Hi @filsan.hassan,
Im glad to hear you sorted out the batch_size issue.
Regarding the keywords, without looking at the code Its hard to diagnose the issue. I would expect that you would see errors in the plumber logs for the pipelet. These can be found in the Server at /var/log/squirro/plumber/plumber.log
or in the Squirro UI under: Server → Log Files → plumber.log (documentation). I would first check the plumber log for any obvious errors.
Looking at the sample code you supplied, I would also double check that the “account_id” key is being added to the items keywords in the fakecrm dataloader. If thats not being mapped correctly I would expect the pipelet to not work as intended. You can check your mappings in the dataloader config steps which is accessible by clicking on “edit” on the datasource in question.
Alternatively, you can use the built in logging module to log the steps around where you are assigning keywords to see how your pipelet is acting when deployed.
If you think its easier, you can also try and expand your test items to be more realistic as to what you are ingesting from your dataloader.
Heres a sample item if you want to use variations on it to test your code locally.
{
"id": "urDkMYVDWO6iL7hyVf_Ixg",
"link": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-42359",
"starred": false,
"title": "CVE-2023-42359",
"body": "<html><body><p>SQL injection vulnerability in Exam Form Submission in PHP with Source Code v.1.0 allows a remote attacker to escalate privileges via the val-username parameter in /index.php.</p></body></html>",
"created_at": "2023-09-18T12:15:07",
"keywords": {
"feed_hostname": [
"nvd.nist.gov"
],
"source_type": [
"Feed"
],
"cve_source": [
"Feed"
],
"nlp_tag__phrases": [
"sql injection vulnerability",
"val username parameter",
"source code v.1.0",
"remote attacker",
"exam form submission",
"php",
"cve-2023 - 42359",
"/index.php",
"cve-2023",
"privilege",
"cve-2023-42359"
],
"publish": [
"yes"
]
},
"communities": [],
"sources": [
{
"id": "JiQP1WSeSqGQywf-NauCHg",
"title": "CVE Feed",
"photo": "/storage/datasource_pictures/24/8c/117748fec7d98b59/8-feed_plugin"
}
],
"notes": [],
"references": []
}
If you have any more questions, please feel free to reach out.
Best of luck!
Aaron