Skip to content

[system] Fix condition in handlebar file of security data stream #14674

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 4 commits into from
Jul 24, 2025

Conversation

janvi-elastic
Copy link
Contributor

Proposed commit message

In System integration with default config, getting an error while saving the integration 
so fix if condition in handlebar file of security data stream.

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.
  • I have verified that any added dashboard complies with Kibana's Dashboard good practices

How to test this PR locally

  • Clone integrations repo.
  • Install elastic package locally.
  • Start elastic stack using elastic-package.
  • Move to integrations/packages/system directory.
  • Run the following command to run tests.

elastic-package test

@janvi-elastic janvi-elastic requested review from a team as code owners July 24, 2025 11:02
@andrewkroh andrewkroh added Integration:system System Crest Contributions from Crest developement team. Team:Security-Windows Platform Security Windows Platform team [elastic/sec-windows-platform] labels Jul 24, 2025
@elasticmachine
Copy link

Pinging @elastic/sec-windows-platform (Team:Security-Windows Platform)

@elastic-vault-github-plugin-prod
Copy link

elastic-vault-github-plugin-prod bot commented Jul 24, 2025

🚀 Benchmarks report

Package system 👍(0) 💚(2) 💔(1)

Expand to view
Data stream Previous EPS New EPS Diff (%) Result
syslog 500000 333333.33 -166666.67 (-33.33%) 💔

To see the full report comment with /test benchmark fullreport

@opauloh
Copy link
Contributor

opauloh commented Jul 24, 2025

Hi @janvi-elastic

For the future, Policy testing can be added to catch errors when updating Handlebars: https://github.com/elastic/elastic-package/blob/main/docs/howto/policy_testing.md

For context, a similar error happened to me when editing the handlebars file in the Auditd Manager integration, and then we learned that policy tests spin a Kibana Snapshot to attempt to save an integration policy, which will catch errors with the handlebars. Here is how they are configured in AuditdManager

Copy link

@elasticmachine
Copy link

💚 Build Succeeded

History

@kpollich kpollich merged commit 5cab4c9 into elastic:main Jul 24, 2025
9 checks passed
@elastic-vault-github-plugin-prod

Package system - 2.5.1 containing this change is available at https://epr.elastic.co/package/system/2.5.1/

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Crest Contributions from Crest developement team. Integration:system System Team:Security-Windows Platform Security Windows Platform team [elastic/sec-windows-platform]
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants