Support Center Home

Cisco Meraki Monitoring

LogicMonitor’s out-of-the-box monitoring for Cisco Meraki monitors:

  • Meraki devices on a per-network level using a hybrid API/SNMP data collection approach
  • API usage and device counts on a per-organization level

Setup Requirements

  • LogicMonitor Collector EA 29.1xx or later

API Configurations

You must enable access to the Meraki Dashboard API. In your Meraki environment, navigate to Organization > Settings > Dashboard API access, and select the Enable access to the Cisco Meraki Dashboard API checkbox.

After enabling the API access, navigate to the My Profile page and generate an API key. The API key will be assigned to a property within LogicMonitor. Be sure to copy the API key in a secure location once it is generated.

See Cisco’s Meraki Dashboard API documentation for instructions on enabling the API access and generating an API key.

SNMP Configurations

SNMP v2c or v3 must be enabled on the Meraki Cloud Controller. See Cisco’s SNMP Overview and Configuration documentation for instructions.

Create a Meraki Device Group

From the Resources page, create a Meraki device group and assign it the following properties:

meraki.api.keyMeraki API key (key must be generated and API must be enabled as discussed in previous section)
snmp.versionBecause LogicMonitor is not querying the devices themselves, but rather the Cloud Controller, it is not able to automatically assign the SNMP version to this property as it typically does for other monitoring operations that leverage SNMP. Be sure to manually assign the corresponding SNMP version (either “v2c” or “v3”) to this property. (v2c only) (v3 only)
These values are generated by Meraki and start with “o/”.
Other SNMP credentials
The properties required to establish the remaining SNMP credentials vary depending on the SNMP version being used. For more information, see Defining Authentication Credentials.

For more information on creating device groups, see Adding Device Groups.

Add Resources Into Monitoring

Add your Cisco Meraki hosts into monitoring. You can either use NetScan to automatically add all relevant devices into monitoring (and auto-assign several required device properties), or you can manually add the devices into monitoring.

Adding Resources via NetScan

You can automatically add all Meraki networks, organizations, and a main device via an advanced NetScan. For instructions on creating and running an advanced NetScan, see Creating NetScans.

Ensure the following configurations are in place for the NetScan:

  • Embed the following Groovy script (to reach text box where this script needs to be embedded, select “Upload a script or csv to discover devices” from the Method field’s dropdown menu and select the Embed a Groovy script option from the scripting options that dynamically display).

    Note: Be sure to substitute the INSERT API TOKEN HERE placeholder text located at the top of this script with your actual API token.

 *  © 2007-2021 - LogicMonitor, Inc. All rights reserved.

import com.santaba.agent.util.Settings
import groovy.json.JsonOutput
import groovy.json.JsonSlurper

// Set this variable to meraki API token.
def token = ""

// Optionally, create a list of organizations (e.g. ["1243","2343","3564","4355"])
// Setting this variable will only discover networks on those orgs.
def orgsAllowed = null

collectorCache = null
try {
    collectorCache = this.class.classLoader.loadClass("com.santaba.agent.util.script.ScriptCache").getCache()
catch (ClassNotFoundException ignored) {}
debug = false

orgs = cachedHttpGet(token, "/organizations")

orgs.each { org ->
    def orgId =

    // Filter in only allowed orgs if it's defined.
    if (orgsAllowed != null) {
        if (!orgsAllowed.contains(orgId)) {

    def orgName =
    def networks = []
    def devices = []

    try {
        networks = cachedHttpGet(token, "/organizations/${orgId}/networks")
        devices = cachedHttpGet(token, "/organizations/${orgId}/devices")
    } catch (Exception error) {
            if (debug) println error.message

    networks.each { network ->
        def networkId =

        // Check if this network has any devices and avoid reporting deviceless networks.
        def networkDevices  = devices.findAll{it.networkId == networkId}
        if (networkDevices.size() == 0) {

        def networkName =
        def networkTags = network.tags
        def hostName = "${orgName.replaceAll('\\W', '')}.${networkName.replaceAll('\\W', '')}.invalid"
        def displayName = "Meraki Network: ${networkName}"

        println "${hostName}##${displayName}${orgName}${orgId}##meraki.api.key=${token}${networkId}${networkName}${networkTags}${network.type}"

    // Only add orgs if they have networks.
    if (networks.size() > 0) {
        println "${orgName.replaceAll('\\W', '')}.invalid##Meraki Org: ${orgName}${orgName}${orgId}##meraki.api.key=${token}"

println "${token}"

return 0

def cachedHttpGet(String token, String endpoint, Map args=[:], String serviceUrl="", Integer expirySecs=600) {
    if (collectorCache) {
        def cacheKey = "CiscoMeraki.APICache:${token}-${composeUrl(serviceUrl, endpoint, args)}"

        LMDebugPrint("Trying cache for a recent answer to ${endpoint}")

        def cachedResponse = collectorCache.get(cacheKey)

        if (cachedResponse) {
            LMDebugPrint("Cached response found, returning ${cachedResponse.size()} bytes")
            return (new JsonSlurper()).parseText(cachedResponse)
            LMDebugPrint("No cached response found.")
            Integer retryCount = 0

            while (retryCount < 5) {
                // We are in the lock, lets get the data, update the cache and
                if(_cacheAcquireLock(cacheKey, 30)) {
                    try {
                        expirySecs = expirySecs * 1000 // Convert to ms.
                        cachedResponse = httpGet(token, endpoint, args, serviceUrl)
                        collectorCache.set(cacheKey, JsonOutput.toJson(cachedResponse), expirySecs)

                        return cachedResponse
                    finally {
                else {
                    cachedResponse = collectorCache.get(cacheKey)
                    if (cachedResponse) {
                        return (new JsonSlurper()).parseText(cachedResponse)

                sleep(1000) // Wait for the other thread to finish or time out.

    else {
        return httpGet(token, endpoint, args, serviceUrl)

boolean _cacheAcquireLock(String cacheKey, Integer timeOutSecs) {
    String lockKey = "${cacheKey}:Lock"
    String lockValue = collectorCache.get(lockKey)
    def now = (new Date()).getTime()
    if (lockValue == null) {
        lockValue = (now + timeOutSecs).toString()
        collectorCache.set(lockKey, lockValue, (timeOutSecs * 1000))
        return true
    else {
        return false

def _cacheReleaseLock(String cacheKey) {
    String lockKey = "${cacheKey}:Lock"

def httpGet(token, endpoint, Map args=[:], serviceUrl="") {
    def retryCount = 0

    while (true) {
        if (retryCount > 10) throw new Exception("Unable to get ${endpoint} after ${retryCount} retries, giving up")

        def request = rawHttpGet(token, endpoint, args, serviceUrl)
        def responseCode = request.getResponseCode()
        LMDebugPrint("Status code: ${responseCode}")

        if (responseCode == 200) {
            String content = request.content.text
            LMDebugPrint("Content length: ${content.size()} bytes")
            def payload = new JsonSlurper().parseText(content)

            String links = request.getHeaderField('link')
            if (links) {
                /* Unpack a header in this form:
                <>; rel=first,
                <>; rel=prev,
                <>; rel=last
                links.split(',').each { link ->
                    def rel = link.split(';')[1].split('=')[1]

                    if (rel == 'next') {
                        def nextEndpoint = link.split(';')[0].strip()[1..-2]
                        sleep(200) // Sleep 1/6th of a second to avoid triggering the throttling.
                        payload += httpGet(token, "", [:], nextEndpoint)

            return payload
        else if (responseCode == 429) {
            def retryIn = request.getHeaderField('Retry-After')

            if (retryIn == null) retryIn = 5
            else retryIn = retryIn.toInteger()

