icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading TA-meraki
SHA256 checksum (ta-meraki_115.tgz) 1013a88ca872d548ddeeb4474fc277ea93d57e8be300812a2bf721a39c849a8b SHA256 checksum (ta-meraki_114.tgz) 073cc7886856843cd1a791bee57bcff41a801d499fb3e65f09498944324a36ca SHA256 checksum (ta-meraki_111.tgz) b781ec267d6604c4396b8f42de73f06f49656e567dc819d08f5af9f4308a73a1 SHA256 checksum (ta-meraki_110.tgz) 38448c14dda5dc657ad173281354612daa322e18efba3c57cd905ed28191dfe4 SHA256 checksum (ta-meraki_109.tgz) 5fc6e456db3c5b74042bcfbdbafceb6e301189425a0ba0d7bf4968365fc95311 SHA256 checksum (ta-meraki_108.tgz) e0290a76dd5766c1acc5e21a1447e101efea441fd1f3d75bf1bdd51aad915ee9 SHA256 checksum (ta-meraki_107.tgz) 366e3ea6c0b137005408381015d5394f814f4ed389bdcf4be2e9407b74e3f680 SHA256 checksum (ta-meraki_106.tgz) 553e0f325d2fa6e5db939c1aaf46eb0bdd36d59de73bd1aaaa993b9a97b1ff7d SHA256 checksum (ta-meraki_105.tgz) e49f2ee0da6467ac9fa4602d78dc32fb3d8cc7b9ab6cd909f6d2fcacfeb969db SHA256 checksum (ta-meraki_104.tgz) 7d04b3ff941032e5880cab88a78475ba1cde77e9a4e14456ff81a9b871e7408b SHA256 checksum (ta-meraki_103.tgz) c63b5f3e0772f9303ba31ef5abc0f71045f867af5917edf6c1bf6d5f6a234408 SHA256 checksum (ta-meraki_102.tgz) e130d25e5d93891da8d494d86eb51f90909019c526dbc93eaa8dbadb58364c9d SHA256 checksum (ta-meraki_101.tgz) 29abd144a69a2b0de991d0ac9af4efcf52fc4e9e0181e5243674dade9d95ec63 SHA256 checksum (ta-meraki_100.tgz) f4b7f83325e0643d6e74affe596d4d04d6c31f69f80a558ff1ba324be2bca8b5 SHA256 checksum (ta-meraki_009.tgz) 3afd26ba0bbb7ecee38599a02506ad8202c785dea5879a31ca1ac3336baca824 SHA256 checksum (ta-meraki_007.tgz) c6e1f92cf54593a0bdf09b15cdf6b99848e672e180eca9e8f385044e38d100d4 SHA256 checksum (ta-meraki_006.tgz) 295a5bca8b305a3b6ec3edb859f71a5e9346f978fc1f09bcb69a58a7a6bb8705 SHA256 checksum (ta-meraki_005.tgz) 37f84f2fbad57dff69b980651e0b3aec7b98199b1e666bb6a38b8798806f477c SHA256 checksum (ta-meraki_004.tgz) b9b8afff7e722d99ea37a653fadc6b0da1138960ea76e3120f9e5517ed0a3849 SHA256 checksum (ta-meraki_003.tgz) d94177203ade98ad76178618fe198367df73b31658c9582e935954a1dd54ecc6 SHA256 checksum (ta-meraki_002.tgz) 90724992c7d114378234ace70bfefd5e26e6a406236336154141e0e174a2c8d9
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

TA-meraki

This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
This is a set of technology adapters for splunk to extract Cisco Meraki logs via syslog. Meraki sends a bunch of different log formats; some logs more complete than others. Majority of all logs extracted are CIM compliant and deposited into the Splunk Common Information Model.

Provides records following the below listed CIM models:
meraki-ids-alerts (ids,attack); meraki-flows (network,communicate), meraki-urls (web,proxy), meraki-dhcp (network,session,dhcp)

This is a technology adapter that enables front end applications to view meraki data via the common information model. If the front end is written to CIM standards your meraki data will automatically appear in that app. Examples include Splunk Enterprise Security (and likely others).

