Latest version: 1.1

Supporting AXL Addon for Cisco CDR Reporting and Analytics

With this app configured, you will get a wealth of new fields from usernames to exact device model names   Next »
If you want to browse and drill down, Browse Devices and Device Detail views have it all too.   Next »

App Details

Latest version: 1.1
Last updated: December 11th, 2020
First released: June 10th, 2019
Splunk compatibility: 7.0 - 8.X
CIM compliance: N/A

This app is designed to be used with Sideview’s App “Cisco CDR Reporting and Analytics”, and it essentially gives the Cisco CDR app the ability to talk to CallManager itself over Cisco’s AXL API.

The main use case of this app initially, is to populate the “devices” lookup within the Cisco CDR Reporting and Analytics app, and to keep that lookup up-to-date by periodically refreshing the data from AXL. This gives you a wealth of extra field names that are not present in the raw CDR and CMR data.

This includes

  • the exact model name of each device,
  • the username, full name, email address and department of any user associated with each device.
  • The name of the calling search space, the protocol and the security profile associated with the device.

What this gets you — some examples
The device_type field in the Cisco CDR app allows you to do cool things like track hardphone vs softphone utilization. With this add-on you can extend that analysis to the exact models of hardphones, or the exact models of video devices.

The “groups” lookup within the Cisco CDR App allows you to do lots of very valuable reporting about specific people and departments. However since its mapping is only from extension to the person, it can be thrown off by certain callflow, including common huntgroup configurations. With this app in place, and the devices lookup being populated nightly, you get a far stronger link from the actual device name, to the current canonical AXL fields about that device.

Interested in keeping an eye on devicePool and overlaps with “site” as you’ve defined it in the Sites lookup?

Interested in devices with a particular securityProfile trying to do… strange things?

Trying to just track down whether there’s widespread misconfiguration in how phones are assigned to users?

And essentially this is one application of the AXL API – using it to get via AXL and SQL, a comprehensive snapshot of all phones. There are over 1000 other methods in the AXL API. Contact us for more details.