Skip to content

Commit e7ac517

Browse files
ti_crowdstrike: add agentless deployment
1 parent fa1c3f9 commit e7ac517

File tree

6 files changed

+61
-3
lines changed

6 files changed

+61
-3
lines changed

packages/ti_crowdstrike/_dev/build/docs/README.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,11 @@
22

33
CrowdStrike Falcon Intelligence is a threat intelligence product that provides advanced cybersecurity insights to organizations. Leveraging machine learning and behavioural analytics, Falcon Intelligence delivers real-time threat data, enabling proactive threat detection and response. With a focus on actionable intelligence, it empowers businesses to stay ahead of cyber adversaries and enhance their overall security posture. This [CrowdStrike Falcon Intelligence](https://www.crowdstrike.com/en-us/) integration enables you to consume and analyze CrowdStrike Falcon Intelligence data within Elastic Security, including Intel Indicator and IOCs, providing you with visibility and context for your cloud environments within Elastic Security.
44

5+
## Agentless Enabled Integration
6+
7+
Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to [Agentless integrations](https://www.elastic.co/guide/en/serverless/current/security-agentless-integrations.html) and the [Agentless integrations FAQ](https://www.elastic.co/guide/en/serverless/current/agentless-integration-troubleshooting.html).
8+
Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.
9+
510
## Data streams
611

712
The CrowdStrike Falcon Intelligence integration collects two types of data: IOC and Intel Indicator.

packages/ti_crowdstrike/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# newer versions go on top
2+
- version: "2.6.0"
3+
changes:
4+
- description: Enable Agentless deployment.
5+
type: enhancement
6+
link: https://github.com/elastic/integrations/pull/15249
27
- version: "2.5.0"
38
changes:
49
- description: Remove duplicated installation instructions from the documentation

packages/ti_crowdstrike/data_stream/intel/elasticsearch/ingest_pipeline/default.yml

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,17 @@ processors:
55
field: ecs.version
66
tag: set_ecs_version
77
value: 8.11.0
8+
- remove:
9+
field:
10+
- organization
11+
- division
12+
- team
13+
ignore_missing: true
14+
if: ctx.organization instanceof String && ctx.division instanceof String && ctx.team instanceof String
15+
tag: remove_agentless_tags
16+
description: >-
17+
Removes the fields added by Agentless as metadata,
18+
as they can collide with ECS fields.
819
- set:
920
field: event.kind
1021
tag: set_event_kind
@@ -29,6 +40,11 @@ processors:
2940
target_field: event.original
3041
ignore_missing: true
3142
if: ctx.event?.original == null
43+
- remove:
44+
field: message
45+
ignore_missing: true
46+
if: ctx.event?.original != null
47+
description: 'The `message` field is no longer required if the document has an `event.original` field.'
3248
- json:
3349
field: event.original
3450
tag: json_event_original

packages/ti_crowdstrike/data_stream/ioc/elasticsearch/ingest_pipeline/default.yml

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,17 @@ processors:
55
field: ecs.version
66
tag: set_ecs_version
77
value: 8.11.0
8+
- remove:
9+
field:
10+
- organization
11+
- division
12+
- team
13+
ignore_missing: true
14+
if: ctx.organization instanceof String && ctx.division instanceof String && ctx.team instanceof String
15+
tag: remove_agentless_tags
16+
description: >-
17+
Removes the fields added by Agentless as metadata,
18+
as they can collide with ECS fields.
819
- set:
920
field: event.kind
1021
tag: set_event_kind
@@ -29,6 +40,11 @@ processors:
2940
target_field: event.original
3041
ignore_missing: true
3142
if: ctx.event?.original == null
43+
- remove:
44+
field: message
45+
ignore_missing: true
46+
if: ctx.event?.original != null
47+
description: 'The `message` field is no longer required if the document has an `event.original` field.'
3248
- json:
3349
field: event.original
3450
tag: json_event_original

packages/ti_crowdstrike/docs/README.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,11 @@
22

33
CrowdStrike Falcon Intelligence is a threat intelligence product that provides advanced cybersecurity insights to organizations. Leveraging machine learning and behavioural analytics, Falcon Intelligence delivers real-time threat data, enabling proactive threat detection and response. With a focus on actionable intelligence, it empowers businesses to stay ahead of cyber adversaries and enhance their overall security posture. This [CrowdStrike Falcon Intelligence](https://www.crowdstrike.com/en-us/) integration enables you to consume and analyze CrowdStrike Falcon Intelligence data within Elastic Security, including Intel Indicator and IOCs, providing you with visibility and context for your cloud environments within Elastic Security.
44

5+
## Agentless Enabled Integration
6+
7+
Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to [Agentless integrations](https://www.elastic.co/guide/en/serverless/current/security-agentless-integrations.html) and the [Agentless integrations FAQ](https://www.elastic.co/guide/en/serverless/current/agentless-integration-troubleshooting.html).
8+
Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.
9+
510
## Data streams
611

712
The CrowdStrike Falcon Intelligence integration collects two types of data: IOC and Intel Indicator.

packages/ti_crowdstrike/manifest.yml

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
1-
format_version: 3.0.3
1+
format_version: 3.3.2
22
name: ti_crowdstrike
33
title: CrowdStrike Falcon Intelligence
4-
version: "2.5.0"
4+
version: "2.6.0"
55
description: Collect logs from CrowdStrike Falcon Intelligence with Elastic Agent.
66
type: integration
77
categories:
88
- security
99
- threat_intel
1010
conditions:
1111
kibana:
12-
version: "^8.13.0 || ^9.0.0"
12+
version: "^8.18.0 || ^9.0.0"
1313
elastic:
1414
subscription: basic
1515
screenshots:
@@ -30,6 +30,17 @@ policy_templates:
3030
- name: ti_crowdstrike
3131
title: CrowdStrike Falcon Intelligence logs
3232
description: Collect CrowdStrike Falcon Intelligence logs.
33+
deployment_modes:
34+
default:
35+
enabled: true
36+
agentless:
37+
enabled: true
38+
organization: security
39+
division: engineering
40+
team: security-service-integrations
41+
resources:
42+
requests:
43+
memory: 4Gi
3344
inputs:
3445
- type: cel
3546
title: Collect CrowdStrike Falcon Intelligence logs via API

0 commit comments

Comments
 (0)