Skip to content

Conversation

@efd6
Copy link
Contributor

@efd6 efd6 commented Nov 22, 2024

Proposed commit message

The current instructions state that the Jamf webhook should be configured with a JSON object withe the auth header name in "Authorization" and the auth token in "Token". According to Jamf, this is not correct. The headers are apparently constructed from the object such that the key is the header name and the value is the header value. Reflect this in the instructions.

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.
  • I have verified that any added dashboard complies with Kibana's Dashboard good practices

Author's Checklist

  • [ ]

How to test this PR locally

Related issues

Screenshots

@efd6 efd6 added bugfix Pull request that fixes a bug issue Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations] Integration:jamf_pro Jamf Pro labels Nov 22, 2024
@efd6 efd6 self-assigned this Nov 22, 2024
@elastic-vault-github-plugin-prod

🚀 Benchmarks report

Package jamf_pro 👍(0) 💚(1) 💔(1)

Expand to view
Data stream Previous EPS New EPS Diff (%) Result
inventory 6666.67 5319.15 -1347.52 (-20.21%) 💔

To see the full report comment with /test benchmark fullreport

@elasticmachine
Copy link

💚 Build Succeeded

cc @efd6

@efd6 efd6 marked this pull request as ready for review November 22, 2024 01:18
@efd6 efd6 requested a review from a team as a code owner November 22, 2024 01:18
@elasticmachine
Copy link

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

Copy link
Contributor

@kcreddy kcreddy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.
The jamf documentation on webhooks states otherwise, but I see same issue being reported in few places and the user got it working with this updated setup in #11759 (comment)

@efd6
Copy link
Contributor Author

efd6 commented Nov 22, 2024

The Jamf documentation is ambiguous, rather than contradictory to this change.

@efd6 efd6 merged commit b22ea4e into elastic:main Nov 22, 2024
5 checks passed
@elastic-vault-github-plugin-prod

Package jamf_pro - 0.1.2 containing this change is available at https://epr.elastic.co/package/jamf_pro/0.1.2/

harnish-crest-data pushed a commit to chavdaharnish/integrations that referenced this pull request Feb 4, 2025
…lastic#11819) The current instructions state that the Jamf webhook should be configured with a JSON object withe the auth header name in "Authorization" and the auth token in "Token". According to Jamf, this is not correct. The headers are apparently constructed from the object such that the key is the header name and the value is the header value. Reflect this in the instructions.
harnish-crest-data pushed a commit to chavdaharnish/integrations that referenced this pull request Feb 5, 2025
…lastic#11819) The current instructions state that the Jamf webhook should be configured with a JSON object withe the auth header name in "Authorization" and the auth token in "Token". According to Jamf, this is not correct. The headers are apparently constructed from the object such that the key is the header name and the value is the header value. Reflect this in the instructions.
@efd6 efd6 deleted the 11759-jamf_pro branch February 5, 2025 22:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

bugfix Pull request that fixes a bug issue Integration:jamf_pro Jamf Pro Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations]

3 participants