-
Notifications
You must be signed in to change notification settings - Fork 444
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[ti_eclecticiq][Enhancement] Enable SSL configuration #8911
Conversation
9dcf55e
to
b801b73
Compare
Pinging @elastic/security-external-integrations (Team:Security-External Integrations) |
/test |
🚀 Benchmarks reportTo see the full report comment with |
/test |
Saw the PR was blocked by conflicts with |
/test |
💚 Build Succeeded
History
|
Package ti_eclecticiq - 0.2.0 containing this change is available at https://epr.elastic.co/search?package=ti_eclecticiq |
1 similar comment
Package ti_eclecticiq - 0.2.0 containing this change is available at https://epr.elastic.co/search?package=ti_eclecticiq |
Proposed commit message
Enhancement: Enable SSL configuration
Motivation: some users use EIQ IC platform with invalid SSL certificates and don't intend to renew or add a valid certificate. Still want to use that instance at least for testing purpose and we need to enable them.
Implementation: added "SSL Configuration" yaml field to allow users to configure outgoing requests SSL certificate validation. This way they have full control over this part of the communication and they can turn off SSL validation by setting
verification_mode
tonone
.Bugfix: parsing incoming data fields that contain dots
Bug: conditions for dot expanders are bad and they prevent reading input data properly. This causes data loss.
Fix: the conditions are updated (fixed) to enable parsing incoming data fields that contain dots.
Checklist
changelog.yml
file.Author's Checklist
How to test this PR locally
Scenario: SSL configuration field works as desired.
Given: updated integration is installed in an Elastic Stack environment
And: EIQ IC is running with on https with invalid certificate
And: integration is set up to use that IC instance with
verification_mode=none
When: integration agent runs
Then: communication is successful.
Scenario: dot expanders are set up properly.
Given: updated integration is installed in an Elastic Stack environment
And: observables that are added to dataset to be downloaded contain populated fields that should be "dot expanded" (source.names, meta.tags, meta.ingest_time, meta.estimated_threat_start_time, meta.estimated_threat_end_time, meta.estimated_observed_time)
When: integration agent runs
Then: values from "dot expanded" fields are mapped into ECS fields (event.provider, tags, event.created, event.start, event.end, threat.indicator.first_seen).