The Cloudflare Logpush integration does not expose ssl configuration for the aws-s3 input type. The http_endpoint input already has it (manifest line 71), but the aws-s3 input does not.
The underlying Filebeat aws-s3 input supports SSL via awscommon.ConfigAWS (TLS *tlscommon.Config, config key ssl), and several other integrations already expose it for their aws-s3 inputs — netskope, github, amazon_security_lake, servicenow, canva, imperva_cloud_waf, sublime_security, and symantec_endpoint_security.
Without this, there is no way to configure custom certificate authorities or other TLS settings for the aws-s3 input through Fleet.
Proposed change
-
Add an ssl variable (type: yaml) to the aws-s3 input in packages/cloudflare_logpush/manifest.yml, following the pattern in packages/netskope/manifest.yml (lines 139-145):
- name: ssl
type: yaml
title: SSL Configuration
description: >-
SSL configuration options. See [documentation](https://www.elastic.co/guide/en/beats/filebeat/current/configuration-ssl.html#ssl-common-config)
for details.
multi: false
required: false
show_user: false
default: |
#certificate_authorities:
# - /path/to/custom-ca.crt
-
Add {{#if ssl}}ssl: {{ssl}}{{/if}} to all 21 data_stream/*/agent/stream/aws-s3.yml.hbs templates, matching
the pattern in packages/netskope/data_stream/alerts_events_v2/agent/stream/aws-s3.yml.hbs.
References
packages/netskope/manifest.yml lines 139-145 — existing example
x-pack/libbeat/common/aws/credentials.go line 46 — Beats code
that reads the ssl config
The Cloudflare Logpush integration does not expose
sslconfiguration for theaws-s3input type. Thehttp_endpointinput already has it (manifest line 71), but theaws-s3input does not.The underlying Filebeat aws-s3 input supports SSL via
awscommon.ConfigAWS(TLS *tlscommon.Config, config keyssl), and several other integrations already expose it for their aws-s3 inputs — netskope, github, amazon_security_lake, servicenow, canva, imperva_cloud_waf, sublime_security, and symantec_endpoint_security.Without this, there is no way to configure custom certificate authorities or other TLS settings for the aws-s3 input through Fleet.
Proposed change
Add an
sslvariable (type:yaml) to theaws-s3input inpackages/cloudflare_logpush/manifest.yml, following the pattern inpackages/netskope/manifest.yml(lines 139-145):Add
{{#if ssl}}ssl: {{ssl}}{{/if}}to all 21data_stream/*/agent/stream/aws-s3.yml.hbstemplates, matchingthe pattern in
packages/netskope/data_stream/alerts_events_v2/agent/stream/aws-s3.yml.hbs.References
packages/netskope/manifest.ymllines 139-145 — existing examplex-pack/libbeat/common/aws/credentials.goline 46 — Beats codethat reads the
sslconfig