Cisco Catalyst SD-WAN Splunk Integration User Guide

Available Languages

Download Options

  • PDF
    (6.8 MB)
    View with Adobe Reader on a variety of devices
Updated:August 1, 2023

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

Available Languages

Download Options

  • PDF
    (6.8 MB)
    View with Adobe Reader on a variety of devices
Updated:August 1, 2023
 

 

Introduction

Cisco SD-WAN and ZBFW

A software-defined wide area network (SD-WAN) is a virtualized service that connects and extends enterprise networks over large geographical distances. Cisco SD-WAN provides unparalleled visibility across WAN, optimal connectivity for end users, and the most comprehensive security platform to harden the network. The Cisco Zone-Based Firewall is the successor of the Classic IOS firewall or CBAC (Context-Based Access Control). It primarily deals with the security “zones”.We can assign router interfaces to various security zones and control the traffic between them. The firewall dynamically inspects traffic passing through zones.

Cisco SD-WAN Splunk Integration

Cisco SD-WAN Splunk Integration will have 2 components:

      Cisco SD-WAN Add-on for Splunk

      Cisco SD-WAN App for Splunk

Cisco SD-WAN Add-on for Splunk

Add-ons are used for data optimization and collection processes. Cisco SD-WAN Add-on for Splunk collects different types of Cisco logs Data and Netflow Data and stores them into Splunk indexes.

Cisco SD-WAN App for Splunk

The Cisco SD-WAN App will present dashboards for different types of Cisco Logs and NetFlow Data. The app is used for visualization, analysis, and representation. The dashboard will use the data collected by the Add-on.

Pre-Requisites

      Install Splunk App for Stream & Splunk Add-on for Stream Forwarders in the Splunk instance to collect the NetFlow (v9) data.

      Make sure that the receiver UDP port (Ex. 4739) is open and bypass the firewall traffic.

Installation and Configuration of Cisco SD-WAN

The Add-on and App can be installed in two different ways:

      Through the Splunk user interface from Apps > Manage Apps > Install the app from file. Upload the downloaded file.

Related image, diagram or screenshot

      By extracting the compressed file (<>-xx-x.x.x-x.tar.gz) into the $SPLUNK_HOME$/etc/apps folder.

A screenshot of a computerDescription automatically generated

      Note: Splunk restart is required after App and Add-on installation.

A white rectangular frame with black borderDescription automatically generated

      Once you log in under Splunk, click on Cisco SD-WAN App For Splunk on the left side of the screen.

A screenshot of a computerDescription automatically generated

Add-on Configuration

Configure Inputs on Splunk for Syslog Data:

The "Cisco SD-WAN Add-on for Splunk" manages inputs through TCP/UDP inputs provided by Splunk. To configure inputs:

1.     Login to Splunk WEB UI.

A screen shot of a computerDescription automatically generated

2.     Navigate to Settings > Data inputs.

A screenshot of a computerDescription automatically generated

3.     Choose TCP or UDP and click New.

A screenshot of a computerDescription automatically generated

4.     In the left pane, click TCP / UDP to add an input.

5.     Click the TCP or UDP button to choose between a TCP or UDP input.

6.     In the Port field, enter a port number on which you are forwarding the logs from Cisco SD-WAN.

7.     In the Source name override field, enter a new source name to override the default source value, if necessary.

8.     Click Next to continue to the Input Settings page.

A screenshot of a computerDescription automatically generated

9.     Set the sourcetype as cisco:firewall:logs.

10.  Set App context to Cisco SD-WAN Add-on.

A screenshot of a computerDescription automatically generated

11.  Set the Index that Splunk Enterprise should send data to for this input

12.  Click Review.

A screenshot of a computerDescription automatically generated

13.  Click Submit once you have ensured everything is correct.

A screenshot of a computerDescription automatically generated

Once the input is configured, execute the following query to see if Syslog events are being received.

index=<configured_index> sourcetype="cisco:sdwan"

Configure Inputs on Splunk for Netflow Data

Steps to follow:

1.     Once the "Splunk App for Stream" & "Splunk Add-on for Stream Forwarders" is installed in the desired Splunk Instance.

2.     Open "Splunk App for Stream" > Click on "Configuration" > Click on "Configure Streams"

3.     In the "Search" filter search for the keyword "netflow".

4.     For "netflow" stream > Goto "Action" > "Edit"

5.     Update the "Mode" to "Enabled" & select the desired index, by default "main" will be selected.

6.     Click on Save.

7.     SSH into the Destination VM example VM: x.x.x.x (should be replaced with the VM in which data is been collected)

8.     Goto Location: $SPLUNK_HOME/etc/apps/Splunk_TA_stream/local

9.     Create a "streamfwd.conf" in the "local" folder Sample format of 'streamfwd.conf' as below:

     ```

     [streamfwd]

     netflowReceiver.<N>.ip = <ip_address>

     netflowReceiver.<N>.port = <port_number>

     netflowReceiver.<N>.decoder = <flow_protocol>

     ```

Below is an example file for the ip x.x.x.x and port 4739:

     ```

     [streamfwd]

     netflowReceiver.0.ip = x.x.x.x

     netflowReceiver.0.port = 4739

     netflowReceiver.0.decoder = netflow

     ```

10.  Save the changes.

11.  All the NetFlow events will get ingested in the Destination VM: x.x.x.x (should be replaced with the VM in which data is been collected)

12.  Verify the ingestion of events by using the following query from the "Destination VM: x.x.x.x" (should be replaced with the VM in which data is been collected)

    index="<desired index name>" sourcetype="stream*"

Note: Refer to the documentation for setting up a new Netflow stream.

Configure Event Types on Splunk Search Head Instance

To use the CIM mapped fields, a user first needs to configure the event type to provide the index in which the data is being collected. To configure event type:

      Navigate to Settings > Event types.

Related image, diagram or screenshot

      Select "Cisco SD-WAN Add-on for Splunk" from the App dropdown.

Related image, diagram or screenshot

      Click on "cisco_sdwan_index".

      Update "()" with "index=<your_configured_index>" in the existing definition to use your configured index.

A screenshot of a computerDescription automatically generated

      Click Save.

Data searching

Macros

      cisco_sdwan_index

    If you are using a custom index in Add-on for data collection then kindly update the "cisco_sdwan_index" macro in the app.

      summariesonly:

    If you want to visualize only accelerated data then change this macro to “summariesonly=true”, the Default value of the macro is “summariesonly=false”

      nataddress_regular:

    Definition for the extracted NAT addresses to convert them to ipv4 addresses.

      nataddress_datamodel:

    Definition for the extracted NAT addresses to convert them to ipv4 addresses in datamodel.

A screenshot of a computerDescription automatically generated

Data Model

      The app consists of Two data models "Cisco SDWAN" for Syslog data and "Cisco SDWAN Netflow" for NetFlow data:

    Cisco_SDWAN - Maps Syslog data based on different log types.

    Cisco_SDWAN_NETFLOW - Maps NetFlow data from Cisco SDWAN

      The acceleration for the data model is disabled by default.

      As all the dashboards are populated using data model queries and real-time search doesn't work with the data model, all the real-time search filters are disabled.

      If you want to improve the performance of dashboards, you just need to enable the acceleration of the data model. Please follow the below steps:

    On the Splunk menu bar, Click on Settings -> Data models

A screenshot of a computerDescription automatically generated

    Select "Cisco SDWAN App for Splunk" in the "App" context dropdown.

    In the "Actions" column, click on Edit and click Edit Acceleration for the "Cisco SDWAN" Data model. This will display the pop-up menu for Edit Acceleration.

A screenshot of a computerDescription automatically generated

    Check or uncheck Accelerate checkbox to "Enable" or "Disable" data model acceleration respectively.

    If acceleration is enabled, select the summary range to specify the acceleration period. The recommended acceleration period is 7 days. The acceleration period can be changed as per user convenience.

    To save acceleration changes click on the Save button.

A screenshot of a computerDescription automatically generated

    Follow the Similar Steps to Enable/Disable Acceleration Cisco_SDWAN_Netflow Data model

      Warning: The accelerated data models help in improving the performance of the dashboard but it increases the disk usage on the Indexer.

Dashboards

SOC Dashboard

Description

It is designed to provide insight into the security operations center (SOC) based on key metrics, workflows, and dispositions so that you can monitor the efficiency of the SOC and ensure that all security operations (detections, analysis, and responses) are on track.

The dashboard will consist of the below-mentioned panels

Screenshot

A screenshot of a computer screenDescription automatically generated

Panels

The Dashboard should have the below panels:

1.     Top 10 Threats

    Description: This panel displays a Pie chart for Top 10 Threats

    Chart Type: Pie Chart

    Chart Filter: Shared Time Range Picker, Source Router

    Drilldown (on click): Inline Threat Details Panel

    Sourcetype: cisco:sdwan:utd:logs

2.     Threat Details For a Particular Threat

    Description: This panel displays a details for particular threat

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Device IP, Device Name, Action, Source IP, Source Port, Destination IP, Destination Port

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:utd:logs

3.     Top 10 Devices By Threat

    Description: This panel displays a Pie chart Top 10 Devices by threat

    Chart Type: Pie Chart

    Chart Filter: Shared Time Range Picker, Source Router, Device IP, Device Name, Action, Source IP, Source Port, Destination IP, Destination Port

    Drilldown (on click): Inline Device Details Panel

    Sourcetype: cisco:sdwan:utd:logs

4.     Device Details for a Particular Device

    Description: This panel displays a details for particular Device

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Source IP, Source Port, Destination IP, Destination Port

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:utd:logs

5.     Top 10 Application

    Description: This panel displays the top 10 applications with their count

    Chart Type: Tabular View

    Chart Filter: Shared Time Range Picker,Source Router

    Drilldown (on click): Inline Application Detail Panel

    Sourcetype: stream:netflow

6.     Application Details for a Particular Application

    Description: This panel displays a details for particular Application

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Source IP, Source Port, Destination IP, Destination Port, Input Snmpidx, Output Snmpidx

    Drilldown (on click): To raw events

    Sourcetype: stream:netflow

7.     Top 10 Policy Hits

    Description: This panel displays the top 10 Policy Hits with their count

    Chart Type: Tabular View

    Chart Filter: Shared Time Range Picker,Source Router

    Drilldown (on click): Inline Policy Details Panel,

    Sourcetype: stream:netflow

8.     Policy Details for a Particular Policy

    Description: This panel displays a details for particular Policy

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Action, Source IP, Source Port, Destination IP, Destination Port, Input Snmpidx, Output Snmpidx

    Drilldown (on click): To raw events

    Sourcetype: stream:netflow

9.     Total Connection Flows by Host Over Time

    Description: This panel displays a timechart for the top All connections

    Chart Type: Line Chart

    Chart Filter: Shared Time Range Picker, Source Router, Host, Target, Class

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:host:tcp:alert:on

10.  Unblocked connections

    Description: This panel displays a single value count of a total number of unblocked connection

    Chart Type: Single Value

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To panel unblocked connections by hosts

    Sourcetype: cisco:sdwan:unblock:host

11.  Unblocked connections by unblock hosts

    Description: This panel displays a table of unblocked connections by unblocked hosts with their count

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To raw events for selected unblocked host

    Sourcetype: cisco:sdwan:unblock:host

12.  Half opened connections

    Description: This panel displays a single value count of a total number of half opened connection

    Chart Type: Single Value

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To Half opened connections by half opened hosts panel

    Sourcetype: cisco:sdwan:host:tcp:alert:on

13.  Half opened connections by half opened hosts

    Description: This panel displays a table of half opened connections by half opened hosts with their count

