Table of Contents | ||||
---|---|---|---|---|
|
...
Overview
Cisco Meraki offers the only solution that provides unified management of mobile devices, Macs, PCs, and the entire network from a centralized dashboard. Enforce device security policies, deploy software and apps, and perform remote, live troubleshooting on thousands of managed devices.
Cisco Meraki products are built from the ground up for cloud management and come out of the box with centralized management, layer 7 device and application visibility, real-time web-based diagnostics, monitoring, reporting, and much, much more.
Data source description
Source | Description | Devo data tables |
Meraki organization changelog | Displays changes made in any network within the current Organization since it was created. This includes configuration changes made to all types of devices, not just administrative changes to the Dashboard. Each time a change is made an event in the ChangeLog will be generated. |
|
MX security events | Display security events generated by MX Appliances for each existing network. |
|
Appliance/Switch/Wireless Event Log | Display network events generated by all managed MR/SM/MS/MV devices for each existing network. | |
Info |
---|
For more info about the Cisco Meraki, visit the Cisco Meraki user guide. |
...
Vendor setup
Meraki collector works over the API to retrieve the data, so is needed to enable the access via API Key and generate a Key to allow the collector to get the data following the steps below:
Rw ui steps macro | ||
---|---|---|
Log in to your Meraki account
Go to Organization → Settings. |
...
Go to the API Access Dashboard and tick the checkbox Enable access to the Cisco Meraki Dashboard API.
...
Search API access and ensure that it is checked.
Once you have enabled access to the API, |
...
you need to create the API Key. To do this, click the profile link shown below the checkbox |
...
or go to the User and click My profile.
Search for API Access → API Keys and click on Generate |
...
API Key. |
...
Note |
---|
|
...
v1.3.4
...
<any_directory> └── devo-collectors/ └── cisco_meraki/ ├── certs/ │ ├── chain.crtTo enable the collector for a customer:
In the Collector Server GUI, access the domain in which you want this instance to be created
Click Add Collector and find the one you wish to add.
In the Version field, select the latest value.
In the Collector Name field, set the value you prefer (this name must be unique inside the same Collector Server domain).
In the sending method select Direct Send. Direct Send configuration is optional for collectors that create
Table
events, but mandatory for those that createLookups
.In the Parameters section, establish the Collector Parameters as follows below:
Editing the JSON configuration
Rw ui tabs macro | ||||||||
---|---|---|---|---|---|---|---|---|
We use a piece of software called Collector Server to host and manage all our available collectors. If you want us to host this collector for you, get in touch with us and we will guide you through the configuration.
This data collector can be run in any machine that has the Docker service available because it should be executed as a docker container. The following sections explain how to prepare all the required setup for having the data collector running. StructureThe following directory structure should be created for being used when running the Cisco Meraki collector: | ||||||||
Code Block |
Code Block |
---|
{ "cisco_meraki": { "id": "<short_unique_identifier>", "enabled": true, "requests_per_second": 5, "services": { │ "network-events": { ├── <your_domain>.key │"api_key": "<api_key>", └── <your_domain>.crt"start_time": "2021-01-01T00:00:00.000000Z" }, └── config/ "security-events": { └── config-cisco_meraki.yaml |
Devo certificates
In Devo, go to Administration → Credentials → X.509 Certificates, download the Certificate, Private key and Chain CA and save them in <any directory>/devo-collectors/cisco_meraki/certs
. Learn more about security credentials in Devo here.
Editing the config-cisco_meraki.yaml file
In the config-cisco_meraki.yaml file, replace the <short_unique_identifier>
, <api_key>
values and enter the ones that retrieved in the previous steps. In the <short_unique_identifier>
placeholder, enter the chosen value.
Code Block |
---|
globals: debug: false "api_key": "<api_key>", "start_time": "2021-01-01T00:00:00.000000Z" }, "changelog": { "api_key": "<api_key>", "start_time": "2021-01-01T00:00:00.000000Z" } } } } |
Info |
---|
Replace the placeholders |
The value chosen for the id
field will be used internally for having independent persistence areas.
Rw tab | ||
---|---|---|
|
This data collector can be run in any machine that has the Docker service available because it should be executed as a docker container. The following sections explain how to prepare all the required setup for having the data collector running.
Structure
The following directory structure should be created for being used when running the Cisco Meraki collector:
Code Block |
---|
<any_directory> └── devo-collectors/ └── cisco_meraki/ ├── certs/ │ ├── chain.crt # File system persistence ON│ id:├── not<your_useddomain>.key name: cisco_meraki persistence: │ └── <your_domain>.crt └── config/ # Directory where the persistence will be saved in case of using filesystem type: filesystem config: directory_name: state # Cloud Devo config EU (for US use us.elb.relay.logtrust.net) outputs: devo_1: type: devo_platform config: address: eu.elb.relay.logtrust.net └── config-cisco_meraki.yaml |
Devo certificates
In Devo, go to Administration → Credentials → X.509 Certificates, download the Certificate, Private key and Chain CA and save them in <any directory>/devo-collectors/cisco_meraki/certs
. Learn more about security credentials in Devo here.
Editing the config-cisco_meraki.yaml file
In the config-cisco_meraki.yaml file, replace the <short_unique_identifier>
, <api_key>
values and enter the ones that retrieved in the previous steps. In the <short_unique_identifier>
placeholder, enter the chosen value.
Code Block |
---|
globals: debug: false id: not_used name: cisco_meraki persistence: type: filesystem port: 443 # File system type:persistence SSLON chainconfig: chain.crt certdirectory_name: <your_domain>.crtstate key: <your_domain>.key inputs: cisco_meraki: id: <short_unique_identifier> # Directory where the persistence will be saved in case of using filesystem outputs: devo_1: # The value of this field will be used internally for having independent persistence areas enabled: true debug: true requests_per_second: 5 # Cloud Devo config EU (for US use collector-us.devo.io) type: devo_platform config: address: eu.elb.relay.logtrust.net # Settingport: up443 requests per second. 5 recommended. type: SSL services: # Services available for this collector are Alerts, Secure Score and Secure score control profilechain: chain.crt cert: <your_domain>.crt network-eventskey: <your_domain>.key inputs: cisco_meraki: id: api_key: '<api_key>'<short_unique_identifier> # The value of this field will be used internally for having independent persistence areas #enabled: APItrue Key obtained in the Meraki profile requests_per_second: 5 start_time: '2021-01-01T00:00:00.000000Z' # CollectorSetup Initialhow time.many request API por second security_events: services: api_key: '<api_key>' # Services available for this collector are #Alerts, APISecure KeyScore obtainedand inSecure thescore Merakicontrol profile network-events: start_time api_key: '2021-01-01T00:00:00.000000Z'<api_key>' # Collector Initial time. # API Key obtained in changelog:the Meraki profile api_key: '<api_key>' # API Key obtained in the Meraki profile start_time: '2021-01-01T00:00:00.000000Z' # Collector Initial time. security-events: # Collector Initial time. |
Note |
---|
The “start_time” fields must have the following format: Alerts “start_time” format: 0000-00-00T00:00:00.000Z |
Note |
---|
The Security-events Service may generate error logs if you do not have an MX appliance. |
Download the Docker image
The collector should be deployed as a Docker container. Download the Docker image of the collector as a .tgz file by clicking the link in the following table:
Collector Docker image
SHA-256 hash
collector-cisco-meraki-docker-image-1.3.6.tgz
a915ba1708713d6e3022f8e63e98ca78099ec93275dbb649495e4c4c3d420a2c
Use the following command to add the Docker image to the system:
Code Block |
---|
gunzip -c collector-cisco-meraki-docker-image-<version>.tgz | docker load |
Once the Docker image is imported, it will show the real name of the Docker image (including version info). Replace "<version>
" with a proper value.
The Docker image can be deployed on the following services:
Docker
Execute the following command on the root directory <any_directory>/devo-collectors/cisco_meraki/
Code Block |
---|
docker run \
--name collector-cisco_meraki \
--volume $PWD/certs:/devo-collector/cisco_meraki/certs \
--volume $PWD/config:/devo-collector/cisco_meraki/config \
--volume $PWD/state:/devo-collector/cisco_meraki/state \
--env CONFIG_FILE=config-cisco_meraki.yaml \
--rm -it docker.devo.internal/collector/meraki_collector:<version> |
Note |
---|
Replace |
Docker Compose
The following Docker Compose file can be used to execute the Docker container. It must be created in the <any_directory>/devo-collectors/cisco_meraki/
directory.
Code Block |
---|
version: '3'
services:
collector-cisco_meraki:
build:
context: .
dockerfile: Dockerfile
image: docker.devo.internal/collector/meraki_collector:${IMAGE_VERSION:-latest}
container_name: collector-cisco_meraki
volumes:
- ./certs:/devo-collector/cisco_meraki/certs
- ./config:/devo-collector/cisco_meraki/config
- ./state:/devo-collector/cisco_meraki/state
environment:
- CONFIG_FILE=${CONFIG_FILE:-config-cisco_meraki.yaml} |
To run the container using docker-compose, execute the following command from the <any_directory>/devo-collectors/cisco_meraki/
directory:
Code Block |
---|
IMAGE_VERSION=<version> docker-compose up -d |
Note |
---|
Replace |
Change log for 1.x.x
...
Release
...
Released on
...
Release type
...
Details
...
Recommendations
...
v1.3.0
...
...
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
Status | ||||
---|---|---|---|---|
|
...
New features:
The resilience has been improved with a new feature that restart the collector when the Devo connections is lost and it cannot be recovered.
Improvements:
The underlay IFC SDK has been updated to v1.1.3.
Vulnerabilities mitigation:
All
critical
andhigh
vulnerabilities have been mitigated.
...
Upgrade
...
v1.3.2
...
...
Status | ||||
---|---|---|---|---|
|
...
Vulnerabilities mitigation:
All
critical
andhigh
vulnerabilities have been mitigated.
...
Upgrade
Download the Docker imageThe collector should be deployed as a Docker container. Download the Docker image of the collector as a .tgz file by clicking the link in the following table:
Use the following command to add the Docker image to the system:
Once the Docker image is imported, it will show the real name of the Docker image (including version info). Replace " The Docker image can be deployed on the following services: DockerExecute the following command on the root directory
Docker ComposeThe following Docker Compose file can be used to execute the Docker container. It must be created in the
To run the container using docker-compose, execute the following command from the
|
Activeboards
In Exchange a number of predefined dashboards that make use of the configured collectors can be installed directly in your domain to start working with your data.
Change log
Release | Released on | Release type | Details | Recommendations | ||||||||||||
|
| Bug fixes:
Improvements:
|
| |||||||||||||
|
| Improvements:
Bug fixing:
|
| |||||||||||||
|
| Improvements:
Bug fixing:
|
| |||||||||||||
|
| Improvements:
Bug fixing:
|
| |||||||||||||
|
| Bug fixing:
|
| |||||||||||||
|
| Improvements:
Bug fixing:
|
| |||||||||||||
|
| Improvements: |
Bug fixes: |
|
|
|
|
| Improvements: |
Bug fixes: |
|
|
|
|
|
Improvements:
The number of debug traces has been increased to provide better visibility when troubleshooting.
The
network_security_events
(MX) service has been enhanced with new logic that avoids requesting MX events from networks without MX appliances. This reduces the number of unnecessary API requests to Meraki that were returning 400 HTTP CODE.Meraki Python package has been upgraded from
v1.18.2
tov1.22.1
The events are sent to Devo in batches, increasing the performance.
Bug fixing:
Fixed a bug where the data extraction services via
network_event_log
andnetwork_security_events
stopped pulling events after retrieving the first page of 1,000 events. This behavior was causing some delay in the ingest in networks with a high volume of events.Fixed how persistence of the
network_security_events
service is handled and it now stores a unique save point for each available network instead of one for all networks.Fixed a bug where events were being sent to Devo without proper ordering. Now all events are ordered from the origin by the API.
Recommended version
| Vulnerabilities mitigation:
|
| ||||||||||||||||||||
|
| New features:
Improvements:
Vulnerabilities mitigation:
|
|