forked from opensearch-project/security-analytics
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Added 2.14.0 release notes. (opensearch-project#1009)
* Added 2.14.0 release notes. Signed-off-by: AWSHurneyt <[email protected]> * Added 2.14.0 release notes. Signed-off-by: AWSHurneyt <[email protected]> --------- Signed-off-by: AWSHurneyt <[email protected]>
- Loading branch information
1 parent
31a81aa
commit 3c03374
Showing
1 changed file
with
22 additions
and
0 deletions.
There are no files selected for viewing
22 changes: 22 additions & 0 deletions
22
release-notes/opensearch-security-analytics.release-notes-2.14.0.0.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,22 @@ | ||
## Version 2.14.0.0 2024-04-30 | ||
|
||
Compatible with OpenSearch 2.14.0 | ||
|
||
### Maintenance | ||
* Increment version to 2.14.0-SNAPSHOT. ([#1007](https://github.com/opensearch-project/security-analytics/pull/1007)) | ||
* Updates sample cert and admin keystore ([#864](https://github.com/opensearch-project/security-analytics/pull/864)) | ||
|
||
### Features | ||
* Add latest sigma rules ([#942](https://github.com/opensearch-project/security-analytics/pull/942)) | ||
|
||
### Bug Fixes | ||
* Fix integ tests after add latest sigma rules ([#950](https://github.com/opensearch-project/security-analytics/pull/950)) | ||
* Fix keywords bug and add comments ([#964](https://github.com/opensearch-project/security-analytics/pull/964)) | ||
* Changes doc level query name field from id to rule name and adds validation ([#972](https://github.com/opensearch-project/security-analytics/pull/972)) | ||
* Fix check for agg rules in detector trigger condition to create chained findings monitor ([#992](https://github.com/opensearch-project/security-analytics/pull/992)) | ||
|
||
### Refactoring | ||
* Allow detectors to be stopped if underlying workflow is deleted. Don't allow them to then be started/edited ([#810](https://github.com/opensearch-project/security-analytics/pull/810)) | ||
|
||
### Documentation | ||
* Added 2.14.0 release notes. ([#1009](https://github.com/opensearch-project/security-analytics/pull/1009)) |