Skip to content

Commit 88930ee

Browse files
authored
m365_defender: ensure $skip parameter is correctly formatted (#15392)
m365_defender: ensure $skip parameter is correctly formatted and quieten invalid health updates The values used to populate this parameter can be greater than the cutover to e-notation for doubles, so convert to int before converting to string.
1 parent 399ac8f commit 88930ee

File tree

5 files changed

+16
-4
lines changed

5 files changed

+16
-4
lines changed

packages/m365_defender/changelog.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,12 @@
11
# newer versions go on top
2+
- version: "4.0.2"
3+
changes:
4+
- description: Ensure large `$skip` API parameter values are correctly formatted in `vulnerability` data stream.
5+
type: bugfix
6+
link: https://github.com/elastic/integrations/pull/15392
7+
- description: Supress expected empty template health updates.
8+
type: bugfix
9+
link: https://github.com/elastic/integrations/pull/15392
210
- version: "4.0.1"
311
changes:
412
- description: Extract `process.name` from `process.command_line` in alert, event, and incident data streams.

packages/m365_defender/data_stream/alert/agent/stream/httpjson.yml.hbs

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,10 +42,12 @@ response.pagination:
4242
target: url.params.$filter
4343
value: '[[.last_response.url.params.Get "$filter"]]'
4444
fail_on_template_error: true
45+
do_not_log_failure: true
4546
- set:
4647
target: url.params.$skip
4748
value: '[[if (eq (len .last_response.body.value) {{batch_size}})]][[add (toInt (.last_response.url.params.Get "$skip")) {{batch_size}}]][[end]]'
4849
fail_on_template_error: true
50+
do_not_log_failure: true
4951
response.split:
5052
target: body.value
5153
ignore_empty_value: true

packages/m365_defender/data_stream/incident/agent/stream/httpjson.yml.hbs

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,12 @@ response.pagination:
4040
target: url.params.$filter
4141
value: '[[.last_response.url.params.Get "$filter"]]'
4242
fail_on_template_error: true
43+
do_not_log_failure: true
4344
- set:
4445
target: url.params.$skip
4546
value: '[[if (eq (len .last_response.body.value) {{batch_size}})]][[add (toInt (.last_response.url.params.Get "$skip")) {{batch_size}}]][[end]]'
4647
fail_on_template_error: true
48+
do_not_log_failure: true
4749
response.split:
4850
target: body.value
4951
ignore_empty_value: true

packages/m365_defender/data_stream/vulnerability/agent/stream/cel.yml.hbs

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ program: |-
6060
"GET",
6161
state.url.trim_right("/") + "/api/vulnerabilities/machinesVulnerabilities?" + {
6262
"$top": [string(state.config.product_batch_size)],
63-
"$skip": [string(state.product_skip)],
63+
"$skip": [string(int(state.product_skip))],
6464
}.format_query()
6565
).do_request().as(productResp, (productResp.StatusCode == 200) ?
6666
productResp.Body.decode_json().as(productBody,
@@ -119,7 +119,7 @@ program: |-
119119
"GET",
120120
state.url.trim_right("/") + "/api/machines?" + {
121121
"$top": [string(state.config.machine_batch_size)],
122-
"$skip": [string(res.machine_skip)],
122+
"$skip": [string(int(res.machine_skip))],
123123
}.format_query()
124124
).do_request().as(machineResp, (machineResp.StatusCode == 200) ?
125125
machineResp.Body.decode_json().as(machineBody,
@@ -182,7 +182,7 @@ program: |-
182182
"GET",
183183
state.url.trim_right("/") + "/api/vulnerabilities?" + {
184184
"$top": [string(state.config.vulnerabilities_batch_size)],
185-
"$skip": [string(res.vulnerability_skip)],
185+
"$skip": [string(int(res.vulnerability_skip))],
186186
}.format_query()
187187
).do_request().as(vulnerabilityResp, (vulnerabilityResp.StatusCode == 200) ?
188188
vulnerabilityResp.Body.decode_json().as(vulnerabilityBody,

packages/m365_defender/manifest.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
format_version: "3.4.0"
22
name: m365_defender
33
title: Microsoft Defender XDR
4-
version: "4.0.1"
4+
version: "4.0.2"
55
description: Collect logs from Microsoft Defender XDR with Elastic Agent.
66
categories:
77
- "security"

0 commit comments

Comments
 (0)