen, enable "Certificate based authentication" checkbox.
    • Enter APIC hostname or IP address of the APIC
    • Enter port of the APIC. ex:8000 (this step is optional)
    • Enter Username to login to the APIC.
    • Enter Name of Certificate.
    • Enter Path of private key. ex: /opt/splunk/ACI.key
    • Click on Save button at the bottom of the page.
  • Remote User based Authentication

    • The user needs to provide both Password and Domain Name of User specified.

    • To setup APIC with Remote based authentication, follow below given steps.

    • On the setup screen, enable "Remote based authentication" checkbox.
    • Enter APIC hostname or IP address of the APIC
    • Enter port of the APIC. ex:8000 (this step is optional)
    • Enter Username and password which is used to login to the APIC.
    • Enter Domain name of the user.
    • Click on Save button at the bottom of the page.

Note: Enable all the required scripted inputs if its not already enabled to collect data.

SSL Configuration:

  • The SSL Connection with APIC is enabled by default. Users first need to create custom certificate with proper Domain name for APIC and load the updated certificate for SSL verification.
  • If users wants to disable SSL verification follow the procedure given in next section.
  • The procedure to create a custom certificate for Cisco ACI for HTTPS Access is given in below link:
    https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/kb/b_Configuring_Custom_Certificate_for_ACI_HTTPS_Access.html

  • To use the new certificate for connection to APIC from Splunk,follow the below steps:

  • If your script uses python2.7 for data collection:

    • Navigate to folder $SPLUNK_HOME/lib/python2.7/site-packages/requests.
    • Add your content at the end of the cacert.pem file.
  • If your script uses python3.7 for data collection:

    • Navigate to folder $SPLUNK_HOME/lib/python3.7/site-packages/requests.
    • Add your content at the end of the cacert.pem file.
  • Follow below steps to disable the SSL verification:

  • For Password based Authentication and Remote User based Authentication:

    • Provide credentials from setup page.
    • passwords.conf file will be created in TA_cisco-ACI/local folder with sample stanza : [credential:x.x.x.x:,admin,True:].
    • Here, default value of SSL verification will be True.
    • Change this value from True to False.
    • Restart Splunk.
  • For Certificate based Authentication:

    • Provide credentials from setup page.
    • cisco_aci_server_setup.conf file will be created in TA_cisco-ACI/local folder with sample stanza : [cisco_aci_server_setup_settings,x.x.x.x].
    • Here, default value of cisco_aci_ssl parameter will be True.
    • Change this value from True to False.
    • Restart Splunk.
  • This app supports multiple APIC entries. Provide more ACI credentials through setup screen. Have max 5 APIC's configured for better performance.

  • For Password based Authentication and Remote User based Authentication, Splunk REST API will encrypt the password and store it in app itself(local/passwords.conf) in encrypted form.

For Certificate based Authentication, certificate name and path to the private key will be stored in the app itself(local/cisco_aci_server_setup.conf).

Data collector script will fetch these credentials through REST API to connect to the APIC.

  • APIC Hostname or IP address once configured to any 3 modes of authentication, cannot be configured through the remaining 2 modes of authentication.

  • Also, user can setup APIC either using any one of the three modes of authentication or all the three modes one by one but for different APICs.

  • Example: User can either setup only APIC1 using Password/Remote/Certificate based authentication.
    OR
    User can setup APIC1 for password based authentication, APIC2 for Remote based authentication and APIC3 for Certificate based authentication.

  • Note: APIC Hostname or IP address once configured to any 3 modes of authentication, cannot be configured through the remaining 2 modes of authentication.

  • Whenever user wants to change the credentials, he/she needs to remove the current entry from directory TA_cisco-ACI/local/passwords.conf or TA_cisco-ACI/local/cisco_aci_server_setup.conf first.
    Restart the Splunk. Provide the credentials through UI.

  • User also needs to modify "default/inputs.conf" according to the following guidelines.

inputs.conf

This file contains filename paths which are different based on your OS platform.
The app is configured out of the box to work for Unix/Linux/MacOS systems.

If you are running this app on a Windows system, perform the following steps:
Copy the file "default/inputs.conf.WINDOWS" to "local/inputs.conf"

  • Each entry in default/input.conf contains a field "passAuth" with default value admin. This field can contain any splunk user with admin rights.

Add More Data to Splunk

  • Data Inputs (in inputs.conf) can be added/modified either from setup page or directly from backend (as mentioned above)

Setup Page

Following options are provided on setup page forunder "Show Data Inputs" checkbox for modifying data inputs in inputs.conf:
* Type: Following seven types are allowed in Add-on
* authentication: To get the authentication information from the ACI environment.
* classInfo: To get the general information for all the MOs of given classes.
* cloud: To get the details related objects for all the MOs of given classes.
* health: To get the health and fault information for all the MOs of given classes.
* fex : To get the health and fault information for all the MOs of given classes.
* microsegment: To get the general information for all the MOs of given classes.
* stats : To get the statistical data for all the MOs of given classes.
* Arguments: Names of APIC classes for which data will be fetched (Names of classes are case-sensitive).
* Interval: Time interval (in seconds) at which data inputs will be scheduled to collect data, once enabled.
* Enable/Disable: Status representing whether the data input is enabled or not.
* Actions:
* Edit:
* Add/Remove/Modify the existing APIC classes.
* Change time interval of data inputs.
* Change status of data inputs i.e. enabled/disabled.
* Click on Add button (under Actions).
* Delete
* This button will directly delete data input.
* Add New Button: It will add new data input in inputs.conf. Again, the user will have choice for all actions stated above.
* Click on save button after making changes.

Note- Any change performed by user will be reflected in default/inputs.conf and local/inputs.conf.

How to enable collector scripts

  • Enable Data collector Scripts. By default Scripts are disabled. Enable through UI (Settings -> Data inputs -> Local inputs-> Scripts).
  • Enable the collector scripts labelled under the app name: TA_cisco-ACI
  • The user can also enable scripts from Setup Page (as mentioned above)

Create your own index:

* The app data defaults to 'main' index.
* If you need to specify a particular index for your APIC data, for ex. "apic",create an indexes.conf file [sample shown in ($SPLUNK_HOME/etc/apps/TA_cisco-ACI/default/indexes.conf.sample)]
* Once you specify your index, edit the inputs.conf file and add a line "index=[yourindex]" under each script stanza.

The list of Python library packaged

  1. Websocket Client Library
    Link: https://pypi.python.org/pypi/websocket-client/
    Author: liris
    Home Page: https://github.com/liris/websocket-client
    License :: OSI Approved :: GNU Library or Lesser General Public License (LGPL)
    Operating System :: MacOS :: MacOS X
    Operating System :: Microsoft :: Windows
    Operating System :: POSIX
    Programming Language :: Python
    Programming Language :: Python :: 2
    Programming Language :: Python :: 3

    This module depend on
    six
    backports.ssl_match_hostname for Python 2.x

  2. RSA Library
    Link: https://pypi.org/project/rsa/
    Author: Sybren A. Stuvel
    Home Page: https://github.com/sybrenstuvel/python-rsa
    License :: OSI Approved :: Apache Software License
    Operating System :: OS Independent
    Programming Language :: Python
    Programming Language :: Python :: 2
    Programming Language :: Python :: 3

