icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Cisco ACI App for Splunk Enterprise (deprecated)
SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_510.tgz) a8b4c3136516e3621ae3d4be1982aea9b7ecba038862c26661c23abb9602ee11 SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_500.tgz) 6b4850352686f091b152f22c7e30c368acf45e63486ee5f7451af6b6a15d8c85 SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_440.tgz) 515fe475a6f113cc979eaddc2651bc61cf8a0d1b6b9d427be524deb28b993bca SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_430.tgz) 34758e1b8aa17b9f60440ec9c419e5ec75be3c44630273ff1eeeb4991f2799ba SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_424.tgz) 739e6a3b78f4ce7f41d93dd59d54bcef9bf6f47ba577ef754b634b5af7cc97d6 SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_423.tgz) e28185438e46edcc1bed591ae33cf3f09a461086625ebaa54de497e14f3d5ef7 SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_422.tgz) 69788938b7b0b6a09a1a13c2c6ca5e265ad576efd01dc70f578d04564da1d50f SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_421.tgz) a76a7e193e86253264f9fe205f471d6fb7ba50c7758735a0aabe8f7d62fd731a SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_420.tgz) 22c6145d7cf1e08a1d826c17f70a4615fd84720e3f362d6469cb47d6ba8f7a13 SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_413.tgz) 1b98837f2bbba01c6a9bd32bfbdaf0cbf5b9a5b7693f09fc94c3a8ddf27dc2c6 SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_401.tgz) 3360d9852666ec2900fcfdcdef88c8d79e927e11caed778184c460905ce0ba39 SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_40.tgz) 1ab262d8b63cb6f8c023c85fb5607d85e26947855ffeb4f15525494269c7d725 SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_30.tgz) 61717e0d929d25084de89bb80366301a96e52ca3e21740696a86a4de492522ee SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_222.tgz) 3217cae28da9d660b85960c086875103005819c4830c4d66b3a51b585cc64f4e SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_221.tgz) 9969812227e86c54feb6c389bf82ad90242bb3ffe707bbf5529057bcf0e0e71b SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_22.tgz) 0ed1fea0ffb77d045c569da4e599eea248a96513cc8f11a409c4a43593e5f10c SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_21.tgz) 62cb0126faec45a4d7e8f8b957c752d22a57a5727d82ac2699e2582a5a5891fe SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_20.tgz) 1606bc545c2aa5722c36754eab59085f637c9990c542b0b97aef38bdfc2931f3 SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_11.tgz) d2b112712c1d3b672022ff8f45010e2351bd3e37a4943869f28acd7b671325ae SHA256 checksum (cisco-aci-app-for-splunk-enterprise-deprecated_10.tgz) a9c5e2f669d3776a4e48779e09e90a7cf17a432b603a7162e5c357f9af50d7c0
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Cisco ACI App for Splunk Enterprise (deprecated)

Splunk Cloud
Overview
Details
This integration is deprecated. Please migrate to the Cisco DC Networking Application available at https://splunkbase.splunk.com/app/7777

A flexible approach to monitoring your Cisco ACI and all other elements of your technology stack. This App for Cisco ACI uses Cisco’s open API framework to collect APIC events, health scores and inventory data to deliver centralized, real-time visibility for applications and ACI infrastructures across bare metal and virtualized environments

Cisco ACI App for Splunk gathers data from APIC enabling you to:

• Gain real time visibility centrally across your ACI deployment
• Track inventory of logical ( e.g tenants, app profiles, EPGs) and physical constructs ( e.g spines, leafs, VMs) along with their health/fault monitoring to analyze, prevent and fix problems
• Threshold setting for KPI's and generate alerts when exceeding warning/critical limits
• Faults tracking with state transition
• Correlate compute, network and storage components by providing integration with Splunk app for vmware

For App related questions, contact
https://globalcontacts.cloudapps.cisco.com/contacts/contactDetails/en_US/c1o1-c2o2-c3o8

ABOUT THIS APP

The Cisco ACI App for Splunk Enterprise is used to build dashboards on indexed data provided by the "Cisco ACI Add-on for Splunk Enterprise" app.

This app delivers centralized, real-time visibility for applications and ACI infrastructures across the bare metal and virtualized environments.

REQUIREMENTS

  • Splunk version supported 9.2.x, 9.1.x and 9.0.x
  • This main App requires "Cisco ACI Add-on for Splunk Enterprise" version 5.1.0

Recommended System configuration

  • Splunk search head system should have 16 GB of RAM and an octa-core CPU to run this app smoothly.

Topology and Setting up Splunk Environment

Install the main app (Cisco ACI App for Splunk Enterprise) and Add-on (Cisco ACI Add-on for Splunk Enterprise) on a single machine. * Here both the app resides on a single machine. * The main app uses the data collected by the Add-on and build dashboards on it.

Installation of App

  • This app can be installed through UI using "Manage Apps" or extract zip file directly into /opt/splunk/etc/apps/ folder.
  • Restart Splunk.
  • Login to Splunk: http://<your_splunk_host:port>
  • Open browser: http://<your_splunk_host:port>/en-US/debug/refresh. Click "Refresh"
  • Open browser: http://<your_splunk_host:port>/en-US/_bump
    (To pull all updated web resources from the server to the browser, to modify the cached items such as js, cookies, images etc..)
  • Restart Splunk

  • Note:
    1) If a previous version of the App is already installed, remove the cisco-app-ACI folder from the Splunk app folder before the installation of a newer version or the user can upgrade the app from Splunk UI.
    2) If in case cleaned Splunk eventdata, please make sure to delete the files ending with _LastTransactionTime.txt from TA_cisco-ACI/bin/ folder.
    These files are saving timestamp to get only incremental data from APIC or MSO.

Installation of Add-on

  • This Add-on can be installed through UI using "Manage Apps" or extract zip file directly into /opt/splunk/etc/apps/ folder.
  • Ref documentation provided by "Cisco ACI Add-on for Splunk Enterprise" for Configuration of Add-on

  • Note: If a previous version of the Add-on is already installed, remove the TA_cisco-ACI folder from the Splunk app folder before installation of a newer version or the user can upgrade the app from Splunk UI.
    If the user upgrades the app, it should be ensured that index, sourcetype, and interval must be mentioned for each input in local/inputs.conf

Upgrade of App/Add-on

Please disable all the scripted inputs before upgrading Add-on(TA_cisco-ACI). * Download the App package * From the UI navigate to Apps-> Manage Apps * In the top right corner select "Install app from file" * Select "Choose File" and select the App package * Check Upgrade App * Select "Upload" and follow the prompts.
#### OR * If a newer version is available on splunkbase, then App/Add-on can be updated from UI also.
* From the UI navigate to Apps-> Manage Apps OR click on the gear icon
* Search for Cisco ACI App/Add-on
* Click on 'Update to <version>' under Version Column.

Post upgrade steps

Upgrading the Add-on(TA_cisco-ACI) to v5.1.0 from any version

Please follow the below steps.

  • In inputs.conf file under TA_cisco-ACI/local folder, if stanza containing '-stats' is present, then perform the following steps.
  • Change following Classes:
    • eqptEgrTotal5min to eqptEgrTotal15min
    • eqptIngrTotal5min to eqptIngrTotal15min
    • procCPU5min to procCPU15min
    • procMem5min to procMem15min
  • Restart Splunk
    ##### OR
  • Remove that whole stanza and save the file.
  • Restart Splunk

  • Follow below steps if you are collecting data using Certificate Based Authentication in v4.3.0 OR v4.4.0 and Upgrading Add-on to v5.1.0

  • Take Backup of your Private key.
  • You need to convert your Private key to RSA Private key by running the following command in cmd.

    • openssl rsa -in <old_private_key>.key -out <private_key>.key
      (Keep the name same for newly generated private_key).
  • Enable all the scripted inputs.

  • Note: If scripts are already enabled then first disable and then re-enable all the scripted inputs.

Uninstallation of App

This section provides the steps to uninstall App from a standalone Splunk platform installation.

  • (Optional) If you want to remove data from Splunk database, you can use the below Splunk CLI clean command to remove indexed data from an app before deleting the app.

    • $SPLUNK_HOME/bin/splunk clean eventdata -index <index_name>
  • Delete the app and its directory. The app and its directory are typically located in the folder$SPLUNK_HOME/etc/apps/<appname> or run the following command in the CLI:

    • $SPLUNK_HOME/bin/splunk remove app [appname] -auth <splunk username>:<splunk password>
  • You may need to remove user-specific directories created for your app by deleting any files found here: $SPLUNK_HOME/bin/etc/users/*/<appname>

  • Restart the Splunk platform. You can navigate to Settings -> Server controls and click the restart button in Splunk web UI or use the following Splunk CLI command to restart Splunk:

    • $SPLUNK_HOME/bin/splunk restart

TEST YOUR INSTALL

  • Once the Add-on is configured to receive data from ACI, The main app dashboard can take some time before the data is populated in all panels. A good test to see that you are receiving all of the data is to run this search after several minutes:

    index="<your index>" | stats count by sourcetype

  • Troubleshooting APIC configuration:

  • In particular, you should see these sourcetypes:
    • cisco:apic:health
    • cisco:apic:stats
    • cisco:apic:class
    • cisco:apic:authentication
    • cisco:apic:cloud
  • If you don't see these sourcetypes, have a look at the messages output by the scripted input: collect.py. Here is a sample search that will show them:
    index=_internal component="ExecProcessor" collect.py "ACI Error:" | table _time host log_level message

  • Troubleshooting MSO configuration:

  • You should see this sourcetype: cisco:mso
  • If you don't see this sourcetype, have a look at the messages output by the scripted input: collect_mso.py. Here is a sample search that will show them:
    index=_internal component="ExecProcessor" collect_mso.py "MSO Error:" | table _time host log_level message

You can also see $SPLUNK_HOME/var/log/splunk/splunkd.log file to check if any error has occurred.

ABOUT THE DATA

APIC DATA

Below are two sample event records. The first one gives health detail for a tenant with the name "common" and the other one gives a fault detail for the same tenant.

1)

2014-04-25 00:38:07 dn=uni/tn-common/health status=created,modified updTs=2014-04-25T04:52:32.274+00:00 chng=0 cur=100 maxSev=cleared modTs=never twScore=100 rn=health prev=100 childAction= dn=uni/tn-common lcOwn=local ownerKey= name=common descr= status=created,modified monPolDn=uni/tn-common/monepg-default modTs=2014-04-23T22:14:01.702+00:00 ownerTag= uid=0 rn=tn-common childAction= component=fvTenant

2)

2014-04-25 00:38:08 status=created,modified domain=tenant code=F1228 occur=1 subject=contract severity=minor descr=Contract default configuration failed due to filter-not-present origSeverity=minor rn=fault-F1228 childAction= type=config dn=uni/tn-common/oobbrc-default/fault-F1228 prevSeverity=minor modTs=never highestSeverity=minor lc=raised changeSet= created=2014-04-23T22:24:37.274+00:00 ack=no cause=configuration-failed rule=vz-abrcp-configuration-failed lastTransition=2014-04-23T22:26:57.046+00:00 dn=uni/tn-common lcOwn=local ownerKey= name=common descr= status=created,modified monPolDn=uni/tn-common/monepg-default modTs=2014-04-23T22:14:01.702+00:00 ownerTag= uid=0 rn=tn-common childAction= component=fvTenant

MSO DATA

Below are two sample event records. The first one gives policy detail for a policy named common_tenant_policy and the other one for mso_policy.

1)

current_time=2020-06-19 16:10:42 mso_host=x.x.x.x mso_api_endpoint=policyDetails version=1 provider_epgRef=/schemas/5eccc36d2d0000623d59b228/templates/Template2/anps/common_tenant_AP/epgs/common_tenant_EPG_1 provider_addr=1.2.3.4 provider_l3Ref= provider_tenantId=0000ffff0000000000000010 provider_externalEpgRef= tenantId=0000ffff0000000000000010 id=5ed5f8242a1d00df1aabe01b policySubtype=relay name=common_tenant_policy policyType=dhcp

2)

current_time=2020-06-19 16:10:42 mso_host=x.x.x.x mso_api_endpoint=policyDetails provider_epgRef=/schemas/5eccc36d2d0000623d59b228/templates/Template2/anps/common_tenant_AP/epgs/common_tenant_EPG_1 provider_addr=10.0.1.11 provider_l3Ref= provider_tenantId=0000ffff0000000000000010 provider_externalEpgRef= tenantId=5ecca9982d0000453759b150 id=5eec91755c1d0065269c37c6 policySubtype=relay name=mso_policy policyType=dhcp

Data Model

This app stores the indexed data in accelerated datamodels and build dashboards by fetching data from datamodels. Below is the list of datamodels that have been created in the app.

  • Auth - Maps authentication details from the ACI Environment.
  • Health - Maps health and fault information for all the MOs of given classes.
  • Fault - Maps to defects or faults present on APIC.
  • Systems - Maps to general information for all the MOs of given classes.
  • Counters - Maps to general information for all the MOs of given classes.
  • Statistics - Maps to statistical data for all the MOs of given classes.
  • Events - Maps to general information for all the MOs of class=eventrecord.

  • If you want to improve the performance of dashboards, you must need to enable the acceleration of datamodel. Please follow the below steps:

  • Go to Settings -> Data Models
  • Filter with Cisco ACI App For Splunk Enterprise
  • In Action tab, Click on Edit and click Edit Acceleration
  • Check Acceleration checkbox and select the appropriate summary range and Save it
  • Warning: Acceleration may increase storage and processing costs.

Saved Searches

This app provides savedsearches that generate lookup files or send email alerts.

  • savedsearches which generates lookup files
  • APICFabricLookup - generates APICNodeLookup.csv file
  • APICCEPLookup - generates APICVMLookup.csv file
  • MSO Sites Lookups - generates mso_site_details.csv file
  • savedsearches which generates alerts
  • ACI Monitoring Threshold: Tenant Exceeds Warning Threshold Limit
  • ACI Monitoring Threshold: Tenant Exceeds Critical Threshold Limit
  • ACI Monitoring Threshold: Tenant Exceeds Max Threshold Limit
  • ACI Monitoring Threshold: EPG Exceeds Warning Threshold Limit
  • ACI Monitoring Threshold: EPG Exceeds Critical Threshold Limit
  • ACI Monitoring Threshold: EPG Exceeds Max Threshold Limit
  • ACI Monitoring Threshold: Contracts Exceeds Warning Threshold Limit
  • ACI Monitoring Threshold: Contracts Exceeds Critical Threshold Limit
  • ACI Monitoring Threshold: Contracts Exceeds Max Threshold Limit
  • ACI Monitoring Threshold: Filters Exceeds Warning Threshold Limit
  • ACI Monitoring Threshold: Filters Exceeds Critical Threshold Limit
  • ACI Monitoring Threshold: Filters Exceeds Max Threshold Limit
  • ACI Monitoring Threshold: BD Exceeds Warning Threshold Limit
  • ACI Monitoring Threshold: BD Exceeds Critical Threshold Limit
  • ACI Monitoring Threshold: BD Exceeds Max Threshold Limit
  • ACI Monitoring Threshold: L3Out Networks Exceeds Warning Threshold Limit
  • ACI Monitoring Threshold: L3Out Networks Exceeds Critical Threshold Limit
  • ACI Monitoring Threshold: L3Out Networks Exceeds Max Threshold Limit
  • ACI Monitoring Threshold: TCAM Percentage Utilized Exceeds Warning Threshold Limit
  • ACI Monitoring Threshold: TCAM Percentage Utilized Exceeds Critical Threshold Limit
  • ACI Monitoring Threshold: Egress Port Utilization for Leafs/Spines Exceeds Warning Threshold Limit
  • ACI Monitoring Threshold: Egress Port Utilization for Leafs/Spines Exceeds Critical Threshold Limit
  • ACI Monitoring Threshold: Ingress Port Utilization for Leafs/Spines Exceeds Warning Threshold Limit
  • ACI Monitoring Threshold: Ingress Port Utilization for Leafs/Spines Exceeds Critical Threshold Limit
  • ACI Monitoring Threshold: VLAN Pool Exceeds Max Thresh
    old Limit
  • ACI Monitoring Threshold: VLAN Pool Exceeds Critical Threshold Limit

Additional Features

In addition to out-of-the-box reporting and analytics capabilities for your ACI environment, the app includes a set of pre-defined dashboards for specific user roles:

  • Helpdesk admin: Enables Help desk operator to analyze various faults in the system and escalate them to tenant or fabric admin accordingly. He will have access to only "Home", "Authentication" and "Helpdesk" dashboards.

  • Tenant admin: Enables Tenant admin to analyze and drill down faults and health related issues to a particular tenant. He can drill down into Applications, EPGs, and VM endpoints to identify a single point of failure within the admin. He will have access to only "Home", "Authentication" and "Tenants" Dashboards.

  • Fabric admin: Enables Fabric Admin to analyze physical network related issues. It gives visibility into fabric components of networks e.g. leaf, spine and it's physical components like chassis, ports, fan tray, line card, etc.

  • Tenant user: Enables Tenant User to manage a specific tenant and all of its components like Application, EPGs, and VMs. To create a Tenant user for tenant "ABC", follow the steps given below.

1) Create a role with the name "tenant_ABC". In search criteria put "dn=uni/tn-ABC/*".
2) Create a new user with the name user-ABC and apply the role of "tenant_ABC" to this user.
3) Edit the permission of Tenant Dashboard to provide read access to a user with the role "tenant_ABC".

The app also includes a set of MSO dashboards for specific use cases:

New Dashboards

  • Sites: Information about sites associated with MSO and the fault count of various severity levels. Drill-downs are provided in Site Information, Site Health graph, and panels consisting of fault counts, so users can get a detailed view of the same.

  • Schemas: Information about schemas configured with MSO. Drill down into No. of Schemas Associated With MSO single pane visualization will show schema details, drill-down on Application Profiles, Bridge Domain, External EPGs, and VRF single pane visualization to get insights about particular health and fault details and drill-down on contracts will show contracts health details.

  • Tenants: Graphical representation of tenants associated with sites, schemas, and users. Drill down on table showing Tenant Details for a particular site will re-direct to Tenant Details dashboard giving more description about the selected tenant.

  • Users: Information about MSO users and their roles. More details about user and roles are given by drill down on the Users and Roles panel.

  • Policy: Information about policies configured in MSO. Drill down on Policy SubType Breakdown panel will show details of specific subtype.

All the MSO dashboards have Audit Logs panel showing Audit Logs of a particular type, for example, schemas dashboard have audit logs only of type schema.

Troubleshooting

  • If any warning displayed in dashboards of the app stating excessive memory usage of mvexpand command like: output will be truncated at xxx results due to excessive memory usage... , user can manually increase the memory limit in limits.conf
  • Default value of max_mem_usage_mb parameter is 500 MB. to increase the limit follow the below steps.
  • create limits.conf file under $SPLUNK_HOME/etc/apps/cisco-app-ACI/local
  • Add below stanza:
    [mvexpand]
    max_mem_usage_mb = <non-negative integer in MB>

The list of open source components used in developing the App

Support

  • This app is supported by Cisco Systems.
  • Email support during weekday business hours. Please ask a question or send an email to aci-splunk-app@cisco.com
  • Author: Cisco Systems
  • Copyright (c) 2024 Cisco Systems, Inc

Release Notes

  • Version 5.1.0:
  • Removed information about APIC Roles from all dashboards.
  • Updated setup guide
  • Bug Fixes

  • Version 5.0.0:

  • Added MSO Overview, Sites, Schemas, Tenants, Users, and Policy Dashboards for Multi-Site Orchestrator.
  • Updated setup guide

  • Version 4.4.0:

  • Updated setup guide
  • Added support of Splunk 8.x

  • Version 4.3.0:

  • Added 3 Dashboards of Cloud APIC
  • Changed savedsearches - APICFabricLookup, APICCEPLookup
  • Bug Fixes

Release Notes

Version 5.1.0
May 23, 2024
  • Added information about required APIC Roles on Setup Page
  • Added subtree fvIP for fvCEP class to get the source addr field
  • Added Support for Nexus Dashboard authentication along with MSO authentication
  • Added Support for APIC version 5.2 and 6.x
  • Added Support for NDO version supported 4.1 and 4.2
  • Added Support for Splunk 9.0, 9.1 and 9.2
Version 5.0.0
Oct. 15, 2020

Added New dashboards for Multi-Site Orchestrator
MSO Overview
Sites
Schemas
Tenants
Users
Policy
Added support for filter out data based on the Multi-Site Orchestrator on all ACI dashboards

Version 4.4.0
Jan. 7, 2020
  • Added support of Splunk 8.x
Version 4.3.0
Aug. 8, 2019

Version 4.3.0
Added 3 Dashboards of Cloud APIC
Changed savedsearches - APICFabricLookup, APICCEPLookup
* Bug Fixes

Version 4.2.4
Jan. 26, 2019

v 4.2.4
- Additional Dashboards for Controller Statistics and ACL Logs on L2 and L3 layer
- Better UI performance
- Additional VLAN information
- Bug fixes

Version 4.2.3
Oct. 22, 2018

v 4.2.3
-Additional bug fixes

v 4.2.2
- Additional Cloud Support

v 4.2.1
- Additional Dashboards for Controller Statistics and ACL Logs on L2 and L3 layer
- Better UI performance
- Additional VLAN information
- Bug fixes

For App related questions, kindly create a TAC case
https://globalcontacts.cloudapps.cisco.com/contacts/contactDetails/en_US/c1o1-c2o2-c3o8
OR
Contact Us
1 800 553 2447 or
1 408 526 7209

Version 4.2.2
Sept. 25, 2018

v 4.2.2
- Additional Cloud Support

v 4.2.1
- Additional Dashboards for Controller Statistics and ACL Logs on L2 and L3 layer
- Better UI performance
- Additional VLAN information
- Bug fixes

For App related questions, kindly create a TAC case
https://globalcontacts.cloudapps.cisco.com/contacts/contactDetails/en_US/c1o1-c2o2-c3o8
OR
Contact Us
1 800 553 2447 or
1 408 526 7209

Version 4.2.1
July 13, 2018

v 4.2.1
- Additional Dashboards for Controller Statistics and ACL Logs on L2 and L3 layer
- Better UI performance
- Additional VLAN information
- Bug fixes

Version 4.2.0
July 12, 2018

v 4.2.0
- Additional Dashboards for Controller Statistics and ACL Logs on L2 and L3 layer
- Better UI performance
- Additional VLAN information
- Bug fixes

Version 4.1.3
Sept. 22, 2017

Version 4.1.3 updates (compatible with ACI add-on 4.1.1):

New Fabric Extenders dashboard
APIC Syslog parsing capability - Used in System Faults and Events dashboard
APIC Health and Status monitoring
Minor bugs and fixes
Optimized dashboard/search performance

For Technical Support: contact aci-splunk-app@cisco.com OR create a case with Cisco TAC.

Version 4.0.1
March 31, 2017

All features existing in the version 4.0
New sample data for eventgen (Cisco ACI Add-on for Splunk Enterprise Version 4.0.1)
Minor bug fixes
Updated Help Desk>'System Faults' dashboard
Updated Fabric>'Authentication' dashboard

Version: 4.0 features
The features developed in this release include: • Support for multiple APIC's • Syslog Integration with ACI • Multi-Pod and Micro-segmentation view • Get to the root cause better and faster • Increased performance of dashboards • New and better User Interface and drill-down capabilities

Version 4.0
Jan. 24, 2017

The features developed in this release include: • Support for multiple APIC's • Syslog Integration with ACI • Multi-Pod and Micro-segmentation view • Get to the root cause better and faster • Increased performance of dashboards • New and better User Interface and drill-down capabilities

Version 3.0
Oct. 20, 2016

The features developed in this release include:
• Support for multiple APIC's
• Threshold setting for KPI's (i.e. no of tenants, end point groups, contracts, filters, bridge domains and l3out networks) • Generate Alters when threshold levels exceed. • Fault tracking with state transition. • Tenant Utilization, Top TCAM and Port Utilization.

Version 2.2.2
Oct. 14, 2016

The features developed in this release include: • Threshold setting for KPI's (i.e. no of tenants, end point groups, contracts, filters, bridge domains and l3out networks) • Generate Alters when threshold levels exceed. • Fault tracking with state transition. • Tenant Utilization, Top TCAM and Port Utilization. • Updated the Splunk Landing page/home page to display the Number of EPGs, Number of contracts, Number of filters, Number of BDs and Number of L3OutNetworks. Drill down on each component to display tenant-wise details.

Version 2.2.1
Oct. 7, 2016

The features developed in this release include:
• Threshold setting for KPI's (i.e. no of tenants, end point groups, contracts, filters, bridge domains and l3out networks)
• Generate Alters when threshold levels exceed.
• Fault tracking with state transition.
• Tenant Utilization, Top TCAM and Port Utilization.
• Updated the Splunk Landing page/home page to display the Number of EPGs, Number of contracts, Number of filters, Number of BDs and Number of L3OutNetworks. Drill down on each component to display tenant-wise details.

Version 2.2
Sept. 9, 2016

Release Features
The features developed in this release include:
• Threshold setting for KPI's (i.e. no of tenants, end point groups, contracts, filters, bridge domains and l3out networks)
• Generate Alters when threshold levels exceed.
• Fault tracking with state transition.
• Tenant Utilization.
• TCAM and Port Utilization.
• Updated the Splunk Landing page/home page to display the Number of EPGs, Number of contracts, Number of filters, Number of BDs and Number of L3OutNetworks. Drill down on each component to display tenant-wise details.

Version 2.1
Aug. 3, 2016

Release Features
The features developed in this release include:
• Threshold setting for KPI's (i.e. no of tenants, end point groups, contracts, filters, bridge domains and l3out networks)
• Generate Alters when threshold levels exceed.
• Fault tracking with state transition.
• Tenant Utilization.
• TCAM and Port Utilization.
• Updated the Splunk Landing page/home page to display the Number of EPGs, Number of contracts, Number of filters, Number of BDs and Number of L3OutNetworks. Drill down on each component to display tenant-wise details.

Version 2.0
July 5, 2016

Release Features
The features developed in this release include:
• Threshold setting for KPI's (i.e. no of tenants, end point groups, contracts, filters, bridge domains and l3out networks)
• Generate Alters when threshold levels exceed.
• Fault tracking with state transition.
• Tenant Utilization.
• TCAM and Port Utilization.
• Updated the Splunk Landing page/home page to display the Number of EPGs, Number of contracts, Number of filters, Number of BDs and Number of L3OutNetworks. Drill down on each component to display tenant-wise details.

Version 1.1
April 1, 2015
Version 1.0
Oct. 31, 2014

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.