Skip to content

Conversation

@brijesh-elastic
Copy link
Collaborator

Proposed commit message

cisco_meraki: Fix the parsing of connecting and reconnecting events for anyconnect_vpn_connect and client_vpn_connect. 

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.
  • I have verified that any added dashboard complies with Kibana's Dashboard good practices

How to test this PR locally

  • Clone integrations repo.
  • Install elastic package locally.
  • Start elastic stack using elastic-package.
  • Move to integrations/packages/cisco_meraki directory.
  • Run the following command to run tests.

elastic-package test

Related issues

@brijesh-elastic brijesh-elastic self-assigned this Jun 16, 2025
@brijesh-elastic brijesh-elastic requested a review from a team as a code owner June 16, 2025 16:03
@brijesh-elastic brijesh-elastic added Integration:cisco_meraki Cisco Meraki bugfix Pull request that fixes a bug issue Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations] Team:Sit-Crest Crest developers on the Security Integrations team [elastic/sit-crest-contractors] labels Jun 16, 2025
@elasticmachine
Copy link

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

@elastic-vault-github-plugin-prod
Copy link

elastic-vault-github-plugin-prod bot commented Jun 16, 2025

🚀 Benchmarks report

Package cisco_meraki 👍(0) 💚(1) 💔(1)

Expand to view
Data stream Previous EPS New EPS Diff (%) Result
events 500000 333333.33 -166666.67 (-33.33%) 💔

To see the full report comment with /test benchmark fullreport

@brijesh-elastic brijesh-elastic requested a review from efd6 June 17, 2025 05:27
@kcreddy
Copy link
Contributor

kcreddy commented Jun 17, 2025

/test

@kcreddy
Copy link
Contributor

kcreddy commented Jun 17, 2025

@brijesh-elastic, this doesn't seem to be an issue with CI. I was able to get similar output as CI locally. Please check.

diff --git a/packages/cisco_meraki/data_stream/log/_dev/test/pipeline/test-events.log-expected.json b/packages/cisco_meraki/data_stream/log/_dev/test/pipeline/test-events.log-expected.json index 95c5c74b29..d36643f01f 100644 --- a/packages/cisco_meraki/data_stream/log/_dev/test/pipeline/test-events.log-expected.json +++ b/packages/cisco_meraki/data_stream/log/_dev/test/pipeline/test-events.log-expected.json @@ -553,12 +553,20 @@ "observer": { "hostname": "MX_device_4" }, + "related": { + "user": [ + "user", + "user@example.com" + ] + }, "tags": [ "forwarded", "preserve_original_event" ], "user": { - "name": "user@example.com" + "domain": "example.com", + "email": "user@example.com", + "name": "user" } }, { @@ -1728,6 +1736,11 @@ "observer": { "hostname": "TCP9001" }, + "related": { + "user": [ + "user.name3" + ] + }, "tags": [ "forwarded", "preserve_original_event" diff --git a/packages/cisco_meraki/data_stream/log/_dev/test/pipeline/test-urls.log-expected.json b/packages/cisco_meraki/data_stream/log/_dev/test/pipeline/test-urls.log-expected.json index c6e3ec0610..b42049f515 100644 --- a/packages/cisco_meraki/data_stream/log/_dev/test/pipeline/test-urls.log-expected.json +++ b/packages/cisco_meraki/data_stream/log/_dev/test/pipeline/test-urls.log-expected.json @@ -228,7 +228,7 @@ "name": "Windows", "version": "10" }, - "version": "108.0" + "version": "108.0." } }, {
@elasticmachine
Copy link

💚 Build Succeeded

History

cc @brijesh-elastic

@efd6
Copy link
Contributor

efd6 commented Jun 18, 2025

This is a stack version issue; it's important to run the test expectation generation with the same stack version as is specified by the package's manifest kibana.version.

@brijesh-elastic
Copy link
Collaborator Author

This is a stack version issue; it's important to run the test expectation generation with the same stack version as is specified by the package's manifest kibana.version.

Thanks @efd6, Resolved in 579e558

Comment on lines +542 to +547
"type": [
"info",
"access",
"allowed",
"start"
]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why do the event.types (and event.categorys) differ between the client_vpn_connect and the anyconnect_vpn_connect cases?

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

by default, we're adding network in event.category and info in event.type (see here)
and for client_vpn_connect subtype, event categorization is performed again here.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Probably worth a follow-up issue. Not for now.

Copy link
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

sure.

Copy link
Contributor

@efd6 efd6 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks

@efd6 efd6 merged commit f863e41 into elastic:main Jun 19, 2025
7 checks passed
@elastic-vault-github-plugin-prod

Package cisco_meraki - 1.29.1 containing this change is available at https://epr.elastic.co/package/cisco_meraki/1.29.1/

shmsr pushed a commit to shmsr/integrations that referenced this pull request Jun 30, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

bugfix Pull request that fixes a bug issue Integration:cisco_meraki Cisco Meraki Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations] Team:Sit-Crest Crest developers on the Security Integrations team [elastic/sit-crest-contractors]

4 participants