Skip to content

Commit 740956b

Browse files
Merge branch 'main' into aws-4.0.0
2 parents ec76fc1 + f6b7e12 commit 740956b

File tree

288 files changed

+25246
-464
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

288 files changed

+25246
-464
lines changed

.buildkite/scripts/common.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -746,7 +746,7 @@ is_pr_affected() {
746746
# Example:
747747
# https://buildkite.com/elastic/integrations/builds/25606
748748
# https://github.com/elastic/integrations/pull/13810
749-
if git diff --name-only "${commit_merge}" "${to}" | grep -E -v '^(packages/|\.github/(CODEOWNERS|ISSUE_TEMPLATE|PULL_REQUEST_TEMPLATE)|README\.md|docs/|catalog-info\.yaml|\.buildkite/(pull-requests\.json|pipeline\.schedule-daily\.yml|pipeline\.schedule-weekly\.yml|pipeline\.backport\.yml))' > /dev/null; then
749+
if git diff --name-only "${commit_merge}" "${to}" | grep -E -v '^(packages/|\.github/(CODEOWNERS|ISSUE_TEMPLATE|PULL_REQUEST_TEMPLATE|workflows/)|README\.md|docs/|catalog-info\.yaml|\.buildkite/(pull-requests\.json|pipeline\.schedule-daily\.yml|pipeline\.schedule-weekly\.yml|pipeline\.backport\.yml))' > /dev/null; then
750750
echo "[${package}] PR is affected: found non-package files"
751751
return 0
752752
fi

.github/CODEOWNERS

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -197,6 +197,7 @@
197197
/packages/elastic_agent @elastic/elastic-agent
198198
/packages/elastic_connectors @elastic/search-extract-and-transform
199199
/packages/elastic_package_registry @elastic/ecosystem
200+
/packages/elastic_security @elastic/security-service-integrations
200201
/packages/elasticsearch @elastic/stack-monitoring
201202
/packages/endace @elastic/sec-deployment-and-devices @elastic/sec-linux-platform
202203
/packages/endace/data_stream/flow @elastic/sec-linux-platform

packages/auth0/_dev/build/docs/README.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,22 +17,24 @@ The package collects log events either sent via log stream webhooks, or by API r
1717

1818
The agent running this integration must be able to accept requests from the Internet in order for Auth0 to be able connect. Auth0 requires that the webhook accept requests over HTTPS. So you must either configure the integration with a valid TLS certificate or use a reverse proxy in front of the integration.
1919

20-
For more information, see Auth0's webpage on [integration to Elastic Security](https://marketplace.auth0.com/integrations/elastic-security).
20+
This integration method is also documented on the Auth0 webpage for the [Elastic Security integration](https://marketplace.auth0.com/integrations/elastic-security).
2121

2222
### Configure the Auth0 integration
2323

2424
1. Click on **Collect Auth0 log streams events via Webhooks** to enable it.
25-
2. Enter values for "Listen Address", "Listen Port" and "Webhook path" to form the endpoint URL. Make note of the **Endpoint URL** `https://{AGENT_ADDRESS}:8383/auth0/logs`.
26-
3. Enter value for "Secret value". This must match the "Authorization Token" value entered when configuring the "Custom Webhook" from Auth0 cloud.
27-
4. Enter values for "TLS". Auth0 requires that the webhook accept requests over HTTPS. So you must either configure the integration with a valid TLS certificate or use a reverse proxy in front of the integration.
25+
2. Enter values for **Listen Address**, **Listen Port** and **Webhook Path**.
26+
3. Enter value for **Authorization Token**. This must match the value entered when configuring the "Custom Webhook" in Auth0 cloud.
27+
4. In the "Advanced options" section, enter settings for **SSL Configuration**. Auth0 requires that webhook requests use HTTPS. So you must either configure the integration with a valid TLS certificate here, or use a separarately configured reverse proxy in front of the agent.
28+
29+
Using the external address of the agent to which the integration is added, and the configured "Listen Port" and "Webhook Path", make a note of the full endpoint URL. It will have the form `https://{AGENT_ADDRESS}:{LISTEN_PORT}{WEBHOOK_PATH}` (for example, `https://agent01.external.example.com:8383/auth0/logs`).
2830

2931
### Creating the stream in Auth0
3032

3133
1. From the Auth0 management console, navigate to **Logs > Streams** and click **+ Create Stream**.
3234
2. Choose **Custom Webhook**.
3335
3. Name the new **Event Stream** appropriately (e.g. Elastic) and click **Create**.
34-
4. In **Payload URL**, paste the **Endpoint URL** collected during Step 1 of **Configure the Auth0 integration** section.
35-
5. In **Authorization Token**, paste the **Authorization Token**. This must match the value entered in Step 2 of **Configure the Auth0 integration** section.
36+
4. In **Payload URL**, enter the endpoint URL set up in the **Configure the Auth0 integration** section.
37+
5. In **Authorization Token**, enter the **Authorization Token**. This must match the value entered in Step 3 of the **Configure the Auth0 integration** section.
3638
6. In **Content Type**, choose **application/json**.
3739
7. In **Content Format**, choose **JSON Lines**.
3840
8. Click **Save**.

