Table of Contents | ||||
---|---|---|---|---|
|
...
Overview
Cisco Meraki offers the only solution that provides unified management of mobile devices, Macs, PCs, and the entire network from a centralized dashboard. Enforce device security policies, deploy software and apps, and perform remote, live troubleshooting on thousands of managed devices.
Cisco Meraki products are built from the ground up for cloud management and come out of the box with centralized management, layer 7 device and application visibility, real-time web-based diagnostics, monitoring, reporting, and much, much more.
Data source description
...
Source | Description | Devo data tables |
Meraki organization changelog | Displays changes made in any network within the current Organization since it was created. This includes configuration changes made to all types of devices, not just administrative changes to the Dashboard. Each time a change is made an event in the ChangeLog will be generated. |
|
MX security events | Display security events generated by MX Appliances for each existing network. |
|
Appliance/Switch/Wireless Event Log | Display network events generated by all managed MR/SM/MS/MV devices for each existing network. |
|
Info |
---|
For more info about the Cisco Meraki, visit the Cisco Meraki user guide. |
Working with API credentials
To set up access to the Cisco Meraki API:
...
Verify that you have a valid user account with appropriate permissions by logging into Cisco Meraki.
...
Hover over the toolbar on the right-hand side to open the Dashboard.
...
Go to Organization > Settings.
...
Go to the API Access Dashboard and tick the checkbox Enable access to the Cisco Meraki Dashboard API.
...
Vendor setup
Meraki collector works over the API to retrieve the data, so is needed to enable the access via API Key and generate a Key to allow the collector to get the data following the steps below:
Rw ui steps macro | ||||
---|---|---|---|---|
Log in to your Meraki account
Go to Organization → Settings.
Search API access and ensure that it is checked.
Once you have enabled access to the API, |
...
you need to create the API Key. To do this, click the profile link shown below the checkbox |
...
or go to the User and click My profile.
Search for API Access → API Keys and click on Generate |
...
API Key. |
...
Note |
---|
Cisco Meraki generates a unique set of API keys for each user account. These keys allow your application to authenticate to the Cisco Meraki API without creating a session.
Run the collector
...
|
Run the collector
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
Rw ui tabs macro | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
We use a piece of software called Collector Server to host and manage all our available collectors. If you want us to host this collector for you, get in touch with us and we will guide you through the configuration.
This data collector can be run in any machine that has the Docker service available because it should be executed as a docker container. The following sections explain how to prepare all the required setup for having the data collector running. StructureThe following directory structure should be created for being used when running the Cisco Meraki collector: Code Block | To enable the collector for a customer:
Editing the JSON configuration
Devo certificatesIn Devo, go to Administration → Credentials → X.509 Certificates, download the Certificate, Private key and Chain CA and save them in Editing the config-cisco_meraki.yaml fileIn the config-cisco_meraki.yaml file, replace the
The value chosen for the
This data collector can be run in any machine that has the Docker service available because it should be executed as a docker container. The following sections explain how to prepare all the required setup for having the data collector running. StructureThe following directory structure should be created for being used when running the Cisco Meraki collector:
Devo certificatesIn Devo, go to Administration → Credentials → X.509 Certificates, download the Certificate, Private key and Chain CA and save them in Editing the config-cisco_meraki.yaml fileIn the config-cisco_meraki.yaml file, replace the
Download the Docker imageThe collector should be deployed as a Docker container. Download the Docker image of the collector as a .tgz file by clicking the link in the following table:
Use the following command to add the Docker image to the system:
Once the Docker image is imported, it will show the real name of the Docker image (including version info). Replace " The Docker image can be deployed on the following services: DockerExecute the following command on the root directory
Docker ComposeThe following Docker Compose file can be used to execute the Docker container. It must be created in the
To run the container using docker-compose, execute the following command from the
To run the container using docker-compose, execute the following command from the
|
Activeboards
In Exchange a number of predefined dashboards that make use of the configured collectors can be installed directly in your domain to start working with your data.
Change log
Release | Released on | Release type | Details | Recommendations | ||||||||||||||||||
|
| Bug fixes:
Improvements:
|
| |||||||||||||||||||
|
| Improvements:
Bug fixing:
|
| |||||||||||||||||||
|
| Improvements:
Bug fixing:
|
| |||||||||||||||||||
|
| Improvements:
Bug fixing:
|
| |||||||||||||||||||
|
| Bug fixing:
|
| |||||||||||||||||||
|
| Improvements:
Bug fixing:
|
| |||||||||||||||||||
|
| Improvements:
Bug fixes:
|
| |||||||||||||||||||
|
| Improvements:
Bug fixes:
|
| |||||||||||||||||||
|
| Vulnerabilities mitigation:
|
| |||||||||||||||||||
|
| New features:
Improvements:
Vulnerabilities mitigation:
|
|