Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

cisco_meraki: remove incorrect event.category:threat and event.type:indicator values #8508

Merged
merged 2 commits into from Nov 23, 2023

Conversation

efd6
Copy link
Contributor

@efd6 efd6 commented Nov 15, 2023

Proposed commit message

See title.

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.

Author's Checklist

  • [ ]

How to test this PR locally

Related issues

Screenshots

@elasticmachine
Copy link

elasticmachine commented Nov 15, 2023

💚 Build Succeeded

the below badges are clickable and redirect to their specific view in the CI or DOCS
Pipeline View Test View Changes Artifacts preview preview

Expand to view the summary

Build stats

  • Start Time: 2023-11-22T06:16:02.312+0000

  • Duration: 20 min 35 sec

Test stats 🧪

Test Results
Failed 0
Passed 19
Skipped 0
Total 19

🤖 GitHub comments

Expand to view the GitHub comments

To re-run your PR in the CI, just comment with:

  • /test : Re-trigger the build.

- threat
type:
- indicator
- intrusion_detection
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not entirely convinced that this is a correct category here, but on the basis of the contexts that I could find it seemed reasonable.

@elasticmachine
Copy link

elasticmachine commented Nov 15, 2023

🌐 Coverage report

Name Metrics % (covered/total) Diff
Packages 100.0% (2/2) 💚
Files 100.0% (9/9) 💚 3.281
Classes 100.0% (9/9) 💚 3.281
Methods 100.0% (67/67) 💚 7.171
Lines 98.463% (1153/1171) 👍 9.941
Conditionals 100.0% (0/0) 💚

@efd6 efd6 marked this pull request as ready for review November 15, 2023 05:21
@efd6 efd6 requested a review from a team as a code owner November 15, 2023 05:21
@elasticmachine
Copy link

Pinging @elastic/security-external-integrations (Team:Security-External Integrations)

Copy link
Contributor

@kcreddy kcreddy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The current change LGTM 👍🏼
But there are 2 pipelines namely security.yml and idsalerts.yml that contains threat.indicator.* fields. Should we also remove them if they are not to be categorized as IoCs?

@efd6
Copy link
Contributor Author

efd6 commented Nov 16, 2023

@P1llus What is your view on the references to threat.indicator.* in security.yml and idsalerts.yml?

@P1llus
Copy link
Member

P1llus commented Nov 21, 2023

@P1llus What is your view on the references to threat.indicator.* in security.yml and idsalerts.yml?

From what I can see these are not IoC's, The sample pipeline test data was a bit weird, since both ids and security events are in the same testfile, so I had a hard time finding it first.

Since they are not IoC's then indeed the category should never be threat, and threat.indicator.* should simply be mapped to its common ecs field, like threat.indicator.file.name to file.name instead.
For ids-alert and security_event, if these are actual alerts, then we should also check that event.kind is alert rather than event.

There is also a weird test-generated.log-expected.json, which seems to be a golden file from when it was still an RSA package, since it does not have any value and do not have its raw file there anymore, lets remove it?

@efd6
Copy link
Contributor Author

efd6 commented Nov 21, 2023

@P1llus PTAL

Copy link
Member

@P1llus P1llus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, just 1 comment, feel free to provide the change (or none) that you find fits best 👍

Comment on lines -198 to -213
category:
- threat
type:
- indicator
action: wireless-packet-flood-detected
"rogue_ssid_detected":
category:
- threat
type:
- indicator
action: rogue-ssid-detected
"ssid_spoofing_detected":
category:
- threat
type:
- indicator
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we ensure that all event types have at least one category and type? I think intrustion_dection and info is still a good fit. Or worst case it could be network and info?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

They all already have event.type:["info"] and event.category:["network"] from here and here.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah sorry, missed that one, LGTM 👍

@efd6 efd6 merged commit 05d757c into elastic:main Nov 23, 2023
4 checks passed
@elasticmachine
Copy link

Package cisco_meraki - 1.20.1 containing this change is available at https://epr.elastic.co/search?package=cisco_meraki

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working Integration:Cisco Meraki
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Meraki] Incorrect 'threat' mappings
4 participants