Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions packages/aws/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "4.3.2"
changes:
- description: Update transform to filter out document containing an error.message from AWS Config, AWS Inspector, and AWS Security Hub latest indexes.
type: bugfix
link: https://github.com/elastic/integrations/pull/15722
- version: "4.3.1"
changes:
- description: Update the AWS CloudWatch documentation.
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,11 @@
source:
index:
- "logs-aws.securityhub_findings_full_posture-*"
query:
bool:
must_not:
exists:
field: error.message
dest:
index: "security_solution-aws.misconfiguration_latest-v2"
aliases:
Expand All @@ -27,4 +32,4 @@ _meta:
managed: true
# Bump this version to delete, reinstall, and restart the transform during package.
# Version bump is needed if there is any code change in transform.
fleet_transform_version: 0.2.0
fleet_transform_version: 0.2.1
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@
source:
index:
- "logs-aws.config-*"
query:
bool:
must_not:
exists:
field: error.message
dest:
index: "security_solution-awsconfig.misconfiguration_latest-v1"
aliases:
Expand Down Expand Up @@ -30,4 +35,4 @@ _meta:
managed: true
# Bump this version to delete, reinstall, and restart the transform during
# package installation.
fleet_transform_version: 0.1.0
fleet_transform_version: 0.1.1
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,9 @@ source:
aws.inspector.status: ACTIVE
- match:
aws.inspector.type: PACKAGE_VULNERABILITY
must_not:
exists:
field: error.message
dest:
index: "security_solution-awsinspector.vulnerability_latest-v1"
aliases:
Expand All @@ -33,4 +36,4 @@ _meta:
managed: true
# Bump this version to delete, reinstall, and restart the transform during package.
# Version bump is needed if there is any code change in transform.
fleet_transform_version: 0.1.0
fleet_transform_version: 0.1.1
2 changes: 1 addition & 1 deletion packages/aws/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: 3.3.2
name: aws
title: AWS
version: "4.3.1"
version: "4.3.2"
description: Collect logs and metrics from Amazon Web Services (AWS) with Elastic Agent.
type: integration
categories:
Expand Down
5 changes: 5 additions & 0 deletions packages/cloud_security_posture/changelog.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,11 @@
# 1.4.x - 8.9.x
# 1.3.x - 8.8.x
# 1.2.x - 8.7.x
- version: "3.1.1"
changes:
- description: Update transform to filter out documents containing an error message from latest vulnerability and misconfiguration indexes.
type: enhancement
link: https://github.com/elastic/integrations/pull/15722
- version: "3.1.0"
changes:
- description: Release version 3.1.0
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,11 @@
source:
index:
- "logs-cloud_security_posture.findings-*"
query:
bool:
must_not:
exists:
field: error.message
dest:
index: "security_solution-cloud_security_posture.misconfiguration_latest-v1"
aliases:
Expand All @@ -27,4 +32,4 @@ _meta:
managed: true
# Bump this version to delete, reinstall, and restart the transform during package.
# Version bump is needed if there is any code change in transform.
fleet_transform_version: 0.2.0
fleet_transform_version: 0.2.1
2 changes: 1 addition & 1 deletion packages/cloud_security_posture/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: 3.3.2
name: cloud_security_posture
title: "Security Posture Management"
version: "3.1.0"
version: "3.1.1"
source:
license: "Elastic-2.0"
description: "Identify & remediate configuration risks in your Cloud infrastructure"
Expand Down
5 changes: 5 additions & 0 deletions packages/google_scc/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "2.2.1"
changes:
- description: Update transform to filter out documents containing an error.message from latest vulnerability and misconfiguration indexes.
