Skip to content

[Cloud Security] auto import for ecs fields#6239

Closed
CohenIdo wants to merge 5 commits intoelastic:mainfrom
CohenIdo:auto-import-ecs
Closed

[Cloud Security] auto import for ecs fields#6239
CohenIdo wants to merge 5 commits intoelastic:mainfrom
CohenIdo:auto-import-ecs

Conversation

@CohenIdo
Copy link
Copy Markdown
Contributor

solves https://github.com/elastic/security-team/issues/6471

using import_mappings: true for auto using ecs fields.

@CohenIdo CohenIdo changed the title working version of auto ecs fields [Cloud Security] working version of auto ecs fields May 17, 2023
@elasticmachine
Copy link
Copy Markdown

elasticmachine commented May 17, 2023

💚 Build Succeeded

the below badges are clickable and redirect to their specific view in the CI or DOCS
Pipeline View Test View Changes Artifacts preview preview

Expand to view the summary

Build stats

  • Start Time: 2023-05-24T08:55:18.985+0000

  • Duration: 13 min 21 sec

Test stats 🧪

Test Results
Failed 0
Passed 4
Skipped 0
Total 4

🤖 GitHub comments

Expand to view the GitHub comments

To re-run your PR in the CI, just comment with:

  • /test : Re-trigger the build.

@elasticmachine
Copy link
Copy Markdown

elasticmachine commented May 17, 2023

🌐 Coverage report

Name Metrics % (covered/total) Diff
Packages 100.0% (0/0) 💚
Files 100.0% (0/0) 💚
Classes 100.0% (0/0) 💚
Methods 25.0% (2/8) 👎 -67.0
Lines 100.0% (0/0) 💚 5.572
Conditionals 100.0% (0/0) 💚

@CohenIdo CohenIdo marked this pull request as ready for review May 22, 2023 08:18
@CohenIdo CohenIdo requested a review from a team as a code owner May 22, 2023 08:18
@amirbenun
Copy link
Copy Markdown
Contributor

I guess you can also delete the vulnerabilities ecs.yml, right?

@CohenIdo
Copy link
Copy Markdown
Contributor Author

CohenIdo commented May 22, 2023

I guess you can also delete the vulnerabilities ecs.yml, right?

yes, thanks @amirbenun

@CohenIdo CohenIdo changed the title [Cloud Security] working version of auto ecs fields [Cloud Security] auto import for ecs fields May 22, 2023
@CohenIdo
Copy link
Copy Markdown
Contributor Author

move back to draft as all the task is blocked during a bug was found in package upgrade

@CohenIdo CohenIdo marked this pull request as draft May 24, 2023 12:43
name: cloud_security_posture
title: "Security Posture Management"
version: "1.4.0-preview2"
version: "1.2.12"
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@CohenIdo pay attention when testing it locally that 1.2.13 is our latest version - so you might not work with the version you expect it to be

@kfirpeled kfirpeled added the Team:Cloud Security Cloud Security team [elastic/cloud-security-posture] label Jun 26, 2023
@botelastic
Copy link
Copy Markdown

botelastic bot commented Jul 26, 2023

Hi! We just realized that we haven't looked into this PR in a while. We're sorry! We're labeling this issue as Stale to make it hit our filters and make sure we get back to it as soon as possible. In the meantime, it'd be extremely helpful if you could take a look at it as well and confirm its relevance. A simple comment with a nice emoji will be enough :+1. Thank you for your contribution!

@botelastic botelastic bot added the Stalled label Jul 26, 2023
@botelastic
Copy link
Copy Markdown

botelastic bot commented Aug 25, 2023

Hi! This PR has been stale for a while and we're going to close it as part of our cleanup procedure. We appreciate your contribution and would like to apologize if we have not been able to review it, due to the current heavy load of the team. Feel free to re-open this PR if you think it should stay open and is worth rebasing. Thank you for your contribution!

@botelastic botelastic bot closed this Aug 25, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Stalled Team:Cloud Security Cloud Security team [elastic/cloud-security-posture]

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants