Skip to content

Commit

Permalink
[windows] Adding custom config to datastreams winlog input (#8877)
Browse files Browse the repository at this point in the history
* Adding custom winlog input config to windows integration

* changelog

* cleaning up new lines
  • Loading branch information
kgeller authored Jan 16, 2024
1 parent bc6b4cd commit 3840a7f
Show file tree
Hide file tree
Showing 18 changed files with 94 additions and 1 deletion.
5 changes: 5 additions & 0 deletions packages/windows/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "1.44.0"
changes:
- description: Add `custom` configuration option to winlog inputs.
type: enhancement
link: https://github.com/elastic/integrations/pull/8877
- version: "1.43.0"
changes:
- description: Limit request tracer log count to five.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,3 +29,4 @@ processors:
{{#if processors.length}}
{{processors}}
{{/if}}
{{custom}}
10 changes: 10 additions & 0 deletions packages/windows/data_stream/applocker_exe_and_dll/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,16 @@ streams:
show_user: false
description: >
Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.
- name: custom
type: yaml
title: Custom Configurations
description: >-
YAML configuration options for winlog input. Be careful, this may break the integration.
required: false
show_user: false
default: |-
# Winlog configuration example
#batch_read_size: 100
- input: httpjson
title: Windows AppLocker EXE and DLL Events via Splunk Enterprise REST API
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,3 +29,4 @@ processors:
{{#if processors.length}}
{{processors}}
{{/if}}
{{custom}}
10 changes: 10 additions & 0 deletions packages/windows/data_stream/applocker_msi_and_script/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,16 @@ streams:
show_user: false
description: >
Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.
- name: custom
type: yaml
title: Custom Configurations
description: >-
YAML configuration options for winlog input. Be careful, this may break the integration.
required: false
show_user: false
default: |-
# Winlog configuration example
#batch_read_size: 100
- input: httpjson
title: Windows AppLocker MSI and Script Events via Splunk Enterprise REST API
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,3 +29,4 @@ processors:
{{#if processors.length}}
{{processors}}
{{/if}}
{{custom}}
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,16 @@ streams:
show_user: false
description: >
Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.
- name: custom
type: yaml
title: Custom Configurations
description: >-
YAML configuration options for winlog input. Be careful, this may break the integration.
required: false
show_user: false
default: |-
# Winlog configuration example
#batch_read_size: 100
- input: httpjson
title: Windows AppLocker/Packaged app-Deployment Events via Splunk Enterprise REST API
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,3 +29,4 @@ processors:
{{#if processors.length}}
{{processors}}
{{/if}}
{{custom}}
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,16 @@ streams:
show_user: false
description: >
Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.
- name: custom
type: yaml
title: Custom Configurations
description: >-
YAML configuration options for winlog input. Be careful, this may break the integration.
required: false
show_user: false
default: |-
# Winlog configuration example
#batch_read_size: 100
- input: httpjson
title: Windows AppLocker/Packaged app-Execution Events via Splunk Enterprise REST API
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,3 +32,4 @@ processors:
{{#if processors.length}}
{{processors}}
{{/if}}
{{custom}}
10 changes: 10 additions & 0 deletions packages/windows/data_stream/forwarded/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -61,6 +61,16 @@ streams:
show_user: false
description: >
Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.
- name: custom
type: yaml
title: Custom Configurations
description: >-
YAML configuration options for winlog input. Be careful, this may break the integration.
required: false
show_user: false
default: |-
# Winlog configuration example
#batch_read_size: 100
- input: httpjson
title: Windows ForwardedEvents via Splunk Enterprise REST API
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,3 +29,4 @@ processors:
{{#if processors.length}}
{{processors}}
{{/if}}
{{custom}}
10 changes: 10 additions & 0 deletions packages/windows/data_stream/powershell/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -60,6 +60,16 @@ streams:
show_user: false
description: >
Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.
- name: custom
type: yaml
title: Custom Configurations
description: >-
YAML configuration options for winlog input. Be careful, this may break the integration.
required: false
show_user: false
default: |-
# Winlog configuration example
#batch_read_size: 100
- input: httpjson
title: Windows Powershell Events via Splunk Enterprise REST API
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,3 +29,4 @@ processors:
{{#if processors.length}}
{{processors}}
{{/if}}
{{custom}}
10 changes: 10 additions & 0 deletions packages/windows/data_stream/powershell_operational/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -60,6 +60,16 @@ streams:
show_user: false
description: >
Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.
- name: custom
type: yaml
title: Custom Configurations
description: >-
YAML configuration options for winlog input. Be careful, this may break the integration.
required: false
show_user: false
default: |-
# Winlog configuration example
#batch_read_size: 100
- input: httpjson
title: Windows Powershell Operational Events via Splunk Enterprise REST API
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -29,3 +29,4 @@ processors:
{{#if processors.length}}
{{processors}}
{{/if}}
{{custom}}
10 changes: 10 additions & 0 deletions packages/windows/data_stream/sysmon_operational/manifest.yml
Original file line number Diff line number Diff line change
Expand Up @@ -51,6 +51,16 @@ streams:
show_user: false
description: >
Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.
- name: custom
type: yaml
title: Custom Configurations
description: >-
YAML configuration options for winlog input. Be careful, this may break the integration.
required: false
show_user: false
default: |-
# Winlog configuration example
#batch_read_size: 100
- input: httpjson
title: Windows Sysmon Operational Events via Splunk Enterprise REST API
Expand Down
2 changes: 1 addition & 1 deletion packages/windows/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
name: windows
title: Windows
version: 1.43.0
version: 1.44.0
description: Collect logs and metrics from Windows OS and services with Elastic Agent.
type: integration
categories:
Expand Down

0 comments on commit 3840a7f

Please sign in to comment.