This TA-app assumes the following:
Cisco Meraki logs will all have sourcetype meraki

This app provides the following common information models:
[eventtype=meraki-ids-alerts]
ids = enabled
attack = enabled
[eventtype=meraki-flows]
network = enabled
communicate = enabled
[eventtype=meraki-urls]
web = enabled
proxy = enabled
[eventtype=meraki-dhcp]
network = enabled
session = enabled
dhcp = enabled

Due to difficulty in sometimes identifying the various services meraki provides; I recommend opening up a separate port on your syslog server with a filter as listed below; or adding a new UDP high address port on a heavy forwarder, or if you only had one indexer that box and then configuring that box as a syslog server with the UDP high address port chosen.

inputs.conf

[default]
host_segment = 4

[monitor:///logpartition/2017/meraki/]
sourcetype = meraki
index=meraki

[monitor:///logpartition/2017/meraki/]
sourcetype = meraki
index=meraki

Sample config for syslog-ng

port to process meraki

source s_ext_udp_15146 {
udp(so_rcvbuf(1073741823) log_fetch_limit(10000) port(15146));
};
filter f_meraki { facility(local0) };
log {
source(s_ext_udp_15146);
filter(f_meraki);
destination(d_meraki);
};
destination d_meraki {
file("/logpartition/$YEAR/meraki/$HOST/$YEAR/$MONTH/$DAY/meraki-$YEAR-$MONTH-$DAY"
owner(root) group(adm) perm(0640) dir_perm(0751) dir_group(adm) create_dirs(yes) template("$ISODATE $HOST $MSGHDR$MSGONLY\n"));
};

Release Notes

Version 1.1.5
Oct. 2, 2020

Version 1.1.5
Change in the flows format, new regex; thank you Philip Kohn

Version 1.1.4
From Peter McCarthy, not all X.X are 4digit+4digit from Meraki, changing..

Version 1.1.3
Thank you Peter McCarthy from SageNet for finding at dvc_ip regex problem

Version 1.1.2
Thank you Jason Mantor for finding an WARN in the lease_scope.

Version 1.1.1
Handle both strip and non-strip of \d{4,}.\d{4,}

Version 1.1.4
Sept. 16, 2020

CHANGELOG:
Version 1.1.4
From Peter McCarthy, not all X.X are 4digit+4digit from Meraki, changing..

Version 1.1.3
Thank you Peter McCarthy from SageNet for finding at dvc_ip regex problem

Version 1.1.2
Thank you Jason Mantor for finding an WARN in the lease_scope.

Version 1.1.1
Handle both strip and non-strip of \d{4,}.\d{4,}

Version 1.1.0
Started to fill out CIM for wireless ids and network session start/stop. I don't have a definition for wireless ips, so
I put everything as informational and blocked for now

Version 1.0.9
minor fixes

Version 1.0.8
Preliminary support for WPA Meraki devices thank you John Ward from spicosolutions

Version 1.0.7
Released under (CC BY-SA 3.0) license

Version 1.0.6
changed category field to a multi-field in order to pick up multiple category websites

Version 1.0.5
bugfix for AP, flows were reported at the end of the log line unlike the other devices. Removed to blank space check at the end of [meraki_dest_port2]

Version 1.1.1
May 8, 2019

Version 1.1.1
Handle both strip and non-strip of \d{4,}.\d{4,}

Version 1.1.0
Started to fill out CIM for wireless ids and network session start/stop. I don't have a definition for wireless ips, so
I put everything as informational and blocked for now

Version 1.0.9
minor fixes

Version 1.0.8
Preliminary support for WPA Meraki devices thank you John Ward from spicosolutions

Version 1.0.7
Released under (CC BY-SA 3.0) license

Version 1.0.6
changed category field to a multi-field in order to pick up multiple category websites

Version 1.0.5
bugfix for AP, flows were reported at the end of the log line unlike the other devices. Removed to blank space check at the end of [meraki_dest_port2]

Version 1.1.0
May 8, 2019

Version 1.1.0
Started to fill out CIM for wireless ids and network session start/stop. I don't have a definition for wireless ips, so
I put everything as informational and blocked for now

Version 1.0.9
minor fixes

Version 1.0.8
Preliminary support for WPA Meraki devices thank you John Ward from spicosolutions

Version 1.0.7
Released under (CC BY-SA 3.0) license

Version 1.0.9
May 4, 2019

This release adds extractions for Meraki WAP and Meraki Air Marshal. The wireless IPS is not complete as I don't have definitions of all the logs. I can finish the CIM model if I can somehow acquire them. Thank you John Ward from spicosolutions.com for invaluable assistance in getting these added.

