Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

x-pack/filebeat/input/entityanalytics/provider/azuread: allow fine-grain control of API requests #36441

Merged
merged 3 commits into from
Sep 5, 2023
Merged
Show file tree
Hide file tree
Changes from 2 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
1 change: 1 addition & 0 deletions CHANGELOG.next.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -211,6 +211,7 @@ https://github.com/elastic/beats/compare/v8.8.1\...main[Check the HEAD diff]
- Make HTTPJSON response body decoding errors more informative. {pull}36481[36481]
- Allow fine-grained control of entity analytics API requests for Okta provider. {issue}36440[36440] {pull}36492[36492]
- Add support for expanding `journald.process.capabilities` into the human-readable effective capabilities in the ECS `process.thread.capabilities.effective` field. {issue}36454[36454] {pull}36470[36470]
- Allow fine-grained control of entity analytics API requests for AzureAD provider. {issue}36440[36440] {pull}36441[36441]

*Auditbeat*

Expand Down
9 changes: 9 additions & 0 deletions x-pack/filebeat/docs/inputs/input-entity-analytics.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -255,6 +255,7 @@ Example configuration:
enabled: true
id: azure-1
provider: azure-ad
dataset: "all"
sync_interval: "12h"
update_interval: "30m"
client_id: "CLIENT_ID"
Expand All @@ -279,6 +280,14 @@ The client/application ID. Used for authentication. Field is required.

The secret value, used for authentication. Field is required.

[float]
===== `dataset`

The datasets to collect from the API. This can be one of "all", "users" or "devices",
bhapas marked this conversation as resolved.
Show resolved Hide resolved

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@efd6 this approach looks ok to me and we can set the default to 'all'. To be safe we can add a section to the integration docs to outline the three options, and the fact that we'll include registered users/owners as part of the device data collection.

FYI @piyush-elastic

or may be left empty for the default behavior which is to collect all entities.
When the `dataset` is set to "devices", some user entity data is collected in order
to populate the registered users and registered owner fields for each device.

[float]
===== `sync_interval`

Expand Down
42 changes: 31 additions & 11 deletions x-pack/filebeat/input/entityanalytics/provider/azuread/azure.go
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ import (
"context"
"errors"
"fmt"
"strings"
"time"

"github.com/google/uuid"
Expand Down Expand Up @@ -267,19 +268,38 @@ func (p *azure) doFetch(ctx context.Context, state *stateStore, fullSync bool) (
groupsDeltaLink = state.groupsLink
}

changedUsers, userLink, err := p.fetcher.Users(ctx, usersDeltaLink)
if err != nil {
return updatedUsers, updatedDevices, err
}
p.logger.Debugf("Received %d users from API", len(changedUsers))

changedDevices, deviceLink, err := p.fetcher.Devices(ctx, devicesDeltaLink)
if err != nil {
return updatedUsers, updatedDevices, err
var (
changedUsers []*fetcher.User
userLink string
)
switch strings.ToLower(p.conf.Dataset) {
case "", "all", "users":
changedUsers, userLink, err = p.fetcher.Users(ctx, usersDeltaLink)
if err != nil {
return updatedUsers, updatedDevices, err
}
p.logger.Debugf("Received %d users from API", len(changedUsers))
default:
p.logger.Debugf("Skipping user collection from API: dataset=%s", p.conf.Dataset)
}

var (
changedDevices []*fetcher.Device
deviceLink string
)
switch strings.ToLower(p.conf.Dataset) {
case "", "all", "devices":
changedDevices, deviceLink, err = p.fetcher.Devices(ctx, devicesDeltaLink)
if err != nil {
return updatedUsers, updatedDevices, err
}
p.logger.Debugf("Received %d devices from API", len(changedDevices))
default:
p.logger.Debugf("Skipping device collection from API: dataset=%s", p.conf.Dataset)
}
p.logger.Debugf("Received %d devices from API", len(changedUsers))

// Get group changes.
// Get group changes. Groups are required for both users and devices.
// So always collect these.
changedGroups, groupLink, err := p.fetcher.Groups(ctx, groupsDeltaLink)
if err != nil {
return updatedUsers, updatedDevices, err
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ package azuread

import (
"context"
"fmt"
"testing"
"time"

Expand All @@ -18,36 +19,64 @@ import (
)

func TestAzure_DoFetch(t *testing.T) {
dbFilename := "TestAzure_DoFetch.db"
store := testSetupStore(t, dbFilename)
t.Cleanup(func() {
testCleanupStore(store, dbFilename)
})

a := azure{
logger: logp.L(),
auth: mockauth.New(""),
fetcher: mockfetcher.New(),
tests := []struct {
dataset string
wantUsers bool
wantDevices bool
}{
{dataset: "", wantUsers: true, wantDevices: true},
{dataset: "all", wantUsers: true, wantDevices: true},
{dataset: "users", wantUsers: true, wantDevices: false},
{dataset: "devices", wantUsers: false, wantDevices: true},
}

ss, err := newStateStore(store)
require.NoError(t, err)
defer ss.close(false)
for _, test := range tests {
t.Run(test.dataset, func(t *testing.T) {
suffix := test.dataset
if suffix != "" {
suffix = "_" + suffix
}
dbFilename := fmt.Sprintf("TestAzure_DoFetch%s.db", suffix)
store := testSetupStore(t, dbFilename)
t.Cleanup(func() {
testCleanupStore(store, dbFilename)
})

ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
defer cancel()
gotUsers, gotDevices, err := a.doFetch(ctx, ss, false)
require.NoError(t, err)
a := azure{
conf: conf{Dataset: test.dataset},
logger: logp.L(),
auth: mockauth.New(""),
fetcher: mockfetcher.New(),
}

var wantModifiedUsers collections.UUIDSet
for _, v := range mockfetcher.UserResponse {
wantModifiedUsers.Add(v.ID)
}
var wantModifiedDevices collections.UUIDSet
for _, v := range mockfetcher.DeviceResponse {
wantModifiedDevices.Add(v.ID)
}
ss, err := newStateStore(store)
require.NoError(t, err)
defer ss.close(false)

ctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)
defer cancel()
gotUsers, gotDevices, err := a.doFetch(ctx, ss, false)
require.NoError(t, err)

require.Equal(t, wantModifiedUsers.Values(), gotUsers.Values())
require.Equal(t, wantModifiedDevices.Values(), gotDevices.Values())
var wantModifiedUsers collections.UUIDSet
for _, v := range mockfetcher.UserResponse {
wantModifiedUsers.Add(v.ID)
}
var wantModifiedDevices collections.UUIDSet
for _, v := range mockfetcher.DeviceResponse {
wantModifiedDevices.Add(v.ID)
}

if test.wantUsers {
require.Equal(t, wantModifiedUsers.Values(), gotUsers.Values())
} else {
require.Equal(t, 0, gotUsers.Len())
}
if test.wantDevices {
require.Equal(t, wantModifiedDevices.Values(), gotDevices.Values())
} else {
require.Equal(t, 0, gotDevices.Len())
}
})
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ package azuread

import (
"errors"
"strings"
"time"
)

Expand All @@ -21,6 +22,7 @@ type conf struct {
TenantID string `config:"tenant_id" validate:"required"`
SyncInterval time.Duration `config:"sync_interval"`
UpdateInterval time.Duration `config:"update_interval"`
Dataset string `config:"dataset"`
}

// Validate runs validation against the config.
Expand All @@ -34,6 +36,11 @@ func (c *conf) Validate() error {
if c.UpdateInterval == 0 {
return errors.New("update_interval must not be zero")
}
switch strings.ToLower(c.Dataset) {
case "", "all", "users", "devices":
default:
return errors.New("dataset must be 'all', 'users', 'devices' or empty")
}
bhapas marked this conversation as resolved.
Show resolved Hide resolved
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Additional comment: If validation is required , then can we extend the unit test here

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That feels like testing that addition works.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not super important may be..!


return nil
}
Expand Down