Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Deployment and Devices integrations to ECS 8.16.0 (part 3) #12121

Open
wants to merge 8 commits into
base: main
Choose a base branch
from

Conversation

taylor-swanson
Copy link
Contributor

@taylor-swanson taylor-swanson commented Dec 16, 2024

Proposed commit message

Updates the following integrations to ECS 8.16.0:

  • juniper_srx
  • modsecurity
  • netflow
  • osquery
  • panw
  • pfsense
  • proxysg

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.
  • [ ] I have verified that any added dashboard complies with Kibana's Dashboard good practices

Related issues

ECS version in build manifest changed from [email protected] to [email protected]. The set
ecs.version processor in pipelines was changed 8.16.0. Previously the pipeline
was setting version 8.11.0. The ecs.version in sample_event.json files was
changed to 8.16.0. Previously sample_event.json files contained 8.11.0.

[git-generate]
go run github.com/andrewkroh/go-examples/ecs-update@latest -ecs-version=8.16.0 [email protected] -pr=999999 packages/juniper_srx
ECS version in build manifest changed from [email protected] to [email protected]. The set
ecs.version processor in pipelines was changed 8.16.0. Previously the pipeline
was setting version 8.11.0. The ecs.version in sample_event.json files was
changed to 8.16.0. Previously sample_event.json files contained 8.11.0.

[git-generate]
go run github.com/andrewkroh/go-examples/ecs-update@latest -ecs-version=8.16.0 [email protected] -pr=999999 packages/modsecurity
ECS version in build manifest changed from [email protected] to [email protected]. The set
ecs.version processor in pipelines was changed 8.16.0. Previously the pipeline
was setting version 8.11.0. The ecs.version in sample_event.json files was
changed to 8.16.0. Previously sample_event.json files contained 8.11.0.

[git-generate]
go run github.com/andrewkroh/go-examples/ecs-update@latest -ecs-version=8.16.0 [email protected] -pr=999999 packages/netflow
ECS version in build manifest changed from [email protected] to [email protected]. The set
ecs.version processor in pipelines was changed 8.16.0. Previously the pipeline
was setting version 8.11.0. The ecs.version in sample_event.json files was
changed to 8.16.0. Previously sample_event.json files contained 8.11.0.

[git-generate]
go run github.com/andrewkroh/go-examples/ecs-update@latest -ecs-version=8.16.0 [email protected] -pr=999999 packages/osquery
ECS version in build manifest changed from [email protected] to [email protected]. The set
ecs.version processor in pipelines was changed 8.16.0. Previously the pipeline
was setting version 8.11.0. The ecs.version in sample_event.json files was
changed to 8.16.0. Previously sample_event.json files contained 8.11.0.

[git-generate]
go run github.com/andrewkroh/go-examples/ecs-update@latest -ecs-version=8.16.0 [email protected] -pr=999999 packages/panw
ECS version in build manifest changed from [email protected] to [email protected]. The set
ecs.version processor in pipelines was changed 8.16.0. Previously the pipeline
was setting version 8.11.0. The ecs.version in sample_event.json files was
changed to 8.16.0. Previously sample_event.json files contained 8.11.0.

[git-generate]
go run github.com/andrewkroh/go-examples/ecs-update@latest -ecs-version=8.16.0 [email protected] -pr=999999 packages/pfsense
ECS version in build manifest changed from [email protected] to [email protected]. The set
ecs.version processor in pipelines was changed 8.16.0. Previously the pipeline
was setting version 8.11.0. The ecs.version in sample_event.json files was
changed to 8.16.0. Previously sample_event.json files contained 8.11.0.

[git-generate]
go run github.com/andrewkroh/go-examples/ecs-update@latest -ecs-version=8.16.0 [email protected] -pr=999999 packages/proxysg
@taylor-swanson taylor-swanson added enhancement New feature or request Team:Security-Deployment and Devices Deployment and Devices Security team [elastic/sec-deployment-and-devices] labels Dec 16, 2024
@taylor-swanson taylor-swanson self-assigned this Dec 16, 2024
@elastic-vault-github-plugin-prod

🚀 Benchmarks report

To see the full report comment with /test benchmark fullreport

@elasticmachine
Copy link

💚 Build Succeeded

cc @taylor-swanson

@taylor-swanson taylor-swanson marked this pull request as ready for review December 16, 2024 16:56
@taylor-swanson taylor-swanson requested a review from a team as a code owner December 16, 2024 16:56
@elasticmachine
Copy link

Pinging @elastic/sec-deployment-and-devices (Team:Security-Deployment and Devices)

@andrewkroh andrewkroh added Integration:pfsense pfSense Integration:proxysg Broadcom ProxySG Integration:modsecurity ModSecurity Audit Integration:netflow NetFlow Records Integration:panw Palo Alto Next-Gen Firewall Integration:juniper_srx Juniper SRX Integration:osquery Osquery Logs labels Dec 16, 2024
@@ -734,7 +734,7 @@ The following processes and tags are supported:
| vulnerability.description | The description of the vulnerability that provides additional context of the vulnerability. For example (https://cve.mitre.org/about/faqs.html#cve_entry_descriptions_created[Common Vulnerabilities and Exposure CVE description]) | keyword |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There's another case of URL being incorrect in this file, at file.mime_type, I created an ECS ticket to fix it, and try to track down any others elastic/ecs#2416

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request Integration:juniper_srx Juniper SRX Integration:modsecurity ModSecurity Audit Integration:netflow NetFlow Records Integration:osquery Osquery Logs Integration:panw Palo Alto Next-Gen Firewall Integration:pfsense pfSense Integration:proxysg Broadcom ProxySG Team:Security-Deployment and Devices Deployment and Devices Security team [elastic/sec-deployment-and-devices]
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants