-
Notifications
You must be signed in to change notification settings - Fork 463
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws.securityhub_findings: Improve support for CDR #11158
Conversation
🚀 Benchmarks reportPackage
|
Data stream | Previous EPS | New EPS | Diff (%) | Result |
---|---|---|---|---|
s3access |
4651.16 | 3831.42 | -819.74 (-17.62%) | 💔 |
apigateway_logs |
10989.01 | 4464.29 | -6524.72 (-59.37%) | 💔 |
ec2_metrics |
25000 | 17857.14 | -7142.86 (-28.57%) | 💔 |
firewall_logs |
3300.33 | 2645.5 | -654.83 (-19.84%) | 💔 |
To see the full report comment with /test benchmark fullreport
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The issue refers to a document upload, but I cannot find it. So I cannot see whether this follows what has been designed. Is there a reason this is not a public document in the issue?
packages/aws/data_stream/securityhub_findings/elasticsearch/ingest_pipeline/default.yml
Outdated
Show resolved
Hide resolved
packages/aws/data_stream/securityhub_findings/elasticsearch/ingest_pipeline/default.yml
Outdated
Show resolved
Hide resolved
packages/aws/data_stream/securityhub_findings/elasticsearch/ingest_pipeline/default.yml
Outdated
Show resolved
Hide resolved
packages/aws/data_stream/securityhub_findings/elasticsearch/ingest_pipeline/default.yml
Show resolved
Hide resolved
/test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A couple of more comments to fix and good to go. Thanks for the patience!
packages/aws/elasticsearch/transform/latest_cdr_misconfigurations/fields/rule.yml
Show resolved
Hide resolved
packages/aws/elasticsearch/transform/latest_cdr_misconfigurations/fields/rule.yml
Outdated
Show resolved
Hide resolved
…spm-aws_securityhub
packages/aws/kibana/dashboard/aws-c9f103d0-5f63-11ed-bd69-473ce047ef30.json
Outdated
Show resolved
Hide resolved
- set: | ||
field: observer.vendor | ||
value: AWS Security Hub | ||
tag: set_observer_vendor | ||
- set: | ||
field: cloud.provider | ||
value: aws | ||
tag: set_cloud_provider |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The three fields being converted to constant_keyword
would all benefit from removal from _source
.
I recommend setting the static values in the ecs.yml
file where they fields are declared instead of the ingest pipeline, and then exchange the three set
processors with a single remove
processor that has a description
field explaining that the fields are defined as constant_keyword and we are removing the fields from _source to gain storage efficiency.
Also, please update the commit message (in the PR description) to specify why the minimum kibana version was changed. |
@andrewkroh the comments are addressed in 0e44091 and PR commit message is also updated. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I left a few more minor comments.
packages/aws/data_stream/securityhub_findings/elasticsearch/ingest_pipeline/default.yml
Outdated
Show resolved
Hide resolved
packages/aws/data_stream/securityhub_findings/elasticsearch/ingest_pipeline/default.yml
Outdated
Show resolved
Hide resolved
packages/aws/elasticsearch/transform/latest_cdr_misconfigurations/fields/ecs.yml
Outdated
Show resolved
Hide resolved
packages/aws/elasticsearch/transform/latest_cdr_misconfigurations/fields/base-fields.yml
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Based on other approvals, approving as a CODEOWNER from @elastic/obs-infraobs-integrations
Quality Gate failedFailed conditions |
💚 Build Succeeded
History
cc @kcreddy |
Package aws - 2.31.0 containing this change is available at https://epr.elastic.co/search?package=aws |
Proposed commit message
Improve support for CDR.
securityhub_findings
data stream's ingest pipeline to support CDR.securityhub_findings
data stream's mappings according to the new fields.8.16.0
as the transform privileges are added in [Cloud Security] Add privileges required for AWS SecurityHub related to CDR misconfiguration features elasticsearch#112574 merged into8.16
Stack release.Fixes: #11040
Note to reviewers: Please DM me for access to the document(s) linked in the issue, it might help in the review.
Checklist
changelog.yml
file.How to test this PR locally
Related issues
Screenshots