-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Filebeat] Add session issuer to cloudtrail fields #16086
Labels
Comments
Pinging @elastic/siem (Team:SIEM) |
4 tasks
leehinman
added a commit
to leehinman/beats
that referenced
this issue
Mar 20, 2020
- sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type - sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id - sessionIssuer.userName -> user.name - sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn - sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id - add aws.cloudtrail.console_login.additional_eventdata.mobile_version - add aws.cloudtrail.console_login.additional_eventdata.login_to - add aws.cloudtrail.console_login.additional_eventdata.mfa_used - copy source.address to source.ip if value is an IP address Closes elastic#16086 Closes elastic#16110
leehinman
added a commit
that referenced
this issue
Mar 23, 2020
* Improve AWS cloudtrail field mappings - sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type - sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id - sessionIssuer.userName -> user.name - sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn - sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id - add aws.cloudtrail.console_login.additional_eventdata.mobile_version - add aws.cloudtrail.console_login.additional_eventdata.login_to - add aws.cloudtrail.console_login.additional_eventdata.mfa_used - copy source.address to source.ip if value is an IP address Closes #16086 Closes #16110
4 tasks
leehinman
added a commit
to leehinman/beats
that referenced
this issue
Mar 23, 2020
* Improve AWS cloudtrail field mappings - sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type - sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id - sessionIssuer.userName -> user.name - sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn - sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id - add aws.cloudtrail.console_login.additional_eventdata.mobile_version - add aws.cloudtrail.console_login.additional_eventdata.login_to - add aws.cloudtrail.console_login.additional_eventdata.mfa_used - copy source.address to source.ip if value is an IP address Closes elastic#16086 Closes elastic#16110 (cherry picked from commit 57e194b)
leehinman
added a commit
that referenced
this issue
Mar 23, 2020
* Improve AWS cloudtrail field mappings - sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type - sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id - sessionIssuer.userName -> user.name - sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn - sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id - add aws.cloudtrail.console_login.additional_eventdata.mobile_version - add aws.cloudtrail.console_login.additional_eventdata.login_to - add aws.cloudtrail.console_login.additional_eventdata.mfa_used - copy source.address to source.ip if value is an IP address Closes #16086 Closes #16110 (cherry picked from commit 57e194b)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
With assumed roles, Cloudtrail has session issuer information in the userIdentity object. We should add. Mappings would be
sessionIssuer.type -> aws.cloudtrail.user_identity.session_issuer.type
sessionIssuer.principalId -> aws.cloudtrail.user_identity.session_issuer.principal_id
sessionIssuer.userName -> user.name
sessionIssuer.arn -> aws.cloudtrail.user_identity.session_issuer.arn
sessionIssuer.accountId -> aws.cloudtrail.user_identity.session_issuer.account_id
The text was updated successfully, but these errors were encountered: