Cisco CDR Reporting & Analytics | Installation Notes
The Cisco CDR app contains a simple facility to extract device types based on regex matches against the device names. Many of the ones we ship will work out of the box, however most likely you will also have one or more device types that don’t match. This page will tell you how to customize those extractions so as to get all, or nearly all, of these populating.
Examples: The most well-known example is the “SEP” prefix on hardphone devicenames. This is what the app uses to assign “orig_device_type”, “dest_device_type” to “hardphone”. Another example is the common (but not universal) prefix “CSF” for jabber devices.
Note: it’s tempting to call these “extractions” since they are really very simple. However, that term implies a slightly different config in the Splunk world, and these are called “transforms.” So, I’m using that nomenclature here.
Let’s say that our default extraction for IP Communicator devices is wrong.
If you get an error that “You do not have permissions to edit this configuration” you’ll have to ask for help from your Splunk admins.
Note that all of these extractions are in pairs: one for the “orig” side, and one for the “dest” side.
This takes two steps. For part 1 we “clone” an existing pair, change their permissions and edit them to match the new requirements.
Pick a simple one to clone like “cisco-cdr-destsoftphone” and “cisco-cdr-origsoftphone”:
After you’ve cloned them you’ll be returned to the “Field Transformations” page.
Important step to change permissions -
If you do not see those options or cannot set them, you should stop here and contact your Splunk admins for help.
Once you’ve changed permissions, find each one again and —
Proceed to part 2 below to make this new extraction show up.
This step makes the extraction we just built run automatically so that your new device types show up.
If you have any comments at all about the documentation, please send them to docs@sideviewapps.com.