-
Notifications
You must be signed in to change notification settings - Fork 460
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Cloud Security] Fix ECS import method #5106
Conversation
- name: host.name | ||
external: ecs | ||
type: keyword | ||
- name: host.os.codename |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
host.os.codename
and host.containerized
are not part of ECS atm
elastic/ecs#294
elastic/ecs#1512
Do you think it's worth adding them as a custom field? and for the sake of backward compatibility?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As long as the field type does not change between the type you set manually and the type the ECS field ends up being its fine to map them. If its unsure then we should get confirmation about the preferred type first.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added some small comments
- name: host.name | ||
external: ecs | ||
type: keyword | ||
- name: host.os.codename |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As long as the field type does not change between the type you set manually and the type the ECS field ends up being its fine to map them. If its unsure then we should get confirmation about the preferred type first.
🌐 Coverage report
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice
What does this PR do?
This PR fixes the way
cloud_security_posture
imports ECS mappings. Till now, we did it manually without knowing how to instructelastic-package
which ECS version to import its mappings from.Checklist
changelog.yml
file.Author's Checklist
How to test this PR locally
Tested with elastic-package 0.72 (requires go 1.19 when built locally)
Related issues
Screenshots