Install the Content Pack for Cisco ThousandEyes
Perform the following high-level steps to install the Content Pack for Cisco ThousandEyes:
- Ensure that you meet the prerequisites.
- Install the content pack.
- Ensure the content pack uses the correct index.
Prerequisites
You must meet the following prerequisites to install and configure the Content Pack for Splunk AppDynamics.
Prerequisite | Description |
---|---|
Back up your environment | Create a full backup of your IT Service Intelligence (ITSI) environment in case you need to uninstall the content pack later. See Create a full backup of ITSI. |
Install the Splunk App for Content Packs | The content pack requires the Splunk App for Content Packs. For installation steps, see Install the Splunk App for Content Packs. |
Install and configure the Cisco ThousandEyes App for Splunk | The content pack requires data collected from the Cisco ThousandEyes App for Splunk. For installation and configuration steps, see Cisco ThousandEyes App for Splunk in the Cisco ThousandEyes documentation. |
Configure the tests stream input in the Cisco ThousandEyes App for Splunk | The content pack requires the tests stream input to be configured in the Cisco ThousandEyes App for Splunk. For configuration steps, see Inputs in the Cisco ThousandEyes documentation.
Note: Enabling the Splunk HTTP Event Collector (HEC) receiver and SSL is required to configure this test input. If you need to open firewall exceptions for the HEC receiver, see Firewall Exception Requirements in the Cisco ThousandEyes documentation. |
Step 1: Install the content pack
To install the Content Pack for Cisco ThousandEyes:
- From the ITSI main menu, select Configuration, then Data Integrations.
- Select the Content library tab.
- Under Splunk Supported Content Packs, select Cisco ThousandEyes.
- Follow the on-screen instructions to install the content pack.
Step 2: Ensure the content pack uses the correct index
The Content Pack for Cisco ThousandEyes uses a search macro to ensure all searches use the same index. The search macro must be configured to use the same index that the Cisco ThousandEyes App for Splunk uses to ingest data.
When the Cisco ThousandEyes App for Splunk is installed on indexers, it automatically creates an events index named thousandeyes
. By default, both the Cisco ThousandEyes App for Splunk and Content Pack for Cisco ThousandEyes are configured to use this index.
If you installed the Cisco ThousandEyes App for Splunk on your indexers and did not change the index configuration for the add-on, this step is optional.
Prerequisite
You must have the admin role to perform this step.
Steps
- (Optional) If you need to create an index, see Create events indexes.
- Identify the index that the Cisco ThousandEyes App for Splunk uses:
- From the Splunk Enterprise main menu, select Apps, then select Cisco ThousandEyes App for Splunk.
- The Inputs tab is selected by default. Identify the tests stream input configured to collect Cisco ThousandEyes test event data and expand the row for the input.
- Identify the value set for the Test Index.
- Update the content pack search macro to use the same index as the add-on:
- From the Splunk Enterprise main menu, select Settings, then Advanced Search.
- Select Search Macros.
- In the App drop-down menu, select Cisco ThousandEyes (DA-ITSI-CP-thousandeyes).
- Select itsi_cp_thousandeyes_index. By default, the macro definition is set to
index="thousandeyes"
. In the Definition field, change theindex
value to the index used by the Cisco ThousandEyes App for Splunk. - Select Save.
Next steps
After you install the content pack, you can start monitoring your Cisco ThousandEyes services and entities. See See Monitor Cisco ThousandEyes services and Monitor Cisco ThousandEyes entities.
About the Content Pack for Cisco ThousandEyes | Monitor Cisco ThousandEyes services |
This documentation applies to the following versions of Content Pack for Cisco ThousandEyes: 1.0.0
Feedback submitted, thanks!