icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Cisco DC Networking
SHA256 checksum (cisco-dc-networking_102.tgz) e657932c6c72903304a173ac47d517f104a1620a55a4d5f466c80ba6f2ec3e3b SHA256 checksum (cisco-dc-networking_101.tgz) b5dd2f01db6394a10042874b4108b234734f64386a889318af0c0d7f91c2cbc2 SHA256 checksum (cisco-dc-networking_100.tgz) d664d4bc5b1554e015186b9f73ba0394b9b1d8d535781a8bead5f11f47a32ea6
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Cisco DC Networking

Splunk Cloud
Overview
Details
DC Networking App provides comprehensive data onboarding and viz forData Center networking products i.e Nexus 9k, ACI and Nexus Dashboard. Data collection is via API. Features include :

Simplified Data Onboarding: With the Introduction of Splunk UCC framework and default inputs selection, DC App provides simplified User experience for onboarding of the data into Splunk. The new app also provides easier cross correlation across these data platforms with same index and app.

Centralized Monitoring: Real-time monitoring of Cisco Nexus 9000 switches, Cisco ACI fabrics and Nexus Dashboard anomalies and advisories, with detailed information on affected network objects.

Customizable Dashboards: The default dashboard uses Base Search for faster loading, but users can create tailored views to suit their specific needs, ensuring that critical information is always at hand.

Overview

  • Nexus Dashboard for the data center stands out as the first comprehensive technology solution in the industry developed by Cisco for network operators to manage day-2 operations in their networks.
  • Nexus Dashboard automates troubleshooting and helps with rapid root-cause analysis and early remediation. It also helps infrastructure owners comply with SLA requirements for their users.
  • Nexus Dashboard for the data center is supported on Cisco ACI and Cisco NX-OS/DCNM-based deployments.
  • Nexus Dashboard collects data on Anomalies, Advisories, and Orchestrator (Multi-Site Orchestrator) from the Nexus API and parses the fields. Data is mapped with the CIM data models for Enterprise Security use cases.
  • ACI is used to gather data from the Application Policy Infrastructure Controller (APIC), index the data, and use it for running searches and building dashboards.
  • Nexus 9k provides a scripted input for Splunk that automatically extracts responses of CLI commands from Cisco Nexus 9000 Switches. Moreover, this app gathers Syslog from Cisco Nexus 9000 Switches and provides the same for running searches on data and building dashboards using it.

Author: Cisco Systems, Inc
Version: 1.0.1

Release Notes

Version 1.0.2

  • Removed the admin user as the owner.

Version 1.0.1

*Updated default value of verify_ssl to True.

Compatibility Matrix

Browser Google Chrome, Mozilla Firefox, Safari
OS Linux, Windows
Splunk Enterprise Version 9.4.x, 9.3.x, 9.2.x, 9.1.x
Supported Splunk Deployment Splunk Cloud, Splunk Standalone, and Distributed Deployment
Nexus Insights version 6.3, 6.1
Nexus Dashboard version 3.2, 2.1, 2.0
APIC version 5.2, 6.0
Orchestrator version 3.1
NDO version 4.1, 4.2
Nexus 9k version 9.3, 10.3, 10.4

Recommended System Configuration

  • The Splunk search head system should have 16 GB of RAM and an octa-core CPU to run this app smoothly.

Account Configuration

For configuring an account for the data collection of API data, follow the below-mentioned steps in the Cisco DC Networking App for Splunk.

ND Account Configuration

  • Navigate to the Cisco DC Networking App for Splunk.
  • Click on the Configuration Tab.
  • Click on the ND Accounts tab.
  • Click on Add.
Input Parameters Required Description
Account Name True The unique name to identify an account
Hostname(s)/IP Address(es) True Hostname or IP Address of Nexus Dashboard (cluster/standalone ND)
ND Port True Port for Nexus Dashboard
ND Authentication Type True Type of Authentication: Local User Authentication or Remote User Authentication
ND Username True Username for Nexus Dashboard
ND Password True Password for Nexus Dashboard
ND Login Domain True (when Authentication Type = Remote User Authentication) Name of the Login Domain for ND
Enable Proxy No Whether the Proxy should be enabled or not
Proxy Type Yes Type of the Proxy: HTTP or SOCKS5
Proxy URL Yes Server Address of Proxy URL
Proxy Port Yes Port to the Proxy Server
Proxy Username No Username for the Proxy Server
Proxy Password No Password for the Proxy Server
  • This provides 2 different modes of authentication to collect the ND data in Splunk. The common fields are Hostname(s)/IP address(es) and ND Port.
  • The different modes are:

    • Password-Based Authentication

      • The user can configure the app using the default approach, i.e., using Password.
      • To set up ND with Password-Based Authentication, follow the steps below:
        • In the 'ND Authentication Type' field, select "Password-Based Authentication".
        • Enter the Hostname(s)/IP address(es) of the ND.
        • Enter the port of the ND, e.g., 443.
        • Enter the username and password used to log in to the ND.
        • Click on the Save button at the bottom of the page.
    • Remote User-Based Authentication

      • The user needs to provide both the Password and the Domain Name of the specified user.
      • To set up ND with Remote User-Based Authentication, follow the steps below:
        • In the 'ND Authentication Type' field, select "Remote User-Based Authentication".
        • Enter the Hostname(s)/IP address(es) of the ND.
        • Enter the port of the ND, e.g., 443.
        • Enter the username and password used to log in to the ND.
        • Enter the Domain Name of the user.
        • Click on the Save button at the bottom of the page.

ACI Account Configuration

  • Navigate to the Cisco DC Networking App for Splunk.
  • Click on the Configuration Tab.
  • Click on the ACI Accounts tab.
  • Click on Add.
Input Parameters Required Description
Account Name True The unique name to identify an account
Hostname(s)/IP Address(es) True Hostname or IP Address of APIC (cluster/standalone APIC)
APIC Port True Port for APIC
APIC Authentication Type True Type of Authentication: Password Based Authentication, Remote User Based Authentication, or Certificate Based Authentication
APIC Username True Username for APIC
APIC Password True Password for APIC
APIC Login Domain True (when APIC Authentication Type = Remote User Based Authentication) Name of the Login Domain for APIC
Certificate Name True (when APIC Authentication Type = Certificate Based Authentication) Name of the Certificate for APIC
Path of Private Key True (when APIC Authentication Type = Certificate Based Authentication) Path of Private Key for APIC
Enable Proxy No Whether the Proxy should be enabled or not
Proxy Type Yes Type of the Proxy: HTTP or SOCKS5
Proxy URL Yes Server Address of Proxy URL
Proxy Port Yes Port to the Proxy Server
Proxy Username No Username for the Proxy Server
Proxy Password No Password for the Proxy Server
  • This provides 3 different modes to configure an ACI account. The common fields are Hostname(s)/IP address(es) and APIC Port.
  • The different modes are:

    • Password-Based Authentication

      • The user can configure the app using the default approach, i.e., using Password.
      • To set up APIC with Password-Based Authentication, follow the steps below:
        • In the 'APIC Authentication Type' field, select "Password-Based Authentication".
        • Enter the Hostname(s)/IP address(es) of the APIC.
        • Enter the port of the APIC, e.g., 443.
        • Enter the username and password used to log in to the APIC.
        • Click on the Save button at the bottom of the page.
    • Certificate-Based Authentication

      • The user needs to provide the Certificate Name (as uploaded on APIC) and the Path of the RSA Private Key (path to the RSA private key, present on Splunk, of the certificate uploaded on APIC) on the setup page to collect data.
      • The procedure to create and configure a custom certificate for certificate-based authentication is given in the link below:
        Cisco APIC Basic Configuration Guide
      • Convert the Private Key to an RSA Private Key by running the following command in the terminal:
      • openssl rsa -in <private_key>.key -out <rsa_private_key>.key

      • To set up APIC with Certificate-Based Authentication, follow the steps below:

        • In the 'APIC Authentication Type' field, select "Certificate-Based Authentication".
        • Enter the Hostname(s)/IP address(es) of the APIC.
        • Enter the port of the APIC, e.g., 443.
        • Enter the username to log in to the APIC.
        • Enter the Name of the Certificate.
        • Enter the Path of the Private Key, e.g., /opt/splunk/ACI.key.
        • Click on the Save button at the bottom of the page.
    • Remote User-Based Authentication

      • The user needs to provide both the Password and the Domain Name of the specified user.
      • To set up APIC with Remote User-Based Authentication, follow the steps below:
        • In the 'APIC Authentication Type' field, select "Remote User-Based Authentication".
        • Enter the Hostname(s)/IP address(es) of the APIC.
        • Enter the port of the APIC, e.g., 443.
        • Enter the username and password used to log in to the APIC.
        • Enter the Domain Name of the user.
        • Click on the Save button at the bottom of the page.

Nexus 9K Account Configuration

  • Navigate to the Cisco DC Networking App for Splunk.
  • Click on the Configuration Tab.
  • Click on the Nexus 9K Accounts tab.
  • Click on Add.
Input Parameters Required Description
Account Name True The unique name to identify an account
Hostname/IP Address True Hostname or IP Address of Nexus 9K
Nexus 9K Port True Port for Nexus 9K
Nexus 9K Username True Username for Nexus 9K
Nexus 9K Password True Password for Nexus 9K
Enable Proxy No Whether the Proxy should be enabled or not
Proxy Type Yes Type of the Proxy: HTTP or SOCKS5
Proxy URL Yes Server Address of Proxy URL
Proxy Port Yes Port to the Proxy Server
Proxy Username No Username for the Proxy Server
Proxy Password No Password for the Proxy Server

Input Creation

For creating an input in Cisco DC Networking App for Splunk and start data collection of API data, follow the below-mentioned steps.

ND Input

  • Navigate to the Cisco DC Networking App for Splunk.
  • Click on the Inputs tab.
  • Click on Create New Input.
  • Select ND from the dropdown.
  • Fill in all the necessary details.
  • Click on Save.

The significance of each field is explained below:

Input Parameter Required Description
Name Yes A unique name for the data input.
ND Account Yes Select an account from the dropdown, which is configured on the configuration page.
Interval Yes The input interval time in seconds. The minimum value is 60 seconds, and the default is 60 seconds.
Index Yes The name of the index where data will be indexed in Splunk. The specified index must exist on the Indexer in a distributed environment.
Input Type Yes Select the type of input: Anomalies, Advisories, or Orchestrator.
Category Yes (if Input Type is Anomalies or Advisories) Select the category for ND input.
Severity Yes (if Input Type is Anomalies or Advisories) Select the severity for ND input.
Time Range Yes (if Input Type is Anomalies or Advisories) Specify the time range for the last N hours. If 0 is specified, all events (from the start of time) are collected. The default value is 4 hours.
Class Name(s) Yes (if Input Type is Orchestrator) Specify the class name(s) for ND input.

ACI Input

  • Navigate to the Cisco DC Networking App for Splunk.
  • Click on the Inputs tab.
  • Click on Create New Input.
  • Select ACI from the dropdown.
  • Fill in all the necessary details.
  • Click on Save.

The significance of each field is explained below:

Input Parameter Required Description
Name Yes A unique name for the data input.
APIC Account Yes Select an account from the dropdown, which is configured on the configuration page.
Interval Yes The input interval time in seconds. The minimum value is 60 seconds, and the default is 60 seconds.
Index Yes The name of the index where data will be indexed in Splunk. The specified index must exist on the Indexer in a distributed environment.
Input Type Yes Select the type of input: stats, microsegment, health, fex, classInfo, or authentication.
Class Name(s) Yes Specify the class name(s) for ACI input.

Nexus 9K Input

  • Navigate to the Cisco DC Networking App for Splunk.
  • Click on the Inputs tab.
  • Click on Create New Input.
  • Select Nexus 9K from the dropdown.
  • Fill in all the necessary details.
  • Click on Save.

The significance of each field is explained below:

Input Parameter Required Description
Name Yes A unique name for the data input.
Nexus 9K Account Yes Select an account from the dropdown, which is configured on the configuration page.
Interval Yes The input interval time in seconds. The minimum value is 60 seconds, and the default is 60 seconds.
Index Yes The name of the index where data will be indexed in Splunk. The specified index must exist on the Indexer in a distributed environment.
Component Yes Specify the component for Nexus 9K input.
Command Yes Select the command for Nexus 9K input.

Release Notes

Version 1.0.2
March 13, 2025

Version 1.0.2

  • Fixed an issue with user ownership/name as admin.
  • Removed the admin user as the owner.
Version 1.0.1
March 7, 2025
  • Fix ND Local Authentication to use "local" login domain and not the Default Authentication configured.
  • Default verify_ssl to True for Splunk Cloud certification
Version 1.0.0
March 4, 2025

First release of Cisco DC Networking App for Splunk including ND, ACI and Nexus 9k standalone ingestion and dashboards.


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.