Skip to content

DDS: Microsoft DNS Audit Logs: Add OCSF pipelines#22567

Open
jaypatel7-crest wants to merge 15 commits intoDataDog:masterfrom
bhargavnariyanicrest:microsoft-dns-audit-logs-ocsf
Open

DDS: Microsoft DNS Audit Logs: Add OCSF pipelines#22567
jaypatel7-crest wants to merge 15 commits intoDataDog:masterfrom
bhargavnariyanicrest:microsoft-dns-audit-logs-ocsf

Conversation

@jaypatel7-crest
Copy link
Contributor

What does this PR do?

  • This PR updates the pipeline to add an OCSF pipeline

Review checklist (to be filled by reviewers)

  • Feature or bugfix MUST have appropriate tests (unit, integration, e2e)
  • Add the qa/skip-qa label if the PR doesn't need to be tested during QA.
  • If you need to backport this PR to another branch, you can add the backport/<branch-name> label to the PR and it will automatically open a backport PR once this one is merged

@jaypatel7-crest jaypatel7-crest marked this pull request as ready for review February 6, 2026 13:34
@jaypatel7-crest jaypatel7-crest requested a review from a team as a code owner February 6, 2026 13:34
Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 5b7b23000f

ℹ️ About Codex in GitHub

Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".

Comment on lines +490 to +496
- name: Map `Event.System.Security.UserID` to `ocsf.actor.user.uid`
sources:
- Event.System.Security.UserID
sourceType: attribute
target: ocsf.actor.user.uid
targetFormat: integer
preserveSource: true

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Preserve SID as string for actor.user.uid

Windows Event.System.Security.UserID values are SIDs (e.g., S-1-5-21-... in the samples within this same file), so coercing them to integer will fail and typically results in a null/empty ocsf.actor.user.uid, losing user attribution for most events. Consider mapping this field with targetFormat: string (or leaving it unformatted) to keep the SID intact; the current integer conversion will drop valid values.

Useful? React with 👍 / 👎.

@github-actions
Copy link
Contributor

github-actions bot commented Feb 9, 2026

⚠️ Recommendation: Add qa/skip-qa label

This PR does not modify any files shipped with the agent.

To help streamline the release process, please consider adding the qa/skip-qa label if these changes do not require QA testing.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants