Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Fleet] Restrict Azure Eventhub input for agentless integrations #211092

Closed
kcreddy opened this issue Feb 13, 2025 · 8 comments · Fixed by #211262
Closed

[Fleet] Restrict Azure Eventhub input for agentless integrations #211092

kcreddy opened this issue Feb 13, 2025 · 8 comments · Fixed by #211262
Assignees
Labels
Team:Fleet Team label for Observability Data Collection Fleet team

Comments

@kcreddy
Copy link
Contributor

kcreddy commented Feb 13, 2025

Coming from elastic/integrations#12586 (comment), while testing Microsoft Sentinel integration in 8.18.0 cloud environment (also Serverless), the integration policy UI shows 2 inputs: API and Azure EventHub.

azure-eventhub input is unsupported in Agentless at the moment as per elastic/integrations#12586 (comment) and needs to be removed just like other inputs here: #202091.

Screenshot from 8.18.0 cloud environment Image

Edit: As per #211092 (comment), we also need to block o365audit and gcp-pubsub along with azure-eventhub

cc: @qcorporation @jamiehynds

@kcreddy kcreddy added the Team:Fleet Team label for Observability Data Collection Fleet team label Feb 13, 2025
@elasticmachine
Copy link
Contributor

Pinging @elastic/fleet (Team:Fleet)

@qcorporation
Copy link

qcorporation commented Feb 13, 2025

We will need to block o365audit, azure-eventhub, gcp-pubsub

@jamiehynds
Copy link

@nimarezainia @kpollich is this something y'all could address sooner rather than later? We have a number of integrations that we'd like to add agentless support to. They support ingest via API and other inputs yet so be supported by agentless. We'd ideally like to address this issue before making these integrations agentless, as it'll likely cause confusion. If there's an ETA we can plan around it. Thanks!

@kpollich
Copy link
Member

Yes we can take care of this ASAP.

Does it make more sense to move to an allowlist rather than a blocklist for these input types? Should we simply only allow httpjson and cel inputs for now?

@kpollich
Copy link
Member

cc @jen-huang @criamico

@kpollich
Copy link
Member

#211262

@kpollich kpollich self-assigned this Feb 14, 2025
@jamiehynds
Copy link

Yes we can take care of this ASAP.

Does it make more sense to move to an allowlist rather than a blocklist for these input types? Should we simply only allow httpjson and cel inputs for now?

No objections on my end, and we can add more inputs to the allowlist once we support S3 etc. Thanks for jumping on it so quickly!

@kpollich
Copy link
Member

I added #211275 as a chore to our next sprint to swap this to an allowlist.

kibanamachine pushed a commit to kibanamachine/kibana that referenced this issue Feb 20, 2025
…gentles inputs (elastic#211262)

Closes elastic#211092

## Summary

Disallows unsupported input types for security integrations adopting
agentless.

### Checklist

- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

cc @jamiehynds @qcorporation @kcreddy

(cherry picked from commit 46812bc)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Team:Fleet Team label for Observability Data Collection Fleet team
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants