-
Notifications
You must be signed in to change notification settings - Fork 474
Preserve auditd.log.record_type #10829
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Rather than renaming `auditd.log.record_type` to `event.action` and silently failing if `event.action` was pre-existing, set `event.action` with a copy of `auditd.log.record_type` if `event.type` is emtpy. This will preserve `auditd.log.record_type` if `event.type` is empty. Also, since the mappings are name instead of number based, fallback to `auditd.log.SYSCALL` to gather syscall ecs mappings if `auditd.log.syscall` fails.
Pinging @elastic/sec-linux-platform (Team:Security-Linux Platform) |
/test |
💚 Build Succeeded
History
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
"a2": "242", | ||
"a3": "180", | ||
"items": "2", | ||
"key": "delete\"\u001dARCH=x86_64", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That looks wrong. But it's unrelated to this PR.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Package auditd - 3.20.1 containing this change is available at https://epr.elastic.co/search?package=auditd |
* Preserve auditd.log.record_type Rather than renaming `auditd.log.record_type` to `event.action` and silently failing if `event.action` was pre-existing, set `event.action` with a copy of `auditd.log.record_type` if `event.type` is emtpy. This will preserve `auditd.log.record_type` if `event.type` is empty.
* Preserve auditd.log.record_type Rather than renaming `auditd.log.record_type` to `event.action` and silently failing if `event.action` was pre-existing, set `event.action` with a copy of `auditd.log.record_type` if `event.type` is emtpy. This will preserve `auditd.log.record_type` if `event.type` is empty.
Proposed commit message
Preserve auditd.log.record_type
Rather than renaming
auditd.log.record_type
toevent.action
and silently failing ifevent.action
was pre-existing, setevent.action
with a copy ofauditd.log.record_type
ifevent.type
is emtpy. This will preserveauditd.log.record_type
ifevent.type
is empty.Also, since the mappings are name instead of number based, fallback to<-- This needs more workauditd.log.SYSCALL
to gather syscall ecs mappings ifauditd.log.syscall
fails.Checklist
I have verified that all data streams collect metrics or logs.changelog.yml
file.I have verified that Kibana version constraints are current according to guidelines.Related issues