- Notifications
You must be signed in to change notification settings - Fork 513
cisco_duo: Make retry options configurable in CEL-based datastreams #11822
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
🚀 Benchmarks reportPackage |
| Data stream | Previous EPS | New EPS | Diff (%) | Result |
|---|---|---|---|---|
activity | 3649.64 | 2857.14 | -792.5 (-21.71%) | 💔 |
telephony_v2 | 22222.22 | 14925.37 | -7296.85 (-32.84%) | 💔 |
trust_monitor | 16393.44 | 9345.79 | -7047.65 (-42.99%) | 💔 |
To see the full report comment with /test benchmark fullreport
| Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
chemamartinez left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It may be worthy to include the same options for the rest of the data streams using CEL
Agreed. Will do |
chemamartinez left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
|
💚 Build Succeeded
History
cc @kcreddy |
| Package cisco_duo - 2.2.6 containing this change is available at https://epr.elastic.co/package/cisco_duo/2.2.6/ |
…11822) Cisco Duo Admin API has very low API request limit (Ex: `not more than 1 request per minute` for Authentication logs). Reaching this limit would lead to `42901` from the API. The response also doesn't include a `Retry-After` header, which leads to a default back-off retry attempts. This subsequently leads to further `42901` as the limit is already reached. This PR allows users to set optional retry configuration allowed by CEL input for CEL-based data-streams. When number of retries are reduces, this helps in reducing the number retry requests being made when already reached `429`.
…lastic#11822) Cisco Duo Admin API has very low API request limit (Ex: `not more than 1 request per minute` for Authentication logs). Reaching this limit would lead to `42901` from the API. The response also doesn't include a `Retry-After` header, which leads to a default back-off retry attempts. This subsequently leads to further `42901` as the limit is already reached. This PR allows users to set optional retry configuration allowed by CEL input for CEL-based data-streams. When number of retries are reduces, this helps in reducing the number retry requests being made when already reached `429`.
…11822) Cisco Duo Admin API has very low API request limit (Ex: `not more than 1 request per minute` for Authentication logs). Reaching this limit would lead to `42901` from the API. The response also doesn't include a `Retry-After` header, which leads to a default back-off retry attempts. This subsequently leads to further `42901` as the limit is already reached. This PR allows users to set optional retry configuration allowed by CEL input for CEL-based data-streams. When number of retries are reduces, this helps in reducing the number retry requests being made when already reached `429`.
…lastic#11822) Cisco Duo Admin API has very low API request limit (Ex: `not more than 1 request per minute` for Authentication logs). Reaching this limit would lead to `42901` from the API. The response also doesn't include a `Retry-After` header, which leads to a default back-off retry attempts. This subsequently leads to further `42901` as the limit is already reached. This PR allows users to set optional retry configuration allowed by CEL input for CEL-based data-streams. When number of retries are reduces, this helps in reducing the number retry requests being made when already reached `429`.




Proposed commit message
Cisco Duo Admin API has very low API request limit (Ex:
not more than 1 request per minutefor Authentication logs). Reaching this limit would lead to42901from the API. The response also doesn't include aRetry-Afterheader, which leads to a default back-off retry attempts. This subsequently leads to further42901as the limit is already reached.This PR allows users to set optional retry configuration allowed by CEL input for CEL-based data-streams. When number of retries are reduces, this helps in reducing the number retry requests being made when already reached
429.Reference:
https://help.duo.com/s/article/1338?language=en_US
https://duo.com/docs/adminapi#authentication-logs
https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-input-cel.html#_resource_retry_max_attempts
Note
This only reduces
42901Too Many Requests from the retry attempts. The users have to tuneIntervalandRate limitto avoid the42901from the initial request (non-retry).Checklist
changelog.ymlfile.Screenshots