Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[8.x] [Cloud Security] Update Findings page runtime fields required f…
…or third party data compatibility (#198635) (#198649) # Backport This will backport the following commits from `main` to `8.x`: - [[Cloud Security] Update Findings page runtime fields required for third party data compatibility (#198635)](#198635) <!--- Backport version: 9.4.3 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) <!--BACKPORT [{"author":{"name":"Paulo Silva","email":"[email protected]"},"sourceCommit":{"committedDate":"2024-11-01T09:59:09Z","message":"[Cloud Security] Update Findings page runtime fields required for third party data compatibility (#198635)\n\n## Summary\r\n\r\nThis PR enhances the solution proposed by [this\r\nPR](#195702), by picking only the\r\nfields that are currently not mapped by the current Third Party\r\nintegrations, this fixes performance degradation identified during the\r\nQA cycle of 8.16.0.\r\n\r\nFixes:\r\n- https://github.com/elastic/security-team/issues/11034\r\n\r\n### Misconfiguration Runtime fields\r\n\r\n- **rule.benchmark.rule_number**: runtime mapping kept because this\r\nfield is missing on `security_solution-aws.misconfiguration_latest-v1`\r\ncausing filtering out data when sorting by **Rule Number** column on the\r\nMisconfigurations Data Table.\r\n- **rule.section**: runtime mapping kept because this field is missing\r\non `security_solution-aws.misconfiguration_latest-v1` causing filtering\r\nout data when sorting by **Framework Section** column on the\r\nMisconfigurations Data Table.\r\n- **resource.sub_type**: runtime mapping kept because this field is\r\nmissing on `security_solution-aws.misconfiguration_latest-v1` causing\r\nfiltering out data when sorting by **Resource Type** column on the\r\nMisconfigurations Data Table.\r\n- **orchestrator.cluster.name**: runtime mapping kept because this field\r\nis missing on `security_solution-wiz.misconfiguration_latest-v1` causing\r\nfiltering out data when grouping by **Kubernetes Cluster** column on the\r\nMisconfigurations page.\r\n- **cloud.account.name**: runtime mapping kept because this field is\r\nmissing on `security_solution-aws.misconfiguration_latest-v1` causing\r\nfiltering out data when grouping by **Kubernetes Cluster** column on the\r\nMisconfigurations page.\r\n\r\n\r\n### Vulnerability Runtime Fields:\r\n\r\n- **observer.vendor**: runtime mapping added because this field is\r\nmapped as `text` on `security_solution-wiz.vulnerability_latest-v1`\r\ncausing filtering out when sorting by the **Vendor** column on the\r\nVulnerability Data Table\r\n- **cloud.provider**: runtime mapping added because this field is mapped\r\nas `text` on `security_solution-wiz.vulnerability_latest-v1` causing\r\nfiltering out when grouping by **Cloud Account** on the Vulnerability\r\npage. (This field is needed in order to retrieve the Cloud Provider name\r\nand icon)\r\n\r\n\r\n## Screenshot - Left: After the changes / Right: Current\r\n\r\n\r\n\r\nhttps://github.com/user-attachments/assets/2cbdd8b7-131c-42e4-a881-632f8cd3854b\r\n\r\n\r\nhttps://github.com/user-attachments/assets/4372feb6-4c01-4047-a90a-d6728f9400fe\r\n\r\n\r\n\r\nhttps://github.com/user-attachments/assets/b9e32514-f2ee-4e4d-ba5f-ea3e20d4d0b2","sha":"7a98aa176d6dcb3b850b5b9ae2dcd48e7c7ec0cb","branchLabelMapping":{"^v9.0.0$":"main","^v8.17.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","v9.0.0","Team:Cloud Security","backport:prev-minor","ci:build-cloud-image","v8.16.0","backport:version","v8.17.0"],"title":"[Cloud Security] Update Findings page runtime fields required for third party data compatibility","number":198635,"url":"https://github.com/elastic/kibana/pull/198635","mergeCommit":{"message":"[Cloud Security] Update Findings page runtime fields required for third party data compatibility (#198635)\n\n## Summary\r\n\r\nThis PR enhances the solution proposed by [this\r\nPR](#195702), by picking only the\r\nfields that are currently not mapped by the current Third Party\r\nintegrations, this fixes performance degradation identified during the\r\nQA cycle of 8.16.0.\r\n\r\nFixes:\r\n- https://github.com/elastic/security-team/issues/11034\r\n\r\n### Misconfiguration Runtime fields\r\n\r\n- **rule.benchmark.rule_number**: runtime mapping kept because this\r\nfield is missing on `security_solution-aws.misconfiguration_latest-v1`\r\ncausing filtering out data when sorting by **Rule Number** column on the\r\nMisconfigurations Data Table.\r\n- **rule.section**: runtime mapping kept because this field is missing\r\non `security_solution-aws.misconfiguration_latest-v1` causing filtering\r\nout data when sorting by **Framework Section** column on the\r\nMisconfigurations Data Table.\r\n- **resource.sub_type**: runtime mapping kept because this field is\r\nmissing on `security_solution-aws.misconfiguration_latest-v1` causing\r\nfiltering out data when sorting by **Resource Type** column on the\r\nMisconfigurations Data Table.\r\n- **orchestrator.cluster.name**: runtime mapping kept because this field\r\nis missing on `security_solution-wiz.misconfiguration_latest-v1` causing\r\nfiltering out data when grouping by **Kubernetes Cluster** column on the\r\nMisconfigurations page.\r\n- **cloud.account.name**: runtime mapping kept because this field is\r\nmissing on `security_solution-aws.misconfiguration_latest-v1` causing\r\nfiltering out data when grouping by **Kubernetes Cluster** column on the\r\nMisconfigurations page.\r\n\r\n\r\n### Vulnerability Runtime Fields:\r\n\r\n- **observer.vendor**: runtime mapping added because this field is\r\nmapped as `text` on `security_solution-wiz.vulnerability_latest-v1`\r\ncausing filtering out when sorting by the **Vendor** column on the\r\nVulnerability Data Table\r\n- **cloud.provider**: runtime mapping added because this field is mapped\r\nas `text` on `security_solution-wiz.vulnerability_latest-v1` causing\r\nfiltering out when grouping by **Cloud Account** on the Vulnerability\r\npage. (This field is needed in order to retrieve the Cloud Provider name\r\nand icon)\r\n\r\n\r\n## Screenshot - Left: After the changes / Right: Current\r\n\r\n\r\n\r\nhttps://github.com/user-attachments/assets/2cbdd8b7-131c-42e4-a881-632f8cd3854b\r\n\r\n\r\nhttps://github.com/user-attachments/assets/4372feb6-4c01-4047-a90a-d6728f9400fe\r\n\r\n\r\n\r\nhttps://github.com/user-attachments/assets/b9e32514-f2ee-4e4d-ba5f-ea3e20d4d0b2","sha":"7a98aa176d6dcb3b850b5b9ae2dcd48e7c7ec0cb"}},"sourceBranch":"main","suggestedTargetBranches":["8.16","8.x"],"targetPullRequestStates":[{"branch":"main","label":"v9.0.0","branchLabelMappingKey":"^v9.0.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/198635","number":198635,"mergeCommit":{"message":"[Cloud Security] Update Findings page runtime fields required for third party data compatibility (#198635)\n\n## Summary\r\n\r\nThis PR enhances the solution proposed by [this\r\nPR](#195702), by picking only the\r\nfields that are currently not mapped by the current Third Party\r\nintegrations, this fixes performance degradation identified during the\r\nQA cycle of 8.16.0.\r\n\r\nFixes:\r\n- https://github.com/elastic/security-team/issues/11034\r\n\r\n### Misconfiguration Runtime fields\r\n\r\n- **rule.benchmark.rule_number**: runtime mapping kept because this\r\nfield is missing on `security_solution-aws.misconfiguration_latest-v1`\r\ncausing filtering out data when sorting by **Rule Number** column on the\r\nMisconfigurations Data Table.\r\n- **rule.section**: runtime mapping kept because this field is missing\r\non `security_solution-aws.misconfiguration_latest-v1` causing filtering\r\nout data when sorting by **Framework Section** column on the\r\nMisconfigurations Data Table.\r\n- **resource.sub_type**: runtime mapping kept because this field is\r\nmissing on `security_solution-aws.misconfiguration_latest-v1` causing\r\nfiltering out data when sorting by **Resource Type** column on the\r\nMisconfigurations Data Table.\r\n- **orchestrator.cluster.name**: runtime mapping kept because this field\r\nis missing on `security_solution-wiz.misconfiguration_latest-v1` causing\r\nfiltering out data when grouping by **Kubernetes Cluster** column on the\r\nMisconfigurations page.\r\n- **cloud.account.name**: runtime mapping kept because this field is\r\nmissing on `security_solution-aws.misconfiguration_latest-v1` causing\r\nfiltering out data when grouping by **Kubernetes Cluster** column on the\r\nMisconfigurations page.\r\n\r\n\r\n### Vulnerability Runtime Fields:\r\n\r\n- **observer.vendor**: runtime mapping added because this field is\r\nmapped as `text` on `security_solution-wiz.vulnerability_latest-v1`\r\ncausing filtering out when sorting by the **Vendor** column on the\r\nVulnerability Data Table\r\n- **cloud.provider**: runtime mapping added because this field is mapped\r\nas `text` on `security_solution-wiz.vulnerability_latest-v1` causing\r\nfiltering out when grouping by **Cloud Account** on the Vulnerability\r\npage. (This field is needed in order to retrieve the Cloud Provider name\r\nand icon)\r\n\r\n\r\n## Screenshot - Left: After the changes / Right: Current\r\n\r\n\r\n\r\nhttps://github.com/user-attachments/assets/2cbdd8b7-131c-42e4-a881-632f8cd3854b\r\n\r\n\r\nhttps://github.com/user-attachments/assets/4372feb6-4c01-4047-a90a-d6728f9400fe\r\n\r\n\r\n\r\nhttps://github.com/user-attachments/assets/b9e32514-f2ee-4e4d-ba5f-ea3e20d4d0b2","sha":"7a98aa176d6dcb3b850b5b9ae2dcd48e7c7ec0cb"}},{"branch":"8.16","label":"v8.16.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.x","label":"v8.17.0","branchLabelMappingKey":"^v8.17.0$","isSourceBranch":false,"state":"NOT_CREATED"}]}] BACKPORT--> Co-authored-by: Paulo Silva <[email protected]>
- Loading branch information