Skip to content

Commit c42891e

Browse files
authored
Merge pull request #14186 from Security-Onion-Solutions/reyesj2/es-upgrade-policies
Reyesj2/es upgrade policies
2 parents 8828a30 + 5443b39 commit c42891e

File tree

2 files changed

+10
-6
lines changed

2 files changed

+10
-6
lines changed

salt/elasticsearch/files/ingest/global@custom

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,9 @@
88
"processors": [
99
{ "set": { "ignore_failure": true, "field": "event.module", "value": "elastic_agent" } },
1010
{ "split": { "if": "ctx.event?.dataset != null && ctx.event.dataset.contains('.')", "field": "event.dataset", "separator": "\\.", "target_field": "module_temp" } },
11+
{ "split": { "if": "ctx.data_stream?.dataset.contains('.')", "field":"data_stream.dataset", "separator":"\\.", "target_field":"datastream_dataset_temp", "ignore_missing":true } },
1112
{ "set": { "if": "ctx.module_temp != null", "override": true, "field": "event.module", "value": "{{module_temp.0}}" } },
13+
{ "set": { "if": "ctx.datastream_dataset_temp[0] == 'network_traffic'", "field":"event.module", "value":"{{ datastream_dataset_temp.0 }}", "ignore_failure":true, "description":"Fix EA network packet capture" } },
1214
{ "gsub": { "if": "ctx.event?.dataset != null && ctx.event.dataset.contains('.')", "field": "event.dataset", "pattern": "^[^.]*.", "replacement": "", "target_field": "dataset_tag_temp" } },
1315
{ "append": { "if": "ctx.dataset_tag_temp != null", "field": "tags", "value": "{{dataset_tag_temp}}", "allow_duplicates": false } },
1416
{ "set": { "if": "ctx.network?.direction == 'egress'", "override": true, "field": "network.initiated", "value": "true" } },
@@ -22,6 +24,6 @@
2224
{ "set": { "if": "ctx.event?.module == 'fim'", "override": true, "field": "event.module", "value": "file_integrity" } },
2325
{ "rename": { "if": "ctx.winlog?.provider_name == 'Microsoft-Windows-Windows Defender'", "ignore_missing": true, "field": "winlog.event_data.Threat Name", "target_field": "winlog.event_data.threat_name" } },
2426
{ "set": { "if": "ctx?.metadata?.kafka != null" , "field": "kafka.id", "value": "{{metadata.kafka.partition}}{{metadata.kafka.offset}}{{metadata.kafka.timestamp}}", "ignore_failure": true } },
25-
{ "remove": { "field": [ "message2", "type", "fields", "category", "module", "dataset", "event.dataset_temp", "dataset_tag_temp", "module_temp" ], "ignore_missing": true, "ignore_failure": true } }
27+
{ "remove": { "field": [ "message2", "type", "fields", "category", "module", "dataset", "event.dataset_temp", "dataset_tag_temp", "module_temp", "datastream_dataset_temp" ], "ignore_missing": true, "ignore_failure": true } }
2628
]
2729
}

salt/manager/tools/sbin/soup

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -534,14 +534,16 @@ post_to_2.4.120() {
534534
# Manually rollover suricata alerts index to ensure data_stream.dataset expected mapping is set to 'suricata'
535535
rollover_index "logs-suricata.alerts-so"
536536

537-
# Sync the newly generated index templates for elasticfleet integrations
538-
salt-call state.apply elasticsearch queue=True
539-
540537
POSTVERSION=2.4.120
541538
}
542539

543540
post_to_2.4.130() {
544-
echo "Nothing to apply"
541+
# Integrations policies need to be updated
542+
rm -f /opt/so/state/eaintegrations.txt
543+
544+
# Sync the newly generated index templates for elasticfleet integrations
545+
salt-call state.apply elasticsearch queue=True
546+
545547
POSTVERSION=2.4.130
546548
}
547549

@@ -725,7 +727,7 @@ up_to_2.4.90() {
725727

726728
up_to_2.4.100() {
727729
echo "Nothing to do for 2.4.100"
728-
730+
729731
INSTALLEDVERSION=2.4.100
730732
}
731733

0 commit comments

Comments
 (0)