Skip to content

Commit 30dff1c

Browse files
authored
Update ECS to 8.4.0 part 3 (#3843)
cisco_nexus cisco_secure_email_gateway cisco_secure_endpoint cisco_umbrella citrix_waf cloudflare crowdstrike cyberark cyberarkpas
1 parent 8018263 commit 30dff1c

File tree

148 files changed

+1106
-1066
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

148 files changed

+1106
-1066
lines changed
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
dependencies:
22
ecs:
3-
reference: git@v8.3.0
3+
reference: git@v8.4.0-rc1

packages/cisco_nexus/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# newer versions go on top
2+
- version: "0.7.0"
3+
changes:
4+
- description: Update package to ECS 8.4.0
5+
type: enhancement
6+
link: https://github.com/elastic/integrations/pull/3843
27
- version: "0.6.0"
38
changes:
49
- description: Update package to ECS 8.3.0.

packages/cisco_nexus/data_stream/log/_dev/test/pipeline/test-nexus.log-expected.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"expected": [
33
{
44
"ecs": {
5-
"version": "8.3.0"
5+
"version": "8.4.0"
66
},
77
"message": "2012 Dec 18 14:51:08 Nexus5010-B %AUTHPRIV-3-SYSTEM_MSG: pam_aaa:Authentication failed for user en from 2.2.2.1 - login",
88
"tags": [

packages/cisco_nexus/data_stream/log/elasticsearch/ingest_pipeline/default.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Pipeline for Cisco Nexus
44
processors:
55
- set:
66
field: ecs.version
7-
value: '8.3.0'
7+
value: '8.4.0'
88
# User agent
99
- user_agent:
1010
field: user_agent.original

packages/cisco_nexus/docs/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -177,7 +177,7 @@ An example event for `log` looks as following:
177177
| message | For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message. | match_only_text |
178178
| network.application | When a specific application or service is identified from network connection details (source/dest IPs, ports, certificates, or wire format), this field captures the application's or service's name. For example, the original event identifies the network connection being from a specific web service in a `https` network connection, like `facebook` or `twitter`. The field value must be normalized to lowercase for querying. | keyword |
179179
| network.bytes | Total bytes transferred in both directions. If `source.bytes` and `destination.bytes` are known, `network.bytes` is their sum. | long |
180-
| network.direction | Direction of the network traffic. Recommended values are: \* ingress \* egress \* inbound \* outbound \* internal \* external \* unknown When mapping events from a host-based monitoring context, populate this field from the host's point of view, using the values "ingress" or "egress". When mapping events from a network or perimeter-based monitoring context, populate this field from the point of view of the network perimeter, using the values "inbound", "outbound", "internal" or "external". Note that "internal" is not crossing perimeter boundaries, and is meant to describe communication between two hosts within the perimeter. Note also that "external" is meant to describe traffic between two hosts that are external to the perimeter. This could for example be useful for ISPs or VPN service providers. | keyword |
180+
| network.direction | Direction of the network traffic. When mapping events from a host-based monitoring context, populate this field from the host's point of view, using the values "ingress" or "egress". When mapping events from a network or perimeter-based monitoring context, populate this field from the point of view of the network perimeter, using the values "inbound", "outbound", "internal" or "external". Note that "internal" is not crossing perimeter boundaries, and is meant to describe communication between two hosts within the perimeter. Note also that "external" is meant to describe traffic between two hosts that are external to the perimeter. This could for example be useful for ISPs or VPN service providers. | keyword |
181181
| network.forwarded_ip | Host IP address when the source IP address is the proxy. | ip |
182182
| network.interface.name | | keyword |
183183
| network.packets | Total packets transferred in both directions. If `source.packets` and `destination.packets` are known, `network.packets` is their sum. | long |

packages/cisco_nexus/manifest.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
format_version: 1.0.0
22
name: cisco_nexus
33
title: Cisco Nexus
4-
version: "0.6.0"
4+
version: "0.7.0"
55
license: basic
66
description: Collect logs from Cisco Nexus with Elastic Agent.
77
type: integration
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
dependencies:
22
ecs:
3-
reference: git@v8.3.0
3+
reference: git@v8.4.0-rc1

packages/cisco_secure_email_gateway/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# newer versions go on top
2+
- version: "0.3.0"
3+
changes:
4+
- description: Update package to ECS 8.4.0
5+
type: enhancement
6+
link: https://github.com/elastic/integrations/pull/3843
27
- version: "0.2.1"
38
changes:
49
- description: Improve SSL config description and example.

packages/cisco_secure_email_gateway/data_stream/log/_dev/test/pipeline/test-common-amp.log-expected.json

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@
1111
}
1212
},
1313
"ecs": {
14-
"version": "8.3.0"
14+
"version": "8.4.0"
1515
},
1616
"email": {
1717
"attachments": {
@@ -54,7 +54,7 @@
5454
}
5555
},
5656
"ecs": {
57-
"version": "8.3.0"
57+
"version": "8.4.0"
5858
},
5959
"email": {
6060
"attachments": {
@@ -108,7 +108,7 @@
108108
}
109109
},
110110
"ecs": {
111-
"version": "8.3.0"
111+
"version": "8.4.0"
112112
},
113113
"email": {
114114
"attachments": {
@@ -149,7 +149,7 @@
149149
}
150150
},
151151
"ecs": {
152-
"version": "8.3.0"
152+
"version": "8.4.0"
153153
},
154154
"email": {
155155
"attachments": {
@@ -202,7 +202,7 @@
202202
}
203203
},
204204
"ecs": {
205-
"version": "8.3.0"
205+
"version": "8.4.0"
206206
},
207207
"email": {
208208
"attachments": {
@@ -248,7 +248,7 @@
248248
}
249249
},
250250
"ecs": {
251-
"version": "8.3.0"
251+
"version": "8.4.0"
252252
},
253253
"email": {
254254
"attachments": {
@@ -295,7 +295,7 @@
295295
}
296296
},
297297
"ecs": {
298-
"version": "8.3.0"
298+
"version": "8.4.0"
299299
},
300300
"email": {
301301
"attachments": {

packages/cisco_secure_email_gateway/data_stream/log/_dev/test/pipeline/test-common-anti-spam.log-expected.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
}
1515
},
1616
"ecs": {
17-
"version": "8.3.0"
17+
"version": "8.4.0"
1818
},
1919
"event": {
2020
"kind": "event",
@@ -45,7 +45,7 @@
4545
}
4646
},
4747
"ecs": {
48-
"version": "8.3.0"
48+
"version": "8.4.0"
4949
},
5050
"event": {
5151
"kind": "event",
@@ -77,7 +77,7 @@
7777
}
7878
},
7979
"ecs": {
80-
"version": "8.3.0"
80+
"version": "8.4.0"
8181
},
8282
"event": {
8383
"kind": "event",

0 commit comments

Comments
 (0)