The Cisco CMX App for Splunk runs searches on indexed data and builds dashboards using it. It provides different dashboards to get insight into CMX data.
Splunk forwarder system should have 4 GB of RAM and a quad-core CPU to run this app smoothly.
Application can work on both Windows and Linux platforms.
1) Add-on app, which runs collector scripts and gathers data from CMX devices, does indexing on it and provides indexed data to the Main app.
2) The main app, which receives indexed data from Add-on app, runs searches on it and builds a dashboard using indexed data.
This App can be set up in two ways:
1) Standalone Mode: Install the main app and Add-on app on a single machine.
2) Distributed Environment: Install the main app and Add-on app on search head, Only Add-on on forwarder system and indexes.conf file from Add-on bundle on Indexer.
* Here also both the apps resides on search head machine, but no need to configure Add-on on search head.
* Only Add-on needs to be installed and configured on forwarder system.
* Execute the following command on forwarder to forward the collected data to the indexer.
$SPLUNK_HOME/bin/splunk add forward-server <indexer_ip_address>:9997
* On Indexer machine, enable event listening on port 9997 (recommended by Splunk).
* The main app on search head uses the received data and builds dashboards on it.
The main app dashboard can take some time to populate the dashboards Once data collection is started. A good test to see that you are receiving all of the data we expect is to run this search after several minutes:
search `cmx_index` | stats count by sourcetype
In particular, you should see these sourcetypes:
cmxhttp
cmxanalytics
cmxactive
cmxmap
If you don't see these sourcetypes, check out logs under $SPLUNK_HOME/var/log/CMX/ folder.
Added validation for Username, Password and Index
Removed support for HTTP. All the REST calls are executed on HTTPS.
This version has following updates:
1) Index configuration available on setup page which is used for updating macro definition.
2) All the dashboards are using macro instead of referring to index directly.
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.