-
Notifications
You must be signed in to change notification settings - Fork 519
aws: Add Config and Inspector transforms for extended protections (CDR) workflow #15230
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
/test |
|
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
| index: "security_solution-awsinspector.vulnerability_latest-v1" | ||
| aliases: | ||
| - alias: "security_solution-awsinspector.vulnerability_latest" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@maxcold, the destination pattern was the only change since #14306 (comment).
Earlier it was security_solution-aws.vulnerability_latest-v1, and now security_solution-awsinspector.vulnerability_latest-v1. Notice change from aws to awsinspector.
This is to make it consistent with awsconfig. We will reserve aws when adding vulnerability data via SecurityHub which has aws pattern already for misconfigurations.
🚀 Benchmarks reportTo see the full report comment with |
💚 Build Succeeded
History
cc @kcreddy |
|
|
Package aws - 4.0.0 containing this change is available at https://epr.elastic.co/package/aws/4.0.0/ |
…R) workflow (elastic#15230) aws: Add transforms to Config and Inspector data streams for extended protections (CDR) workflow. - Add latest transform to Config and Inspector data streams to help with Cloud Native Vulnerability Management (CNVM)[1] and Cloud Security Posture Management (CSPM)[2] workflows. - Add ILM policy to AWS Config as it does full sync every interval. - Update minimum kibana version to "^8.19.0 || ^9.1.0" to ensure necessary permissions for transform[3]. - Re-add 3.14.2 changelog entry as it is overwritten in VPC Flow PR[4]. - Skip system tests for securityhub* data streams to avoid fleet health degradation due to empty template values by httpjson. This is fixed in 8.19.4 and 9.1.4 by beats#45810[5] and beats#46332[6]. This skip can be removed when the stack version is upgraded to ones containing the fix. [1] https://www.elastic.co/guide/en/security/current/vuln-management-overview.html [2] https://www.elastic.co/docs/solutions/security/cloud/cloud-security-posture-management [3] elastic/elasticsearch#128350 [4] elastic#15077 [5] elastic/beats#45810 [6] elastic/beats#46332


Proposed commit message
Note
Checklist
changelog.ymlfile.Related issues