packages/auth0/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# newer versions go on top
2+
- version: "1.23.0"
3+
changes:
4+
- description: Improve webhook setup instructions.
5+
type: enhancement
6+
link: https://github.com/elastic/integrations/pull/14434
27
- version: "1.22.0"
38
changes:
49
- description: Standardize user fields processing across integrations.

packages/auth0/data_stream/logs/manifest.yml

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -24,15 +24,16 @@ streams:
2424
default: 8383
2525
- name: url
2626
type: text
27-
title: Webhook path
28-
description: URL path where the webhook will accept requests.
27+
title: Webhook Path
28+
description: URL path where the webhook will accept requests. It must include a leading slash.
2929
multi: false
3030
required: true
31-
show_user: false
31+
show_user: true
3232
default: /auth0/logs
3333
- name: secret_value
34+
title: Authorization Token
3435
type: password
35-
description: Authorization token
36+
description: A token that incoming requests must include in an Authorization header.
3637
multi: false
3738
required: false
3839
show_user: true

packages/auth0/docs/README.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -17,22 +17,24 @@ The package collects log events either sent via log stream webhooks, or by API r
1717

1818
The agent running this integration must be able to accept requests from the Internet in order for Auth0 to be able connect. Auth0 requires that the webhook accept requests over HTTPS. So you must either configure the integration with a valid TLS certificate or use a reverse proxy in front of the integration.
1919

20-
For more information, see Auth0's webpage on [integration to Elastic Security](https://marketplace.auth0.com/integrations/elastic-security).
20+
This integration method is also documented on the Auth0 webpage for the [Elastic Security integration](https://marketplace.auth0.com/integrations/elastic-security).
2121

2222
### Configure the Auth0 integration
2323

2424
1. Click on **Collect Auth0 log streams events via Webhooks** to enable it.
25-
2. Enter values for "Listen Address", "Listen Port" and "Webhook path" to form the endpoint URL. Make note of the **Endpoint URL** `https://{AGENT_ADDRESS}:8383/auth0/logs`.
26-
3. Enter value for "Secret value". This must match the "Authorization Token" value entered when configuring the "Custom Webhook" from Auth0 cloud.
27-
4. Enter values for "TLS". Auth0 requires that the webhook accept requests over HTTPS. So you must either configure the integration with a valid TLS certificate or use a reverse proxy in front of the integration.
25+
2. Enter values for **Listen Address**, **Listen Port** and **Webhook Path**.
26+
3. Enter value for **Authorization Token**. This must match the value entered when configuring the "Custom Webhook" in Auth0 cloud.
27+
4. In the "Advanced options" section, enter settings for **SSL Configuration**. Auth0 requires that webhook requests use HTTPS. So you must either configure the integration with a valid TLS certificate here, or use a separarately configured reverse proxy in front of the agent.
28+
29+
Using the external address of the agent to which the integration is added, and the configured "Listen Port" and "Webhook Path", make a note of the full endpoint URL. It will have the form `https://{AGENT_ADDRESS}:{LISTEN_PORT}{WEBHOOK_PATH}` (for example, `https://agent01.external.example.com:8383/auth0/logs`).
2830

2931
### Creating the stream in Auth0
3032

3133
1. From the Auth0 management console, navigate to **Logs > Streams** and click **+ Create Stream**.
3234
2. Choose **Custom Webhook**.
3335
3. Name the new **Event Stream** appropriately (e.g. Elastic) and click **Create**.
34-
4. In **Payload URL**, paste the **Endpoint URL** collected during Step 1 of **Configure the Auth0 integration** section.
35-
5. In **Authorization Token**, paste the **Authorization Token**. This must match the value entered in Step 2 of **Configure the Auth0 integration** section.
36+
4. In **Payload URL**, enter the endpoint URL set up in the **Configure the Auth0 integration** section.
37+
5. In **Authorization Token**, enter the **Authorization Token**. This must match the value entered in Step 3 of the **Configure the Auth0 integration** section.
3638
6. In **Content Type**, choose **application/json**.
3739
7. In **Content Format**, choose **JSON Lines**.
3840
8. Click **Save**.

packages/auth0/manifest.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
format_version: "3.0.2"
22
name: auth0
33
title: "Auth0"
4-
version: "1.22.0"
4+
version: "1.23.0"
55
description: Collect logs from Auth0 with Elastic Agent.
66
type: integration
77
categories:

packages/aws/changelog.yml

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,14 @@
1919
- description: Remove metadata fields added by the Agentless policy.
2020
type: bugfix
2121
link: https://github.com/elastic/integrations/pull/14306
22+
- version: "3.11.0"
23+
changes:
24+
- description: Fix `tlsVersion` parsing when not properly defined in cloudtrail event.
25+
type: bugfix
26+
link: https://github.com/elastic/integrations/pull/13345
27+
- description: Add empty value removal script to cloudtrail data stream ingest pipeline.
28+
type: enhancement
29+
link: https://github.com/elastic/integrations/pull/13345
2230
- version: "3.10.1"
2331
changes:
2432
- description: Fix configuration template typo.
@@ -161,7 +169,7 @@
161169
link: https://github.com/elastic/integrations/pull/12755
162170
- version: "2.40.0"
163171
changes:
164-
- description: Add support for Kibana `9.0.0`
172+
- description: Add support for Kibana `9.0.0`.
165173
type: enhancement
166174
link: https://github.com/elastic/integrations/pull/12637
167175
- version: "2.39.0"

packages/aws/data_stream/cloudtrail/_dev/test/pipeline/test-change-password-json.log-expected.json

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@
1515
"error_message": "An unknown error occurred",
1616
"event_type": "AwsApiCall",
1717
"event_version": "1.05",
18-
"flattened": {},
1918
"recipient_account_id": "0123456789012",
2019
"request_id": "EXAMPLE-5204-4fed-9c60-9c6EXAMPLE",
2120
"user_identity": {
@@ -95,7 +94,6 @@
9594
"cloudtrail": {
9695
"event_type": "AwsApiCall",
9796
"event_version": "1.05",
98-
"flattened": {},
9997
"recipient_account_id": "0123456789012",
10098
"request_id": "EXAMPLE-5c16-4eda-9724-EXAMPLE",
10199
"user_identity": {

packages/aws/data_stream/cloudtrail/_dev/test/pipeline/test-converse-json.log-expected.json

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,8 +59,7 @@
5959
"kind": "event",
6060
"original": "{\"eventVersion\":\"1.10\",\"userIdentity\":{\"type\":\"AssumedRole\",\"principalId\":\"PRINCIPALID:i-03cd6b2a7eb4bf3ae\",\"arn\":\"arn:aws:sts::00000000000:assumed-role/private-ec2-instance-role/i-03cd6b2a7eb4bf3ae\",\"accountId\":\"00000000000\",\"accessKeyId\":\"ACCESSKEY\",\"sessionContext\":{\"sessionIssuer\":{\"type\":\"Role\",\"principalId\":\"PRINCIPALID\",\"arn\":\"arn:aws:iam::00000000000:role/private-ec2-instance-role\",\"accountId\":\"00000000000\",\"userName\":\"private-ec2-instance-role\"},\"attributes\":{\"creationDate\":\"2024-10-29T14:29:03Z\",\"mfaAuthenticated\":\"false\"},\"ec2RoleDelivery\":\"2.0\"}},\"eventTime\":\"2024-10-29T15:51:44Z\",\"eventSource\":\"bedrock.amazonaws.com\",\"eventName\":\"Converse\",\"awsRegion\":\"us-east-1\",\"sourceIPAddress\":\"216.160.83.56\",\"userAgent\":\"Boto3/1.35.50 md/Botocore#1.35.50 ua/2.0 os/linux#6.8.0-1016-aws md/arch#x86_64 lang/python#3.12.3 md/pyimpl#CPython cfg/retry-mode#legacy Botocore/1.35.50\",\"requestParameters\":{\"modelId\":\"anthropic.claude-3-5-sonnet-20240620-v1:0\"},\"responseElements\":null,\"requestID\":\"aff6f361-1ef0-4460-97af-26528a80b511\",\"eventID\":\"3d67c35a-eef1-4d64-9620-77af8f372ae7\",\"readOnly\":true,\"eventType\":\"AwsApiCall\",\"recipientAccountId\":\"00000000000\",\"eventCategory\":\"Management\",\"tlsDetails\":{\"tlsVersion\":\"TLSv1.3\",\"cipherSuite\":\"TLS_AES_128_GCM_SHA256\",\"clientProvidedHostHeader\":\"bedrock-runtime.us-east-1.amazonaws.com\"}}",
6161
"outcome": "success",
62-
"provider": "bedrock.amazonaws.com",
63-
"type": []
62+
"provider": "bedrock.amazonaws.com"
6463
},
6564
"related": {
6665
"entity": [

0 commit comments

Comments
 (0)