This fixes some bugs in regard to the previous release with overlapping regex's in regard too meraki_app

Version 1.0.8
May 2, 2019

Preliminary extractions added for Meraki wireless. Still work needs to be done to be CIM compliant for this extraction set.

Version 1.0.7
Aug. 31, 2017

Re-Released under Creative Commons Attribution-ShareAlike 3.0 Unported. (source of support changed https://github.com/AlaskaSSO/TA-meraki). Some cleanup. New logo.

Version 1.0.6
March 10, 2017

changed category field to a multi-field in order to pick up multiple category websites

Version 1.0.5
Jan. 31, 2017

bugfix for AP, flows were reported at the end of the log line unlike the other devices. Removed to blank space check at the end of [meraki_dest_port2]

Version 1.0.4
Jan. 27, 2017

cleanup on DHCP portion to make it easier to read
cleanup on signature_id to become more useful (applied signature_id to dhcp entries based on Microsoft DHCP error ids)
applied coalesce to a few different variables that were being reported by different regex's (signature_id,meraki_action,meraki_priority)

Version 1.0.3
Jan. 26, 2017

bugfix report of different logformat for flows on MX access point. Added new extractions for flows on AP.
bugfix regarding if you search for a signature created in the dhcp portion it was being overwritten by #FIELDALIAS-signature = category AS signature from the web portion; changed to a coalesce so now you can do a regular search on both without searching the model

Version 1.0.2
Jan. 24, 2017
Version 1.0.1
Oct. 5, 2016

added meraki_dhcp_lease_release extraction
added meraki_events_ad extraction, basic identification for Active Directory activity
added meraki_date_clipper, if added to indexer or heavy forwarder this removes unix timestamp date and saves about 19 bytes of data per log file (normal syslog timestamp still exists) (optional), if the file format changes this will have no effect

Version 1.0.0
Sept. 30, 2016

No change except:
Version number to 1.0.0 for splunk certification of stable app
removed targeted index for eventtype search.

Version 0.0.9
Sept. 28, 2016

Minor update
cleanup for app certification status

Version 0.0.7
Sept. 28, 2016

Minor update
changed default app status to disabled for app certification status
modified documentation/icons and contact information for app certification process
This version will be submitted to application certification, app has been around for a while and I believe all/most major/minor bugs have been squashed

Version 0.0.6
Sept. 28, 2016

Minor update
added extraction for port status change (will eventually be added to CIM change analysis)
added extraction for authentication log under events-authentication
TODO: deal with more unparsed event types (i.e. vrrp); feel free to submit log samples
TODO: still deal with block messages regarding CIM compliance

Version 0.0.5
Sept. 27, 2016

Added DHCP CIM compliance (via meraki_app="events-dhcp")
moved status codes/rule messages to a lookup app so it will be more forward compatible in the future
moved web blocks to a new meraki_app called events-content_filtering_block, unfortunately with no source IP address I can't add it into the CIM. Maybe put the device as the src IP?
TODO: deal with more unparsed event types (i.e. vrrp); feel free to submit log samples
fixed minor bugs

Version 0.0.4
March 17, 2016

Added Web CIM compliance
todo: still deal with block messages regarding CIM compliance

Version 0.0.3
March 16, 2016

Updated CIM compatibility
Added ICMP Code Type resolution
Split Meraki into 2 sub event types instead of having them all as one
(IDS, and Network Traffic) for CIM compliance
Fixed a bug with splunk 6.3.2 regarding concat of fields; moved to running 2 extractions instead of one. Previously fieldname:$1$2 which no longer works
Fixed a typo in signature and signature-id
added a couple of fields to start on the progress of adding web CIM support to Meraki

TODO: Web CIM compliance (and more)

Version 0.0.2
Jan. 21, 2016

0.0.2

These are a set of Meraki extractions that are partially CIM compliant. These were developed from me seeing the events on my own system.

TA-meraki should be installed index side and search side.

These are likely NOT complete; but currently everything on my system is detected. Please feel free to submit logs or things that don't work
and I'll fix them.


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk Inc. in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.