Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading EMC Isilon App for Splunk Enterprise
MD5 checksum (emc-isilon-app-for-splunk-enterprise_21.tgz) 93b80f4531119e7ac8f3dd92be2e03c0 MD5 checksum (emc-isilon-app-for-splunk-enterprise_20.tgz) cfafe3ca8800e542933226a300387857 MD5 checksum (emc-isilon-app-for-splunk-enterprise_10.tgz) 1d95893843a61d1d97ea7b3faa95d55d
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

EMC Isilon App for Splunk Enterprise

Splunk Certified
Overview
Details
The EMC Isilon App for Splunk Enterprise provides the deep operational visibility that IT professionals need in order to gain insight into the health and operation of their EMC Isilon cluster.

The EMC Isilon App for Splunk Enterprise provides enhanced visibility into your cluster including detailed drill-downs, built-in correlation resulting in comprehensive analytics and faster problem resolution. This App collects data from Isilon cluster enabling you to:

- Track Cluster inventory in terms of nodes, SSDs, CPUs, Disks, storage pools, access zones etc.
- Trace Cluster performance data like disk usage, file system throughput, network throughput, CPU usage, Client connections and protocol performance.
- Track Critical events and provide ability to drill down into the events.
- Track Syslogs and Audit events of your Isilon Clusters.

REQUIREMENTS

• Splunk version 6.2,6.3 or 6.4

• Splunk search head system should have 8 GB of RAM and a quad-core CPU to run this app smoothly

• This main app also requires EMC Isilon Add-On for Splunk Enterprise

HOW TO INSTALL

This app should be installed on search head either through UI through "Manage Apps" or by extracting zip file into /opt/splunk/etc/apps folder. Plesae restart Splunk server after this installation

Topology and Setting up Splunk Environment

  • This app has been distributed in two parts.

1) Add-on app, which runs collector scripts and gathers data from EMC Isilon node, does indexing on it and provides indexed data to Main app.
2) Main app, which receives indexed data from Add-on app, runs searches on it and builds dashboard using indexed data.

  • This App can be set up in two ways:
    1) Standalone Mode: Install main app and Add-on app on a single machine.

    • Here both the app resides on a single machine.
    • Main app uses the data collected by Add-on app and builds dashboard on it

    2) Distributed Environment: Install main app and Add-on app on search head, Only Add-on on forwarder system and indexes.conf file from Add-on bundle on Indexer.

    • Here also both the apps resides on search head machine, but no need to configure Add-on on search head.

    • Only Add-on needs to be installed and configured on forwarder system.

    • On Indexer, you can either put complete Add-on without configuring or just indexes.conf from the Add-on bundle that contains definition for 'isilon' index.

    • Execute the following command on forwarder to forward the collected data to the indexer.
      /opt/splunk/bin/splunk add forward-server <indexer_ip_address>:9997

    • On Indexer machine, enable event listening on port 9997 (recommended by Splunk).

    • Main app on search head uses the received data and builds dashboards on it.

HOW TO CONFIGURE

No additional configuration is needed for this app.

Release Notes

Version: 2.1

- Added support for Active directory user & sid mapping through new REST API.
- Made changes in Isilon log parser to make it robust & generic for both Isilon version-7 and version-8 Security logs.
- Replaced Node_IP filter with Cluster_Name filter in existing Security logs dashboards.
- Security logs have been segregated in two categories - FileSystem Audit Logs and Authentication & Privilege activities.
- Added new dashboard to provide the user search facility for FS Audit logs across the Clusters.

Sept. 22, 2016, 10:41 a.m.

Platform Independent

6.4, 6.3, 6.2

Version: 2.0

Aug. 12, 2016, 7:39 a.m.

Platform Independent

Version: 1.0

March 28, 2015, 3:40 p.m.

Platform Independent

6.2

90
Installs
731
Downloads
Share Subscribe LOGIN TO DOWNLOAD
Version
2.1
Category
IT Operations
Product Support
Splunk Enterprise
Splunk Cloud
Content Type
App
Splunk Versions
6.4
6.3
6.2
Licensing
End User License Agreement for Third-Party Content
Platforms
Platform Independent
Built by
Crest Data Systems
Contact Developer
Subscribe Share

Splunk Certification Program

Splunk's App Certification program uses a specific set of criteria to evaluate the level of quality, usability and security your app offers to its users. In addition, we evaluate the documentation and support you offer to your app's users.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2017 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.