The Python code in this App is dual 2.7/3 compatible. This version of the App enforces Python 3 for execution of the modular input script when running on Splunk 8+ in order to satisfy Splunkbase AppInspect requirements. If running this App on Splunk versions prior to 8 , then Python 2.7 will get executed.
This is a Splunk modular input add-on for Cisco Meraki that allows you to receive JSON probe events from the Meraki Presence Cloud.
Settings -> Data Inputs -> Cisco Meraki
to add a new Input stanza that will establish a new Meraki HTTP server to listen for event datahttp://yoursplunkhost:yourport/events
You require an activation key to use this App. Visit http://www.baboonbones.com/#activation to obtain a non-expiring key
Modular Input logs will get written to $SPLUNK_HOME/var/log/splunk/merakimodinput_app_modularinput.log
Setup logs will get written to $SPLUNK_HOME/var/log/splunk/merakimodinput_app_setuphandler.log
These logs are rotated daily with a backup limit of 5.
The Modular Input logging level can be specified in the input stanza you setup. The default level is INFO
.
You can search for these log sources in the _internal
index or browse to the Logs
menu item on the App's navigation bar.
BaboonBones.com offer commercial support for implementing and any questions pertaining to this App.