Skip to content

Conversation

@efd6
Copy link
Contributor

@efd6 efd6 commented Jan 28, 2025

Proposed commit message

Assume that network direction that is no inbound can be validly semantically represented as outbound using the ECS fields available. This is probably not true; documented values of the ConnectionDirection are 0 - outbound, 1 - inbound, 2 - neither, and 3 - both[1].

Adhering strictly to inbound/outbound makes it impossible to map the data to ECS since neither and both would only be expressible as unknown.

[1]https://docs.panther.com/data-onboarding/supported-logs/crowdstrike/falcon-data-replicator#crowdstrike.networkconnect

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.
  • I have verified that any added dashboard complies with Kibana's Dashboard good practices

Author's Checklist

  • [ ]

How to test this PR locally

Related issues

Screenshots

@efd6 efd6 added Integration:crowdstrike CrowdStrike bugfix Pull request that fixes a bug issue Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations] labels Jan 28, 2025
@efd6 efd6 self-assigned this Jan 28, 2025
@efd6 efd6 force-pushed the 12476-crowdstrike branch from 101bf00 to d9ddf43 Compare January 28, 2025 21:58
@elastic-vault-github-plugin-prod

🚀 Benchmarks report

To see the full report comment with /test benchmark fullreport

@efd6 efd6 marked this pull request as ready for review January 28, 2025 22:41
@efd6 efd6 requested a review from a team as a January 28, 2025 22:41
@elasticmachine
Copy link

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

Copy link
Contributor

@kcreddy kcreddy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It would be nice to hear from user on #12476 (comment)

@efd6
Copy link
Contributor Author

efd6 commented Feb 3, 2025

Waiting for @monkeyonbranch. Setting as draft to avoid accidental merge.

@efd6 efd6 marked this pull request as draft February 3, 2025 05:00
@andrewkroh andrewkroh added Integration:1password 1Password (Partner supported) Integration:abnormal_security Abnormal AI New Integration Issue or pull request for creating a new integration package. labels Feb 4, 2025
@efd6 efd6 force-pushed the 12476-crowdstrike branch from 9444961 to 77e1e98 Compare February 4, 2025 04:15
@andrewkroh andrewkroh added Integration:crowdstrike CrowdStrike and removed Integration:crowdstrike CrowdStrike Integration:1password 1Password (Partner supported) Integration:abnormal_security Abnormal AI labels Feb 4, 2025
efd6 added 3 commits February 5, 2025 06:45
Assume that network direction that is no inbound can be validly semantically represented as outbound using the ECS fields available. This is probably not true; documented values of the ConnectionDirection are 0 - outbound, 1 - inbound, 2 - neither, and 3 - both[1]. Adhering strictly to inbound/outbound makes it impossible to map the data to ECS since neither and both would only be expressible as unknown. [1]https://docs.panther.com/data-onboarding/supported-logs/crowdstrike/falcon-data-replicator#crowdstrike.networkconnect
@efd6 efd6 force-pushed the 12476-crowdstrike branch from 77e1e98 to 07ef3af Compare February 4, 2025 20:16
@elasticmachine
Copy link

💚 Build Succeeded

History

  • 💚 Build #21534 succeeded 77e1e982380aa2f2019d880a656df960095f36a1
  • 💚 Build #21433 succeeded 9444961d34a6b9ca3d3760a10925edc6ab909415
  • 💚 Build #21147 succeeded d9ddf43df731beb8784f93a424cd6b2381607b8c

cc @efd6

@monkeyonbranch
Copy link
Contributor

Sorry for the long wait. Sometimes life happens.
Yes, the fixes looks good to me. It should provide and improvement in making sure the right data is being set when normalizing it.

@efd6
Copy link
Contributor Author

efd6 commented Feb 5, 2025

Thanks @monkeyonbranch. If there are any issues with the heuristic we are using, please file a new issue.

@efd6 efd6 marked this pull request as ready for review February 5, 2025 20:23
@efd6 efd6 merged commit eda4138 into elastic:main Feb 5, 2025
5 checks passed
qcorporation pushed a commit that referenced this pull request Feb 5, 2025
Assume that network direction that is not inbound can be validly semantically represented as outbound using the ECS fields available. This is probably not true; documented values of the ConnectionDirection are 0 - outbound, 1 - inbound, 2 - neither, and 3 - both[1]. Adhering strictly to inbound/outbound makes it impossible to map the data to ECS since neither and both would only be expressible as unknown. [1]https://docs.panther.com/data-onboarding/supported-logs/crowdstrike/falcon-data-replicator#crowdstrike.networkconnect
JoseLuisGJ pushed a commit to JoseLuisGJ/integrations that referenced this pull request Feb 6, 2025
Assume that network direction that is not inbound can be validly semantically represented as outbound using the ECS fields available. This is probably not true; documented values of the ConnectionDirection are 0 - outbound, 1 - inbound, 2 - neither, and 3 - both[1]. Adhering strictly to inbound/outbound makes it impossible to map the data to ECS since neither and both would only be expressible as unknown. [1]https://docs.panther.com/data-onboarding/supported-logs/crowdstrike/falcon-data-replicator#crowdstrike.networkconnect
@elastic-vault-github-plugin-prod

Package crowdstrike - 1.49.1 containing this change is available at https://epr.elastic.co/package/crowdstrike/1.49.1/

@efd6 efd6 deleted the 12476-crowdstrike branch February 7, 2025 08:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

bugfix Pull request that fixes a bug issue Integration:crowdstrike CrowdStrike New Integration Issue or pull request for creating a new integration package. Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations]

5 participants