type: bugfix
link: https://github.com/elastic/integrations/pull/15722
- version: "2.2.0"
changes:
- description: Prevent updating fleet health status to degraded.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,9 @@ source:
must:
- match:
google_scc.finding.class: MISCONFIGURATION
must_not:
exists:
field: error.message
dest:
index: "security_solution-google_scc.misconfiguration_latest-v1"
aliases:
Expand Down Expand Up @@ -33,4 +36,4 @@ _meta:
managed: true
# Bump this version to delete, reinstall, and restart the transform during package.
# Version bump is needed if there is any code change in transform.
fleet_transform_version: 0.1.0
fleet_transform_version: 0.1.1
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,9 @@ source:
google_scc.finding.class: VULNERABILITY
- match:
google_scc.finding.state: ACTIVE
must_not:
exists:
field: error.message
dest:
index: "security_solution-google_scc.vulnerability_latest-v1"
aliases:
Expand Down Expand Up @@ -36,4 +39,4 @@ _meta:
managed: true
# Bump this version to delete, reinstall, and restart the transform during package.
# Version bump is needed if there is any code change in transform.
fleet_transform_version: 0.1.0
fleet_transform_version: 0.1.1
2 changes: 1 addition & 1 deletion packages/google_scc/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: "3.2.3"
name: google_scc
title: Google Security Command Center
version: "2.2.0"
version: "2.2.1"
description: Collect logs from Google Security Command Center with Elastic Agent.
type: integration
categories:
Expand Down
5 changes: 5 additions & 0 deletions packages/m365_defender/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "5.0.1"
changes:
- description: Update transform to filter out documents containing an error.message from vulnerability latest index
type: bugfix
link: https://github.com/elastic/integrations/pull/15722
- version: "5.0.0"
changes:
- description: |
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,9 @@ source:
filter:
- exists:
field: resource.id
must_not:
exists:
field: error.message
dest:
index: "security_solution-m365_defender.vulnerability_latest-v2"
aliases:
Expand Down Expand Up @@ -37,4 +40,4 @@ _meta:
managed: true
# Bump this version to delete, reinstall, and restart the transform during package.
# Version bump is needed if there is any code change in transform.
fleet_transform_version: 0.2.0
fleet_transform_version: 0.2.1
2 changes: 1 addition & 1 deletion packages/m365_defender/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: "3.4.0"
name: m365_defender
title: Microsoft Defender XDR
version: "5.0.0"
version: "5.0.1"
description: Collect logs from Microsoft Defender XDR with Elastic Agent.
categories:
- "security"
Expand Down
5 changes: 5 additions & 0 deletions packages/microsoft_defender_cloud/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "3.1.1"
changes:
- description: Update transform to filter out documents containing an error.message from latest vulnerability and misconfiguration indexes.
type: bugfix
link: https://github.com/elastic/integrations/pull/15722
- version: "3.1.0"
changes:
- description: Add `vulnerability_workflow` and `misconfiguration_workflow` sub category label.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,9 @@ source:
must:
- match:
microsoft_defender_cloud.assessment.class: misconfiguration
must_not:
exists:
field: error.message
dest:
index: 'security_solution-microsoft_defender_cloud.misconfiguration_latest-v1'
aliases:
Expand Down Expand Up @@ -33,4 +36,4 @@ _meta:
managed: true
# Bump this version to delete, reinstall, and restart the transform during package.
# Version bump is needed if there is any code change in transform.
fleet_transform_version: 0.1.0
fleet_transform_version: 0.1.1
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,9 @@ source:
event.outcome: failure
- exists:
field: package.name
must_not:
exists:
field: error.message
dest:
index: 'security_solution-microsoft_defender_cloud.vulnerability_latest-v1'
aliases:
Expand Down Expand Up @@ -39,4 +42,4 @@ _meta:
managed: true
# Bump this version to delete, reinstall, and restart the transform during package.
# Version bump is needed if there is any code change in transform.
fleet_transform_version: 0.1.0
fleet_transform_version: 0.1.1
2 changes: 1 addition & 1 deletion packages/microsoft_defender_cloud/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: '3.3.2'
name: microsoft_defender_cloud
title: Microsoft Defender for Cloud
version: '3.1.0'
version: '3.1.1'
description: Collect logs from Microsoft Defender for Cloud with Elastic Agent.
type: integration
categories:
Expand Down
5 changes: 5 additions & 0 deletions packages/microsoft_defender_endpoint/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "4.1.1"
changes:
- description: Update transform to filter out documents containing an error.message from vulnerability latest index
type: bugfix
link: https://github.com/elastic/integrations/pull/15722
- version: "4.1.0"
changes:
- description: Add support for OAuth2 Endpoint Params option.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@
source:
index:
- "logs-microsoft_defender_endpoint.machine_action-*"
query:
bool:
must_not:
- exists:
field: error.message
dest:
index: "logs-microsoft_defender_endpoint_latest.dest_action"
aliases:
Expand All @@ -28,5 +33,5 @@ _meta:
managed: false
# Bump this version to delete, reinstall, and restart the transform during
# package installation.
fleet_transform_version: 1.0.0
fleet_transform_version: 1.0.1
run_as_kibana_system: false
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,9 @@ source:
filter:
- exists:
field: resource.id
must_not:
exists:
field: error.message
dest:
index: "security_solution-microsoft_defender_endpoint.vulnerability_latest-v2"
aliases:
Expand Down Expand Up @@ -37,4 +40,4 @@ _meta:
managed: true
# Bump this version to delete, reinstall, and restart the transform during package.
# Version bump is needed if there is any code change in transform.
fleet_transform_version: 0.2.0
fleet_transform_version: 0.2.1
2 changes: 1 addition & 1 deletion packages/microsoft_defender_endpoint/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: "3.4.0"
name: microsoft_defender_endpoint
title: Microsoft Defender for Endpoint
version: "4.1.0"
version: "4.1.1"
description: Collect logs from Microsoft Defender for Endpoint with Elastic Agent.
categories:
- security
Expand Down
5 changes: 5 additions & 0 deletions packages/qualys_vmdr/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "6.10.1"
changes:
- description: Update transform to filter out documents containing an error.message from vulnerability latest index
type: bugfix
link: https://github.com/elastic/integrations/pull/15722
- version: "6.10.0"
changes:
- description: Add `vulnerability_workflow` sub category label.
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,11 @@
source:
index:
- "logs-qualys_vmdr.asset_host_detection-*"
query:
bool:
must_not:
exists:
field: error.message
dest:
index: "security_solution-qualys_vmdr.vulnerability_latest-v1"
aliases:
Expand All @@ -27,4 +32,4 @@ _meta:
managed: true
# Bump this version to delete, reinstall, and restart the transform during package.
# Version bump is needed if there is any code change in transform.
fleet_transform_version: 0.1.0
fleet_transform_version: 0.1.1
2 changes: 1 addition & 1 deletion packages/qualys_vmdr/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: "3.4.0"
name: qualys_vmdr
title: Qualys VMDR
version: "6.10.0"
version: "6.10.1"
description: Collect data from Qualys VMDR platform with Elastic Agent.
type: integration
categories:
Expand Down
5 changes: 5 additions & 0 deletions packages/rapid7_insightvm/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "2.4.1"
changes:
- description: Update transform to filter out documents containing an error.message from vulnerability latest index
type: bugfix
link: https://github.com/elastic/integrations/pull/15722
- version: "2.4.0"
changes:
- description: Prevent updating fleet health status to degraded.
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,11 @@
source:
index:
- "logs-rapid7_insightvm.asset_vulnerability-*"
query:
bool:
must_not:
exists:
field: error.message
dest:
index: "security_solution-rapid7_insightvm.vulnerability_latest-v1"
aliases:
Expand All @@ -27,4 +32,4 @@ _meta:
managed: true
# Bump this version to delete, reinstall, and restart the transform during package.
# Version bump is needed if there is any code change in transform.
fleet_transform_version: 0.1.0
fleet_transform_version: 0.1.1
2 changes: 1 addition & 1 deletion packages/rapid7_insightvm/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: "3.4.0"
name: rapid7_insightvm
title: Rapid7 InsightVM
version: "2.4.0"
version: "2.4.1"
source:
license: "Elastic-2.0"
description: Collect logs from Rapid7 InsightVM with Elastic Agent.
Expand Down
5 changes: 5 additions & 0 deletions packages/tenable_io/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "4.4.1"
changes:
- description: Update transform to filter out documents containing an error.message from vulnerability latest index
type: bugfix
link: https://github.com/elastic/integrations/pull/15722
- version: "4.4.0"
changes:
- description: Add `vulnerability_workflow` sub category label.
Expand Down
Loading