-
Notifications
You must be signed in to change notification settings - Fork 497
{microsoft_defender_endpoint, m365_defender}.vulnerability: New API implementation #15603
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
...s/m365_defender/kibana/visualization/m365_defender-4f3a6702-9642-4392-9b34-ceb1447e09a7.json
Show resolved
Hide resolved
packages/m365_defender/data_stream/vulnerability/agent/stream/cel.yml.hbs
Outdated
Show resolved
Hide resolved
packages/microsoft_defender_endpoint/_dev/deploy/docker/vulnerability-http-mock-config.yml
Outdated
Show resolved
Hide resolved
...endpoint/kibana/search/microsoft_defender_endpoint-89e2c263-f9c2-4f34-85d2-86b1d1b9106b.json
Outdated
Show resolved
Hide resolved
...t/kibana/visualization/microsoft_defender_endpoint-4f3a6702-9642-4392-9b34-ceb1447e09a7.json
Show resolved
Hide resolved
packages/m365_defender/data_stream/vulnerability/agent/stream/cel.yml.hbs
Outdated
Show resolved
Hide resolved
packages/m365_defender/data_stream/vulnerability/agent/stream/cel.yml.hbs
Outdated
Show resolved
Hide resolved
packages/microsoft_defender_endpoint/data_stream/vulnerability/agent/stream/cel.yml.hbs
Outdated
Show resolved
Hide resolved
- description: | | ||
Fetch vulnerability data using SoftwareVulnerabilitiesExport API endpoint. | ||
Following fields are no longer available in new implementation: "cloud.provider", "cloud.resource_id", | ||
"cloud.instance.id", "host.geo", "host.ip", "host.risk.calculated_level", "related.ip", | ||
"vulnerability.description", "vulnerability.published_date", "vulnerability.score.version". | ||
If there are custom dashboards using these fields, they could be broken. | ||
type: breaking-change | ||
link: https://github.com/elastic/integrations/pull/15603 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- description: | | |
Fetch vulnerability data using SoftwareVulnerabilitiesExport API endpoint. | |
Following fields are no longer available in new implementation: "cloud.provider", "cloud.resource_id", | |
"cloud.instance.id", "host.geo", "host.ip", "host.risk.calculated_level", "related.ip", | |
"vulnerability.description", "vulnerability.published_date", "vulnerability.score.version". | |
If there are custom dashboards using these fields, they could be broken. | |
type: breaking-change | |
link: https://github.com/elastic/integrations/pull/15603 | |
- description: | | |
Fetch vulnerability data using SoftwareVulnerabilitiesExport API endpoint. | |
type: enhancement | |
link: https://github.com/elastic/integrations/pull/15603 | |
- description: | | |
The following fields are no longer available in the new implementation: "cloud.provider", "cloud.resource_id", | |
"cloud.instance.id", "host.geo", "host.ip", "host.risk.calculated_level", "related.ip", | |
"vulnerability.description", "vulnerability.published_date", "vulnerability.score.version". | |
type: breaking-change | |
link: https://github.com/elastic/integrations/pull/15603 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updated in 2f1492e
- description: | | ||
Fetch vulnerability data using SoftwareVulnerabilitiesExport API endpoint. | ||
Following fields are no longer available in new implementation: "cloud.provider", "cloud.resource_id", | ||
"cloud.instance.id", "host.geo", "host.ip", "host.risk.calculated_level", "related.ip", | ||
"vulnerability.description", "vulnerability.published_date", "vulnerability.score.version". | ||
If there are custom dashboards using these fields, they could be broken. | ||
type: breaking-change | ||
link: https://github.com/elastic/integrations/pull/15603 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- description: | | |
Fetch vulnerability data using SoftwareVulnerabilitiesExport API endpoint. | |
Following fields are no longer available in new implementation: "cloud.provider", "cloud.resource_id", | |
"cloud.instance.id", "host.geo", "host.ip", "host.risk.calculated_level", "related.ip", | |
"vulnerability.description", "vulnerability.published_date", "vulnerability.score.version". | |
If there are custom dashboards using these fields, they could be broken. | |
type: breaking-change | |
link: https://github.com/elastic/integrations/pull/15603 | |
- description: | | |
Fetch vulnerability data using SoftwareVulnerabilitiesExport API endpoint. | |
type: enhancement | |
link: https://github.com/elastic/integrations/pull/15603 | |
- description: | | |
The following fields are no longer available in the new implementation: "cloud.provider", "cloud.resource_id", | |
"cloud.instance.id", "host.geo", "host.ip", "host.risk.calculated_level", "related.ip", | |
"vulnerability.description", "vulnerability.published_date", "vulnerability.score.version". | |
type: breaking-change | |
link: https://github.com/elastic/integrations/pull/15603 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updated in 2f1492e
data_stream: | ||
vars: | ||
batch_size: 2 | ||
sas_valid_hours: 2 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
sas_valid_hours: 2 | |
sas_valid_hours: 2h |
data_stream: | ||
vars: | ||
batch_size: 2 | ||
sas_valid_hours: 2 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
sas_valid_hours: 2 | |
sas_valid_hours: 2h |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks. Updated in 2f1492e
🚀 Benchmarks reportTo see the full report comment with |
💚 Build Succeeded
History
cc @kcreddy |
string(vulnerabilityResp.Body) | ||
"code": string(resp.StatusCode), | ||
"id": string(resp.Status), | ||
"message": "GET "+ state.url.trim_right("/") + ":" + ( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"message": "GET "+ state.url.trim_right("/") + ":" + ( | |
"message": "GET /api/machines/SoftwareVulnerabilitiesExport :" + ( |
Since there is a change in the transform schema, the |
Proposed commit message
Checklist
changelog.yml
file.Author's Checklist
How to test this PR locally
Pipeline tests and System tests pass.
Related issues
Screenshots
Updated dashboards:
Upgrade Flow
mde-vulnerability-3.1-to-3.2-upgrade-flow.mp4