            LMDebugPrint("Sleeping and retrying in ${retryIn} ms after recieving a 429 response")
            sleep(retryIn * 1000)
        else {
            throw new Exception("Server return HTTP code ${responseCode} from ${endpoint}")

static String composeUrl(String serviceUrl, String endpoint, Map args) {
    def url = serviceUrl+endpoint

    if (args) {
        def encodedArgs = []
        args.each{ k,v ->
            encodedArgs << "${k}=${URLEncoder.encode(v.toString(), "UTF-8")}"
        url += "?${encodedArgs.join('&')}"
    return url

def rawHttpGet(String token, String endpoint, Map args=[:],serviceUrl="") {
    def headers = ["X-Cisco-Meraki-API-Key": token.toString(),
                   "Accept": "application/json"]

    url = composeUrl(serviceUrl, endpoint, args)

    def request = null
    def proxyInfo = getProxyInfo()

    if (proxyInfo) {
        request = url.toURL().openConnection(proxyInfo)
    else {
        request = url.toURL().openConnection()

    headers.each { request.addRequestProperty(it.key, it.value)}
    LMDebugPrint("GET ${url}")

    return request

def getProxyInfo() {
    if (Settings.getSetting("proxy.enable").toBoolean()) {
        return new Proxy(Proxy.Type.HTTP,
                new InetSocketAddress(Settings.getSetting(""), Settings.getSetting("proxy.port")?.toInteger()))

    return null

def LMDebugPrint(message) {
    if (debug) {
  • In the Default Group field (which displays after the script text box), specify the Cisco Meraki device group you previously created.
  • Note: Ensure your SNMP credentials and Meraki key are set as properties on this group before running the NetScan. For more information, see Create a Meraki Device Group

    Manually Add Devices into Monitoring

    You can manually add your Meraki devices into monitoring. There are three types of Meraki devices that can be added:

    • Network device
    • Organization device
    • Meraki API device

    When adding these devices, assign them to the device group you created previously. For instructions on manually adding resources into monitoring, see Adding Devices.

    Network Device

    The network device reports per-device and per-interface data for a specific network.

    • The network device’s hostname (as entered into the IP Address/DNS name field) must end with “.invalid”.
    • Network-specific properties must be assigned to the device, as discussed in the Assign Properties to Resources section of this support article.

    Organization Device

    The organization device reports per-network device counts and API Usage statistics for a specific organization.

    • The organization device’s hostname (as entered into the IP Address/DNS name field) must end with “.invalid”.
    • Organization-specific properties must be assigned to the device, as discussed in the Assign Properties to Resources section of this support article.

    Meraki API Device

    The Meraki API device reports per-network device counts and API Usage statistics for all organizations on the account.

    • The Meraki API device’s hostname (as entered into the IP Address/DNS name field) must be “”.

    Assign Properties to Resources

    In addition to the SNMP and meraki.api.key properties (which we recommend assigning at the group level, as discussed in the Create a Meraki Device Group section of this support article), the following properties must also be set on the Meraki devices within LogicMonitor.

    Note: If you added resources into monitoring via NetScan, these properties will already be assigned. If you added resources into monitoring manually, you’ll need to manually set these properties. For instructions on manually setting properties, see Resource and Instance Properties.

    PropertyDescription this property on organization devices only. For a list of organizations and their respective IDs, visit!get-organizations.* this property on network devices only. For a list of networks and their respective IDs, visit!get-organization-networks. Be sure to enter the ​organization ID for the organization you wish to see networks on.*

    *Ensure that you set the X-Cisco-Meraki-API-Key header to your API key when running any API requests from

    Multiple Organizations

    Some Meraki configurations can encompass multiple organizations with different SNMP credentials. In such instances, resources belonging to an organization can be grouped by creating a dynamic group for each organization and assigning the specific properties there.

    Importing LogicModules

    From the LogicMonitor public repository, import all Cisco Meraki LogicModules, which are listed in the LogicModules in Package section of this support article. If these LogicModules are already present, ensure you have the most recent versions.

    Once the LogicModules are imported (assuming all previous setup requirements have been met), the suite of Meraki DataSources will automatically begin collecting data.

