Splunk® Supported Add-ons

Splunk Add-on for Cisco Meraki

Acrobat logo Download manual as PDF


Acrobat logo Download topic as PDF

Source types for the Splunk Add-on for Cisco Meraki

The Splunk Add-on for Cisco Meraki provides the index-time and search-time knowledge for Cisco Meraki configuration changes, organization security and events from devices in the following formats.

Source type Description Event Type CIM data models
meraki:audit Organization configuration changes meraki_api_audit Change
meraki:accesspoints Access points events meraki_api_accesspoints_alerts Alerts
meraki_api_accesspoints_authentication Authentication
meraki_api_accesspoints_change Change
meraki:cameras Cameras events meraki_api_cameras Change
meraki:securityappliances Security appliances events meraki_api_securityappliances_alerts Alerts
meraki_api_securityappliances_authentication Authentication
meraki_api_securityappliances_change Change
meraki_api_securityappliances_networksessions Network Sessions
meraki:switches Switches events meraki_api_switches_change Change
meraki:organizationsecurity Organization security events meraki_api_organizationsecurity Malware
Last modified on 16 November, 2021
PREVIOUS
Migrate from an existing add-on
  NEXT
Lookups for the Splunk Add-on for Cisco Meraki

This documentation applies to the following versions of Splunk® Supported Add-ons: released


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters