Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SIEM] Remove deprecated code from 8.0 #19039

Closed
8 tasks done
andrewkroh opened this issue Jun 8, 2020 · 10 comments
Closed
8 tasks done

[SIEM] Remove deprecated code from 8.0 #19039

andrewkroh opened this issue Jun 8, 2020 · 10 comments

Comments

@andrewkroh
Copy link
Member

andrewkroh commented Jun 8, 2020

I looked through the Security Ingest modules/beats for comments and TODOs indicating that a change was needed for 8.0. This may not be an exhaustive list so if you know of change that should be made for 8.0 please add it hear.

Winlogbeat

Auditbeat

Packetbeat

// remove this in 8.x
"version": cert.Version,

// remove this in 8.x
{"province", name.Province},

fields.Put("tls.detailed", detailed)
if cert, ok := detailed["client_certificate"]; ok {
fields.Put("tls.client.x509", cert)
}
if cert, ok := detailed["server_certificate"]; ok {
fields.Put("tls.server.x509", cert)

  • Remove network_traffic ECS category:

Category: []string{"network_traffic", "network"},

Filebeat

  • Duplicated DNS fields in CoreDNS module

# The following copies values from dns namespace (ECS) to the coredns
# namespace to avoid introducing breaking change. This should be removed
# for 8.0.0. Additionally coredns.dnssec_ok can be removed.
- set:
field: coredns.id
value: '{{dns.id}}'
ignore_empty_value: true
- set:
field: coredns.query.class
value: '{{dns.question.class}}'
ignore_empty_value: true
- set:
field: coredns.query.name
value: '{{dns.question.name}}'
ignore_empty_value: true
- set:
field: coredns.query.type
value: '{{dns.question.type}}'
ignore_empty_value: true
- set:
field: coredns.response.code
value: '{{dns.response_code}}'
ignore_empty_value: true
- script:
if: ctx.dns?.header_flags != null
lang: painless
source: >
ctx.coredns.response.flags = ctx.dns.header_flags;

@elasticmachine
Copy link
Collaborator

Pinging @elastic/siem (Team:SIEM)

@peasead
Copy link
Contributor

peasead commented Oct 26, 2020

An additional gap for Packetbeat is that event.type is blank.

My thought is that event.type (or event.dataset) would reflect what type currently is and that event.action would carry the start and end values?
image
image

@botelastic
Copy link

botelastic bot commented Sep 26, 2021

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@botelastic botelastic bot added the Stalled label Sep 26, 2021
@jamiehynds
Copy link

@andrewkroh is this issue still relevant for 8.0?

@botelastic botelastic bot removed the Stalled label Sep 28, 2021
@andrewkroh
Copy link
Member Author

andrewkroh commented Sep 28, 2021

Yes, this is relevant. I went through and checked the boxes for the ones that have been addressed, but the others still should be changed for 8.0.

@elasticmachine
Copy link
Collaborator

Pinging @elastic/security-external-integrations (Team:Security-External Integrations)

@efd6
Copy link
Contributor

efd6 commented Sep 29, 2021

@andrewkroh Is this coredns deprecation relevant here? If so, what else is required?

@andrewkroh
Copy link
Member Author

@efd6 Yes, that looks relevant. I've added a bullet point to the description for this. I think what needs done is to remove those processors from the pipeline, remove the related fields from the _meta/fields.yml file, and then run make update to regenerate some files and docs.

@efd6
Copy link
Contributor

efd6 commented Sep 29, 2021

@andrewkroh It mentions removing coredns.dnssec_ok, so that should be hosed out too after using it to append the DO flag to dns.header_flags?

@andrewkroh
Copy link
Member Author

Yes, coredns.dnssec_ok can be removed because we have dns.header_flags in the event (an ECS field) and users can check for the DO flag that indicates "DNSSEC answer OK".

andrewkroh added a commit to andrewkroh/beats that referenced this issue Oct 13, 2021
andrewkroh added a commit to andrewkroh/beats that referenced this issue Oct 13, 2021
Removes the authentication_success and authentication_failure event.type values for user logins.

Relates elastic#19039
andrewkroh added a commit that referenced this issue Oct 15, 2021
* Remove `hash.*` from Auditbeat file_integrity for 8.0

Relates #19039

* Remove non-ECS event.type from Auditbeat auditd module

Removes the authentication_success and authentication_failure event.type values for user logins.

Relates #19039
r00tu53r added a commit to r00tu53r/beats that referenced this issue Oct 18, 2021
* Remove tls.detailed.server_certificate and
  tls.detailed.client_certificate in favor of x509
  fields in tls.server.x509 and tls.client.x509
  respectively
* Addresses part of elastic#19039
Icedroid pushed a commit to Icedroid/beats that referenced this issue Nov 1, 2021
* Remove `hash.*` from Auditbeat file_integrity for 8.0

Relates elastic#19039

* Remove non-ECS event.type from Auditbeat auditd module

Removes the authentication_success and authentication_failure event.type values for user logins.

Relates elastic#19039
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants