Skip to content

[Cloudflare Logpush] Add SSL configuration to aws-s3 input #18588

@kcreddy

Description

@kcreddy

The Cloudflare Logpush integration does not expose ssl configuration for the aws-s3 input type. The http_endpoint input already has it (manifest line 71), but the aws-s3 input does not.

The underlying Filebeat aws-s3 input supports SSL via awscommon.ConfigAWS (TLS *tlscommon.Config, config key ssl), and several other integrations already expose it for their aws-s3 inputs — netskope, github, amazon_security_lake, servicenow, canva, imperva_cloud_waf, sublime_security, and symantec_endpoint_security.

Without this, there is no way to configure custom certificate authorities or other TLS settings for the aws-s3 input through Fleet.

Proposed change

  1. Add an ssl variable (type: yaml) to the aws-s3 input in packages/cloudflare_logpush/manifest.yml, following the pattern in packages/netskope/manifest.yml (lines 139-145):

    - name: ssl
      type: yaml
      title: SSL Configuration
      description: >-
        SSL configuration options. See [documentation](https://www.elastic.co/guide/en/beats/filebeat/current/configuration-ssl.html#ssl-common-config)
        for details.
      multi: false
      required: false
      show_user: false
      default: |
        #certificate_authorities:
        #  - /path/to/custom-ca.crt
  2. Add {{#if ssl}}ssl: {{ssl}}{{/if}} to all 21 data_stream/*/agent/stream/aws-s3.yml.hbs templates, matching
    the pattern in packages/netskope/data_stream/alerts_events_v2/agent/stream/aws-s3.yml.hbs.

References

  • packages/netskope/manifest.yml lines 139-145 — existing example
  • x-pack/libbeat/common/aws/credentials.go line 46 — Beats code
    that reads the ssl config

Metadata

Metadata

Assignees

No one assigned

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions