-   Notifications  
You must be signed in to change notification settings  - Fork 509
 
Set vulnerability ECS field based on Qualys data #11100
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…ection.vulnerability.qds_factors`
…tion.vulnerability.qds_factor`
|   The build is failing but it's passing on my laptop. Based on the logs, I'm not sure it's linked to my work. Do you have an idea on the root cause?  |  
|   Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)  |  
  |  
 🚀 Benchmarks reportPackage   |  
| Data stream | Previous EPS | New EPS | Diff (%) | Result | 
|---|---|---|---|---|
asset_host_detection |  1277.14 | 719.42 | -557.72 (-43.67%) | 💔 | 
knowledge_base |  1886.79 | 1483.68 | -403.11 (-21.36%) | 💔 | 
user_activity |  9090.91 | 7042.25 | -2048.66 (-22.54%) | 💔 | 
To see the full report comment with /test benchmark fullreport
   packages/qualys_vmdr/data_stream/asset_host_detection/elasticsearch/ingest_pipeline/default.yml  Outdated   Show resolved Hide resolved  
    packages/qualys_vmdr/data_stream/asset_host_detection/elasticsearch/ingest_pipeline/default.yml  Outdated   Show resolved Hide resolved  
    packages/qualys_vmdr/data_stream/asset_host_detection/elasticsearch/ingest_pipeline/default.yml  Outdated   Show resolved Hide resolved  
    packages/qualys_vmdr/data_stream/asset_host_detection/elasticsearch/ingest_pipeline/default.yml  Outdated   Show resolved Hide resolved  
    |  
 💚 Build Succeeded
 History
  |  
|   I've implemented @efd6's suggestion. I believe it's ready to be merged.  |  
|   Package qualys_vmdr - 5.1.0 containing this change is available at https://epr.elastic.co/search?package=qualys_vmdr  |  




…ection.vulnerability.qds_factors`
Proposed commit message
In this version
5.1.0, the following changes have been made:vulnerability.score.basefield based on the item CVSS item under fieldqualys_vmdr.asset_host_detection.vulnerability.qds_factorsvulnerability.classificationfield to CVSSvulnerability.severityfield based onvulnerability.score.basevulnerability.scanner.vendorfield to Qualysvulnerability.score.versionfield based on the item CVSS_vector item under fieldqualys_vmdr.asset_host_detection.vulnerability.qds_factorsChecklist
changelog.ymlfile.Author's Checklist
How to test this PR locally
Related issues
Screenshots