The list of Javascript/CSS libraries used

  1. Google Fonts
    Link: https://fonts.googleapis.com/css?family=Roboto|Varela+Round|Open+Sans
    Author: Google
    Home Page:
    Roboto: https://fonts.google.com/specimen/Roboto
    Varela Round: https://fonts.google.com/specimen/Varela+Round
    Open Sans: https://fonts.google.com/specimen/Open+Sans
    Material Icons: https://google.github.io/material-design-icons/
    License:
    Roboto: https://www.apache.org/licenses/LICENSE-2.0
    Varela Round: https://scripts.sil.org/cms/scripts/page.php?site_id=nrsi&id=OFL_web
    Open Sans: https://www.apache.org/licenses/LICENSE-2.0
    Material Icons: https://www.apache.org/licenses/LICENSE-2.0
  2. Font Awesome
    Link: https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
    Author: Dave Gandy
    Home Page: https://fontawesome.com/?from=io
    License: Font: https://scripts.sil.org/cms/scripts/page.php?site_id=nrsi&id=OFL, CSS: https://opensource.org/licenses/MIT
  3. Bootstrap
    Link: https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js
    Author: Twitter
    Home Page: https://getbootstrap.com/
    License: https://opensource.org/licenses/MIT

TEST YOUR INSTALL / TROUBLESHOOTING

The main app dashboard can take some time before the data is returned which will populate some of the panels. A good test to see that you are receiving all of the data we expect is to run this search after several minutes:

index="<your index>" | stats count by sourcetype

In particular, you should see these sourcetypes:
cisco:apic:health
cisco:apic:stats
cisco:apic:class
cisco:apic:authentication
* cisco:apic:cloud

If you don't see these sourcetypes, have a look at the messages output by the scripted input: collect.py. Here is a sample search that will show them:

index=_internal component="ExecProcessor" collect.py "ACI Error:" | table _time host log_level message

You can also see $SPLUNK_HOME/var/log/splunk/splunkd.log file to check if any error has occured.

ABOUT THE DATA

You can see what each event looks like by going to $SPLUNK_HOME/etc/apps/TA_cisco-ACI/bin and executing collect.py with Splunk Python interpreter.
Example:
/opt/splunk/bin/splunk cmd python collect.py -stats fvAp

Each event contains data in "Field=value" pair. Field names are case sensitive in the Cisco API for APIC. Every event starts with the timestamp, and contains dn(Distinguished Name) field. This field gives fair idea about the type of information given by event(health,fault etc). Like below given dn gives health details for Tenant "abc".

dn="uni/tn-abc/health"

Below are two sample event records. First one gives health detail for tenant with name "common" and the other one gives a fault detail for the same tenant.

1)

2014-04-25 00:38:07 dn=uni/tn-common/health status=created,modified updTs=2014-04-25T04:52:32.274+00:00 chng=0 cur=100 maxSev=cleared modTs=never twScore=100 rn=health prev=100 childAction= dn=uni/tn-common lcOwn=local ownerKey= name=common descr= status=created,modified monPolDn=uni/tn-common/monepg-default modTs=2014-04-23T22:14:01.702+00:00 ownerTag= uid=0 rn=tn-common childAction= component=fvTenant

2)

2014-04-25 00:38:08 status=created,modified domain=tenant code=F1228 occur=1 subject=contract severity=minor descr=Contract default configuration failed due to filter-not-present origSeverity=minor rn=fault-F1228 childAction= type=config dn=uni/tn-common/oobbrc-default/fault-F1228 prevSeverity=minor modTs=never highestSeverity=minor lc=raised changeSet= created=2014-04-23T22:24:37.274+00:00 ack=no cause=configuration-failed rule=vz-abrcp-configuration-failed lastTransition=2014-04-23T22:26:57.046+00:00 dn=uni/tn-common lcOwn=local ownerKey= name=common descr= status=created,modified monPolDn=uni/tn-common/monepg-default modTs=2014-04-23T22:14:01.702+00:00 ownerTag= uid=0 rn=tn-common childAction= component=fvTenant

DATA GENERATOR

This app is provided with sample data which can be used to generate dummy data. To simulate this sample data, first of all download Splunk Event generator, which is available at https://github.com/splunk/eventgen, & needs tobe installed at $SPLUNK_HOME/etc/apps/. This app generates the dummy data for ACI environment and populates the dashboards of main app with the dummy data.

Support

  • This app is supported by Cisco Systems.
  • Email support during weekday business hours. Please ask question or send an email to tac@cisco.com

Release Notes

  • Version 4.5.0:
  • Added support of Splunk 8.x
  • Made Add-on Python2 and Python3 compatible

  • Version 4.4.0:

  • Fixed cloud vetting concerns

  • Version 4.3.0:

  • Remote User-based Authentication
  • Certificate-based Authentication
  • Functionality to edit inputs.conf from Setup Page
  • CIM Mapping - Splunk CIM version supported - 4.13.0
  • Bug Fixes

Release Notes

Version 4.5.0
Jan. 7, 2020

* Added support of Splunk 8.x
* Made Add-on Python2 and Python3 compatible

Version 4.4.0
Sept. 19, 2019

v 4.4.0 Release Notes:
* Fixed cloud vetting concerns

Version 4.3.0
Aug. 8, 2019

Version 4.3.0
* Remote User-based Authentication
* Certificate-based Authentication
* Functionality to edit inputs.conf from Setup Page
* CIM Mapping - Splunk CIM version supported - 4.13.0
* Bug Fixes

Version 4.2.4
Feb. 13, 2019

v4.2.4
- Login bug fix

v4.2.2
- New features and updates
- APIC Redundancy and HA
- Optimized data pull from APIC.
- APIC CPU and Memory monitoring

Version 4.2.3
Feb. 8, 2019

v4.2.3
- Login bug fix

v4.2.2
- New features and updates
- APIC Redundancy and HA
- Optimized data pull from APIC.
- APIC CPU and Memory monitoring

Version 4.2.2
Jan. 26, 2019

v4.2.2
- New features and updates
- APIC Redundancy and HA
- Optimized data pull from APIC.
- APIC CPU and Memory monitoring

Version 4.2.1
July 13, 2018

v4.2.1
- New features and updates
- APIC Redundancy and HA
- Optimized data pull from APIC.
- APIC CPU and Memory monitoring

Version 4.2.0
July 12, 2018

v4.2.0
- New features and updates
- APIC Redundancy and HA
- Optimized data pull from APIC.
- APIC CPU and Memory monitoring

Version 4.1.1
Sept. 22, 2017

Version 4.1 Updates (compatible with ACI app v4.1):
Updated scripts
Revised inputs.conf - script calls
Updated sample data files

For Technical Support: contact aci-splunk-app@cisco.com OR create a case with Cisco TAC.

Version 4.0.1
March 31, 2017

All features existing in the version 4.0
Updated sample data files to reflect current APIC version data
Minor bug fixes

Version 4.0
Jan. 19, 2017

The features developed in this release include: *Multi-Pod integration * Micro-segmentation support * Supports multiple APIC's * Enabled SSL connection with APIC.

Version 3.0
Oct. 20, 2016

The features developed in this release include: * Supports multiple APIC's * Enabled SSL connection with APIC.

Version 2.2
Sept. 9, 2016

RELEASE NOTES
The features developed in this release include:
* Migrating the existing Cisco ACI Add-on application for Splunk from using ACI Python SDK to ACI REST APIs.
* Enabled SSL connection with APIC.
There is no impact on the existing Cisco ACI application due to the changes done in Cisco ACI Add-on.

Version 2.1
July 14, 2016

RELEASE NOTES
The features developed in this release include:
Migrating the existing Cisco ACI Add-on application for Splunk from using ACI Python SDK to ACI REST APIs.
There is no impact on the existing Cisco ACI application due to the changes done in Cisco ACI Add-on.

Version 2.0
July 5, 2016

The features developed in this release include:
Migrating the existing Cisco ACI Add-on application for Splunk from using ACI Python SDK to ACI REST APIs.
There is no impact on the existing Cisco ACI application due to the changes done in Cisco ACI Add-on.

Version 1.2
April 29, 2016

Version 1.1
April 1, 2015

Version 1.0
Oct. 31, 2014

772
Installs
3,687
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2020 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.