We would like to configure a restrictive alarm configuration for the Meraki plugin. The single alarm type needed to be restricted is ssid_spoofing_detected. How to apply an filter so that only events that matches "ssid_spoofing_detected" are generated?
Release : 22.2
You can configure the plug-in to filter Meraki networks, organizations, and events.
Follow these steps:
1.Set the value for the APPLY_FILTER property to true in the plug-in configuration.
Stop the application server by issuing the following command:
2. Systemctl stop Wildfly
3. Go to <VNA_home>/collector/<Meraki_Engine_UUID>/repository/work/FilterConfiguration.json filter configuration file, and then update the values for the following properties:
"filterEvents": true and "filterType": "whitelist", and ssid_spooling_detected is added to the eventsTypesList
See below:
"eventsFilter": {
"filterEvents": true,
"filterType": "whitelist",
"eventTypesList": [
"ssid_spoofing_detected",
4. Systemctl start Wildfly