Table of Contents
Overview ↵
Splunk Add-on for Cisco UCS¶
Version | 4.3.0 |
Vendor products | Cisco UCS Manager 2.0.3, 4.1, 4.2 |
Visible in Splunk Web | Yes. This add-on contains views for configuration. |
The Splunk Add-on for Cisco UCS allows a Splunk software administrator to collect UCS fault, inventory, and performance data from Cisco UCS servers using the UCS API.
This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk apps, such as Splunk Enterprise Security and the Splunk App for PCI Compliance.
Download the Splunk Add-on for Cisco UCS from Splunkbase.
For a summary of new features, fixed issues, and known issues, see Release Notes for the Splunk Add-on for Cisco UCS.
For information about installing and configuring the Splunk Add-on for Cisco UCS, see Installation and configuration overview for the Splunk Add-on for Cisco UCS.
See Questions related to Splunk Add-on for Cisco UCS on Splunk Answers.
Hardware and software requirements for the Splunk Add-on for Cisco UCS¶
Splunk admin requirements¶
To install and configure the Splunk Add-on for Cisco UCS, you must be a
member of the admin
or sc_admin
role.
Sizing guidelines¶
The Splunk Add-on for Cisco UCS uses a multiple-process design. It can collect data from up to 15 Cisco UCS Managers on an 8 core machine with 8 GB of memory.
Splunk platform requirements¶
Because this add-on runs on the Splunk platform, all of the system requirements apply for the Splunk software that you use to run this add-on:
- For Splunk Enterprise system requirements, see System Requirements in the Splunk Enterprise Installation Manual.
- If you are managing on-premises forwarders to get data into Splunk Cloud, see System Requirements in the Splunk Enterprise Installation Manual, which includes information about forwarders.
For information about installation locations and environments, see Install the Splunk Add-on for Cisco UCS.
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
Installation overview for the Splunk Add-on for Cisco UCS¶
Complete the following steps to install and configure this add-on:
Ended: Overview
Installation ↵
Install the Splunk Add-on for Cisco UCS¶
- Get the Splunk Add-on for Cisco UCS by downloading it from Splunkbase or browsing to it using the app browser within Splunk Web.
- Determine where and how to install this add-on in your deployment, using the following tables.
- Perform any prerequisite steps before installing, if required and specified in the following tables.
- Complete your installation.
If you need step-by-step instructions on how to install an add-on in your specific deployment environment, see the installation walkthroughs section at the bottom of this page for links to installation instructions specific to a single-instance deployment, distributed deployment, or Splunk Cloud.
Distributed deployment¶
Use the following tables to determine where and how to install this add-on in a distributed deployment of Splunk Enterprise or any deployment for which you are using forwarders to get your data in. Depending on your environment, your preferences, and the requirements of the add-on, you may need to install the add-on in multiple places.
Where to install this add-on¶
Unless otherwise noted, all supported add-ons can be safely installed to all tiers of a distributed Splunk platform deployment. See Where to install Splunk add-ons in Splunk Add-ons for more information.
This table provides a reference for installing this specific add-on to a distributed deployment of the Splunk platform:
Splunk platform instance type | Supported | Required | Actions required / Comments |
---|---|---|---|
Search Heads | Yes | Yes | Install this add-on to all search heads where Cisco UCS knowledge management is required. As a best practice, turn add-on visibility off on your search heads to prevent data duplication errors. Errors can result from running inputs on your search heads instead of, or in addition to, your data collection node. |
Indexers | Yes | No | Not required, because the parsing operations occur on the heavy forwarders. |
Heavy Forwarders | Yes | Yes | This add-on supports heavy forwarders for data collection. |
Universal Forwarders | No | No | This add-on supports only heavy forwarders for data collection. |
Distributed deployment feature compatibility¶
This table describes the compatibility of this add-on with Splunk distributed deployment features.
