Skip to content

Commit 026db7b

Browse files
authored
ti_misp: add toggle to enable request tracing (#5965)
Add an advanced option to enable http request trace logging for debugging purposes. Bump kibana constraint to 8.5.0 which is when the request tracer feature was introduced to Agent.
1 parent c7e6883 commit 026db7b

File tree

6 files changed

+33
-2
lines changed

6 files changed

+33
-2
lines changed

packages/ti_misp/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# newer versions go on top
2+
- version: "1.13.0"
3+
changes:
4+
- description: Add toggle to enable request tracing.
5+
type: bugfix
6+
link: https://github.com/elastic/integrations/pull/5965
27
- version: "1.12.1"
38
changes:
49
- description: Harmonise distribution fields to type long.

packages/ti_misp/data_stream/threat/agent/stream/httpjson.yml.hbs

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,9 @@ config_version: "2"
22
interval: {{interval}}
33
request.method: "POST"
44

5+
{{#if enable_request_tracer}}
6+
request.tracer.filename: http-request-trace-httpjson-ti_misp-threat.ndjson
7+
{{/if}}
58
{{#if url}}
69
request.url: {{url}}/events/restSearch
710
{{/if}}

packages/ti_misp/data_stream/threat/manifest.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,16 @@ streams:
9595
show_user: false
9696
description: >
9797
Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.
98+
- name: enable_request_tracer
99+
type: bool
100+
title: Enable request tracing
101+
multi: false
102+
required: false
103+
show_user: false
104+
description: >
105+
The request tracer logs requests and responses to the agent's local file-system for debugging configurations.
106+
Enabling this request tracing compromises security and should only be used for debugging.
107+
See [documentation](https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-input-httpjson.html#_request_tracer_filename) for details.
98108
99109
template_path: httpjson.yml.hbs
100110
title: MISP

packages/ti_misp/data_stream/threat_attributes/agent/stream/httpjson.yml.hbs

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,9 @@ config_version: "2"
22
interval: {{interval}}
33
request.method: "POST"
44

5+
{{#if enable_request_tracer}}
6+
request.tracer.filename: http-request-trace-httpjson-ti_misp-threat_attributes.ndjson
7+
{{/if}}
58
{{#if url}}
69
request.url: {{url}}/attributes/restSearch
710
{{/if}}

packages/ti_misp/data_stream/threat_attributes/manifest.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -95,6 +95,16 @@ streams:
9595
show_user: false
9696
description: >
9797
Processors are used to reduce the number of fields in the exported event or to enhance the event with metadata. This executes in the agent before the logs are parsed. See [Processors](https://www.elastic.co/guide/en/beats/filebeat/current/filtering-and-enhancing-data.html) for details.
98+
- name: enable_request_tracer
99+
type: bool
100+
title: Enable request tracing
101+
multi: false
102+
required: false
103+
show_user: false
104+
description: >
105+
The request tracer logs requests and responses to the agent's local file-system for debugging configurations.
106+
Enabling this request tracing compromises security and should only be used for debugging.
107+
See [documentation](https://www.elastic.co/guide/en/beats/filebeat/current/filebeat-input-httpjson.html#_request_tracer_filename) for details.
98108
99109
template_path: httpjson.yml.hbs
100110
title: MISP

packages/ti_misp/manifest.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
name: ti_misp
22
title: MISP
3-
version: "1.12.1"
3+
version: "1.13.0"
44
release: ga
55
description: Ingest threat intelligence indicators from MISP platform with Elastic Agent.
66
type: integration
77
format_version: 1.0.0
88
license: basic
99
categories: ["security", "threat_intel"]
1010
conditions:
11-
kibana.version: ^8.0.0
11+
kibana.version: ^8.5.0
1212
icons:
1313
- src: /img/misp.svg
1414
title: MISP

0 commit comments

Comments
 (0)