Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading EMC Isilon App for Splunk Enterprise
SHA256 checksum (emc-isilon-app-for-splunk-enterprise_230.tgz) de949bb9e3f37826e483516ef66d8eb4aef700cab007bee4c74a21f7f6bb8a5e SHA256 checksum (emc-isilon-app-for-splunk-enterprise_22.tgz) acff78db8060ca2aa38a63a9fed405696528274ad694106027aefadaeeaf34c8 SHA256 checksum (emc-isilon-app-for-splunk-enterprise_21.tgz) 39b345f2b0cb5310dc615eec4d7a61dffff4a2d79a6876178f8dc55fc21354d6
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

EMC Isilon App for Splunk Enterprise

Splunk Certified
Overview
Details
The EMC Isilon App for Splunk Enterprise provides the deep operational visibility that IT professionals need in order to gain insight into the health and operation of their EMC Isilon cluster.

The EMC Isilon App for Splunk Enterprise provides enhanced visibility into your cluster including detailed drill-downs, built-in correlation resulting in comprehensive analytics and faster problem resolution. This App collects data from Isilon cluster enabling you to:

- Track Cluster inventory in terms of nodes, SSDs, CPUs, Disks, storage pools, access zones etc.
- Trace Cluster performance data like disk usage, file system throughput, network throughput, CPU usage, Client connections and protocol performance.
- Track Critical events and provide ability to drill down into the events.
- Track Syslogs and Audit events of your Isilon Clusters.

REQUIREMENTS

• Splunk version 6.2,6.3 or 6.4

• Splunk search head system should have 8 GB of RAM and a quad-core CPU to run this app smoothly

• This main app also requires EMC Isilon Add-On for Splunk Enterprise

HOW TO INSTALL

This app should be installed on search head either through UI through "Manage Apps" or by extracting zip file into /opt/splunk/etc/apps folder. Plesae restart Splunk server after this installation

Topology and Setting up Splunk Environment

  • This app has been distributed in two parts.

1) Add-on app, which runs collector scripts and gathers data from EMC Isilon node, does indexing on it and provides indexed data to Main app.
2) Main app, which receives indexed data from Add-on app, runs searches on it and builds dashboard using indexed data.

  • This App can be set up in two ways:
    1) Standalone Mode: Install main app and Add-on app on a single machine.

    • Here both the app resides on a single machine.
    • Main app uses the data collected by Add-on app and builds dashboard on it

    2) Distributed Environment: Install main app and Add-on app on search head, Only Add-on on forwarder system and indexes.conf file from Add-on bundle on Indexer.

    • Here also both the apps resides on search head machine, but no need to configure Add-on on search head.

    • Only Add-on needs to be installed and configured on forwarder system.

    • On Indexer, you can either put complete Add-on without configuring or just indexes.conf from the Add-on bundle that contains definition for 'isilon' index.

    • Execute the following command on forwarder to forward the collected data to the indexer.
      /opt/splunk/bin/splunk add forward-server <indexer_ip_address>:9997

    • On Indexer machine, enable event listening on port 9997 (recommended by Splunk).

    • Main app on search head uses the received data and builds dashboards on it.

HOW TO CONFIGURE

No additional configuration is needed for this app.

Release Notes

Version 2.3.0
Feb. 2, 2018

- Added additional metrics to show IOPs by Protocol and Latency by Protocol in Protocol Details Dashboard

Version 2.2
July 18, 2017

- Fixed JS issues of Cluster Overview dashboard to make it compatible with Splunk version 6.6
- Fixed issue of Node details drill down in Cluster Inventory Dashboard
- Fixed issues of user filter in FS Audit Logs, FS Audit Logs Search Facility and Authentication & Privilege Activities Dashboards
- Added Distributed search to replicate macros in distributed environment

Version 2.1
Sept. 22, 2016

- Added support for Active directory user & sid mapping through new REST API.
- Made changes in Isilon log parser to make it robust & generic for both Isilon version-7 and version-8 Security logs.
- Replaced Node_IP filter with Cluster_Name filter in existing Security logs dashboards.
- Security logs have been segregated in two categories - FileSystem Audit Logs and Authentication & Privilege activities.
- Added new dashboard to provide the user search facility for FS Audit logs across the Clusters.

172
Installs
1,324
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2018 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.