-
Notifications
You must be signed in to change notification settings - Fork 474
[suricata] Handle empty tls data #10756
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
It's possible for Suricata logs to have app_proto=tls, but not provide a tls object. This will handle this case by checking for the existing of the tls object before running the tls pipeline that parses this object.
Pinging @elastic/sec-deployment-and-devices (Team:Security-Deployment and Devices) |
packages/suricata/data_stream/eve/elasticsearch/ingest_pipeline/default.yml
Outdated
Show resolved
Hide resolved
…e/default.yml Co-authored-by: Andrew Kroh <andrew.kroh@elastic.co>
🚀 Benchmarks reportTo see the full report comment with |
💚 Build Succeeded
History
cc @mjwolf |
|
Package suricata - 2.21.2 containing this change is available at https://epr.elastic.co/search?package=suricata |
It's possible for Suricata logs to have app_proto=tls, but not provide a tls object. This will handle this case by checking for the existing of the tls object before running the tls pipeline that parses this object. --------- Co-authored-by: Andrew Kroh <andrew.kroh@elastic.co>
It's possible for Suricata logs to have app_proto=tls, but not provide a tls object. This will handle this case by checking for the existing of the tls object before running the tls pipeline that parses this object. --------- Co-authored-by: Andrew Kroh <andrew.kroh@elastic.co>
Proposed commit message
It's possible for Suricata logs to have app_proto=tls, but not provide a tls object. This will handle this case by checking for the existing of the tls object before running the tls pipeline that parses this object.
Checklist
changelog.yml
file.