-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Filebeat: add TLS + pipeline options to checkpoint module #18116
Conversation
Since this is a community submitted pull request, a Jenkins build has not been kicked off automatically. Can an Elastic organization member please verify the contents of this patch and then kick off a build manually? |
1 similar comment
Since this is a community submitted pull request, a Jenkins build has not been kicked off automatically. Can an Elastic organization member please verify the contents of this patch and then kick off a build manually? |
💚 CLA has been signed |
❕ Build Aborted
Expand to view the summary
Build stats
Steps errorsExpand to view the steps failures
Log outputExpand to view the last 100 lines of log output
|
Pinging @elastic/siem (Team:SIEM) |
Hey @hazcod, thanks for your contribution! You will need to sign the CLA so we can merge it https://www.elastic.co/contributor-agreement |
Hmm I thought I did, will try again. |
jenkins test this |
I ran |
Can we get this merged? |
Ping. |
❕ Build Aborted
Expand to view the summary
Build stats
Steps errorsExpand to view the steps failures
Log outputExpand to view the last 100 lines of log output
|
Hmm @andrewkroh , any idea how I would do that? |
@@ -0,0 +1,100 @@ | |||
// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one | |||
// or more contributor license agreements. Licensed under the Elastic License; | |||
// you may not use this file except in compliance with the Elastic License. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@hazcod / @andrewkroh : So I'm not entirely sure how these files got here, but it looks like a bunch of the x-pack
inputs for filebeat were copied over into the non-x-pack
folder and then the generator was run, resulting in the huge changeset.
We try and keep a strict separation between Elastic licensed code and the Apache-licensed stuff (with the Elastic licensed stuff in the x-pack
directory), so these files should not be moved or copied around. Here's the commit where this happened: bb64918.
Since this is core to our project structure and our licensing model, you're likely going to need to revert that commit and fix up the rest of your contribution without it before we can accept it.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah yes, I believe the reason was that the checkpoint module needs to be moved to be able to compile the module.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@hazcod -- so if you're modifying files in the x-pack
directory you should still be able to compile/test using the x-pack
entrypoint. The way these binaries work is that the Apache-licensed binary entrypoint is basically the filebeat/cmd
sub-package. The x-pack/filebeat/cmd
sub-package wraps the Apache-licensed entrypoint and includes all of the Elastic-licensed modules.
The Elastic-licensed binary we distribute is here: https://www.elastic.co/downloads/beats/filebeat, while the Apache-licensed binary, without the Elastic-licensed code is here: https://www.elastic.co/downloads/beats/filebeat-oss
So if you're trying to build or test changes involving the Elastic-licensed code, you'll just need to work in the x-pack/filebeat
directory rather than filebeat
directly. The make
/mage
commands for building and testing should be pretty much the same.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Seems like i compiled that wrong, I will open up a new PR this weekend.
Closing in favor of #19560 |
What does this PR do?
This adds a
var.input
typetls
, which will use tcp + tls for mutual TLS authentication.Why is it important?
Syslog udp is plaintext and does not guarantee CIA.
Checklist
CHANGELOG.next.asciidoc
orCHANGELOG-developer.next.asciidoc
.Related issues
#17682
CC @P1llus @adriansr