Skip to content

Source types for the Splunk Add-on for Cisco Meraki

The Splunk Add-on for Cisco Meraki provides the index-time and search-time knowledge for Cisco Meraki configuration changes, organization security and events from devices in the following formats.

Source type Description Event Type CIM data models
meraki:audit Organization configuration changes meraki_api_audit Change
meraki:accesspoints Access points events meraki_api_accesspoints_alerts Alerts
meraki_api_accesspoints_authentication Authentication
meraki_api_accesspoints_change Change
meraki:cameras Cameras events meraki_api_cameras Change
meraki:securityappliances Security appliances events meraki_api_securityappliances_alerts Alerts
meraki_api_securityappliances_authentication Authentication
meraki_api_securityappliances_change Change
meraki_api_securityappliances_networksessions Network Sessions
meraki:switches Switches events meraki_api_switches_change Change
meraki:organizationsecurity Organization security events meraki_api_organizationsecurity Malware