Splunk® Supported Add-ons

Splunk Add-on for Cisco ISE

Acrobat logo Download manual as PDF

Acrobat logo Download topic as PDF

Upgrade an indexer cluster from Splunk Add-on for Cisco ISE version 3.0.0

  1. On the cluster master of your indexer clustered Splunk platform deployment, navigate to $SPLUNK_HOME/etc/master-apps/Splunk_TA_cisco-ise/local/ .
  2. Open props.conf and edit the cisco:ise stanza to remove the following line:
    DATETIME_CONFIG = /etc/slave-apps/Splunk_TA_cisco-ise/default/datetime_udp.xml
  3. Edit the cisco:ise:syslog stanza to remove the following line:
    DATETIME_CONFIG = /etc/slave-apps/Splunk_TA_cisco-ise/default/datetime_udp.xml
  4. Save your changes.
  5. Push the configurations to your peer nodes.
Last modified on 20 July, 2020
PREVIOUS
Configure Cisco ISE to send logs to Splunk Enterprise for the Splunk Add-on for Cisco ISE
  NEXT
Configure data collection using Splunk Connect for Syslog

This documentation applies to the following versions of Splunk® Supported Add-ons: released


Was this documentation topic helpful?

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters