Skip to content

Conversation

@jrmolin
Copy link
Contributor

@jrmolin jrmolin commented Nov 6, 2025

Proposed commit message

[cisco_ftd] update documentation with LLM

  • create a knowledge base to enforce known-good information
  • use an LLM and examples to produce new documentation that follows the template

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.
  • I have verified that any added dashboard complies with Kibana's Dashboard good practices

Author's Checklist

  • [ ]

How to test this PR locally

Related issues

Screenshots

localhost_5601_app_integrations_detail_cisco_ftd-3 13 0_overview

@jrmolin jrmolin added the Integration:cisco_ftd Cisco FTD label Nov 6, 2025
@andrewkroh andrewkroh added the documentation Improvements or additions to documentation. Applied to PRs that modify *.md files. label Nov 6, 2025
@jrmolin jrmolin marked this pull request as ready for review November 7, 2025 15:14
@jrmolin jrmolin requested a review from a team as a code owner November 7, 2025 15:14
@elastic-vault-github-plugin-prod
Copy link

elastic-vault-github-plugin-prod bot commented Nov 7, 2025

🚀 Benchmarks report

Package cisco_ftd 👍(0) 💚(0) 💔(1)

Expand to view
Data stream Previous EPS New EPS Diff (%) Result
log 1013.17 713.78 -299.39 (-29.55%) 💔

To see the full report comment with /test benchmark fullreport

@andrewkroh andrewkroh added the Team:Integration-Experience Security Integrations Integration Experience [elastic/integration-experience] label Nov 7, 2025
@elasticmachine
Copy link

Pinging @elastic/integration-experience (Team:Integration-Experience)

@qcorporation qcorporation requested a review from a team November 7, 2025 19:47
Copy link
Contributor

@alaudazzi alaudazzi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I left a few editing suggestions.


## Troubleshooting

For help with Elastic ingest tools, check [Common problems](https://www.elastic.co/docs/troubleshoot/ingest/fleet/common-problems).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This section sends to a generic list of problems. Is that really helpful? Should we expect troubleshooting tips that are more specific to this integration?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I like this suggestion, this is what I got from just doing a google search, "troubleshooting cisco ftd forward logs", I don't know if we can reproduce this from the prompts or if it would be useful to the user. But it seems that it might be.


To troubleshoot Cisco FTD log forwarding, first verify your configuration in FMC/FDM, ensure the syslog server is reachable using a ping command, check that the correct interface is selected for logging, and confirm that policy deployments are successful. For more in-depth analysis, use the CLI to enable diagnostic logging or take packet captures to see if logs are being sent.

  1. Verify FTD/FMC configuration
    Enable logging: In Cisco FDM or FMC, go to System Settings > Logging Settings and ensure Data Logging is enabled.
    Configure the syslog server: Add the correct IP address, protocol (UDP/TCP), and port (e.g., 514) for your syslog server.
    Select the correct interface: Under Interface for Device Logs, select the interface that has a network path to the syslog server.
    Deploy policies: After making changes, click Deploy to apply them to the FTD device.
  2. Check network connectivity
    Ping the syslog server: Log in to the FTD's management CLI via SSH and use the ping <syslog_server_ip> command to check reachability.
    Check interface status: Use the show failover command to verify the status of the interfaces involved in log forwarding, especially in a high-availability (HA) cluster, notes Cisco Systems.
  3. Analyze the logs and traffic
    Use the diagnostic CLI: Access the diagnostic CLI with system support diagnostic-cli to see more detailed logs and debugging information, suggests Cisco Systems.
    Perform a packet capture: Within the diagnostic CLI, use packet capture commands to verify if traffic is reaching the syslog server.
    Check access rules: Ensure that the access control rules you expect to be generating logs have logging enabled, as described in a Cisco Community thread.
  4. Troubleshoot deployment issues
    Check deployment status: In FMC, check the deployment status to ensure it completed successfully.
    Retry deployment: If a deployment fails, try again. Issues might be temporary, or a retry may be needed after a cluster synchronization.
    Review deployment errors: If a deployment repeatedly fails, examine the error messages and consider reaching out to Cisco TAC.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have this in the panw README: https://github.com/elastic/integrations/blob/main/packages/panw/_dev/build/docs/README.md?plain=1#L83, so I think that's why it's also being used here.

If we don't want this, we'll have to take it out of the example README

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i think that's the best we can do, since we don't expect anything specific to go sideways

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i copied out the verification steps in the knowledge base directly here. i don't know why that wasn't populated before.

Copy link
Contributor

@qcorporation qcorporation left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

overall it's looking much better. Thanks for generating this document.
I agree with the comment that the validation step seems a bit lite. I don't know if we want to add any vendor specific troubleshooting steps in general? I think it's up to the group if this is something we aspire to do at scale.


## Troubleshooting

For help with Elastic ingest tools, check [Common problems](https://www.elastic.co/docs/troubleshoot/ingest/fleet/common-problems).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I like this suggestion, this is what I got from just doing a google search, "troubleshooting cisco ftd forward logs", I don't know if we can reproduce this from the prompts or if it would be useful to the user. But it seems that it might be.


To troubleshoot Cisco FTD log forwarding, first verify your configuration in FMC/FDM, ensure the syslog server is reachable using a ping command, check that the correct interface is selected for logging, and confirm that policy deployments are successful. For more in-depth analysis, use the CLI to enable diagnostic logging or take packet captures to see if logs are being sent.

  1. Verify FTD/FMC configuration
    Enable logging: In Cisco FDM or FMC, go to System Settings > Logging Settings and ensure Data Logging is enabled.
    Configure the syslog server: Add the correct IP address, protocol (UDP/TCP), and port (e.g., 514) for your syslog server.
    Select the correct interface: Under Interface for Device Logs, select the interface that has a network path to the syslog server.
    Deploy policies: After making changes, click Deploy to apply them to the FTD device.
  2. Check network connectivity
    Ping the syslog server: Log in to the FTD's management CLI via SSH and use the ping <syslog_server_ip> command to check reachability.
    Check interface status: Use the show failover command to verify the status of the interfaces involved in log forwarding, especially in a high-availability (HA) cluster, notes Cisco Systems.
  3. Analyze the logs and traffic
    Use the diagnostic CLI: Access the diagnostic CLI with system support diagnostic-cli to see more detailed logs and debugging information, suggests Cisco Systems.
    Perform a packet capture: Within the diagnostic CLI, use packet capture commands to verify if traffic is reaching the syslog server.
    Check access rules: Ensure that the access control rules you expect to be generating logs have logging enabled, as described in a Cisco Community thread.
  4. Troubleshoot deployment issues
    Check deployment status: In FMC, check the deployment status to ensure it completed successfully.
    Retry deployment: If a deployment fails, try again. Issues might be temporary, or a retry may be needed after a cluster synchronization.
    Review deployment errors: If a deployment repeatedly fails, examine the error messages and consider reaching out to Cisco TAC.

@jrmolin jrmolin requested a review from alaudazzi November 14, 2025 18:22
Copy link
Contributor

@qcorporation qcorporation left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It looks much better, thanks for addressing the issues

@jrmolin jrmolin enabled auto-merge (squash) November 14, 2025 20:24
@elasticmachine
Copy link

💚 Build Succeeded

History

@jrmolin jrmolin merged commit f5948d6 into elastic:main Nov 14, 2025
8 checks passed
@elastic-vault-github-plugin-prod

Package cisco_ftd - 3.13.0 containing this change is available at https://epr.elastic.co/package/cisco_ftd/3.13.0/

@jrmolin jrmolin deleted the cisco_ftd-update_documentation branch November 18, 2025 19:28
@andrewkroh andrewkroh added the enhancement New feature or request label Nov 25, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

documentation Improvements or additions to documentation. Applied to PRs that modify *.md files. enhancement New feature or request Integration:cisco_ftd Cisco FTD Team:Integration-Experience Security Integrations Integration Experience [elastic/integration-experience]

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants