icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Cisco DC Networking
SHA256 checksum (cisco-dc-networking_110.tgz) f1319efc499566f6bb056c89fd4a8d2fce4e1f5c7611a3c0aaf618d3e011ec03 SHA256 checksum (cisco-dc-networking_102.tgz) b393e384972b17b94fd03f3d20de83570345d8f15092f5f929c8729294394785 SHA256 checksum (cisco-dc-networking_101.tgz) 4afbe8858b667d03201a243d3a4fc98f6f4fa0349d3f60d766d7c659c3380109 SHA256 checksum (cisco-dc-networking_100.tgz) 312f118b77f1471e5ddd7c8c3133fd303fa5c8a01eaae0648b870bda502ba540
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Cisco DC Networking

Splunk Cloud
Overview
Details
The Cisco Data Center Networking App delivers a comprehensive solution for data onboarding and visualization tailored to Cisco Data Center Networking products, including Cisco Nexus 9000 Series Switches, Cisco ACI, and Cisco Nexus Dashboard. Data collection is achieved through APIs. Key features of the app include:

Simplified Data Onboarding: Leveraging the Splunk UCC framework and default input selection, the app streamlines the process of integrating data into Splunk. It also enhances cross-correlation capabilities across data platforms by utilizing a unified index and application structure.

Centralized Monitoring: Offers real-time monitoring of Cisco Nexus 9000 Series Switches, Cisco ACI fabrics, and Cisco Nexus Dashboard, providing detailed insights into anomalies and advisories with specific information about affected network objects.

Customizable Dashboards: Includes a default dashboard optimized for faster loading using Base Search. Additionally, users can create personalized views to meet their specific requirements, ensuring critical data is easily accessible.

Overview

Cisco Nexus Dashboard for Data Center Networking is the industry's first comprehensive solution designed specifically for network operators to streamline and simplify operations. This innovative platform enhances operational efficiency by automating troubleshooting, enabling rapid root-cause analysis, and supporting proactive remediation. It also assists infrastructure teams in meeting SLA requirements for their end users.

Nexus Dashboard is compatible with Cisco ACI and Cisco NX-OS based deployments, providing a unified approach to operational management. Key functionalities include:

Data Collection and Parsing: The Nexus Dashboard aggregates data on anomalies, advisories, and orchestrator events (via Nexus Dashboard’s Orchestration) using Nexus APIs. The collected data is then parsed and mapped to Common Information Model (CIM) data models, making it applicable for Enterprise Security use cases.

Application-Centric Insights: For ACI-based deployments, the platform collects data from the Application Policy Infrastructure Controller (APIC), indexes it, and enables users to perform advanced searches and create customized dashboards for actionable insights.

Nexus 9000 Series Switches Integration: Nexus Dashboard includes a script-based input for Splunk that automates the extraction of CLI command responses from Cisco Nexus 9000 switches. Additionally, it gathers Syslog data from these switches, enabling comprehensive search capabilities and dashboard creation for detailed network visibility and analysis.

By consolidating these capabilities, Cisco Nexus Dashboard empowers network operators with a robust toolset to optimize and manage data center networks effectively.

Release Notes

Version : 1.1.0

Added support for collecting Congestion, Endpoints, Flows, Protocols, and Custom data for ND.
Added support for collecting Managed Objects data for ACI.
Added support for collecting DME-based data with class/object queries for N9K.
Added support of providing additional query parameters in all the 3 input types - ACI, ND, 9K.
Added dashboards for Flows, Congestion, Endpoints, and Protocols for ND.
Added new Syslog dashboards for ND, Orchestrator, ACI and N9K.
Updated existing dashboard queries to use base search for improved performance and efficiency.
Added CIM mapping and improved field extraction for better correlation and normalization in Splunk.
Updated and enhanced field extraction across all data types to improve data quality and usability.
Added multi-account support, enabling configuration of multiple accounts per input.
Added new default inputs for ND

Version 1.0.2

  • Removed the admin user as the owner.

Version 1.0.1

*Updated default value of verify_ssl to True.

Compatibility Matrix

Browser Google Chrome, Mozilla Firefox, Safari
OS Linux, Windows
Splunk Enterprise Version 10.x , 9.4.x, 9.3.x, 9.2.x, 9.1.x
Supported Splunk Deployment Splunk Cloud, Splunk Standalone, and Distributed Deployment
Nexus Insights version 6.3, 6.1
Nexus Dashboard version 3.2, 2.1, 2.0
APIC version 5.2, 6.0
Orchestrator version 3.1
NDO version 4.1, 4.2
Nexus 9k version 9.3, 10.3, 10.4

Recommended System Configuration

  • The Splunk search head system should have 16 GB of RAM and an octa-core CPU to run this app smoothly.

Account Configuration

For configuring an account for the data collection of API data, follow the below-mentioned steps in the Cisco DC Networking App for Splunk.

ND Account Configuration

  • Navigate to the Cisco DC Networking App for Splunk.
  • Click on the Configuration Tab.
  • Click on the ND Accounts tab.
  • Click on Add.
Input Parameters Required Description
Account Name True The unique name to identify an account
Hostname(s)/IP Address(es) True Hostname or IP Address of Nexus Dashboard (cluster/standalone ND)
ND Port True Port for Nexus Dashboard
ND Authentication Type True Type of Authentication: Local User Authentication or Remote User Authentication
ND Username True Username for Nexus Dashboard
ND Password True Password for Nexus Dashboard
ND Login Domain True (when Authentication Type = Remote User Authentication) Name of the Login Domain for ND
Enable Proxy No Whether the Proxy should be enabled or not
Proxy Type Yes Type of the Proxy: HTTP or SOCKS5
Proxy URL Yes Server Address of Proxy URL
Proxy Port Yes Port to the Proxy Server
Proxy Username No Username for the Proxy Server
Proxy Password No Password for the Proxy Server
  • This provides 2 different modes of authentication to collect the ND data in Splunk. The common fields are Hostname(s)/IP address(es) and ND Port.
  • The different modes are:

    • Password-Based Authentication

      • The user can configure the app using the default approach, i.e., using Password.
      • To set up ND with Password-Based Authentication, follow the steps below:
        • In the 'ND Authentication Type' field, select "Password-Based Authentication".
        • Enter the Hostname(s)/IP address(es) of the ND.
        • Enter the port of the ND, e.g., 443.
        • Enter the username and password used to log in to the ND.
        • Click on the Save button at the bottom of the page.
    • Remote User-Based Authentication

      • The user needs to provide both the Password and the Domain Name of the specified user.
      • To set up ND with Remote User-Based Authentication, follow the steps below:
        • In the 'ND Authentication Type' field, select "Remote User-Based Authentication".
        • Enter the Hostname(s)/IP address(es) of the ND.
        • Enter the port of the ND, e.g., 443.
        • Enter the username and password used to log in to the ND.
        • Enter the Domain Name of the user.
        • Click on the Save button at the bottom of the page.

ACI Account Configuration

  • Navigate to the Cisco DC Networking App for Splunk.
  • Click on the Configuration Tab.
  • Click on the ACI Accounts tab.
  • Click on Add.
Input Parameters Required Description
Account Name True The unique name to identify an account
Hostname(s)/IP Address(es) True Hostname or IP Address of APIC (cluster/standalone APIC)
APIC Port True Port for APIC
APIC Authentication Type True Type of Authentication: Password Based Authentication, Remote User Based Authentication, or Certificate Based Authentication
APIC Username True Username for APIC
APIC Password True Password for APIC
APIC Login Domain True (when APIC Authentication Type = Remote User Based Authentication) Name of the Login Domain for APIC
Certificate Name True (when APIC Authentication Type = Certificate Based Authentication) Name of the Certificate for APIC
Path of Private Key True (when APIC Authentication Type = Certificate Based Authentication) Path of Private Key for APIC
Enable Proxy No Whether the Proxy should be enabled or not
Proxy Type Yes Type of the Proxy: HTTP or SOCKS5
Proxy URL Yes Server Address of Proxy URL
Proxy Port Yes Port to the Proxy Server
Proxy Username No Username for the Proxy Server
Proxy Password No Password for the Proxy Server
  • This provides 3 different modes to configure an ACI account. The common fields are Hostname(s)/IP address(es) and APIC Port.
  • The different modes are:

    • Password-Based Authentication

      • The user can configure the app using the default approach, i.e., using Password.
      • To set up APIC with Password-Based Authentication, follow the steps below:
        • In the 'APIC Authentication Type' field, select "Password-Based Authentication".
        • Enter the Hostname(s)/IP address(es) of the APIC.
        • Enter the port of the APIC, e.g., 443.
        • Enter the username and password used to log in to the APIC.
        • Click on the Save button at the bottom of the page.
    • Certificate-Based Authentication

      • The user needs to provide the Certificate Name (as uploaded on APIC) and the Path of the RSA Private Key (path to the RSA private key, present on Splunk, of the certificate uploaded on APIC) on the setup page to collect data.
      • The procedure to create and configure a custom certificate for certificate-based authentication is given in the link below:
        Cisco APIC Basic Configuration Guide
      • Convert the Private Key to an RSA Private Key by running the following command in the terminal:
      • openssl rsa -in <private_key>.key -out <rsa_private_key>.key

      • To set up APIC with Certificate-Based Authentication, follow the steps below:

        • In the 'APIC Authentication Type' field, select "Certificate-Based Authentication".
        • Enter the Hostname(s)/IP address(es) of the APIC.
        • Enter the port of the APIC, e.g., 443.
        • Enter the username to log in to the APIC.
        • Enter the Name of the Certificate.
        • Enter the Path of the Private Key, e.g., /opt/splunk/ACI.key.
        • Click on the Save button at the bottom of the page.
    • Remote User-Based Authentication

      • The user needs to provide both the Password and the Domain Name of the specified user.
      • To set up APIC with Remote User-Based Authentication, follow the steps below:
        • In the 'APIC Authentication Type' field, select "Remote User-Based Authentication".
        • Enter the Hostname(s)/IP address(es) of the APIC.
        • Enter the port of the APIC, e.g., 443.
        • Enter the username and password used to log in to the APIC.
        • Enter the Domain Name of the user.
        • Click on the Save button at the bottom of the page.

Nexus 9K Account Configuration

  • Navigate to the Cisco DC Networking App for Splunk.
  • Click on the Configuration Tab.
  • Click on the Nexus 9K Accounts tab.
  • Click on Add.
Input Parameters Required Description
Account Name True The unique name to identify an account
Hostname/IP Address True Hostname or IP Address of Nexus 9K
Nexus 9K Port True Port for Nexus 9K
Nexus 9K Username True Username for Nexus 9K
Nexus 9K Password True Password for Nexus 9K
Enable Proxy No Whether the Proxy should be enabled or not
Proxy Type Yes Type of the Proxy: HTTP or SOCKS5
Proxy URL Yes Server Address of Proxy URL
Proxy Port Yes Port to the Proxy Server
Proxy Username No Username for the Proxy Server
Proxy Password No Password for the Proxy Server

Input Creation

For creating an input in Cisco DC Networking App for Splunk and start data collection of API data, follow the below-mentioned steps.

ND Input

  • Navigate to the Cisco DC Networking App for Splunk.
  • Click on the Inputs tab.
  • Click on Create New Input.
  • Select ND from the dropdown.
  • Fill in all the necessary details.
  • Click on Save.

The significance of each field is explained below:

Input Parameter Required Description
Name Yes A unique name for the data input.
ND Account Yes Select an account from the dropdown, which is configured on the configuration page.
Interval Yes The input interval time in seconds. The minimum value is 60 seconds, and the default is 60 seconds.
Index Yes The name of the index where data will be indexed in Splunk. The specified index must exist on the Indexer in a distributed environment.
Input Type Yes Select the type of input: Anomalies, Advisories, or Orchestrator.
Category Yes (if Input Type is Anomalies or Advisories) Select the category for ND input.
Severity Yes (if Input Type is Anomalies or Advisories) Select the severity for ND input.
Time Range Yes (if Input Type is Anomalies or Advisories) Specify the time range for the last N hours. If 0 is specified, all events (from the start of time) are collected. The default value is 4 hours.
Class Name(s) Yes (if Input Type is Orchestrator) Specify the class name(s) for ND input.

ACI Input

  • Navigate to the Cisco DC Networking App for Splunk.
  • Click on the Inputs tab.
  • Click on Create New Input.
  • Select ACI from the dropdown.
  • Fill in all the necessary details.
  • Click on Save.

The significance of each field is explained below:

Input Parameter Required Description
Name Yes A unique name for the data input.
APIC Account Yes Select an account from the dropdown, which is configured on the configuration page.
Interval Yes The input interval time in seconds. The minimum value is 60 seconds, and the default is 60 seconds.
Index Yes The name of the index where data will be indexed in Splunk. The specified index must exist on the Indexer in a distributed environment.
Input Type Yes Select the type of input: stats, microsegment, health, fex, classInfo, or authentication.
Class Name(s) Yes Specify the class name(s) for ACI input.

Nexus 9K Input

  • Navigate to the Cisco DC Networking App for Splunk.
  • Click on the Inputs tab.
  • Click on Create New Input.
  • Select Nexus 9K from the dropdown.
  • Fill in all the necessary details.
  • Click on Save.

The significance of each field is explained below:

Input Parameter Required Description
Name Yes A unique name for the data input.
Nexus 9K Account Yes Select an account from the dropdown, which is configured on the configuration page.
Interval Yes The input interval time in seconds. The minimum value is 60 seconds, and the default is 60 seconds.
Index Yes The name of the index where data will be indexed in Splunk. The specified index must exist on the Indexer in a distributed environment.
Component Yes Specify the component for Nexus 9K input.
Command Yes Select the command for Nexus 9K input.

Release Notes

Version 1.1.0
Aug. 14, 2025

General:
Updated existing dashboard queries to use base search for improved performance and efficiency.
CIM mapping; Added CIM mapping and improved field extraction for better correlation and normalization in Splunk.
Field Extraction : Updated and enhanced field extraction across all data types to improve data quality and usability.
Multi-account selection support : Users get ability to configure of multiple accounts per input or selection using name.

Nexus dashboard:
New Data Sources: Added support for collecting Congestion, Endpoints, Flows, Protocols(interface statistics), and Custom data for Nexus Dashbaord
New Dashboards: Added dashboards for Flows, Congestion, Endpoints, and Interface statistics for ND.
Added new syslog dashboards for ND ,NDO.
Added new default inputs for ND.

ACI:
Added support for collecting Managed Objects data for ACI.
Added new Syslog for ACI

N9K:
Added support for collecting DME-based data with class/object queries for N9K.
Added new Syslog for N9k

Version 1.0.2
March 13, 2025

Version 1.0.2

  • Fixed an issue with user ownership/name as admin.
  • Removed the admin user as the owner.
Version 1.0.1
March 7, 2025
  • Fix ND Local Authentication to use "local" login domain and not the Default Authentication configured.
  • Default verify_ssl to True for Splunk Cloud certification
Version 1.0.0
March 4, 2025

First release of Cisco DC Networking App for Splunk including ND, ACI and Nexus 9k standalone ingestion and dashboards.


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.