    Migration from Legacy DataSources

    In June of 2020, LogicMonitor released a new suite of Cisco Meraki DataSources. The new DataSources offer several advantages, including expanded monitoring coverage and improved efficiency for future scalability and support.

    The release of these new DataSources serves to deprecate the following legacy Meraki DataSources:

    • Meraki_CloudController_DeviceInventory
    • Meraki_MR_Interfaces
    • Meraki_MR_Stats
    • Meraki_MS_Stats
    • Meraki_MX_Interfaces
    • Meraki_MX_Stats
    • Meraki_Z_Interfaces
    • Meraki_Z_Stats

    If you are currently monitoring Meraki devices using any of these legacy DataSources, you will not experience data loss upon importing the new DataSources. This is because DataSource names have been changed to eliminate module overwriting.

    However, you will collect duplicate data and receive duplicate alerts for as long as both sets of DataSources are active. For this reason, we recommend that you disable the above-listed DataSources after importing the new set of DataSources and confirming that they are working as intended in your environment.

    When a DataSource is disabled, it stops querying the host and generating alerts, but maintains all historical data. At some point in time, you may want to delete the legacy DataSources altogether, but consider this move carefully as all historical data will be lost upon deletion. For more information on disabling DataSources, see Disabling Monitoring for a DataSource or Instance.

    LogicModules in Package

    LogicMonitor’s package for Cisco Meraki consists of the following LogicModules. For full coverage, please ensure that all of these LogicModules are imported into your LogicMonitor platform.

    addCategory_Meraki_APIPropertySourceIdentifies if the host is configured for Meraki API access, adds various system auto properties and adds the value of “MerakiAPIOrg”, as well as “NoPing” to the system.categories property.
    Cisco_Meraki_SwitchesDataSourceMonitors Meraki Switch client connections and operating status.
    Note: Currently displays the switch serial number instead of the switch name.
    Cisco_Meraki_Switch_InterfacesDataSourceMonitors Meraki Switch interface data throughput and packet transmission on a per-network level.
    Note: Currently displays the switch serial number instead of the switch name.
    Cisco_Meraki_SecurityAppliancesDataSourceMonitors Meraki Security Appliance client connections and operating status.
    Cisco_Meraki_SecurityAppliance_InterfacesDataSourceMonitors Meraki Security Appliance interface data throughput and packet transmission on a per-network level.
    Cisco_Meraki_LicensingDataSourceReports licensing status of a given organization.
    Cisco_Meraki_UplinkLossAndLatencyDataSourceReturns the uplink loss and latency for every MX in the organization.
    Cisco_Meraki_UplinkApplianceStatusDataSourceLists the uplink status of every Meraki MX and Z series appliances in the organization.
    Cisco_Meraki_OrgDeviceCountDataSourceCount of Meraki devices per organization.
    Cisco_Meraki_DeviceCountDataSourceCount of Meraki devices on a per-network level as well as a total count.
    Cisco_Meraki_APIUsageDataSourceCounts Meraki API usage on a per-org basis.
    Cisco_Meraki_GatewaysDataSourceMonitors Meraki Teleworker Gateway client connections and operating status.
    Cisco_Meraki_Gateway_InterfacesDataSourceMonitors Meraki Teleworker Gateway interface data throughput and packet transmission on a per-network level.
    Cisco_Meraki_AccessPointsDataSourceMonitors Meraki Access Point client connections and operating status.
    Note: Currently displays the access point serial number instead of the access point name.
    Cisco_Meraki_AccessPoint_InterfacesDataSourceMonitors Meraki Access Point interface data throughput and packet transmission on a per-network level.
    Note: Currently displays the access point serial number instead of the access point name.

    When setting static datapoint thresholds on the various metrics tracked by this package’s DataSources, LogicMonitor follows the technology owner’s best practice KPI recommendations. If necessary, we encourage you to adjust these predefined thresholds to meet the unique needs of your environment. For more information on tuning datapoint thresholds, see Tuning Static Thresholds for Datapoints.

    In This Article