icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Cisco Networks Add-on for Splunk Enterprise
SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_275.tgz) 9f1bc3debe93c4da1c7840b2097f53d728ee4b50a2559ab599742e7f795b1887 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_273.tgz) cbe4bfa0787bc39146efecfcb289f3c52dd197b33ee2d24fd2f1d75c22c10872 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_272.tgz) c32844323ce5b53585bed6d198324e71dfbf5ac917227a5517dd2144d2f0a5ec SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_271.tgz) 66dcda2e058cc6894fdd54a8406ddfbb6e32c227eb4212cc492b41111deee672 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_262.tgz) ba7b219750830025132e797379d41792e531481e785bc6b346a185fe3aa05166 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_270.tgz) 594aca85f7ad22cd32b5e12532df436db380e97eb8dde6b90a0d58ec38b7beb8 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_261.tgz) de0710a6ad523d4da3e22bf1e7f316c7c04354061f20dbe2c912ae764200c9e6 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_260.tgz) d375d395dedbb9399e256a7965b096bd29c610b3c363f7289da220093d54af4d SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_258.tgz) 01a434dd9d79ea7d087b2cc21d5ee5b90439e2311339b7a06eefbbcd54992de0 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_257.tgz) 6a53ed37a76791a1386e10658861551cb519bfce5e2f2e79ce869a922b306f83 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_254.tgz) d0a56b5e64123e3001f5c0ee2dd2f22292af3f9343237a724c370b258f6cc037 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_252.tgz) dad92278042fad410209187bb19020498fff8a595718e1fd5270c24fce1db00e SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_251.tgz) 6f13d0292551e5f50be0ded55640afc063e18be31736db8948bab0672985f3d1 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_250.tgz) 1817ede611cd36ad6890a7d570afd74bb9541573e23bc6c7e40cb5079bca2c31 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_234.tgz) 3ba1864f19eeeb9ae3e0117ce3135bacf92de0c100e71d96c67dafc9c1ac0a02 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_233.tgz) ca38145f4c6df389d5781cfaa7e8df26a56b182755b9a0c6e070f769d4f72b1a SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_232.tgz) 6063d1e176111d1fa3b59069961c762bf2a576c4c8c21efb68570f32a021e6a0 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_230.tgz) 1f99003dc89341113824fbb8a8e31858b4badc93810abb314ca5f605f0983284 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_221.zip) 73c1b4722f400cefd8401b01ec285dbe57946334ac3a62c166dc8a8e631e4eeb SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_220.zip) e661b4c0db4e95034bb692985151a34f810187293e85c9a1e795407d73e745e5 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_210.tgz) 563d1b95d8abf2280fd0bd24d57b8d8c8ecc5c83106d4ac03a36fc25d13f266f SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_200.tgz) 5b669332b21888773443133c27dbc116885207f984b88c5a3255d19c67835518 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_160.tgz) e5169e6b5bb5716411059ccc7842a61e178b22d767a98f7b73c650495b773272 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_150.tgz) 8c757d0b80fd91b19d321f51c5179e81b096f2401b125350ccf4aee429a6fb38 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_122.tgz) 08210a85d833b8dc7e273f5ef5bc08277c2605bfb64bf8132ea20fd2be3ca035 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_121.tgz) 4d323c2350a708369015b991156ae0bf6375f090e0317275ba6772eee7a035a1 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_104.tgz) 38d7744aa25a4a0bb5faa491584c29c11c07d3836f4b030f59b7ba9b9070698a SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_103.tgz) 34fa4785265282997e5fa542004fae713e0b68a68512387f4decca17d50947b1 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_102.tgz) 15b1159a1e14ee6fea7f21a81a8af1b423774da4f445767064b4fa3239daee21 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_101.tgz) 0f766b67e446aca5f16e36a414be7de51bd0dd58f14fe57ce555fada10518713 SHA256 checksum (cisco-networks-add-on-for-splunk-enterprise_100.tgz) 326e0528fa30d83941c3f0b5ffbb704f55891f198a780eaca6e19d5a52c46d64
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Cisco Networks Add-on for Splunk Enterprise

Splunk Cloud
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
The Cisco Networks Add-on for Splunk Enterprise (TA-cisco_ios) sets the correct sourcetype and fields used for identifying data from Cisco Switches & Routers (Cisco IOS, IOS XE, IOS XR and NX-OS devices), WLAN Controllers and Access Points, using Splunk® Enterprise & Splunk® Cloud.

Install this Add-On on your search head and indexers/heavy forwarders. Install the Cisco Networks (cisco_ios) App on your search head.

Supported Cisco Devices:
* Any Cisco Catalyst switch or router. Specific examples below:
* Cisco Catalyst series switches (1000, 1200, 1300, 2960, 3650, 3750, 4500, 6500, 6800, 7600, 9000 etc.)
* Cisco ASR - Aggregation Services Routers (900, 1000, 5000, 9000 etc.)
* Cisco ISR - Integrated Services Routers (800, 1900, 2900, 3900, 4451 etc.)
* Cisco Nexus Data Center switches (1000V, 2000, 3000, 4000, 5000, 6000, 7000, 9000 etc.)
* Cisco Carrier Routing System
* Other Cisco IOS based devices (Metro Ethernet, Industrial Ethernet, Blade Switches, Connected Grid etc.)
* Cisco Access Points
* Cisco WLC - WLAN Controller

The Cisco Networks Add-on (TA-cisco_ios) sets the correct sourcetype and fields used for identifying data from Cisco IOS, IOS XE, IOS XR, NX-OS devices using Splunk® Enterprise.

Install this Add-on on your search head and indexers/heavy forwarders. Install the Cisco Networks (cisco_ios) App on your search head.

Supported data inputs:

  • Syslog

Please post a question on Splunk Answers and tag it with "Cisco Networks Add-on" if there is anything you would like to see in this app.

Application Details

Sourcetype(s): cisco:ios
Supported Technologies: Cisco IOS, IOS-XE, NX-OS, IOS XR, WLC devices

Installation Instructions

The Cisco Networks Add-on can be downloaded, installed, and configured to receive Cisco IOS and WLC data by either using the Splunk app setup screen or by manually installing and configuring the app.
This app does not add any new inputs, it merely rewrites syslog events matching the IOS format. You need to already have IOS events coming in as the syslog OR cisco:ios sourcetype.

Setup and configuration

  1. Install in $SPLUNK_HOME/etc/apps/TA-cisco_ios
  2. Configure inputs:
    1. Option 1: Configure Splunk Connect 4 Syslog to receive syslog data and forward this data to Splunk.
    2. Option 2: Create a UDP input on one of your Splunk servers or a forwarder with sourcetype set to syslog or cisco:ios. A regex match will be performed to rewrite the events to the cisco:ios sourcetype.
  3. Configure your Cisco devices to send their syslogs to the UDP input created in step 2 with logging level informational.
  4. Restart Splunk

Getting Help

Release Notes

Version 2.7.5
Sept. 3, 2024
Version 2.7.3
Dec. 5, 2022
New features

Cisco Networks Add-on includes the following new features:

Fixed issues

Version 2.7.3 of the Cisco Networks Add-on fixes the following issues:

  • Optional whitespace in the general regex to match events from certain devices/software versions with inconsistent logging
  • Splunk Cloud no longer requires a restart due to eventgen.conf.
Known issues

Version 2.7.3 of the Cisco Networks Add-on has the following known issues:

  • None known
Version 2.7.2
June 10, 2021

Fixed issues
Version 2.7.2 of the Cisco Networks Add-on fixes the following issues:

  • Splunk Cloud no longer requires a restart due to eventgen.conf.
Version 2.7.1
Dec. 8, 2020

This release is ONLY compatibly with Splunk 8.1+. For compatibility with older versions, please use version 2.6.2.

Fixed issues

Version 2.7.0 of the Cisco Networks Add-on fixes the following issues:

  • Corrections for Splunk Connect for Syslog data ingest
  • Added initial support for Cisco Telemetry data
  • Network Interface short names are now normalized OOTB without macros thanks to Splunk 8.1 EVAL lookups
  • Excludes Cisco FTD events from being part of field extractions and sourcetype rewrites
  • Adds ACI field extraction (for Faults)
Version 2.6.2
Dec. 8, 2020
Fixed issues

Version 2.6.2 of the Cisco Networks Add-on fixes the following issues:

  • Corrections for Splunk Connect for Syslog data ingest
  • Excludes Cisco FTD events from being part of field extractions and sourcetype rewrites
  • Adds ACI field extraction (for Faults)
  • This will be the LAST release of this app compatible with Splunk 8.0 and lower
Version 2.7.0
Dec. 8, 2020

This release is ONLY compatibly with Splunk 8.1+. For compatibility with older versions, please use version 2.6.1.

Fixed issues

Version 2.7.0 of the Cisco Networks Add-on fixes the following issues:

  • Corrections for Splunk Connect for Syslog data ingest
  • Added initial support for Cisco Telemetry data
  • Network Interface short names are now normalized OOTB without macros thanks to Splunk 8.1 EVAL lookups
  • Excludes Cisco FTD events from being part of field extractions and sourcetype rewrites
  • Adds ACI field extraction (for Faults)
Version 2.6.1
Dec. 8, 2020
Fixed issues

Version 2.6.1 of the Cisco Networks Add-on fixes the following issues:

  • Corrections for Splunk Connect for Syslog data ingest
  • Excludes Cisco FTD events from being part of field extractions and sourcetype rewrites
  • Adds ACI field extraction (for Faults)
  • This will be the LAST release of this app compatible with Splunk 8.0 and lower
Version 2.6.0
March 25, 2020

Excludes Cisco FTD events from being extracted and transformed

Version 2.5.8
May 28, 2019
New features

Cisco Networks Add-on includes the following new features:

Fixed issues

Version 2.5.8 of the Cisco Networks Add-on fixes the following issues:

  • Removed a lot of FIELDALIAS that are no longer working as of Splunk 7.2
Known issues

Version 2.5.8 of the Cisco Networks Add-on has the following known issues:

  • None known
Version 2.5.7
April 16, 2019
Fixed issues

Version 2.5.7 of the Cisco Networks Add-on fixes the following issues:

  • Removed a lot of FIELDALIAS that are no longer working as of Splunk 7.2
Version 2.5.4
April 20, 2018
New features

Cisco Networks Add-on includes the following new features:

  • App certification
  • ACI field extractions
Fixed issues

Version 2.5.4 of the Cisco Networks Add-on fixes the following issues:

  • Removed cisco_ios_apptype lookup as it is just a static value. Replaced with an eval instead.
  • Brought back the optional index force transform
  • Improvements to the general extractions contributed by m4dc0w
  • Better handling of NGFW events
  • Fixes for IOS-XE extractions
  • Extra Nexus VIM IF_ATTACHED extraction (Thanks rsethre)
  • Removed cisco_ios_vendor lookup as it is just a static value. Replaced with an eval instead
Known issues

Version 2.5.4 of the Cisco Networks Add-on has the following known issues:

  • None known
Version 2.5.2
April 18, 2018
New features

Cisco Networks Add-on includes the following new features:

  • App certification
  • ACI field extractions
Fixed issues

Version 2.5.2 of the Cisco Networks Add-on fixes the following issues:

  • Removed cisco_ios_apptype lookup as it is just a static value. Replaced with an eval instead.
  • Brought back the optional index force transform
  • Improvements to the general extractions contributed by m4dc0w
  • Better handling of NGFW events
  • Fixes for IOS-XE extractions
  • Extra Nexus VIM IF_ATTACHED extraction (Thanks rsethre)
  • Removed cisco_ios_vendor lookup as it is just a static value. Replaced with an eval instead
Version 2.5.1
Jan. 25, 2018
New features

Cisco Networks Add-on includes the following new features:

  • App certification
  • ACI field extractions
Fixed issues

Version 2.5.1 of the Cisco Networks Add-on fixes the following issues:

  • Removed cisco_ios_apptype lookup as it is just a static value. Replaced with an eval instead.
  • Brought back the optional index force transform
  • Improvements to the general extractions contributed by m4dc0w
  • Better handling of NGFW events
  • Fixes for IOS-XE extractions
  • Extra Nexus VIM IF_ATTACHED extraction (Thanks rsethre)
  • Removed cisco_ios_vendor lookup as it is just a static value. Replaced with an eval instead
Version 2.5.0
Jan. 22, 2018
Fixed issues

Version 2.5.0 of the Cisco Networks Add-on fixes the following issues:

  • Removed cisco_ios_apptype lookup as it is just a static value. Replaced with an eval instead.
  • Brought back the optional index force transform
  • Improvements to the general extractions contributed by m4dc0w
  • Better handling of NGFW events
  • Fixes for IOS-XE extractions
  • Extra Nexus VIM IF_ATTACHED extraction (Thanks rsethre)
  • Removed cisco_ios_vendor lookup as it is just a static value. Replaced with an eval instead
Version 2.3.4
Oct. 27, 2016

NOTE: The OPTIONAL index transform was removed by mistake. If you use this feature please stay on your current version. This will be re-added in 2.3.5

New features

Cisco Networks Add-on includes the following new features:

  • App certification
Fixed issues

Version 2.3.4 of the Cisco Networks Add-on fixes the following issues:

  • Improvements to the general extractions contributed by m4dc0w
  • Better handling of NGFW events
  • Fixes for IOS-XE extractions
  • Extra Nexus VIM IF_ATTACHED extraction (Thanks rsethre)
Known issues

Version 2.3.4 of the Cisco Networks Add-on has the following known issues:

  • None known
Version 2.3.3
Oct. 26, 2016
New features

Cisco Networks Add-on includes the following new features:

  • None
Fixed issues

Version 2.3.3 of the Cisco Networks Add-on fixes the following issues:

  • Improvements to the general extractions contributed by m4dc0w
  • Better handling of NGFW events
  • Fixes for IOS-XE extractions
  • Extra Nexus VIM IF_ATTACHED extraction (Thanks rsethre)
Known issues

Version 2.3.3 of the Cisco Networks Add-on has the following known issues:

  • None known
Version 2.3.2
Feb. 23, 2016
Fixed issues

Version 2.3.2 of the Cisco Networks Add-on fixes the following issues:

  • Improvements to the general extractions contributed by m4dc0w
Known issues

Version 2.3.2 of the Cisco Networks Add-on has the following known issues:

  • None known
Version 2.3.0
Sept. 11, 2015
New features

Cisco Networks Add-on includes the following new features:

  • Direct AP logging now supported. product field can now hold a value of IOS, WLC or IOS
  • IP version agnostic IP extractions
  • Lookup of ICMP codes and types in ACL logs
Fixed issues

Version 2.3.0 of the Cisco Networks Add-on fixes the following issues:

  • Transform corrected in case of missing reported_hostname. General field extraction also edited.
  • EVAL searchmatch action lookup not working correctly due to conflict with vendor_action lookup. Will need to be fixed by moving all the searchmatches to vendor_action_lookup
  • Field extractions for Nexus interface admin changes + tags
  • Normalization of src_int in case it contains whitespaces, i.e. "vlan 3333" is now "vlan3333"
Known issues

Version 2.3.0 of the Cisco Networks Add-on has the following known issues:

  • None known
Version 2.2.1
April 7, 2015
New features

Cisco Networks Add-on includes the following new features:

  • Moved a few extractions to transforms.conf.
  • Added extraction for SEC_LOGIN-1-QUIET_MODE_ON
  • Regex routing contributions from seismiccollission
  • product field lookup now done based on presence of fields. This results in WLC or IOS as the two possible products
Version 2.2.0
Feb. 5, 2015
New features

Cisco Networks Add-on includes the following new features:

  • Five new extractions: ARP Inspection, IP Source guard, Storm Control
Fixed issues

Version 2.2.0 of the Cisco Networks Add-on fixes the following issues:

  • Removed cisco_ios_hosts_last_period lookup
  • ap_mac and src_mac issues for wireless resolved
Known issues

Version 2.2.0 of the Cisco Networks Add-on has the following known issues:

  • EVAL searchmatch action lookup not working correctly due to conflict with vendor_action lookup
Version 2.1.0
Dec. 3, 2014

+++ 2.1.0 (2014-11-10)
Features:
NAME CHANGED to Cisco Networks Add-on.
RFC5424 support (untested). Rewrites sourcetype rfc5424_syslog to cisco:ios if it matches. Also extracts fields

Version 2.0.0
Sept. 23, 2014

++ What's New

+++ 2.0.0 (2014-09-19)
Features:
* CIM compliance
MAKE SURE YOU REMOVE EARLIER VERSIONS OF THIS APP BEFORE INSTALLING THIS VERSION!

Version 1.6.0
July 21, 2014

++ What's New

+++ 1.6.0 (2014-07-21)
Features:
Lots of new extractions
Nexus ACL extractions
IOS Firewall extracts. Thanks Patrick Preuss!
Cisco IOS XE extraction fix for 4451. Thanks

Bug fixes:
* Cisco IOS Messages CSV file moved from this app to the Cisco IOS app.

Version 1.5.0
May 8, 2014

++ What's New

+++ 1.5.0 (2014-05-08)
Features:
* Added lookup file for Cisco System Messages for the following devices:
- Nexus 7000, MDS 9000
- Catalyst 2960, 3750 etc
- Catalyst 4500
- Catalyst 6500
- WLC 5500

There are duplicates. I will review them at a later time

Version 1.2.2
April 24, 2014

+++ 1.2.2 (2014-04-23)
Features:
* 16 new extractions:
extract_cisco_ios-ILPOWER-3-CONTROLLER_PORT_ERR
extract_cisco_ios-SYS-CPUHOG
extract_cisco_ios-SYS-CPUHOG-2
extract_cisco_ios-LDP-5-SP
extract_cisco_ios-DHCP-6-ADDRESS_ASSIGN
extract_cisco_ios-CLEAR-5-COUNTERS
extract_cisco_ios-OSPF-4-ERRRCV
extract_cisco_ios-CERM-4-RX_TX_BW_LIMIT
extract_cisco_ios-SYS-5-PRIV_I
extract_cisco_ios-UDLD-4-UDLD_PORT_DISABLED
extract_cisco_ios-AUTHMGR-5-SECURITY_VIOLATION
extract_cisco_ios-TRACKING-5-STATE
extract_cisco_ios-RTT-6-SAATHRESHOLD
extract_cisco_ios-EC-5-L3DONTBNDL
extract_cisco_ios-EC-5-PORTDOWN
extract_cisco_ios-EC-5-STAYDOWN

Version 1.2.1
Feb. 17, 2014

+++ 1.2.1 (2014-02-17)
Features:
This app must now be installed on both the search head AND indexer
We no longer rewrite the indexer to the "ios" index

+++ 1.2.0 (2014-01-09)
Features: Added props, transforms, tags to this app for CIM compliance

Version 1.0.4
Sept. 20, 2013

+++ 1.0.4 (2013-09-20)
Features: IOS XR support

Version 1.0.3
Aug. 14, 2013

+++ 1.0.3 (2013-08-12)
Bug fixes: Don't capture ACS events, be stricter on capturing

Version 1.0.2
June 21, 2013

+++ 1.0.2 (2013-06-07)
Bug fixes:
* Don't capture UCSM events

Version 1.0.1
April 25, 2013

+++ 1.0.1 (2013-04-23)
Bug fixes:
* Fixed extraction of mnemonic and facility with integers in it

Version 1.0.0
March 25, 2013

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.
OSZAR »