[Cloud Security] add missing ECS mappings to wiz cdr_latest_vulnerabilities destination index#11614
Merged
maxcold merged 3 commits intoelastic:mainfrom Nov 4, 2024
maxcold:csp-add-missing-mappings-wiz-cdr-vulnerability
Merged
[Cloud Security] add missing ECS mappings to wiz cdr_latest_vulnerabilities destination index#11614maxcold merged 3 commits intoelastic:mainfrom maxcold:csp-add-missing-mappings-wiz-cdr-vulnerability
maxcold merged 3 commits intoelastic:mainfrom
maxcold:csp-add-missing-mappings-wiz-cdr-vulnerability
Conversation
🚀 Benchmarks reportTo see the full report comment with |
|
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
opauloh
approved these changes
Nov 2, 2024
Co-authored-by: Dan Kortschak <dan.kortschak@elastic.co>
efd6
approved these changes
Nov 4, 2024
💚 Build Succeeded
History
|
|
maxcold
added a commit
to elastic/kibana
that referenced
this pull request
Nov 4, 2024
## Summary It closes elastic/security-team#11034 This PR removes runtime mappings for vulnerabilities, since they will be added on the third party integration on [this PR](elastic/integrations#11614) before the 8.16 release, we can remove the runtime mappings in Kibana in favour of not compromising performance. Co-authored-by: Maxim Kholod <maxim.kholod@elastic.co>
kibanamachine
pushed a commit
to kibanamachine/kibana
that referenced
this pull request
Nov 4, 2024
## Summary It closes elastic/security-team#11034 This PR removes runtime mappings for vulnerabilities, since they will be added on the third party integration on [this PR](elastic/integrations#11614) before the 8.16 release, we can remove the runtime mappings in Kibana in favour of not compromising performance. Co-authored-by: Maxim Kholod <maxim.kholod@elastic.co> (cherry picked from commit 10d7926)
kibanamachine
pushed a commit
to kibanamachine/kibana
that referenced
this pull request
Nov 4, 2024
## Summary It closes elastic/security-team#11034 This PR removes runtime mappings for vulnerabilities, since they will be added on the third party integration on [this PR](elastic/integrations#11614) before the 8.16 release, we can remove the runtime mappings in Kibana in favour of not compromising performance. Co-authored-by: Maxim Kholod <maxim.kholod@elastic.co> (cherry picked from commit 10d7926)
|
Package wiz - 2.1.0 containing this change is available at https://epr.elastic.co/search?package=wiz |
kibanamachine
added a commit
to elastic/kibana
that referenced
this pull request
Nov 4, 2024
# Backport This will backport the following commits from `main` to `8.x`: - [Reducing vulnerability runtime mappings (#198739)](#198739) <!--- Backport version: 9.4.3 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) <!--BACKPORT [{"author":{"name":"Paulo Silva","email":"paulo.henrique@elastic.co"},"sourceCommit":{"committedDate":"2024-11-04T14:00:35Z","message":"Reducing vulnerability runtime mappings (#198739)\n\n## Summary\r\n\r\nIt closes https://github.com/elastic/security-team/issues/11034\r\n\r\nThis PR removes runtime mappings for vulnerabilities, since they will be\r\nadded on the third party integration on [this\r\nPR](elastic/integrations#11614) before the 8.16\r\nrelease, we can remove the runtime mappings in Kibana in favour of not\r\ncompromising performance.\r\n\r\nCo-authored-by: Maxim Kholod <maxim.kholod@elastic.co>","sha":"10d7926e3b2a943250d0ec2437c8d645486b84bd","branchLabelMapping":{"^v9.0.0$":"main","^v8.17.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","v9.0.0","Team:Cloud Security","v8.16.0","backport:version","v8.17.0"],"title":"Reducing vulnerability runtime mappings","number":198739,"url":"https://github.com/elastic/kibana/pull/198739","mergeCommit":{"message":"Reducing vulnerability runtime mappings (#198739)\n\n## Summary\r\n\r\nIt closes https://github.com/elastic/security-team/issues/11034\r\n\r\nThis PR removes runtime mappings for vulnerabilities, since they will be\r\nadded on the third party integration on [this\r\nPR](elastic/integrations#11614) before the 8.16\r\nrelease, we can remove the runtime mappings in Kibana in favour of not\r\ncompromising performance.\r\n\r\nCo-authored-by: Maxim Kholod <maxim.kholod@elastic.co>","sha":"10d7926e3b2a943250d0ec2437c8d645486b84bd"}},"sourceBranch":"main","suggestedTargetBranches":["8.16","8.x"],"targetPullRequestStates":[{"branch":"main","label":"v9.0.0","branchLabelMappingKey":"^v9.0.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/198739","number":198739,"mergeCommit":{"message":"Reducing vulnerability runtime mappings (#198739)\n\n## Summary\r\n\r\nIt closes https://github.com/elastic/security-team/issues/11034\r\n\r\nThis PR removes runtime mappings for vulnerabilities, since they will be\r\nadded on the third party integration on [this\r\nPR](elastic/integrations#11614) before the 8.16\r\nrelease, we can remove the runtime mappings in Kibana in favour of not\r\ncompromising performance.\r\n\r\nCo-authored-by: Maxim Kholod <maxim.kholod@elastic.co>","sha":"10d7926e3b2a943250d0ec2437c8d645486b84bd"}},{"branch":"8.16","label":"v8.16.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.x","label":"v8.17.0","branchLabelMappingKey":"^v8.17.0$","isSourceBranch":false,"state":"NOT_CREATED"}]}] BACKPORT--> Co-authored-by: Paulo Silva <paulo.henrique@elastic.co>
kibanamachine
added a commit
to elastic/kibana
that referenced
this pull request
Nov 4, 2024
# Backport This will backport the following commits from `main` to `8.16`: - [Reducing vulnerability runtime mappings (#198739)](#198739) <!--- Backport version: 9.4.3 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) <!--BACKPORT [{"author":{"name":"Paulo Silva","email":"paulo.henrique@elastic.co"},"sourceCommit":{"committedDate":"2024-11-04T14:00:35Z","message":"Reducing vulnerability runtime mappings (#198739)\n\n## Summary\r\n\r\nIt closes https://github.com/elastic/security-team/issues/11034\r\n\r\nThis PR removes runtime mappings for vulnerabilities, since they will be\r\nadded on the third party integration on [this\r\nPR](elastic/integrations#11614) before the 8.16\r\nrelease, we can remove the runtime mappings in Kibana in favour of not\r\ncompromising performance.\r\n\r\nCo-authored-by: Maxim Kholod <maxim.kholod@elastic.co>","sha":"10d7926e3b2a943250d0ec2437c8d645486b84bd","branchLabelMapping":{"^v9.0.0$":"main","^v8.17.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","v9.0.0","Team:Cloud Security","v8.16.0","backport:version","v8.17.0"],"title":"Reducing vulnerability runtime mappings","number":198739,"url":"https://github.com/elastic/kibana/pull/198739","mergeCommit":{"message":"Reducing vulnerability runtime mappings (#198739)\n\n## Summary\r\n\r\nIt closes https://github.com/elastic/security-team/issues/11034\r\n\r\nThis PR removes runtime mappings for vulnerabilities, since they will be\r\nadded on the third party integration on [this\r\nPR](elastic/integrations#11614) before the 8.16\r\nrelease, we can remove the runtime mappings in Kibana in favour of not\r\ncompromising performance.\r\n\r\nCo-authored-by: Maxim Kholod <maxim.kholod@elastic.co>","sha":"10d7926e3b2a943250d0ec2437c8d645486b84bd"}},"sourceBranch":"main","suggestedTargetBranches":["8.16","8.x"],"targetPullRequestStates":[{"branch":"main","label":"v9.0.0","branchLabelMappingKey":"^v9.0.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/198739","number":198739,"mergeCommit":{"message":"Reducing vulnerability runtime mappings (#198739)\n\n## Summary\r\n\r\nIt closes https://github.com/elastic/security-team/issues/11034\r\n\r\nThis PR removes runtime mappings for vulnerabilities, since they will be\r\nadded on the third party integration on [this\r\nPR](elastic/integrations#11614) before the 8.16\r\nrelease, we can remove the runtime mappings in Kibana in favour of not\r\ncompromising performance.\r\n\r\nCo-authored-by: Maxim Kholod <maxim.kholod@elastic.co>","sha":"10d7926e3b2a943250d0ec2437c8d645486b84bd"}},{"branch":"8.16","label":"v8.16.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.x","label":"v8.17.0","branchLabelMappingKey":"^v8.17.0$","isSourceBranch":false,"state":"NOT_CREATED"}]}] BACKPORT--> Co-authored-by: Paulo Silva <paulo.henrique@elastic.co>
harnish-crest-data
pushed a commit
to chavdaharnish/integrations
that referenced
this pull request
Feb 4, 2025
…lities destination index (elastic#11614) * add missing ECS mappings to wiz cdr_latest_vulnerabilities destination index * add PR link to changelog * Update packages/wiz/changelog.yml Co-authored-by: Dan Kortschak <dan.kortschak@elastic.co> --------- Co-authored-by: Dan Kortschak <dan.kortschak@elastic.co>
harnish-crest-data
pushed a commit
to chavdaharnish/integrations
that referenced
this pull request
Feb 5, 2025
…lities destination index (elastic#11614) * add missing ECS mappings to wiz cdr_latest_vulnerabilities destination index * add PR link to changelog * Update packages/wiz/changelog.yml Co-authored-by: Dan Kortschak <dan.kortschak@elastic.co> --------- Co-authored-by: Dan Kortschak <dan.kortschak@elastic.co>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.




Proposed commit message
observer.vendorandcloud.providerECS mappings missing in the cdr vulnerability latest transform destination indexChecklist
changelog.ymlfile.Author's Checklist
How to test this PR locally
Related issues
Screenshots