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To raw events for selected half opened host

    Sourcetype: cisco:sdwan:host:tcp:alert:on

14.  Blocked connections

    Description: This panel displays a single value count of a total number of blocked connections

    Chart Type: Single Value

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:block:host

15.  Blocked connections by blocked hosts

    Description: This panel displays a table of blocked connections by blocked hosts with their count

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To raw events for selected blocked host

    Sourcetype: cisco:sdwan:host:tcp:alert:on

16.  Dropped ZBFW Flows – ADD THE HIGHLIGHTED TEXT FROM #28- #31 UNDER PANELS

    Description: This panel displays a table of dropped ZBFW flows between source ip and destination ip with their total count

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): Panel for dropped flow details between source ip and destination ip

    Sourcetype: stream:netflow

17.  Dropped ZBFW Flows between Source IP and Destination IP

    Description: This panel displays a table of all the dropped ZBFW flows between source ip and destination ip

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To raw event

    Sourcetype: stream:netflow

18.  Inspected ZBFW Flows

    Description: This panel displays a table of inspected ZBFW flows between source ip and destination ip with their total count

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): Panel for inspected flow details between source ip and destination ip

    Sourcetype: stream:netflow

19.  Inspected ZBFW Flows between Source IP and Destination IP

    Description: This panel displays a table of all the inspected ZBFW flows between source ip and destination ip

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To raw event

    Sourcetype: stream:netflow

XDR Dashboard

Description

Extended detection and response (XDR) delivers visibility into data across networks, clouds, endpoints, and applications while applying analytics and automation to detect, analyze, hunt, and remediate today's and tomorrow's threats.

Screenshot

A screenshot of a computerDescription automatically generated

Panels

The Dashboard should have the below panels:

1.     Number Of Platform Errors

    Description: This panel displays a single value count of a total number of platform errors

    Chart Type: Single Value

    Chart Filter: Shared Time Range Picker, Source Router

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:smart:lic:platform:error

2.     Number Of Engine Write Fails

    Description: This panel displays a single value count of a total number of engine write fail

    Chart Type: Single Valued

    Chart Filter: Shared Time Range Picker, Source Router

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:dmi:cli:engine:write:fail

3.     Alerts On - Today (with 7 days Trend)

    Description: This panel displays a single value count of a total number of Alert on in last 24 hours with last month trend

    Chart Type: Single Value

    Chart Filter: Use Time Picker, Source Router, Target, Class

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:alert:on

4.     Alerts Off - Today (with 7 days Trend)

    Description: This panel displays a single value count of a total number of Alert off in last 24 hours with last month trend

    Chart Type: Single Value

    Chart Filter: Use Time Picker, Source Router, Target, Class

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:alert:off

5.     Session Exceeded Over Time

    Description: This panel displays a timechart for the count of session exceeded in 1d span

    Chart Type: Line Chart

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:sessions:maximum

6.     Top 10 Source IPs

    Description: This panel displays a tabular view of top 10 Source IP and no. of requests

    Chart Type: Tabular View

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:session:audit:trail:start

7.     Top 10 Destination IPs

    Description: This panel displays a tabular view of top 10 Destination IP and no. of requests

    Chart Type: Tabular View

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:session:audit:trail:start

8.     Top 10 Pairs Of Source and Destination IPs

    Description: This panel displays a tabular view of top 10 Source IP and Destination IP combination and no. of requests

    Chart Type: Tabular View

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:session:audit:trail:start

9.     Top 10 Initiator by Traffic

    Description: This panel displays a tabular view of top 10 Source IP and its traffic

    Chart Type: Tabular View

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:session:audit:trail

10.  Top 10 Responder by Traffic

    Description: This panel displays a tabular view of top 10 Destination IP and its traffic

    Chart Type: Tabular View

    Chart Filter: Shared Time Range Picker, Source Router, Target, Class

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:session:audit:trail

Threat Inspection Dashboard

Description

Provide tactical guidance and insights to detect, investigate and respond to the latest threats.

Screenshot

A screenshot of a computerDescription automatically generated

Panels

The Dashboard should have the below panels:

1.     Blocked Connections Over IPS event

    Description: This panel displays pie chart for blocked calls by classification

    Chart Type: Pie Chart

    Chart Filter: Shared Time Range Picker, Source Router

    Drilldown (on click): Inline Classification Details Panel

    Sourcetype: cisco:sdwan:utd:logs

2.     Classification Details for a Particular IPS

    Description: This panel displays a details for particular IPS

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Device IP, Device Name, Action, Source IP, Source Port, Destination IP, Destination Port

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:utd:logs

3.     Malicious Files by Malware

    Description: This panel displays pie chart for Malicious files by malware

    Chart Type: Pie Chart

    Chart Filter: Shared Time Range Picker, Source Router

    Drilldown (on click): Inline Malware Detail Panel

    Sourcetype: cisco:sdwan:utd:logs

4.     Malware Details for a Particular Malware

    Description: This panel displays a details for particular Filetype

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Device IP, Device Name, Action, Source IP, Source Port, Destination IP, Destination Port

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:utd:log

5.     Malicious Files by Type

    Description: This panel displays pie chart for Malicious files by type

    Chart Type: Pie Chart

    Chart Filter: Shared Time Range Picker, Source Router

    Drilldown (on click): Inline Filetype Detail Panel

    Sourcetype: cisco:sdwan:utd:logs

6.     Filetype Detail for a Particular filetype

    Description: This panel displays a details for particular Filetype

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Device IP, Device Name, Action, Source IP, Source Port, Destination IP, Destination Port

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:utd:logs

7.     File Scan Results by Disposition

    Description: This panel displays pie chart for Malicious files by disposition

    Chart Type: Pie Chart

    Chart Filter: Shared Time Range Picker, Source Router

    Drilldown (on click): Inline UTD Amp Disposition Details Panel

    Sourcetype: cisco:sdwan:utd:logs

8.     UTD Amp Disposition Details for a Particular Malware

    Description: This panel displays a details for particular Filetype

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Device IP, Device Name, Action, Source IP, Source Port, Destination IP, Destination Port

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:utd:logs

9.     Malicious Files

    Description: This panel displays table of Malicious files by Filename, Filetype, Malware, UTD AMP Disposition

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:utd:logs

10.  Blocked Connections over category

    Description: This panel displays pie chart for blocked calls by category

    Chart Type: Pie Chart

    Chart Filter: Shared Time Range Picker, Source Router

    Drilldown (on click): Inline Url Details for Category Panel

    Sourcetype: cisco:sdwan:utd:logs

11.  Url Details for Category for a Particular Category

    Description: This panel displays a details for url details with its Reputation for particular category

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router

    Drilldown (on click): Inline url detail panel

    Sourcetype: cisco:sdwan:utd:logs

12.  Url Details for a Particular Url

    Description: This panel displays a details for particular url

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Device IP, Device Name, Action, Source IP, Source Port, Destination IP, Destination Port

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:utd:logs

13.  Blocked Connections over urls

    Description: This panel displays the blocked calls by urls with their count

    Chart Type: Pie chart

    Chart Filter: Shared Time Range Picker, Source Router, URL

    Drilldown (on click): Inline Url Details Panel

    Sourcetype: cisco:sdwan:utd:logs

14.  Url Details for a Particular Url

    Description: This panel displays a details for particular url

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Device IP, Device Name, Action, Source IP, Source Port, Destination IP, Destination Port

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:utd:logs

15.  URL Reputation

    Description: This panel displays the table of the worst reputed urls with their reputation

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, URL

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:utd:logs

16.  Blocked Connections over source

    Description: This panel displays the table of the blocked calls by source with their count

    Chart Type: Pie chart

    Chart Filter: Shared Time Range Picker, Source Router, Source IP

    Drilldown (on click): Inline Source Details Panel

    Sourcetype: cisco:sdwan:utd:logs

17.  Source Details for a Particular Source

    Description: This panel displays a details for particular source

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Device IP, Device Name, Action, Source IP, Source Port, Destination IP, Destination Port

    Drilldown (on click): To raw events

    Sourcetype: cisco:sdwan:utd:logs

Flow Analysis

Description

The dashboard provides information related to "Netflow" data such as top network talkers and top source and destination countries.

Screenshot

A screenshot of a computerDescription automatically generated

Panels

The Dashboard should have the below panels:

1.     Netflow Packets

    Description: This panel displays a single value count of a total number of connection

    Chart Type: Single Valued

    Chart Filter: Shared Time Range Picker

    Drilldown (on click): To raw events

    Sourcetype: stream:netflow

2.     NetFlow Packet Timeline

    Description: This panel displays the line chart netflow records packet

    Chart Type: Line Chart

    Chart Filter: Shared Time Range Picker

    Drilldown (on click): To raw events

    Sourcetype: stream:netflow

3.     Top Source Countries

    Description: This panel displays the top source countries

    Chart Type: Geographical Map

    Chart Filter: Shared Time Range Picker

    Drilldown (on click): N/A

    Sourcetype: stream:netflow

4.     Top Destination Countries

    Description: This panel displays the top destination countries

    Chart Type: Geographical Map

    Chart Filter: Shared Time Range Picker

    Drilldown (on click): N/A

    Sourcetype: stream:netflow

5.     Communications Map between Sources and Destinations

    Description: This panel displays a sankey diagram to visualize packet transfer from source to destination based on protocol

    Chart Type: Sankey Diagram

    Chart Filter: Shared Time Range Picker, Source Router, Protocol, Number Of Links To Chart, Target, Class, Source IPs, Destination IPs

    Drilldown (on click): N/A

    Sourcetype: cisco:sdwan:log:summary

6.     Top Network Talkers

    Description: This panel displays the top network talkers

    Chart Type: Tabular View

    Chart Filter: Shared Time Range Picker

    Drilldown (on click): To raw events

    Sourcetype: stream:netflow

7.     Top 10 Application

    Description: This panel displays the top 10 applications with their count

    Chart Type: Tabular View

    Chart Filter: Shared Time Range Picker,Source Router

    Drilldown (on click): Inline Application Detail Panel

    Sourcetype: stream:netflow

8.     Application Details for a Particular Application

    Description: This panel displays a details for particular Application

    Chart Type: Tabular view

    Chart Filter: Shared Time Range Picker, Source Router, Source IP, Source Port, Destination IP, Destination Port, Input Snmpidx, Output Snmpidx

    Drilldown (on click): To raw events

    Sourcetype: stream:netflow

Custom Searches

Description

The dashboard provides predefined event types that helps in searching data based on its categories.

Screenshot

A screenshot of a computerDescription automatically generated

Panels

The Dashboard contains panel having raw events for the selected filters (i.e. Time, Source Router, Log Types, Custom Search).

Time: Select the time range in which you are looking for the data.

Source Router: Select the appropriate host.

Log Types: Select the type of the logs for which you are looking for.

Custom Search: Search the keywords which are part of the raw events.

Event Threshold Notification

Description

The dashboard provides the user the ability to create Splunk alerts based on the “Keywords” and can set the threshold and the schedule as per the requirements.

Screenshot

A screenshot of a computerDescription automatically generated

Panels

The Dashboard contains a panel that gives details about the alerts that are created by the user.

Name: Name of the alert.

Description: Description for the respective alert.

Keyword: Keyword for which the alert is created.

Threshold: Threshold count for the keyword.

Email: Email of user to send the alert to.

Cron Schedule: Cron at which the alert is executed.

Earliest Time: Earliest time for the data to be considered.

Latest Time: Latest time for the data to be considered.

Monitor Critical IPs

Description

The dashboard provides the user the ability to create Splunk alerts based on the “IPs/CIDR” and can set the threshold and the schedule as per the requirements.

Screenshot

A screenshot of a computerDescription automatically generated

Panels

The Dashboard contains a panel that gives details about the alerts that are created by the user.

Name: Name of the alert.

Description: Description for the respective alert.

IPs/CIDR: IPs/CIDR for which the alert is created.

Threshold: Threshold count for the IPs/CIDR.

Email: Email of user to send the alert to.

Cron Schedule: Cron at which the alert is executed.

Earliest Time: Earliest time for the data to be considered.

Latest Time: Latest time for the data to be considered.

Uninstalling Cisco SD-WAN App and Add-on for Splunk

Disabling the App and Add-on

To disable the App and Add-on, you must be logged into Splunk as an Administrator and follow the steps below.

      Click the App name in the title bar, and then click Manage Apps.

      In the search box, type the name of the app, and then click Search. In the Status column, next to both the App and Add-on, click Disable.

Uninstalling the App and Add-on

Follow the below instructions based on your environment

Uninstall from a Standalone Environment

1.     Disable the App and Add-on from the Splunk user interface as detailed above.

2.     Log into the Splunk machine from the backend and delete the App and Add-on folders. The app and its directory are typically located in $SPLUNK_HOME/etc/apps/cisco-sdwan-app, and add-on and its directory are typically located in $SPLUNK_HOME/etc/apps/ta-sdwan-app

3.     Verify that no local configuration files related to Cisco SDWAN App/Add-on are available in the $SPLUNK_HOME/etc/system and $SPLUNK_HOME/etc/users folders. If the local folder is present, remove it as well.

4.     Restart Splunk.

Uninstall from a Distributed or Clustered Environment (To be Checked)

In a cluster or distributed environment, the Cisco SD-WAN App is installed on all the Search Heads and the Cisco SD-WAN Add-on is installed on Search Heads and Forwarders.

The steps to uninstall the App and Add-on are the same as for Standalone.

1.     To perform any installation or uninstallation step on all the search nodes of a distributed environment, use a deployer manager.

2.     From the deployer machine, go to $SPLUNK_HOME$/etc/shcluster/apps and remove the App and Add-on folders and execute cluster bundle command. Refer.

Troubleshooting

Cisco SD-WAN Add-on for Splunk

      To check the fields extracted for Syslog data by the Cisco SDWAN Add-on for Splunk:

    index=<your_index_name> sourcetype="cisco:sdwan*" in Splunk in verbose mode.

    "cisco:firewall:logs" must be selected as sourcetype while configuring the Syslog input.

      To check the fields extracted for Netflow data by the Cisco SDWAN Add-on for Splunk:

    index=<your_index_name> sourcetype="stream*" in Splunk in verbose mode.

Cisco SD-WAN App for Splunk

      If dashboards are not getting populated or found data discrepancy between the panel search result and drilldown search result:

    Check whether you have correctly configured the index in the cisco_sdwan_index macro.

    Also, you can verify if the data is there in the index by running the search query:

   index="<your_index_name>"

    Try expanding Time Range.

      If in SOC Dashboard "Top 10 Applications" Panel is not getting populated run the savesearch as per the given steps:

    Go to Settings -> Searches, reports, and alerts

    Select "Cisco SD-WAN for Splunk" in the "App" context dropdown and "All" in the "Owner" dropdown.

    Run the "cisco_sdwan_netflow" savedsearch with "All time" time range.

      If in SOC Dashboard "Top 10 Policy Hits" Panel is not getting populated run the savesearch as per the given steps:

    Go to Settings -> Searches, reports, and alerts

    Select "Cisco SD-WAN for Splunk" in the "App" context dropdown and "All" in the "Owner" dropdown.

    Run the "cisco_sdwan_action" and "cisco_sdwan_policy" savedsearches with "All time" time range.

 

 

 

Learn more