-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reducing vulnerability runtime mappings #198739
Reducing vulnerability runtime mappings #198739
Conversation
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security) |
export const CDR_VULNERABILITY_DATA_TABLE_RUNTIME_MAPPING_FIELDS: string[] = [ | ||
VULNERABILITY_FIELDS.VENDOR, | ||
]; | ||
export const CDR_VULNERABILITY_DATA_TABLE_RUNTIME_MAPPING_FIELDS: string[] = []; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
decided to keep the constant while we have the runtime mappings for misconfigurations, so its clear that there's no runtime mappings for vulnerabilities.
Starting backport for target branches: 8.16, 8.x |
💚 Build Succeeded
Metrics [docs]Async chunks
History
|
## Summary It closes elastic/security-team#11034 This PR removes runtime mappings for vulnerabilities, since they will be added on the third party integration on [this PR](elastic/integrations#11614) before the 8.16 release, we can remove the runtime mappings in Kibana in favour of not compromising performance. Co-authored-by: Maxim Kholod <[email protected]> (cherry picked from commit 10d7926)
## Summary It closes elastic/security-team#11034 This PR removes runtime mappings for vulnerabilities, since they will be added on the third party integration on [this PR](elastic/integrations#11614) before the 8.16 release, we can remove the runtime mappings in Kibana in favour of not compromising performance. Co-authored-by: Maxim Kholod <[email protected]> (cherry picked from commit 10d7926)
💚 All backports created successfully
Note: Successful backport PRs will be merged automatically after passing CI. Questions ?Please refer to the Backport tool documentation |
# Backport This will backport the following commits from `main` to `8.x`: - [Reducing vulnerability runtime mappings (#198739)](#198739) <!--- Backport version: 9.4.3 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) <!--BACKPORT [{"author":{"name":"Paulo Silva","email":"[email protected]"},"sourceCommit":{"committedDate":"2024-11-04T14:00:35Z","message":"Reducing vulnerability runtime mappings (#198739)\n\n## Summary\r\n\r\nIt closes https://github.com/elastic/security-team/issues/11034\r\n\r\nThis PR removes runtime mappings for vulnerabilities, since they will be\r\nadded on the third party integration on [this\r\nPR](elastic/integrations#11614) before the 8.16\r\nrelease, we can remove the runtime mappings in Kibana in favour of not\r\ncompromising performance.\r\n\r\nCo-authored-by: Maxim Kholod <[email protected]>","sha":"10d7926e3b2a943250d0ec2437c8d645486b84bd","branchLabelMapping":{"^v9.0.0$":"main","^v8.17.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","v9.0.0","Team:Cloud Security","v8.16.0","backport:version","v8.17.0"],"title":"Reducing vulnerability runtime mappings","number":198739,"url":"https://github.com/elastic/kibana/pull/198739","mergeCommit":{"message":"Reducing vulnerability runtime mappings (#198739)\n\n## Summary\r\n\r\nIt closes https://github.com/elastic/security-team/issues/11034\r\n\r\nThis PR removes runtime mappings for vulnerabilities, since they will be\r\nadded on the third party integration on [this\r\nPR](elastic/integrations#11614) before the 8.16\r\nrelease, we can remove the runtime mappings in Kibana in favour of not\r\ncompromising performance.\r\n\r\nCo-authored-by: Maxim Kholod <[email protected]>","sha":"10d7926e3b2a943250d0ec2437c8d645486b84bd"}},"sourceBranch":"main","suggestedTargetBranches":["8.16","8.x"],"targetPullRequestStates":[{"branch":"main","label":"v9.0.0","branchLabelMappingKey":"^v9.0.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/198739","number":198739,"mergeCommit":{"message":"Reducing vulnerability runtime mappings (#198739)\n\n## Summary\r\n\r\nIt closes https://github.com/elastic/security-team/issues/11034\r\n\r\nThis PR removes runtime mappings for vulnerabilities, since they will be\r\nadded on the third party integration on [this\r\nPR](elastic/integrations#11614) before the 8.16\r\nrelease, we can remove the runtime mappings in Kibana in favour of not\r\ncompromising performance.\r\n\r\nCo-authored-by: Maxim Kholod <[email protected]>","sha":"10d7926e3b2a943250d0ec2437c8d645486b84bd"}},{"branch":"8.16","label":"v8.16.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.x","label":"v8.17.0","branchLabelMappingKey":"^v8.17.0$","isSourceBranch":false,"state":"NOT_CREATED"}]}] BACKPORT--> Co-authored-by: Paulo Silva <[email protected]>
# Backport This will backport the following commits from `main` to `8.16`: - [Reducing vulnerability runtime mappings (#198739)](#198739) <!--- Backport version: 9.4.3 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) <!--BACKPORT [{"author":{"name":"Paulo Silva","email":"[email protected]"},"sourceCommit":{"committedDate":"2024-11-04T14:00:35Z","message":"Reducing vulnerability runtime mappings (#198739)\n\n## Summary\r\n\r\nIt closes https://github.com/elastic/security-team/issues/11034\r\n\r\nThis PR removes runtime mappings for vulnerabilities, since they will be\r\nadded on the third party integration on [this\r\nPR](elastic/integrations#11614) before the 8.16\r\nrelease, we can remove the runtime mappings in Kibana in favour of not\r\ncompromising performance.\r\n\r\nCo-authored-by: Maxim Kholod <[email protected]>","sha":"10d7926e3b2a943250d0ec2437c8d645486b84bd","branchLabelMapping":{"^v9.0.0$":"main","^v8.17.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","v9.0.0","Team:Cloud Security","v8.16.0","backport:version","v8.17.0"],"title":"Reducing vulnerability runtime mappings","number":198739,"url":"https://github.com/elastic/kibana/pull/198739","mergeCommit":{"message":"Reducing vulnerability runtime mappings (#198739)\n\n## Summary\r\n\r\nIt closes https://github.com/elastic/security-team/issues/11034\r\n\r\nThis PR removes runtime mappings for vulnerabilities, since they will be\r\nadded on the third party integration on [this\r\nPR](elastic/integrations#11614) before the 8.16\r\nrelease, we can remove the runtime mappings in Kibana in favour of not\r\ncompromising performance.\r\n\r\nCo-authored-by: Maxim Kholod <[email protected]>","sha":"10d7926e3b2a943250d0ec2437c8d645486b84bd"}},"sourceBranch":"main","suggestedTargetBranches":["8.16","8.x"],"targetPullRequestStates":[{"branch":"main","label":"v9.0.0","branchLabelMappingKey":"^v9.0.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/198739","number":198739,"mergeCommit":{"message":"Reducing vulnerability runtime mappings (#198739)\n\n## Summary\r\n\r\nIt closes https://github.com/elastic/security-team/issues/11034\r\n\r\nThis PR removes runtime mappings for vulnerabilities, since they will be\r\nadded on the third party integration on [this\r\nPR](elastic/integrations#11614) before the 8.16\r\nrelease, we can remove the runtime mappings in Kibana in favour of not\r\ncompromising performance.\r\n\r\nCo-authored-by: Maxim Kholod <[email protected]>","sha":"10d7926e3b2a943250d0ec2437c8d645486b84bd"}},{"branch":"8.16","label":"v8.16.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.x","label":"v8.17.0","branchLabelMappingKey":"^v8.17.0$","isSourceBranch":false,"state":"NOT_CREATED"}]}] BACKPORT--> Co-authored-by: Paulo Silva <[email protected]>
Summary
It closes https://github.com/elastic/security-team/issues/11034
This PR removes runtime mappings for vulnerabilities, since they will be added on the third party integration on this PR before the 8.16 release, we can remove the runtime mappings in Kibana in favour of not compromising performance.