Distributed deployment feature | Supported | Actions required / Comments |
---|---|---|
Search Head Clusters | Yes | Install this add-on to all search heads where Cisco UCS knowledge management is required. As a best practice, turn add-on visibility off on your search heads to prevent data duplication errors. Errors can result from running inputs on your search heads instead of, or in addition to, your data collection node. |
Indexer Clusters | Yes | Not required, because the parsing operations occur on the heavy forwarders. |
Deployment Server | No | You cannot use a deployment server to deploy the configured add-on to forwarders because the add-on uses modular inputs to collect data remotely. Using a deployment server to deploy configured add-ons to multiple forwarders results in duplicate data collection. |
Installation walkthroughs¶
The Splunk Add-Ons manual includes an Installing add-ons guide that helps you successfully install any Splunk-supported add-on to your Splunk platform deployment:
For a walkthrough of the installation procedure, follow the link that matches your deployment scenario:
Ended: Installation
Configuration ↵
Configure inputs for the Splunk Add-on for Cisco UCS¶
Configure your inputs on your data collection node, which is usually a heavy forwarder. You can configure your inputs using either the Splunk Web UI or configuration files.
Set SSL details¶
SSL details must be configured in configuration files.
-
To collect data from a Cisco UCS Manager without SSL certificate verification, set the manager’s
disable_ssl_verification
totrue
in yoursplunk_ta_cisco_ucs_servers.conf
file. Find it at$SPLUNK_HOME/etc/apps/Splunk_TA_cisco-ucs/local/splunk_ta_cisco_ucs_servers.conf
. -
To collect data from a Cisco UCS Manager using an SSL connection with a self-signed certificate, add the certificate’s value in your
cacerts.pem
file. It is at$SPLUNK_HOME/etc/apps/Splunk_TA_Cisco_ucs/lib/certifi/
.
Collecting data from a Cisco UCS Manager using an SSL connection with a signed Trusted Certificate requires no additional steps.
Splunk Web configuration instructions¶
Use the Splunk Web UI to configure Cisco UCS Managers, Templates, and Inputs.
Configure Cisco UCS Managers¶
To configure a Cisco UCS Manager, perform the following steps:
- By default, the Splunk Add-on for Cisco UCS page starts on the Manage Cisco UCS Managers screen. If you are on a different screen, select Configurations > Managers to reach this screen.
- Click Add.
- In the Add Cisco UCS Manager window, complete the following fields.
Field | Description |
---|---|
Name | Give your manager a name using only letters, numbers, and underscores. |
Description | Optionally, enter a description for the Cisco UCS Manager. |
Host | Provide the host or IP address of your Cisco UCS Manager. |
Username | If your Cisco UCS Manager requires authentication, enter a valid username. |
Password | If your Cisco UCS Manager requires authentication, enter a valid password. |
- Click Add.
- Repeat these steps for each Cisco UCS Manager from which you want to collect data.
Return to this screen if you want to edit, create, or delete your existing Manager configurations.
Configure Cisco UCS Templates¶
To configure Cisco UCS Templates, perform the following steps:
- Select Configuration > Templates.
- Review the predefined collection templates by selecting Edit next to each template. If these templates meet your needs, you can use them as is. You can also edit them by deleting or adding metrics.
- If you want to make your own template, click Add.
- In the Add a Collection Template window, complete the following fields:
Field | Description |
---|---|
Name | Give your template a name using letters, numbers, and underscores. |
Description | Optionally, give your template a brief description to distinguish it from other templates. |
Metrics | Click in the metrics field to browse or search for the Cisco UCS classIDs that you want to collect data from. |
- Click Add.
You can include any number of metrics in a single template, but for best results, limit the number of metrics that you include in a single template to avoid overloading the Cisco UCS Manager. Limit your performance metrics to no more than 15 within one template. Inventory metrics, which are static and less frequently collected, can be in larger groups. Conversely, avoid creating many individual templates with just one or very few metrics to avoid overloading the Cisco UCS Manager with too many concurrent sessions.
For more information on the Cisco UCS classIDs, refer to the Cisco UCS Central CLI Reference Manual.
Return to this screen if you want to edit, create, or delete your existing templates.
Configure Cisco UCS Inputs¶
To configure Cisco UCS Inputs, perform the following steps:
- Select Inputs.
- Click Create New Input.
- In the Add Inputs window, complete the following fields:
Field | Description |
---|---|
Name | Give your input a name using letters, numbers, and underscores. |
Description | Optionally, give your input a brief description to distinguish it from other inputs. |
Managers | Select one or more managers to specify from which Cisco UCS server to collect data for this input. |
Templates | Select one or more templates to define which Cisco UCS classID or set of classIDs should be included in this input. |
Polling Interval | Adjust the default Polling Interval if desired. |
Source Type | Adjust the default Source Type if desired. |
Index | Adjust the default index if desired. |
- Click Add to enable the input. You can return to this input to adjust your input setting by selecting Edit.
Although you can select as many templates as you want, limit the number of templates that you invoke with a single input to avoid creating too many concurrent sessions. The UCS manager can support 200 sessions in parallel at maximum load.
- Go to the Search & Reporting app and search for
sourcetype=cisco:ucs:*
to confirm that Splunk Enterprise is indexing events as expected through the add-on.
Configure the Splunk Add-on for Cisco UCS with configuration files¶
You can also configure Cisco UCS Managers, Templates, and Inputs using configuration files.
Configure Cisco UCS Managers¶
To configure Cisco UCS Managers, perform the following steps:
- To add a new Cisco UCS Manager, add the following stanza to
$SPLUNK_HOME/etc/apps/Splunk_TA_cisco-ucs/local/splunk_ta_cisco_ucs_servers.conf
:
# [Cisco UCS Manager name, using only letters, numbers, and underscores]
# account_name = Your Cisco UCS account name, in plaintext
# account_password = Your Cicsco UCS password, in plaintext
# description = A description of the Cisco UCS Manager
# disable_ssl_verification = True or False
# server_url = Host of the Cisco UCS Manager
- Save the file.
- Restart the Splunk platform by running
> splunk restart
.
Configure Cisco UCS Templates¶
To configure Cisco UCS Templates, perform the following steps:
- To add a new Cisco UCS Template, add the following stanza to
$SPLUNK_HOME/etc/apps/Splunk_TA_cisco-ucs/local/splunk_ta_cisco_ucs_templates.conf
:
# [Cisco UCS Template name, using only letters, numbers, and underscores]
# content = The Cisco UCS classID
# description = A brief description of what this Template configures
- Save the file.
- Restart the Splunk platform by running
> splunk restart
.
Configure Cisco UCS Inputs¶
To add Cisco UCS inputs, perform the following steps:
- To add a new Cisco UCS Input, add the following stanza to
$SPLUNK_HOME/etc/apps/Splunk/TA/cisco-ucs/local/inputs.conf
- [Cisco UCS Input name, using only letters, numbers, and underscores]
- description = A brief description of the Input
- disabled = False
- index = default
- interval = 300
- sourcetype = cisco:ucs
- servers = server1
- templates = UCS_Fault
- Save the file.
- Restart the Splunk platform by running
> splunk restart
.
Set time zone details¶
If a new sourcetype has a timestamp in its events, then configure your server’s time configurations to match the time configurations in the Splunk Add-on for Cisco UCS.
The following sources are configured in UTC by default in the
$SPLUNK_HOME/etc/apps/Splunk_TA_cisco-ucs/default/props.conf
file of
the Splunk Add-on for Cisco UCS.
cisco:ucs:swSystemStats
cisco:ucs:etherTxStats
cisco:ucs:etherPauseStats
cisco:ucs:etherRxStats
cisco:ucs:etherLossStats
cisco:ucs:etherErrStats
cisco:ucs:adaptorVnicStats
cisco:ucs:processorEnvStats
cisco:ucs:computeMbTempStats
cisco:ucs:computeMbPowerStats
cisco:ucs:equipmentChassisStats
cisco:ucs:equipmentPsuStats
If your Cisco UCS server is sends events in a different timezone, then
configure all sourcetypes (including the sourcetypes listed above) in
$SPLUNK_HOME/etc/apps/Splunk_TA_cisco-ucs/local/props.conf
to override
the default timezone setting. See Specify time zones in
props.conf
in the Getting Data In manual to learn more.
Ended: Configuration
Reference ↵
Lookups for the Splunk Add-on for Cisco UCS¶
The Splunk Add-on for Cisco UCS uses two
lookups. The lookup files are located
in $SPLUNK_HOME/etc/apps/Splunk_TA_cisco-ucs/lookups
:
Filename | Description |
---|---|
ucs_fault_code.csv |
maps a numerical fault code to an explanation |
ucs_fault_type.csv |
maps a fault type to a description |
ucs_fault_alert_type.csv |
maps a fault severity level to fault alert type |
ucs_fault_highestSeverity.csv |
maps fault severity level to the severity id |
Sources for the Splunk Add-on for Cisco UCS¶
The Splunk Add-on for Cisco UCS assigns all Cisco UCS data the source
type of cisco:ucs
.
In addition, the add-on automatically assigns a source to the event
based on the classID associated with the event. Cisco UCS has more than
700 classIDs. All sources follow the format cisco:ucs:
Source | CIM data models |
---|---|
cisco:ucs:faultInst |
ITSI Normalization |
cisco:ucs:swSystemStats |
Performance |
cisco:ucs:adaptorVnicStats |
Performance |
cisco:ucs:equipmentPsuStats |
Performance |
cisco:ucs:processorEnvStats |
Performance |
cisco:ucs:computeMbTempStats |
Performance |
cisco:ucs:computeMbPowerStats |
Performance |
cisco:ucs:equipmentChassisStats |
Performance |
cisco:ucs:storageLocalDisk |
Inventory |
cisco:ucs:etherPIo |
Inventory |
cisco:ucs:computeBlade |
Inventory |
cisco:ucs:computeRackUnit |
Inventory |
Ended: Reference
Troubleshoot ↵
Troubleshoot the Splunk Add-on for Cisco UCS¶
For helpful troubleshooting tips that you can apply to all add-ons, see Troubleshoot add-ons in Splunk Add-ons. For additional resources, see Support and resource links for add-ons in Splunk Add-ons.
Configure logging level¶
The Splunk Add-on for Cisco UCS allows you to configure logging levels
in the configuration UI under the logging tab or in
splunk_ta_cisco_ucs_settings.conf
. Allowed log levels are DEBUG, INFO,
WARN, and ERROR. The default is INFO. To configure logging using the UI,
perform the following steps:
- Go to Splunk Web on your data collection node.
- Access the Splunk Add-on for Cisco UCS UI.
- Click Configuration > Logging, then select a logging level from the drop-down menu.
Search for configuration errors¶
If you do not see the data you expect when you search for
sourcetype=cisco:ucs:*
, inspect the event types for relevant errors.
- If you have data collection errors, search for
eventype="cisco_ucs_ta_log_error"
OReventtype="ta_util_error"
. - If you have web configuration errors, search for
eventtype="cisco_ucs_ta_web_error"
. - If you see “reached maximum session limit” in an
eventtype=cisco_ucs_ta_log_error
, go to your Cisco UCS manager to set a bigger session limit. See Chapter: Managing Administrative Settings in the Cisco UCS Central CLI Reference Manual for details.
Ended: Troubleshoot
Release Notes ↵
Release notes for the Splunk Add-on for Cisco UCS¶
Version 4.3.0 of the Splunk Add-on for Cisco UCS was released on January 21, 2025.
Compatibility¶
Version 4.3.0 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 9.1.x, 9.2.x, 9.3.x |
CIM | 5.0.x, 5.1.x, 5.2.x, 5.3.x |
Supported OS for data collection | Linux and Windows |
Vendor products | Cisco UCS Manager |
New features¶
Version 4.3.0 of the Splunk Add-on for Cisco UCS has the following new features:
- Support for CIM v5.3.2.
- Introduced TA monitoring dashboard.
- Bug fixes and enhancements.
Fixed issues¶
Version 4.3.0 of the Splunk Add-on for Cisco UCS fixes the following issues:
Known issues¶
Version 4.3.0 of the Splunk Add-on for Cisco UCS contains the following known issues.
Third-party software attributions¶
Some of the components included in this add-on are licensed under free or open source licenses. We wish to thank the contributors to those projects.
A complete listing of third-party software information for this add-on is available as a PDF file for download: Splunk Add-on for Cisco UCS third-party software credits.
Release history for the Splunk Add-on for Cisco UCS¶
Latest release¶
The latest release of the Splunk Add-on for Cisco UCS is version 4.3.0. See Release notes for the Splunk Add-on for Cisco UCS for the release notes of this latest version.
Version 4.2.0¶
Version 4.2.0 of the Splunk Add-on for Cisco UCS was released on July 22, 2024.
Compatibility¶
Version 4.2.0 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 9.0, 9.1.x, 9.2x |
CIM | 4.18.1 |
Supported OS for data collection | Linux and Windows |
Vendor products | Cisco UCS Manager |
This add-on is unrelated to and is not intended to be compatible with the Splunk App for Cisco UCS. If you are currently using the Splunk App for Cisco UCS, disable the data gathering in the Splunk App for Cisco UCS so that the input from the add-on does not conflict with the input from the app.
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
New features¶
Version 4.2.0 of the Splunk Add-on for Cisco UCS has the following new features:
- Improved memory and CPU usage by migrating inputs from single to multi-instance mode for data collection.
- IPv6 support and the Splunk Add-on for Cisco UCS is now compatible with Splunk running on the IPv6 environment.
Fixed issues¶
Version 4.2.0 of the Splunk Add-on for Cisco UCS fixes the following issues:
Known issues¶
Version 4.2.0 of the Splunk Add-on for Cisco UCS contains the following known issues.
Third-party software attributions¶
Some of the components included in this add-on are licensed under free or open source licenses. We wish to thank the contributors to those projects.
A complete listing of third-party software information for this add-on is available as a PDF file for download: Splunk Add-on for Cisco UCS third-party software credits.
Version 4.1.0¶
Version 4.1.0 of the Splunk Add-on for Ciscos UCS was released on April 29, 2024.
Compatibility¶
Version 4.1.0 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 9.0, 9.1.x, 9.2x |
CIM | 4.18.1 |
Supported OS for data collection | Linux and Windows |
Vendor products | Cisco UCS Manager |
This add-on is unrelated to and is not intended to be compatible with the Splunk App for Cisco UCS. If you are currently using the Splunk App for Cisco UCS, disable the data gathering in the Splunk App for Cisco UCS so that the input from the add-on does not conflict with the input from the app.
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
New features¶
Version 4.1.0 of the Splunk Add-on for Cisco UCS has the following new features:
- Migrated from httplib2 to requests library
Fixed issues¶
Version 4.1.0 of the Splunk Add-on for Cisco UCS fixes the following issues:
Known issues¶
Version 4.1.0 of the Splunk Add-on for Cisco UCS contains the following known issues.
Third-party software attributions¶
Some of the components included in this add-on are licensed under free or open source licenses. We wish to thank the contributors to those projects.
A complete listing of third-party software information for this add-on is available as a PDF file for download: Splunk Add-on for Cisco UCS third-party software credits.
Version 4.0.2¶
Version 4.0.2 of the Splunk Add-on for Cisco UCS was released on December 21, 2023.
Compatibility¶
Version 4.0.2 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 9.0, 9.1.x |
CIM | 4.18.1 |
Supported OS for data collection | Linux and Windows |
Vendor products | Cisco UCS Manager |
This add-on is unrelated to and is not intended to be compatible with the Splunk App for Cisco UCS. If you are currently using the Splunk App for Cisco UCS, disable the data gathering in the Splunk App for Cisco UCS so that the input from the add-on does not conflict with the input from the app.
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
New features¶
Version 4.0.2 of the Splunk Add-on for Cisco UCS has the following new features: Fixed the security vulnerabilities found in the certifi and urllib3 libraries by upgrading their version from 2022.12.7 to 2023.11.17, 1.26.6 to 1.26.18 respectively.
Fixed issues¶
Version 4.0.2 of the Splunk Add-on for Cisco UCS fixes the following issues:
Known issues¶
Version 4.0.2 of the Splunk Add-on for Cisco UCS contains the following known issues.
Third-party software attributions¶
Some of the components included in this add-on are licensed under free or open source licenses. We wish to thank the contributors to those projects.
A complete listing of third-party software information for this add-on is available as a PDF file for download: Splunk Add-on for Cisco UCS third-party software credits.
Version 4.0.1¶
Version 4.0.1 of the Splunk Add-on for Ciscos UCS was released on February 22, 2023.
Compatibility¶
Version 4.0.1 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 8.0.0, 8.1.x, 8.2.x |
CIM | 4.18.1 |
Supported OS for data collection | Linux and Windows |
Vendor products | Cisco UCS Manager |
This add-on is unrelated to and is not intended to be compatible with the Splunk App for Cisco UCS. If you are currently using the Splunk App for Cisco UCS, disable the data gathering in the Splunk App for Cisco UCS so that the input from the add-on does not conflict with the input from the app.
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
New features¶
Version 4.0.1 of the Splunk Add-on for Cisco UCS has the following new features:
- Upgraded the certifi library to version 2022.12.7
- Fixed a security vulnerability found in the certifi library
Fixed issues¶
Version 4.0.1 of the Splunk Add-on for Cisco UCS fixes the following issues:
Known issues¶
Version 4.0.1 of the Splunk Add-on for Cisco UCS contains the following known issues.
Third-party software attributions¶
Some of the components included in this add-on are licensed under free or open source licenses. We wish to thank the contributors to those projects.
A complete listing of third-party software information for this add-on is available as a PDF file for download: Splunk Add-on for Cisco UCS third-party software credits.
Version 4.0.0¶
Version 4.0.0 of the Splunk Add-on for Ciscos UCS was released on July 20, 2021.
Compatibility¶
Version 4.0.0 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 8.0.0, 8.1.x, 8.2.x |
CIM | 4.18.1 |
Supported OS for data collection | Linux and Windows |
Vendor products | Cisco UCS Manager |
This add-on is unrelated to and is not intended to be compatible with the Splunk App for Cisco UCS. If you are currently using the Splunk App for Cisco UCS, disable the data gathering in the Splunk App for Cisco UCS so that the input from the add-on does not conflict with the input from the app.
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
Upgrade¶
- After upgrading the add-on, you must restart Splunk on Heavy Forwarders and indexers (if the add-on is configured on the indexer) in order to migrate the information from the old configuration files to the newer ones.
- If you added Cisco UCS Managers in previous versions of the Splunk Add-on for Cisco UCS, confirm the type of connection protocol used for each Manager. For SSL protocol, follow the below steps:
- Download the ssl certificate of the Cisco UCS server in PEM format.
- Copy the content of your ssl certificate in
$Splunk_Home/etc/apps/Splunk_TA_cisco_ucs/lib/certifi/cacerts.pem
- Save your changes.
New features¶
Version 4.0.0 of the Splunk Add-on for Cisco UCS has the following new features:
- Fast and intuitive UI with an improved look and feel.
- Fixed critical security issue by removing jquery2.
- Removed python2 support. Splunk only supports python3 for future releases.
- The Tasks are now called Inputs and have a separate page in the UI.
- The Managers, Templates, and Logging are now tabs under the configuration page.
- Removed support for the Destination App for managers, templates, and inputs in the latest version of this add-on.
- The data from old .conf files will be migrated to these new .conf files:
From | To |
cisco_ucs_tasks.conf | inputs.conf |
cisco_ucs_templates.conf | splunk_ta_cisco_ucs_templates.conf |
cisco_ucs_servers.conf | splunk_ta_cisco_ucs_servers.conf |
cisco_ucs.conf | splunk_ta_cisco_ucs_settings.conf |
Fixed issues¶
Version 4.0.0 of the Splunk Add-on for Cisco UCS fixes the following issues:
Known issues¶
Version 4.0.0 of the Splunk Add-on for Cisco UCS contains the following known issues.
Third-party software attributions¶
Some of the components included in this add-on are licensed under free or open source licenses. We wish to thank the contributors to those projects.
A complete listing of third-party software information for this add-on is available as a PDF file for download: Splunk Add-on for Cisco UCS third-party software credits.
Version 3.1.0¶
Version 3.1.0 of the Splunk Add-on for Ciscos UCS was released on May 8, 2021.
Compatibility¶
Version 3.1.0 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 7.2.x, 7.3.x, 8.0.0, 8.1.x |
CIM | 4.19 |
Supported OS for data collection | Linux and Windows |
Vendor products | Cisco UCS Manager |
This add-on is unrelated to and is not intended to be compatible with the Splunk App for Cisco UCS. If you are currently using the Splunk App for Cisco UCS, disable the data gathering in the Splunk App for Cisco UCS so that the input from the add-on does not conflict with the input from the app.
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
Upgrade¶
If you added Cisco UCS Managers in previous versions of the Splunk App for Cisco UCS, confirm the type of connection protocol each Manager uses. For protocols other than SSL with a Trusted Certificate, take one of the following two actions:
HTTP | Set disable_ssl_verification to true in your cisco_ucs_servers.conf file. |
SSL | 1.Find your cacerts.txt file at $Splunk_Home/etc/apps/Splunk_TA_Cisco_ucs/bin/ta_util2/httplib2/ . 2.Add your certificate details in base-64 encoded format to the cacerts.txt file. |
New features¶
Version 3.1.0 of the Splunk Add-on for Cisco UCS has the following new features:
- Support for Cisco UCS Manager 4.1.
- Support for CIM 4.19.
- CIM data model and extraction changes.
- Server validation feature while configuring a UCS manager on the configuration page.
- Removed CIM tags for
cisco:ucs:faultInst
source and extracted ITSI Fields in support of the Universal Alerting ITSI Content Pack for Monitoring and Alerting in ITSI. - Removed CIM tags from these sources:
cisco:ucs:etherTxStats
cisco:ucs:etherPauseStats
cisco:ucs:etherRxStats
cisco:ucs:etherErrStats
- Added a csv lookup
ucs_fault_highestSeverity
to map fault severity level to the severity id. - Updated dest field mapping in majority of the sources.
- Enhanced CIM mappings and extractions for these eventtypes:
cisco_ucs_computeRackUnit
cisco_ucs_computeBlade
cisco_ucs_storageLocalDisk
cisco_ucs_etherPIo
- Resolved an issue where data collection was not working correctly with a self-signed SSL certificate.
- Error traceback now prints only after the retry for a failed API call, as opposed to printing error traceback on every failed API call in the data collection.
Fixed issues¶
Version 3.1.0 of the Splunk Add-on for Cisco UCS fixes the following issues:
Known issues¶
Version 3.1.0 of the Splunk Add-on for Cisco UCS contains the following known issues.
Third-party software attributions¶
Version 3.1.0 of the Splunk Add-on for Cisco UCS incorporates the following third-party software or libraries:
Version 3.0.1¶
Version 3.0.1 of the Splunk Add-on for Ciscos UCS was released on March 10, 2020.
Compatibility¶
Version 3.0.1 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 7.0.x, 7.1.x, 7.2.x, 7.3.x, 8.0.0 |
CIM | 4.14 and later |
Supported OS for data collection | Linux and Windows |
Vendor products | Cisco UCS Manager |
This add-on is unrelated to and is not intended to be compatible with the Splunk App for Cisco UCS. If you are currently using the Splunk App for Cisco UCS, disable the data gathering in the Splunk App for Cisco UCS so that the input from the add-on does not conflict with the input from the app.
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
Upgrade¶
If you added Cisco UCS Managers in previous versions of the Splunk App for Cisco UCS, confirm the type of connection protocol each Manager uses. For protocols other than SSL with a Trusted Certificate, take one of the following two actions:
HTTP | Set disable_ssl_verification to true in your cisco_ucs_servers.conf file. |
SSL | 1.Find your cacerts.txt file at $Splunk_Home/etc/apps/Splunk_TA_Cisco_ucs/bin/ta_util2/httplib2/ . 2.Add your certificate details in base-64 encoded format to the cacerts.txt file. |
New features¶
Version 3.0.1 of the Splunk Add-on for Cisco UCS has the following new features:
- Default Python 3 support
Fixed issues¶
Version 3.0.1 of the Splunk Add-on for Cisco UCS fixes the following issues:
Known issues¶
Version 3.0.1 of the Splunk Add-on for Cisco UCS contains the following known issues.
Third-party software attributions¶
Version 3.0.1 of the Splunk Add-on for Cisco UCS incorporates the following third-party software or libraries:
Version 3.0.0¶
Version 3.0.0 of the Splunk Add-on for Ciscos UCS was released on January 22, 2020.
Compatibility¶
Version 3.0.0 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 7.0.x, 7.1.x, 7.2.x, 7.3.x, 8.0.0 |
CIM | 4.14 |
Supported OS for data collection | Linux and Windows |
Vendor products | Cisco UCS Manager |
This add-on is unrelated to and is not intended to be compatible with the Splunk App for Cisco UCS. If you are currently using the Splunk App for Cisco UCS, disable the data gathering in the Splunk App for Cisco UCS so that the input from the add-on does not conflict with the input from the app.
Upgrade¶
If you added Cisco UCS Managers in previous versions of the Splunk App for Cisco UCS, confirm the type of connection protocol each Manager uses. For protocols other than SSL with a Trusted Certificate, take one of the following two actions:
HTTP | Set disable_ssl_verification to true in your cisco_ucs_servers.conf file. |
SSL | 1.Find your cacerts.txt file at $Splunk_Home/etc/apps/Splunk_TA_Cisco_ucs/bin/ta_util2/httplib2/ . 2.Add your certificate details in base-64 encoded format to the cacerts.txt file. |
New features¶
Version 3.0.0 of the Splunk Add-on for Cisco UCS has the following new features:
- Restricts a user’s ability to delete configuration or template that has an associated task.
- Python 3 support
Fixed issues¶
Version 3.0.0 of the Splunk Add-on for Cisco UCS fixes the following issues:
Known issues¶
Version 3.0.0 of the Splunk Add-on for Cisco UCS contains the following known issues.
Third-party software attributions¶
Version 3.0.0 of the Splunk Add-on for Cisco UCS incorporates the following third-party software or libraries:
Version 2.0.3¶
Version 2.0.3 of the Splunk Add-on for Ciscos UCS was released on July 9, 2018.
Compatibility¶
Version 2.0.3 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 6.6.x, 7.0.x, 7.1.x, 7.2.x |
CIM | 4.10 |
Supported OS for data collection | Linux and Windows |
Vendor products | Cisco UCS Manager |
This add-on is unrelated to and is not intended to be compatible with the Splunk App for Cisco UCS. If you are currently using the Splunk App for Cisco UCS, disable the data gathering in the Splunk App for Cisco UCS so that the input from the add-on does not conflict with the input from the app.
Upgrade¶
If you added Cisco UCS Managers in previous versions of the Splunk App for Cisco UCS, confirm the type of connection protocol each Manager uses. For protocols other than SSL with a Trusted Certificate, take one of the following two actions:
HTTP | Set disable_ssl_verification to true in your cisco_ucs_servers.conf file. |
SSL | 1.Find your cacerts.txt file at $Splunk_Home/etc/apps/Splunk_TA_Cisco_ucs/bin/ta_util2/httplib2/ . 2.Add your certificate details in base-64 encoded format to the cacerts.txt file. |
New features¶
Version 2.0.3 of the Splunk Add-on for Cisco UCS has the following new features:
- Support for eventgen version 6
- Compatibility with Splunk Cloud
Fixed issues¶
Version 2.0.3 of the Splunk Add-on for Cisco UCS fixes the following issues:
Known issues¶
Version 2.0.3 of the Splunk Add-on for Cisco UCS contains the following known issues.
Third-party software attributions¶
Version 2.0.3 of the Splunk Add-on for Cisco UCS incorporates the following third-party software or libraries:
Version 2.0.2¶
Version 2.0.2 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 6.2, 6.3, 6.4, 6.5, 6.6 |
CIM | 4.2 and above |
Platforms | Linux and Windows |
Vendor Products | Cisco UCS Manager |
Upgrade requirements¶
This add-on is unrelated to and is not intended to be compatible with the Splunk App for Cisco UCS. If you are currently using the Splunk App for Cisco UCS, disable the data gathering in the app so that the add-on’s input does not conflict with it.
Fixed issues¶
Version 2.0.2 of the Splunk Add-on for Cisco UCS has the following fixed issues:
Known issues¶
Version 2.0.2 of the Splunk Add-on for Cisco UCS has the following known issues:
Third-party software attributions¶
Version 2.0.2 of the Splunk Add-on for Cisco UCS incorporates the following third-party software or libraries:
Version 2.0.1¶
Version 2.0.1 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 6.2 and above |
CIM | 4.2 and above |
Platforms | Linux and Windows |
Vendor Products | Cisco UCS Manager |
Upgrade requirements¶
This add-on is unrelated to and is not intended to be compatible with the Splunk App for Cisco UCS. If you are currently using the Splunk App for Cisco UCS, disable the data gathering in the app so that the add-on’s input does not conflict with it.
Fixed issues¶
Version 2.0.1 of the Splunk Add-on for Cisco UCS has the following fixed issues:
Known issues¶
Version 2.0.1 of the Splunk Add-on for Cisco UCS has the following known issues:
Third-party software attributions¶
Version 2.0.1 of the Splunk Add-on for Cisco UCS incorporates the following third-party software or libraries:
Version 2.0.0¶
Version 2.0.0 of the Splunk Add-on for Cisco UCS is compatible with the following software, CIM versions, and platforms:
Splunk platform versions | 6.2 and above |
CIM | 4.2 and above |
Platforms | Linux and Windows |
Vendor Products | Cisco UCS Manager |
Upgrade requirements¶
This add-on is unrelated to and is not intended to be compatible with the Splunk App for Cisco UCS. If you are currently using the Splunk App for Cisco UCS, disable the data gathering in the app so that the add-on’s input does not conflict with it.
New features¶
Version 2.0.0 of the Splunk Add-on for Cisco UCS had the following new features:
Date | Issue number | Description |
04/30/15 | ADDON-1137 | New Splunk-supported add-on for Cisco UCS data collection and CIM mapping. |
Fixed issues¶
Version 2.0.0 of the Splunk Add-on for Cisco UCS has the following fixed issues:
Known issues¶
Version 2.0.0 of the Splunk Add-on for Cisco UCS had the following known issues:
Third-party software attributions¶
Version 2.0.0 of the Splunk Add-on for Cisco UCS incorporates the following third-party software or libraries: