Source types for the Splunk Add-on for Cisco Meraki
The Splunk Add-on for Cisco Meraki provides the index-time and search-time knowledge for Cisco Meraki configuration changes, organization security and events from devices in the following formats.
Source type | Description | Event Type | CIM data models |
---|---|---|---|
meraki:audit
|
Organization configuration changes | meraki_api_audit
|
Change |
meraki:accesspoints
|
Access points events | meraki_api_accesspoints_alerts
|
Alerts |
meraki_api_accesspoints_authentication
|
Authentication | ||
meraki_api_accesspoints_change
|
Change | ||
meraki:cameras
|
Cameras events | meraki_api_cameras
|
Change |
meraki:securityappliances
|
Security appliances events | meraki_api_securityappliances_alerts
|
Alerts |
meraki_api_securityappliances_authentication
|
Authentication | ||
meraki_api_securityappliances_change
|
Change | ||
meraki_api_securityappliances_networksessions
|
Network Sessions | ||
meraki:switches
|
Switches events | meraki_api_switches_change
|
Change |
meraki:organizationsecurity
|
Organization security events | meraki_api_organizationsecurity
|
Malware |
Migrate from an existing add-on | Lookups for the Splunk Add-on for Cisco Meraki |
This documentation applies to the following versions of Splunk® Supported Add-ons: released
Feedback submitted, thanks!