Skip to content

system: improve event.{action,category,outcome} enrichment for auth datastream #6966

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Jul 18, 2023

Conversation

efd6
Copy link
Contributor

@efd6 efd6 commented Jul 17, 2023

What does this PR do?

Enriches event fields for pam session and auth messages and for process-related auth messages.

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.

Author's Checklist

  • [ ]

How to test this PR locally

Related issues

Screenshots

Comment on lines +89 to +96
- set:
field: event.action
value: 'logged-on'
if: ctx.message != null && ctx.message.contains('session opened')
- set:
field: event.action
value: 'logged-off'
if: ctx.message != null && ctx.message.contains('session closed')
Copy link
Contributor Author

@efd6 efd6 Jul 17, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ISTM that these should be "session-opened" and "session-closed" since this is not a login, but if these are the terms that are used in the security solution they are OK as is.

@elasticmachine
Copy link

elasticmachine commented Jul 17, 2023

💚 Build Succeeded

the below badges are clickable and redirect to their specific view in the CI or DOCS
Pipeline View Test View Changes Artifacts preview preview

Expand to view the summary

Build stats

  • Start Time: 2023-07-18T06:42:04.822+0000

  • Duration: 15 min 33 sec

Test stats 🧪

Test Results
Failed 0
Passed 146
Skipped 0
Total 146

🤖 GitHub comments

Expand to view the GitHub comments

To re-run your PR in the CI, just comment with:

  • /test : Re-trigger the build.

@elasticmachine
Copy link

elasticmachine commented Jul 17, 2023

🌐 Coverage report

Name Metrics % (covered/total) Diff
Packages 100.0% (3/3) 💚
Files 100.0% (4/4) 💚 2.778
Classes 100.0% (4/4) 💚 2.778
Methods 60.759% (48/79) 👎 -31.388
Lines 99.86% (2852/2856) 👍 8.712
Conditionals 100.0% (0/0) 💚

@efd6 efd6 marked this pull request as ready for review July 17, 2023 00:42
@efd6 efd6 requested a review from a team as a code owner July 17, 2023 00:42
@elasticmachine
Copy link

Pinging @elastic/security-external-integrations (Team:Security-External Integrations)

Copy link
Contributor

@lalit-satapathy lalit-satapathy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM codeowner; as it is security datastream

Copy link
Contributor

@kcreddy kcreddy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM 👍🏼

@efd6 efd6 merged commit f7588cb into elastic:main Jul 18, 2023
@elasticmachine
Copy link

Package system - 1.37.0 containing this change is available at https://epr.elastic.co/search?package=system

@efd6 efd6 deleted the 6550-system branch February 5, 2025 22:10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request Integration:system System
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[System.auth] Adding ECS category fields
4 participants