Source types for the Splunk Add-on for Cisco Meraki¶
The Splunk Add-on for Cisco Meraki provides the index-time and search-time knowledge for Cisco Meraki configuration changes, organization security and events from devices in the following formats.
Source type | Description | Event Type | CIM data models |
---|---|---|---|
meraki:audit |
Organization configuration changes | meraki_api_audit |
Change |
meraki:accesspoints |
Access points events | meraki_api_accesspoints_alerts |
Alerts |
meraki_api_accesspoints_authentication |
Authentication | ||
meraki_api_accesspoints_change |
Change | ||
meraki:cameras |
Cameras events | meraki_api_cameras |
Change |
meraki:securityappliances |
Security appliances events | meraki_api_securityappliances_alerts |
Alerts |
meraki_api_securityappliances_authentication |
Authentication | ||
meraki_api_securityappliances_change |
Change | ||
meraki_api_securityappliances_networksessions |
Network Sessions | ||
meraki:switches |
Switches events | meraki_api_switches_change |
Change |
meraki:organizationsecurity |
Organization security events | meraki_api_organizationsecurity |
Malware |