Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[ti_eclecticiq][Enhancement] Enable SSL configuration #8911

Merged
merged 6 commits into from
Jan 29, 2024

Conversation

petarc-eiq
Copy link
Contributor

Proposed commit message

Enhancement: Enable SSL configuration

Motivation: some users use EIQ IC platform with invalid SSL certificates and don't intend to renew or add a valid certificate. Still want to use that instance at least for testing purpose and we need to enable them.

Implementation: added "SSL Configuration" yaml field to allow users to configure outgoing requests SSL certificate validation. This way they have full control over this part of the communication and they can turn off SSL validation by setting verification_mode to none.

Bugfix: parsing incoming data fields that contain dots

Bug: conditions for dot expanders are bad and they prevent reading input data properly. This causes data loss.

Fix: the conditions are updated (fixed) to enable parsing incoming data fields that contain dots.

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.

Author's Checklist

  • changelog.yml is updated according to standards

How to test this PR locally

Scenario: SSL configuration field works as desired.
Given: updated integration is installed in an Elastic Stack environment
And: EIQ IC is running with on https with invalid certificate
And: integration is set up to use that IC instance with verification_mode=none
When: integration agent runs
Then: communication is successful.

Scenario: dot expanders are set up properly.
Given: updated integration is installed in an Elastic Stack environment
And: observables that are added to dataset to be downloaded contain populated fields that should be "dot expanded" (source.names, meta.tags, meta.ingest_time, meta.estimated_threat_start_time, meta.estimated_threat_end_time, meta.estimated_observed_time)
When: integration agent runs
Then: values from "dot expanded" fields are mapped into ECS fields (event.provider, tags, event.created, event.start, event.end, threat.indicator.first_seen).

@petarc-eiq petarc-eiq requested a review from a team as a code owner January 17, 2024 12:58
@elasticmachine
Copy link

Pinging @elastic/security-external-integrations (Team:Security-External Integrations)

@bhapas
Copy link
Contributor

bhapas commented Jan 23, 2024

/test

@elasticmachine
Copy link

🚀 Benchmarks report

To see the full report comment with /test benchmark fullreport

@bhapas
Copy link
Contributor

bhapas commented Jan 23, 2024

/test

@petarc-eiq petarc-eiq requested a review from a team as a code owner January 26, 2024 02:23
@zed-eiq
Copy link
Contributor

zed-eiq commented Jan 26, 2024

Saw the PR was blocked by conflicts with main that bumped version to 0.1.1 with a codeowners change; resolved that

@efd6
Copy link
Contributor

efd6 commented Jan 29, 2024

/test

@elasticmachine
Copy link

💚 Build Succeeded

History

@efd6 efd6 merged commit 7eaa18d into elastic:main Jan 29, 2024
3 checks passed
@elasticmachine
Copy link

Package ti_eclecticiq - 0.2.0 containing this change is available at https://epr.elastic.co/search?package=ti_eclecticiq

1 similar comment
@elasticmachine
Copy link

Package ti_eclecticiq - 0.2.0 containing this change is available at https://epr.elastic.co/search?package=ti_eclecticiq

@petarc-eiq petarc-eiq deleted the ti_eclecticiq_0.1.1 branch January 29, 2024 08:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants