Skip to content

Conversation

@peterydzynski
Copy link
Contributor

Proposed commit message

The network.transport and network.protocol fields are not being set properly. Often the transport value (udp/tcp) is getting set to the protocol field and the protocol is never set at all. The changes I made to the test-device.log-expected.json file should demonstrate these issues.

I also added handling for missing protocols and added example logs for the ones I had the ability to produce.

As a side note, I am happy to convert the entire logic for handling transport/protocol to a single script processor but I figured using the built in processors is easier for maintainability.

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.

Author's Checklist

  • [ ]

How to test this PR locally

Related issues

Screenshots

…rt according to ECS. Added test logs to cover missing protocols and updated expected logs.
@peterydzynski peterydzynski requested a review from a team as a code owner July 8, 2024 20:57
Copy link
Contributor

@efd6 efd6 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please add a changelog entry and bump the patch version in manifest.yml.

@peterydzynski
Copy link
Contributor Author

Whoops forgot to do those. Should be updated @efd6!

@efd6
Copy link
Contributor

efd6 commented Jul 10, 2024

/test

@elasticmachine
Copy link

🚀 Benchmarks report

To see the full report comment with /test benchmark fullreport

Copy link
Contributor

@efd6 efd6 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit then LGTM

Co-authored-by: Dan Kortschak <[email protected]>
@peterydzynski
Copy link
Contributor Author

Hey @efd6, is this good to go?

@andrewkroh andrewkroh added Integration:m365_defender Microsoft Defender XDR Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations] labels Jul 19, 2024
@elasticmachine
Copy link

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

@efd6
Copy link
Contributor

efd6 commented Jul 21, 2024

/test

@elastic-sonarqube
Copy link

@elasticmachine
Copy link

💚 Build Succeeded

History

Copy link
Contributor

@efd6 efd6 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks

@efd6 efd6 merged commit eff2b24 into elastic:main Jul 22, 2024
@elasticmachine
Copy link

Package m365_defender - 2.14.2 containing this change is available at https://epr.elastic.co/search?package=m365_defender

@peterydzynski peterydzynski deleted the network-transport-bug branch July 22, 2024 17:48
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Integration:m365_defender Microsoft Defender XDR Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations]

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants