Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

microsoft_sentinel: Add agentless deployment #12586

Merged
merged 8 commits into from
Mar 5, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 7 additions & 2 deletions packages/microsoft_sentinel/_dev/build/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,11 @@

Use the Microsoft Sentinel integration to collect and parse Alerts and Incidents from Microsoft Sentinel REST API and Events from the Microsoft Azure Event Hub, then visualise the data in Kibana.

## Agentless Enabled Integration
Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to [Agentless integrations](https://www.elastic.co/guide/en/serverless/current/security-agentless-integrations.html) and the [Agentless integrations FAQ](https://www.elastic.co/guide/en/serverless/current/agentless-integration-troubleshooting.html).

Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

## Data streams

The Microsoft Sentinel integration collects logs for three types of events: Alert, Event and Incident.
Expand All @@ -18,7 +23,7 @@ The Microsoft Sentinel integration collects logs for three types of events: Aler

## Requirements

Elastic Agent must be installed. For more details and installation instructions, please refer to the [Elastic Agent Installation Guide](https://www.elastic.co/guide/en/fleet/current/elastic-agent-installation.html).
Unless you choose `Agentless` deployment, the Elastic Agent must be installed. For more details and installation instructions, please refer to the [Elastic Agent Installation Guide](https://www.elastic.co/guide/en/fleet/current/elastic-agent-installation.html).

### Installing and managing an Elastic Agent:

Expand Down Expand Up @@ -101,4 +106,4 @@ This is the `Incident` dataset.

{{event "incident"}}

{{fields "incident"}}
{{fields "incident"}}
5 changes: 5 additions & 0 deletions packages/microsoft_sentinel/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "0.5.0"
changes:
- description: Add support for agentless deployment.
type: enhancement
link: https://github.com/elastic/integrations/pull/12586
- version: "0.4.0"
changes:
- description: Update Kibana constraint to support 9.0.0.
Expand Down
8 changes: 6 additions & 2 deletions packages/microsoft_sentinel/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,11 @@

Use the Microsoft Sentinel integration to collect and parse Alerts and Incidents from Microsoft Sentinel REST API and Events from the Microsoft Azure Event Hub, then visualise the data in Kibana.

## Agentless Enabled Integration
Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to [Agentless integrations](https://www.elastic.co/guide/en/serverless/current/security-agentless-integrations.html) and the [Agentless integrations FAQ](https://www.elastic.co/guide/en/serverless/current/agentless-integration-troubleshooting.html).

Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

## Data streams

The Microsoft Sentinel integration collects logs for three types of events: Alert, Event and Incident.
Expand All @@ -18,7 +23,7 @@ The Microsoft Sentinel integration collects logs for three types of events: Aler

## Requirements

Elastic Agent must be installed. For more details and installation instructions, please refer to the [Elastic Agent Installation Guide](https://www.elastic.co/guide/en/fleet/current/elastic-agent-installation.html).
Unless you choose `Agentless` deployment, the Elastic Agent must be installed. For more details and installation instructions, please refer to the [Elastic Agent Installation Guide](https://www.elastic.co/guide/en/fleet/current/elastic-agent-installation.html).

### Installing and managing an Elastic Agent:

Expand Down Expand Up @@ -484,4 +489,3 @@ An example event for `incident` looks as following:
| observer.product | | constant_keyword |
| observer.vendor | | constant_keyword |
| tags | User defined tags. | keyword |

14 changes: 11 additions & 3 deletions packages/microsoft_sentinel/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
format_version: 3.2.1
format_version: 3.2.3
name: microsoft_sentinel
title: Microsoft Sentinel
version: "0.4.0"
version: "0.5.0"
description: Collect logs from Microsoft Sentinel with Elastic Agent.
type: integration
categories:
Expand All @@ -10,7 +10,7 @@ categories:
- edr_xdr
conditions:
kibana:
version: "^8.14.0 || ^9.0.0"
version: "^8.18.0 || ^9.0.0"
elastic:
subscription: basic
screenshots:
Expand All @@ -35,6 +35,14 @@ policy_templates:
- name: microsoft_sentinel
title: Microsoft Sentinel Logs
description: Collect logs from Microsoft Sentinel.
deployment_modes:
default:
enabled: true
agentless:
enabled: true
organization: security
division: engineering
team: security-service-integrations
inputs:
- type: cel
title: Collect Microsoft Sentinel logs via API
Expand Down