Skip to content

[iptables] Update sample_event.json#3358

Merged
andrewkroh merged 3 commits intoelastic:mainfrom
andrewkroh:iptables/update-sample-event
May 17, 2022
Merged

[iptables] Update sample_event.json#3358
andrewkroh merged 3 commits intoelastic:mainfrom
andrewkroh:iptables/update-sample-event

Conversation

@andrewkroh
Copy link
Member

What does this PR do?

The sample event was not up to date with the pipeline.

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.

The sample event was not up to date with the pipeline.
[git-generate]
cd packages/iptables
elastic-package build
[git-generate]
cd packages/iptables
elastic-package-changelog add-next --type bugfix --description "Update sample event based on current pipeline." --pr 3358
@elasticmachine
Copy link

elasticmachine commented May 16, 2022

💚 Build Succeeded

the below badges are clickable and redirect to their specific view in the CI or DOCS
Pipeline View Test View Changes Artifacts preview preview

Expand to view the summary

Build stats

  • Start Time: 2022-05-16T21:34:58.714+0000

  • Duration: 15 min 46 sec

Test stats 🧪

Test Results
Failed 0
Passed 27
Skipped 1
Total 28

🤖 GitHub comments

To re-run your PR in the CI, just comment with:

  • /test : Re-trigger the build.

@elasticmachine
Copy link

🌐 Coverage report

Name Metrics % (covered/total) Diff
Packages 100.0% (1/1) 💚
Files 100.0% (1/1) 💚 3.695
Classes 100.0% (1/1) 💚 3.695
Methods 100.0% (16/16) 💚 11.758
Lines 92.453% (294/318) 👍 3.521
Conditionals 100.0% (0/0) 💚

@andrewkroh andrewkroh marked this pull request as ready for review May 16, 2022 22:57
@andrewkroh andrewkroh requested a review from a team as a code owner May 16, 2022 22:57
@elasticmachine
Copy link

Pinging @elastic/security-external-integrations (Team:Security-External Integrations)

@andrewkroh andrewkroh merged commit 3c30036 into elastic:main May 17, 2022
andrewkroh added a commit that referenced this pull request Jun 28, 2022
This updates the ECS version used in all non-deprecated packages owned by elastic/security-external-integrations.

These packages required fixes in order to comply with the `pattern` added to ECS to validate MAC addresses.

- cef - #3566
- crowdstrike - #3302
- cylance.protect - #3368
- fortinet.fortimanager - #3401
- iptables.log - #3358
- microsoft_dhcp - #3300
- pfsense - #3303
- snort - #3301
- sonicwall.firewall - #3360
- sophos.utm - #3370

NOTE: The following packages were not updated for 8.2.0. I didn't catch anything in 8.1 or 8.2 that needed changed.

 - auth0 - 1.12.0
 - carbon_black_cloud - 8.0.0
 - cisco_ise - 8.0.0
 - cisco_meraki - 8.0.0
 - hid_bravura_monitor - 1.12.0
 - modsecurity - 1.12.0
 - mysql_enterprise - 8.0.0
 - netskope - 8.0.0
 - oracle - 8.0.0
 - symantec_endpoint - 1.12.0
 - ti_recordedfuture - 8.0

[git-generate]
go run github.com/andrewkroh/go-examples/ecs-update@6efa1ecb3871 \
  --ecs-version=8.3.0 \
  -ecs-git-ref=v8.3.0 \
  --pr=3353 \
  --owner=elastic/security-external-integrations \
  packages/*
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants