Skip to content

Commit d82006e

Browse files
committed
update version across integration
1 parent e72b238 commit d82006e

File tree

18 files changed

+18
-18
lines changed

18 files changed

+18
-18
lines changed

packages/ti_google_threat_intelligence/data_stream/cryptominer/agent/stream/cel.yml.hbs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ program: |
3333
?"query": has(state.query) ? optional.of([state.query]) : optional.none(),
3434
"limit": ["4000"],
3535
"x-tool": ["Elastic"],
36-
"User-Agent": ["v0.2.0"], // Keep this in sync with 'version' in package level manifest.yml.
36+
"User-Agent": ["v0.3.0"], // Keep this in sync with 'version' in package level manifest.yml.
3737
}.format_query()
3838
).with({
3939
"Header": {

packages/ti_google_threat_intelligence/data_stream/first_stage_delivery_vectors/agent/stream/cel.yml.hbs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ program: |
3333
?"query": has(state.query) ? optional.of([state.query]) : optional.none(),
3434
"limit": ["4000"],
3535
"x-tool": ["Elastic"],
36-
"User-Agent": ["v0.2.0"], // Keep this in sync with 'version' in package level manifest.yml.
36+
"User-Agent": ["v0.3.0"], // Keep this in sync with 'version' in package level manifest.yml.
3737
}.format_query()
3838
).with({
3939
"Header": {

packages/ti_google_threat_intelligence/data_stream/infostealer/agent/stream/cel.yml.hbs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ program: |
3333
?"query": has(state.query) ? optional.of([state.query]) : optional.none(),
3434
"limit": ["4000"],
3535
"x-tool": ["Elastic"],
36-
"User-Agent": ["v0.2.0"], // Keep this in sync with 'version' in package level manifest.yml.
36+
"User-Agent": ["v0.3.0"], // Keep this in sync with 'version' in package level manifest.yml.
3737
}.format_query()
3838
).with({
3939
"Header": {

packages/ti_google_threat_intelligence/data_stream/iot/agent/stream/cel.yml.hbs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ program: |
3333
?"query": has(state.query) ? optional.of([state.query]) : optional.none(),
3434
"limit": ["4000"],
3535
"x-tool": ["Elastic"],
36-
"User-Agent": ["v0.2.0"], // Keep this in sync with 'version' in package level manifest.yml.
36+
"User-Agent": ["v0.3.0"], // Keep this in sync with 'version' in package level manifest.yml.
3737
}.format_query()
3838
).with({
3939
"Header": {

packages/ti_google_threat_intelligence/data_stream/linux/agent/stream/cel.yml.hbs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ program: |
3333
?"query": has(state.query) ? optional.of([state.query]) : optional.none(),
3434
"limit": ["4000"],
3535
"x-tool": ["Elastic"],
36-
"User-Agent": ["v0.2.0"], // Keep this in sync with 'version' in package level manifest.yml.
36+
"User-Agent": ["v0.3.0"], // Keep this in sync with 'version' in package level manifest.yml.
3737
}.format_query()
3838
).with({
3939
"Header": {

packages/ti_google_threat_intelligence/data_stream/malicious_network_infrastructure/agent/stream/cel.yml.hbs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ program: |
3333
?"query": has(state.query) ? optional.of([state.query]) : optional.none(),
3434
"limit": ["4000"],
3535
"x-tool": ["Elastic"],
36-
"User-Agent": ["v0.2.0"], // Keep this in sync with 'version' in package level manifest.yml.
36+
"User-Agent": ["v0.3.0"], // Keep this in sync with 'version' in package level manifest.yml.
3737
}.format_query()
3838
).with({
3939
"Header": {

packages/ti_google_threat_intelligence/data_stream/malware/agent/stream/cel.yml.hbs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ program: |
3333
?"query": has(state.query) ? optional.of([state.query]) : optional.none(),
3434
"limit": ["4000"],
3535
"x-tool": ["Elastic"],
36-
"User-Agent": ["v0.2.0"], // Keep this in sync with 'version' in package level manifest.yml.
36+
"User-Agent": ["v0.3.0"], // Keep this in sync with 'version' in package level manifest.yml.
3737
}.format_query()
3838
).with({
3939
"Header": {

packages/ti_google_threat_intelligence/data_stream/mobile/agent/stream/cel.yml.hbs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ program: |
3333
?"query": has(state.query) ? optional.of([state.query]) : optional.none(),
3434
"limit": ["4000"],
3535
"x-tool": ["Elastic"],
36-
"User-Agent": ["v0.2.0"], // Keep this in sync with 'version' in package level manifest.yml.
36+
"User-Agent": ["v0.3.0"], // Keep this in sync with 'version' in package level manifest.yml.
3737
}.format_query()
3838
).with({
3939
"Header": {

packages/ti_google_threat_intelligence/data_stream/osx/agent/stream/cel.yml.hbs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ program: |
3333
?"query": has(state.query) ? optional.of([state.query]) : optional.none(),
3434
"limit": ["4000"],
3535
"x-tool": ["Elastic"],
36-
"User-Agent": ["v0.2.0"], // Keep this in sync with 'version' in package level manifest.yml.
36+
"User-Agent": ["v0.3.0"], // Keep this in sync with 'version' in package level manifest.yml.
3737
}.format_query()
3838
).with({
3939
"Header": {

packages/ti_google_threat_intelligence/elasticsearch/transform/domain_ioc/transform.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ _meta:
5454
managed: false
5555
# Bump this version to delete, reinstall, and restart the transform during
5656
# package installation.
57-
fleet_transform_version: 0.2.0
57+
fleet_transform_version: 0.3.0
5858
# We are currently using multiple source indices in this transform because system tests do not support
5959
# executing queries defined within the transform. This causes test failures, so we've raised the issue here:
6060
# https://github.com/elastic/elastic-package/issues/2676

0 commit comments

Comments
 (0)