Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Automatic Import] Fix missing ecs mappings #209057

Merged
merged 2 commits into from
Jan 31, 2025

Conversation

bhapas
Copy link
Contributor

@bhapas bhapas commented Jan 31, 2025

Summary

Fix missing ecs mappings.

Details

If the input is of a multilevel json where there were no ecs mappings identified on first level, For ex:

{
  okta_test: {
    audit: {
      actor: [Object],
      authenticationContext: [Object],
      client: [Object],
      debugContext: [Object],
      displayMessage: [Object],
      eventType: [Object],
      legacyEventType: null,
      outcome: [Object],
      published: [Object],
      request: [Object],
      securityContext: [Object],
      severity: [Object],
      target: null,
      transaction: [Object],
      uuid: [Object],
      version: null
    }
  }
}

Then there is no target field identified and an iteration is triggered to find the ecs mappings in the next level. Since there is no target identified the logic exited and further levels were skipped in identifying the mappings.

This PR fixes it and skips handling of Arrays since rename processor cannot flatten arrays on its own to map searchable fields. This will handled separately.

@bhapas bhapas added release_note:fix backport:prev-major Backport to (8.x, 8.18, 8.17, 8.16) the previous major branch and other branches in development Team:Security-Scalability Team label for Security Integrations Scalability Team Feature:AutomaticImport labels Jan 31, 2025
@bhapas bhapas self-assigned this Jan 31, 2025
@bhapas bhapas requested a review from a team as a code owner January 31, 2025 08:07
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-scalability (Team:Security-Scalability)

@bhapas bhapas enabled auto-merge (squash) January 31, 2025 08:57
@bhapas bhapas merged commit 2fe3976 into elastic:main Jan 31, 2025
9 checks passed
@kibanamachine
Copy link
Contributor

Starting backport for target branches: 8.16, 8.17, 8.18, 8.x

https://github.com/elastic/kibana/actions/runs/13071476437

@elasticmachine
Copy link
Contributor

💛 Build succeeded, but was flaky

Failed CI Steps

Test Failures

  • [job] [logs] Jest Tests #20 / CustomFieldsForm renders text as default custom field type

Metrics [docs]

✅ unchanged

cc @bhapas

kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Jan 31, 2025
## Summary

Fix missing ecs mappings.

## Details

If the input is of a multilevel json where there were no ecs mappings
identified on first level, For ex:

```
{
  okta_test: {
    audit: {
      actor: [Object],
      authenticationContext: [Object],
      client: [Object],
      debugContext: [Object],
      displayMessage: [Object],
      eventType: [Object],
      legacyEventType: null,
      outcome: [Object],
      published: [Object],
      request: [Object],
      securityContext: [Object],
      severity: [Object],
      target: null,
      transaction: [Object],
      uuid: [Object],
      version: null
    }
  }
}
```

Then there is no `target` field identified and an iteration is triggered
to find the ecs mappings in the next level. Since there is no `target`
identified the logic exited and further levels were skipped in
identifying the mappings.

This PR fixes it and skips handling of Arrays since `rename` processor
cannot flatten arrays on its own to map searchable fields. This will
handled separately.

(cherry picked from commit 2fe3976)
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Jan 31, 2025
## Summary

Fix missing ecs mappings.

## Details

If the input is of a multilevel json where there were no ecs mappings
identified on first level, For ex:

```
{
  okta_test: {
    audit: {
      actor: [Object],
      authenticationContext: [Object],
      client: [Object],
      debugContext: [Object],
      displayMessage: [Object],
      eventType: [Object],
      legacyEventType: null,
      outcome: [Object],
      published: [Object],
      request: [Object],
      securityContext: [Object],
      severity: [Object],
      target: null,
      transaction: [Object],
      uuid: [Object],
      version: null
    }
  }
}
```

Then there is no `target` field identified and an iteration is triggered
to find the ecs mappings in the next level. Since there is no `target`
identified the logic exited and further levels were skipped in
identifying the mappings.

This PR fixes it and skips handling of Arrays since `rename` processor
cannot flatten arrays on its own to map searchable fields. This will
handled separately.

(cherry picked from commit 2fe3976)
@kibanamachine
Copy link
Contributor

💔 Some backports could not be created

Status Branch Result
8.16 Backport failed because of merge conflicts
8.17 Backport failed because of merge conflicts
8.18
8.x

Note: Successful backport PRs will be merged automatically after passing CI.

Manual backport

To create the backport manually run:

node scripts/backport --pr 209057

Questions ?

Please refer to the Backport tool documentation

@bhapas bhapas added the backport:prev-minor Backport to (9.0) the previous minor version (i.e. one version back from main) label Jan 31, 2025
@kibanamachine
Copy link
Contributor

Starting backport for target branches: 8.16, 8.17, 8.18, 8.x, 9.0

https://github.com/elastic/kibana/actions/runs/13071904524

@bhapas
Copy link
Contributor Author

bhapas commented Jan 31, 2025

Skipping backport to 8.17/8.16

kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Jan 31, 2025
## Summary

Fix missing ecs mappings.

## Details

If the input is of a multilevel json where there were no ecs mappings
identified on first level, For ex:

```
{
  okta_test: {
    audit: {
      actor: [Object],
      authenticationContext: [Object],
      client: [Object],
      debugContext: [Object],
      displayMessage: [Object],
      eventType: [Object],
      legacyEventType: null,
      outcome: [Object],
      published: [Object],
      request: [Object],
      securityContext: [Object],
      severity: [Object],
      target: null,
      transaction: [Object],
      uuid: [Object],
      version: null
    }
  }
}
```

Then there is no `target` field identified and an iteration is triggered
to find the ecs mappings in the next level. Since there is no `target`
identified the logic exited and further levels were skipped in
identifying the mappings.

This PR fixes it and skips handling of Arrays since `rename` processor
cannot flatten arrays on its own to map searchable fields. This will
handled separately.

(cherry picked from commit 2fe3976)
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Jan 31, 2025
## Summary

Fix missing ecs mappings.

## Details

If the input is of a multilevel json where there were no ecs mappings
identified on first level, For ex:

```
{
  okta_test: {
    audit: {
      actor: [Object],
      authenticationContext: [Object],
      client: [Object],
      debugContext: [Object],
      displayMessage: [Object],
      eventType: [Object],
      legacyEventType: null,
      outcome: [Object],
      published: [Object],
      request: [Object],
      securityContext: [Object],
      severity: [Object],
      target: null,
      transaction: [Object],
      uuid: [Object],
      version: null
    }
  }
}
```

Then there is no `target` field identified and an iteration is triggered
to find the ecs mappings in the next level. Since there is no `target`
identified the logic exited and further levels were skipped in
identifying the mappings.

This PR fixes it and skips handling of Arrays since `rename` processor
cannot flatten arrays on its own to map searchable fields. This will
handled separately.

(cherry picked from commit 2fe3976)
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Jan 31, 2025
## Summary

Fix missing ecs mappings.

## Details

If the input is of a multilevel json where there were no ecs mappings
identified on first level, For ex:

```
{
  okta_test: {
    audit: {
      actor: [Object],
      authenticationContext: [Object],
      client: [Object],
      debugContext: [Object],
      displayMessage: [Object],
      eventType: [Object],
      legacyEventType: null,
      outcome: [Object],
      published: [Object],
      request: [Object],
      securityContext: [Object],
      severity: [Object],
      target: null,
      transaction: [Object],
      uuid: [Object],
      version: null
    }
  }
}
```

Then there is no `target` field identified and an iteration is triggered
to find the ecs mappings in the next level. Since there is no `target`
identified the logic exited and further levels were skipped in
identifying the mappings.

This PR fixes it and skips handling of Arrays since `rename` processor
cannot flatten arrays on its own to map searchable fields. This will
handled separately.

(cherry picked from commit 2fe3976)
@kibanamachine
Copy link
Contributor

💔 Some backports could not be created

Status Branch Result
8.16 Backport failed because of merge conflicts
8.17 Backport failed because of merge conflicts
8.18
8.x
9.0

Note: Successful backport PRs will be merged automatically after passing CI.

Manual backport

To create the backport manually run:

node scripts/backport --pr 209057

Questions ?

Please refer to the Backport tool documentation

kibanamachine added a commit that referenced this pull request Jan 31, 2025
# Backport

This will backport the following commits from `main` to `8.x`:
- [[Automatic Import] Fix missing ecs mappings
(#209057)](#209057)

<!--- Backport version: 9.4.3 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sqren/backport)

<!--BACKPORT [{"author":{"name":"Bharat
Pasupula","email":"[email protected]"},"sourceCommit":{"committedDate":"2025-01-31T11:04:45Z","message":"[Automatic
Import] Fix missing ecs mappings (#209057)\n\n## Summary\r\n\r\nFix
missing ecs mappings.\r\n\r\n## Details\r\n\r\nIf the input is of a
multilevel json where there were no ecs mappings\r\nidentified on first
level, For ex:\r\n\r\n```\r\n{\r\n okta_test: {\r\n audit: {\r\n actor:
[Object],\r\n authenticationContext: [Object],\r\n client: [Object],\r\n
debugContext: [Object],\r\n displayMessage: [Object],\r\n eventType:
[Object],\r\n legacyEventType: null,\r\n outcome: [Object],\r\n
published: [Object],\r\n request: [Object],\r\n securityContext:
[Object],\r\n severity: [Object],\r\n target: null,\r\n transaction:
[Object],\r\n uuid: [Object],\r\n version: null\r\n }\r\n
}\r\n}\r\n```\r\n\r\nThen there is no `target` field identified and an
iteration is triggered\r\nto find the ecs mappings in the next level.
Since there is no `target`\r\nidentified the logic exited and further
levels were skipped in\r\nidentifying the mappings.\r\n\r\nThis PR fixes
it and skips handling of Arrays since `rename` processor\r\ncannot
flatten arrays on its own to map searchable fields. This will\r\nhandled
separately.","sha":"2fe39767eeee79e7e059afe5a07d7724e80c0969","branchLabelMapping":{"^v9.1.0$":"main","^v8.19.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:fix","backport:prev-major","Team:Security-Scalability","Feature:AutomaticImport","v9.1.0"],"title":"[Automatic
Import] Fix missing ecs
mappings","number":209057,"url":"https://github.com/elastic/kibana/pull/209057","mergeCommit":{"message":"[Automatic
Import] Fix missing ecs mappings (#209057)\n\n## Summary\r\n\r\nFix
missing ecs mappings.\r\n\r\n## Details\r\n\r\nIf the input is of a
multilevel json where there were no ecs mappings\r\nidentified on first
level, For ex:\r\n\r\n```\r\n{\r\n okta_test: {\r\n audit: {\r\n actor:
[Object],\r\n authenticationContext: [Object],\r\n client: [Object],\r\n
debugContext: [Object],\r\n displayMessage: [Object],\r\n eventType:
[Object],\r\n legacyEventType: null,\r\n outcome: [Object],\r\n
published: [Object],\r\n request: [Object],\r\n securityContext:
[Object],\r\n severity: [Object],\r\n target: null,\r\n transaction:
[Object],\r\n uuid: [Object],\r\n version: null\r\n }\r\n
}\r\n}\r\n```\r\n\r\nThen there is no `target` field identified and an
iteration is triggered\r\nto find the ecs mappings in the next level.
Since there is no `target`\r\nidentified the logic exited and further
levels were skipped in\r\nidentifying the mappings.\r\n\r\nThis PR fixes
it and skips handling of Arrays since `rename` processor\r\ncannot
flatten arrays on its own to map searchable fields. This will\r\nhandled
separately.","sha":"2fe39767eeee79e7e059afe5a07d7724e80c0969"}},"sourceBranch":"main","suggestedTargetBranches":[],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/209057","number":209057,"mergeCommit":{"message":"[Automatic
Import] Fix missing ecs mappings (#209057)\n\n## Summary\r\n\r\nFix
missing ecs mappings.\r\n\r\n## Details\r\n\r\nIf the input is of a
multilevel json where there were no ecs mappings\r\nidentified on first
level, For ex:\r\n\r\n```\r\n{\r\n okta_test: {\r\n audit: {\r\n actor:
[Object],\r\n authenticationContext: [Object],\r\n client: [Object],\r\n
debugContext: [Object],\r\n displayMessage: [Object],\r\n eventType:
[Object],\r\n legacyEventType: null,\r\n outcome: [Object],\r\n
published: [Object],\r\n request: [Object],\r\n securityContext:
[Object],\r\n severity: [Object],\r\n target: null,\r\n transaction:
[Object],\r\n uuid: [Object],\r\n version: null\r\n }\r\n
}\r\n}\r\n```\r\n\r\nThen there is no `target` field identified and an
iteration is triggered\r\nto find the ecs mappings in the next level.
Since there is no `target`\r\nidentified the logic exited and further
levels were skipped in\r\nidentifying the mappings.\r\n\r\nThis PR fixes
it and skips handling of Arrays since `rename` processor\r\ncannot
flatten arrays on its own to map searchable fields. This will\r\nhandled
separately.","sha":"2fe39767eeee79e7e059afe5a07d7724e80c0969"}}]}]
BACKPORT-->

Co-authored-by: Bharat Pasupula <[email protected]>
kibanamachine added a commit that referenced this pull request Jan 31, 2025
# Backport

This will backport the following commits from `main` to `8.18`:
- [[Automatic Import] Fix missing ecs mappings
(#209057)](#209057)

<!--- Backport version: 9.4.3 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sqren/backport)

<!--BACKPORT [{"author":{"name":"Bharat
Pasupula","email":"[email protected]"},"sourceCommit":{"committedDate":"2025-01-31T11:04:45Z","message":"[Automatic
Import] Fix missing ecs mappings (#209057)\n\n## Summary\r\n\r\nFix
missing ecs mappings.\r\n\r\n## Details\r\n\r\nIf the input is of a
multilevel json where there were no ecs mappings\r\nidentified on first
level, For ex:\r\n\r\n```\r\n{\r\n okta_test: {\r\n audit: {\r\n actor:
[Object],\r\n authenticationContext: [Object],\r\n client: [Object],\r\n
debugContext: [Object],\r\n displayMessage: [Object],\r\n eventType:
[Object],\r\n legacyEventType: null,\r\n outcome: [Object],\r\n
published: [Object],\r\n request: [Object],\r\n securityContext:
[Object],\r\n severity: [Object],\r\n target: null,\r\n transaction:
[Object],\r\n uuid: [Object],\r\n version: null\r\n }\r\n
}\r\n}\r\n```\r\n\r\nThen there is no `target` field identified and an
iteration is triggered\r\nto find the ecs mappings in the next level.
Since there is no `target`\r\nidentified the logic exited and further
levels were skipped in\r\nidentifying the mappings.\r\n\r\nThis PR fixes
it and skips handling of Arrays since `rename` processor\r\ncannot
flatten arrays on its own to map searchable fields. This will\r\nhandled
separately.","sha":"2fe39767eeee79e7e059afe5a07d7724e80c0969","branchLabelMapping":{"^v9.1.0$":"main","^v8.19.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:fix","backport:prev-major","Team:Security-Scalability","Feature:AutomaticImport","v9.1.0"],"title":"[Automatic
Import] Fix missing ecs
mappings","number":209057,"url":"https://github.com/elastic/kibana/pull/209057","mergeCommit":{"message":"[Automatic
Import] Fix missing ecs mappings (#209057)\n\n## Summary\r\n\r\nFix
missing ecs mappings.\r\n\r\n## Details\r\n\r\nIf the input is of a
multilevel json where there were no ecs mappings\r\nidentified on first
level, For ex:\r\n\r\n```\r\n{\r\n okta_test: {\r\n audit: {\r\n actor:
[Object],\r\n authenticationContext: [Object],\r\n client: [Object],\r\n
debugContext: [Object],\r\n displayMessage: [Object],\r\n eventType:
[Object],\r\n legacyEventType: null,\r\n outcome: [Object],\r\n
published: [Object],\r\n request: [Object],\r\n securityContext:
[Object],\r\n severity: [Object],\r\n target: null,\r\n transaction:
[Object],\r\n uuid: [Object],\r\n version: null\r\n }\r\n
}\r\n}\r\n```\r\n\r\nThen there is no `target` field identified and an
iteration is triggered\r\nto find the ecs mappings in the next level.
Since there is no `target`\r\nidentified the logic exited and further
levels were skipped in\r\nidentifying the mappings.\r\n\r\nThis PR fixes
it and skips handling of Arrays since `rename` processor\r\ncannot
flatten arrays on its own to map searchable fields. This will\r\nhandled
separately.","sha":"2fe39767eeee79e7e059afe5a07d7724e80c0969"}},"sourceBranch":"main","suggestedTargetBranches":[],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/209057","number":209057,"mergeCommit":{"message":"[Automatic
Import] Fix missing ecs mappings (#209057)\n\n## Summary\r\n\r\nFix
missing ecs mappings.\r\n\r\n## Details\r\n\r\nIf the input is of a
multilevel json where there were no ecs mappings\r\nidentified on first
level, For ex:\r\n\r\n```\r\n{\r\n okta_test: {\r\n audit: {\r\n actor:
[Object],\r\n authenticationContext: [Object],\r\n client: [Object],\r\n
debugContext: [Object],\r\n displayMessage: [Object],\r\n eventType:
[Object],\r\n legacyEventType: null,\r\n outcome: [Object],\r\n
published: [Object],\r\n request: [Object],\r\n securityContext:
[Object],\r\n severity: [Object],\r\n target: null,\r\n transaction:
[Object],\r\n uuid: [Object],\r\n version: null\r\n }\r\n
}\r\n}\r\n```\r\n\r\nThen there is no `target` field identified and an
iteration is triggered\r\nto find the ecs mappings in the next level.
Since there is no `target`\r\nidentified the logic exited and further
levels were skipped in\r\nidentifying the mappings.\r\n\r\nThis PR fixes
it and skips handling of Arrays since `rename` processor\r\ncannot
flatten arrays on its own to map searchable fields. This will\r\nhandled
separately.","sha":"2fe39767eeee79e7e059afe5a07d7724e80c0969"}}]}]
BACKPORT-->

Co-authored-by: Bharat Pasupula <[email protected]>
kibanamachine added a commit that referenced this pull request Jan 31, 2025
# Backport

This will backport the following commits from `main` to `9.0`:
- [[Automatic Import] Fix missing ecs mappings
(#209057)](#209057)

<!--- Backport version: 9.4.3 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sqren/backport)

<!--BACKPORT [{"author":{"name":"Bharat
Pasupula","email":"[email protected]"},"sourceCommit":{"committedDate":"2025-01-31T11:04:45Z","message":"[Automatic
Import] Fix missing ecs mappings (#209057)\n\n## Summary\r\n\r\nFix
missing ecs mappings.\r\n\r\n## Details\r\n\r\nIf the input is of a
multilevel json where there were no ecs mappings\r\nidentified on first
level, For ex:\r\n\r\n```\r\n{\r\n okta_test: {\r\n audit: {\r\n actor:
[Object],\r\n authenticationContext: [Object],\r\n client: [Object],\r\n
debugContext: [Object],\r\n displayMessage: [Object],\r\n eventType:
[Object],\r\n legacyEventType: null,\r\n outcome: [Object],\r\n
published: [Object],\r\n request: [Object],\r\n securityContext:
[Object],\r\n severity: [Object],\r\n target: null,\r\n transaction:
[Object],\r\n uuid: [Object],\r\n version: null\r\n }\r\n
}\r\n}\r\n```\r\n\r\nThen there is no `target` field identified and an
iteration is triggered\r\nto find the ecs mappings in the next level.
Since there is no `target`\r\nidentified the logic exited and further
levels were skipped in\r\nidentifying the mappings.\r\n\r\nThis PR fixes
it and skips handling of Arrays since `rename` processor\r\ncannot
flatten arrays on its own to map searchable fields. This will\r\nhandled
separately.","sha":"2fe39767eeee79e7e059afe5a07d7724e80c0969","branchLabelMapping":{"^v9.1.0$":"main","^v8.19.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:fix","backport:prev-minor","backport:prev-major","Team:Security-Scalability","Feature:AutomaticImport","v9.1.0"],"title":"[Automatic
Import] Fix missing ecs
mappings","number":209057,"url":"https://github.com/elastic/kibana/pull/209057","mergeCommit":{"message":"[Automatic
Import] Fix missing ecs mappings (#209057)\n\n## Summary\r\n\r\nFix
missing ecs mappings.\r\n\r\n## Details\r\n\r\nIf the input is of a
multilevel json where there were no ecs mappings\r\nidentified on first
level, For ex:\r\n\r\n```\r\n{\r\n okta_test: {\r\n audit: {\r\n actor:
[Object],\r\n authenticationContext: [Object],\r\n client: [Object],\r\n
debugContext: [Object],\r\n displayMessage: [Object],\r\n eventType:
[Object],\r\n legacyEventType: null,\r\n outcome: [Object],\r\n
published: [Object],\r\n request: [Object],\r\n securityContext:
[Object],\r\n severity: [Object],\r\n target: null,\r\n transaction:
[Object],\r\n uuid: [Object],\r\n version: null\r\n }\r\n
}\r\n}\r\n```\r\n\r\nThen there is no `target` field identified and an
iteration is triggered\r\nto find the ecs mappings in the next level.
Since there is no `target`\r\nidentified the logic exited and further
levels were skipped in\r\nidentifying the mappings.\r\n\r\nThis PR fixes
it and skips handling of Arrays since `rename` processor\r\ncannot
flatten arrays on its own to map searchable fields. This will\r\nhandled
separately.","sha":"2fe39767eeee79e7e059afe5a07d7724e80c0969"}},"sourceBranch":"main","suggestedTargetBranches":[],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/209057","number":209057,"mergeCommit":{"message":"[Automatic
Import] Fix missing ecs mappings (#209057)\n\n## Summary\r\n\r\nFix
missing ecs mappings.\r\n\r\n## Details\r\n\r\nIf the input is of a
multilevel json where there were no ecs mappings\r\nidentified on first
level, For ex:\r\n\r\n```\r\n{\r\n okta_test: {\r\n audit: {\r\n actor:
[Object],\r\n authenticationContext: [Object],\r\n client: [Object],\r\n
debugContext: [Object],\r\n displayMessage: [Object],\r\n eventType:
[Object],\r\n legacyEventType: null,\r\n outcome: [Object],\r\n
published: [Object],\r\n request: [Object],\r\n securityContext:
[Object],\r\n severity: [Object],\r\n target: null,\r\n transaction:
[Object],\r\n uuid: [Object],\r\n version: null\r\n }\r\n
}\r\n}\r\n```\r\n\r\nThen there is no `target` field identified and an
iteration is triggered\r\nto find the ecs mappings in the next level.
Since there is no `target`\r\nidentified the logic exited and further
levels were skipped in\r\nidentifying the mappings.\r\n\r\nThis PR fixes
it and skips handling of Arrays since `rename` processor\r\ncannot
flatten arrays on its own to map searchable fields. This will\r\nhandled
separately.","sha":"2fe39767eeee79e7e059afe5a07d7724e80c0969"}},{"url":"https://github.com/elastic/kibana/pull/209084","number":209084,"branch":"8.18","state":"OPEN"},{"url":"https://github.com/elastic/kibana/pull/209085","number":209085,"branch":"8.x","state":"OPEN"}]}]
BACKPORT-->

Co-authored-by: Bharat Pasupula <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:prev-major Backport to (8.x, 8.18, 8.17, 8.16) the previous major branch and other branches in development backport:prev-minor Backport to (9.0) the previous minor version (i.e. one version back from main) Feature:AutomaticImport release_note:fix Team:Security-Scalability Team label for Security Integrations Scalability Team v8.18.0 v8.19.0 v9.0.0 v9.1.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants