Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
292 commits
Select commit Hold shift + click to select a range
8b7f1fd
Fixed SecureFindingRestApiIT. Removed uppercasing of the detector typ…
stevanbz Jan 10, 2023
c062cf4
GetMappingsView API - index pattern/alias/datastream support (#245)
petardz Jan 10, 2023
887be34
Updated MAINTAINERS.md to match recommended opensearch-project format…
dblock Jan 10, 2023
d3fb2d9
createmappings api index pattern support (#260)
petardz Jan 11, 2023
df07017
Added 2.5 release notes. (#268)
AWSHurneyt Jan 11, 2023
eadcfdc
add mapping fixes (#264)
sbcd90 Jan 11, 2023
7bdb8e8
correct linux mapping error (#263)
phaseshiftg Jan 11, 2023
0dbbbfc
GetIndexMappings index pattern support (#265)
petardz Jan 11, 2023
78ea8be
Adds timestamp field alias and sets time range filter in bucket level…
eirsep Jan 11, 2023
60c4e0f
added resolving index template config; changed GetIndexMappings API t…
petardz Jan 11, 2023
18a6e92
add nesting level to yaml constructor (#286)
sbcd90 Jan 11, 2023
4c160e2
GetIndexMapping API bugfix (#293)
petardz Jan 12, 2023
0f92eee
log message change for debugging (#321)
sbcd90 Feb 9, 2023
41c4482
Baselined MAINTAINERS and CODEOWNERS docs. (#329)
AWSHurneyt Feb 16, 2023
821f86e
Created untriaged issue workflow. (#325)
dblock Feb 17, 2023
a705168
update others_application mappings (#277)
phaseshiftg Feb 20, 2023
04e99a4
update others_apt (#278)
phaseshiftg Feb 20, 2023
b3ea840
query_field_names bugfix (#335)
petardz Feb 21, 2023
3d2d31f
GetAllRuleCategories API (#327)
petardz Feb 21, 2023
176f299
update others_cloud mappings (#301)
phaseshiftg Feb 21, 2023
35227bd
update others_compliance mappings (#302)
phaseshiftg Feb 21, 2023
f72911a
update others_web mappings (#304)
phaseshiftg Feb 21, 2023
12e4a56
Publish snapshots to maven via GHA (#352)
lezzago Feb 21, 2023
dc938cf
Support for multiple indices in detector input (#336)
petardz Feb 22, 2023
52afd47
Index template cleanup (#317)
petardz Feb 22, 2023
2647ef9
New log types (#332)
petardz Feb 22, 2023
e456804
Add .whitesource configuration file (#96)
mend-for-github-com[bot] Apr 6, 2023
7f5d2c5
upgrade main to 3.0.0 (#389)
sbcd90 Apr 10, 2023
e50c70a
handle index not exists for detector search and delete (#396)
eirsep Apr 12, 2023
6271399
Handle monitor or monitor index not exists during detector deletion (…
eirsep Apr 12, 2023
acfef46
add correlation engine for security-analytics (#405)
sbcd90 Apr 19, 2023
f92e232
Fixed compile issues related to replacing ImmutableOpenMap with java.…
petardz May 1, 2023
12596a2
Findings index mappings fix (#409)
petardz May 2, 2023
2bdba83
enabled source filtering when searching rules (#374)
petardz May 2, 2023
5fb5e3f
Alias and dataStream end-to-end ITs (#373)
petardz May 2, 2023
65dfd98
Moved CODEOWNERS files to align with org requirements. (#418)
AWSHurneyt May 3, 2023
98663af
add rules to correlations for correlation engine (#423)
sbcd90 May 3, 2023
cc53260
fix for input validation of correlation rule names (#428)
sbcd90 May 8, 2023
efe204c
Update CODEOWNERS (#434)
prudhvigodithi May 10, 2023
4e04323
fix for failure in syslogs mappings view api (#435)
sbcd90 May 12, 2023
1c6e64a
Added 2.8 release notes (#444)
bowenlan-amzn May 26, 2023
d14e764
Gradle update (#437)
petardz Jun 7, 2023
faccf6c
New Log Type JSON format (#465)
petardz Jul 5, 2023
d0d3ee7
Logtypes pr v2 (#475)
petardz Jul 11, 2023
61715cd
correlation rule search, delete and edit api (#476)
sbcd90 Jul 11, 2023
e77a7d9
Reduce log level for informative message (#203)
eht16 Jul 12, 2023
9a3213b
Added 2.9 release notes. (#486)
AWSHurneyt Jul 12, 2023
6d49245
[Refactor] rebase to support latest core snapshot (#510)
nknize Aug 8, 2023
8556254
Fix from upstream core.action changes (#517)
YANG-DB Aug 23, 2023
066eaee
[CVE-2023-2976] Fix google-java-format-1.17.0.jar: 1 vulnerabilities …
sandeshkr419 Aug 31, 2023
39b55da
Use strong password in security test (#452) (#454)
opensearch-trigger-bot[bot] Aug 31, 2023
66664b4
[Backport main] Custom log type implementation (#503)
opensearch-trigger-bot[bot] Sep 1, 2023
4339b84
fix for mappings of custom log types & other bug fixes (#505) (#528)
opensearch-trigger-bot[bot] Sep 1, 2023
b88f3db
Fixes detectorType incompatibility with detector rules (#524)
jowg-amazon Sep 1, 2023
af05189
segment replication changes (#529)
sbcd90 Sep 1, 2023
4d63f38
Use core OpenSearch version of commons-lang3 (#535)
lezzago Sep 6, 2023
5178cc0
Force google guava to 32.0.1 (#536)
lezzago Sep 6, 2023
1cb5ddc
Using alerting workflows in detectors (#394) (#533)
eirsep Sep 6, 2023
32d5aa1
add mitre attack based auto-correlations support in correlation engin…
sbcd90 Sep 6, 2023
4d514bd
Updates demo certs used in integ tests (#543)
DarshitChanpura Sep 7, 2023
1003936
auto expand replicas (#539)
lezzago Sep 7, 2023
8f9191a
Added 2.10.0 release notes. (#555)
jowg-amazon Sep 8, 2023
f4be879
adds support for alerts and triggers on group by based sigma rules (…
eirsep Sep 8, 2023
773b5c9
verify workflow through post api call (#563)
jowg-amazon Sep 13, 2023
907ed64
auto expand replicas for logtype index (#568)
sbcd90 Sep 13, 2023
578f41e
Match maintainer account username. (#438)
dblock Sep 15, 2023
998d081
fix flaky integration tests (#581)
sbcd90 Sep 15, 2023
7a33024
ignore tests that may be flaky (#596)
sbcd90 Sep 18, 2023
12e4a97
ignore more flaky tests (#603)
sbcd90 Sep 19, 2023
3c9b23a
updated lucene MAX_DIMENSIONS path (#607)
jowg-amazon Sep 19, 2023
03573e9
Change ruleId if it exists (#628)
lezzago Oct 4, 2023
5781c85
add category to custom log types (#634)
sbcd90 Oct 4, 2023
b838dd8
Sigma Aggregation rule fixes (#622)
sbcd90 Oct 4, 2023
3aa2844
Address search request timeouts as transient error (#561)
jowg-amazon Oct 5, 2023
115ae95
Adding WAF Log type (#617)
sandeshkr419 Oct 5, 2023
58a3a83
fix doc level query constructor (#651)
eirsep Oct 9, 2023
294785f
Added 2.11 release notes. (#660)
AWSHurneyt Oct 11, 2023
884ddd0
Integrate threat intel feeds (#669)
eirsep Oct 25, 2023
92a620d
return rule fields which do not have aliases (#652)
sbcd90 Oct 26, 2023
7a45203
fix detector writeTo() method missing fields (#695)
eirsep Oct 26, 2023
0dd9787
make threat intel async (#703)
sbcd90 Oct 31, 2023
24e94b4
add rollover & archival mechanism for correlation history indices (#670)
sbcd90 Oct 31, 2023
0db4dd3
Onboard prod jenkins docker images to github actions (#710)
peterzhuamazon Nov 3, 2023
177e831
Added release notes for 2.11.1 (#727)
amsiglan Nov 22, 2023
4cca068
Ignore flaky test (#730)
jowg-amazon Nov 27, 2023
c2da465
add jowg-amazon to codeowners (#726)
jowg-amazon Nov 28, 2023
9b36b35
update release notes for 2.11.1 (#736)
sbcd90 Nov 28, 2023
43040d6
#683 Sigma keywords field not handled correctly (#725)
jowg-amazon Nov 29, 2023
a59a014
fix null query filter conversion from sigma to query string query (#722)
eirsep Nov 29, 2023
c0f7bd9
#709 Return empty response for empty mappings and no applied aliases …
goyamegh Nov 30, 2023
01facfc
add field based rules support in correlation engine (#737)
sbcd90 Dec 6, 2023
ae8e996
fix TIF integ test (#774)
jowg-amazon Dec 7, 2023
7066923
Use a common constant to specify the version for log type mappings #7…
jowg-amazon Dec 8, 2023
c373343
Allow deletion of custom log type if custom rule index is missing (#767)
goyamegh Dec 8, 2023
0ad91cc
Delete detector successfully if workflow is missing (#790)
engechas Jan 3, 2024
31e4299
Add developer guide (#791)
engechas Jan 3, 2024
1dd6c2d
Fix codeowners to match maintainers (#783)
dtaivpp Jan 4, 2024
988377a
Upgrade Lucene Codec to Lucene99 (#800)
jowg-amazon Jan 13, 2024
0bbdb31
support object fields in aggregation based sigma rules (#789)
sbcd90 Jan 16, 2024
ea3dc80
Addresses changes related to default admin credentials (#832)
DarshitChanpura Feb 6, 2024
8adb9c3
Updated alert creation following common-utils PR 584. (#837)
AWSHurneyt Feb 6, 2024
4d4f5e3
fix CVE-2023-2976 (#835)
jowg-amazon Feb 6, 2024
414484a
Release notes for 2.12.0 (#834)
jowg-amazon Feb 7, 2024
e3362f6
Added engechas as a maintainer. (#848)
AWSHurneyt Feb 12, 2024
0ef8543
[BUG] ArrayIndexOutOfBoundsException for inconsistent detector index …
goyamegh Feb 14, 2024
8d19912
Fail the flow the when detectot type is missing in the log types inde…
goyamegh Feb 14, 2024
1e0f1ad
Add goyamegh as a maintainer (#868)
goyamegh Feb 22, 2024
8ef0a3f
added riysaxen-amzn as a maintainer (#869)
riysaxen-amzn Feb 27, 2024
172d58d
Remove blocking calls and change threat intel feed flow to event driv…
eirsep Mar 2, 2024
db025ce
Fixing hanging tasks for correlations (#874)
goyamegh Mar 5, 2024
f4ee7bb
Add throw for empty strings in rules with modifier contains, startwit…
jowg-amazon Mar 6, 2024
ec0657d
Refactor invocation of Action listeners in correlations (#880)
goyamegh Mar 6, 2024
8877390
Pass rule field names in doc level queries during monitor/creation. R…
eirsep Mar 6, 2024
689760e
Fix duplicate ecs mappings which returns incorrect log index field in…
jowg-amazon Mar 7, 2024
656a5fe
Add an "exists" check for "not" condition in sigma rules (#852)
jowg-amazon Mar 8, 2024
75c4429
Add search request timeouts for correlations workflows (#893)
goyamegh Mar 8, 2024
25f6c50
Fix get mappings view API incorrectly returning ecs path (#867)
jowg-amazon Mar 11, 2024
0d1d599
get all findings as part of findings API enhancement (#803)
riysaxen-amzn Mar 11, 2024
e816341
fix integ test (#918)
jowg-amazon Mar 13, 2024
9b59f61
Feature findings api enhancements (#914)
riysaxen-amzn Mar 13, 2024
edfff4b
add latest sigma rules (#942)
sbcd90 Mar 19, 2024
06e370f
fix integtests after add latest sigma rules (#950)
sbcd90 Mar 25, 2024
42849c7
Updates sample cert and admin keystore (#864)
DarshitChanpura Mar 26, 2024
901eb26
Allow detectors to be stopped if underlying workflow is deleted. Don'…
engechas Apr 3, 2024
0507239
fix keywords bug and add comments (#964)
jowg-amazon Apr 3, 2024
400969d
Fix: typo. (#941)
dblock Apr 10, 2024
41d5a2e
Delete refresh fix (#433)
petardz Apr 10, 2024
47f160f
Add Codecov workflow (#979)
engechas Apr 13, 2024
b86ee63
[BUG] Changes doc level query name field from id to rule name and add…
jowg-amazon Apr 13, 2024
5188864
Return list of cx friendly 4xx errors for indexing custom rules (#862)
goyamegh Apr 16, 2024
446648d
office hours template (#974)
praveensameneni Apr 17, 2024
62129cd
Upgrade the backport workflow (#494)
lezzago Apr 17, 2024
31a81aa
[BUG_FIX] fix check for agg rules in detector trigger condition to cr…
eirsep Apr 27, 2024
3c03374
Added 2.14.0 release notes. (#1009)
AWSHurneyt May 1, 2024
eea1908
make security-analytics integTest stable (#1005)
sbcd90 May 3, 2024
df5f746
fix chained findings monitor logic in update detector flow (#1019)
eirsep May 9, 2024
c693606
fix code coverage calculation (#980)
sbcd90 May 9, 2024
3793f5c
change default filter to time based fields (#1030)
sbcd90 May 21, 2024
20905ce
changes to add start_time and end_time filters to GetAlertsRequest (#…
sbcd90 May 22, 2024
29cb35b
fix upgrade issues due to lucene codec name change (#1047)
sbcd90 Jun 4, 2024
c3476fe
Add 2.15 release notes (#1061)
engechas Jun 10, 2024
62e4453
Alerts in correlations [Experminental] (#1040)
riysaxen-amzn Jun 11, 2024
a74f509
Alerts in Correlations Part 2 (#1062)
riysaxen-amzn Jun 12, 2024
362f0d6
updates the release notes 2.15 (#1070)
riysaxen-amzn Jun 12, 2024
b99121e
pass integ tests (#1082)
sbcd90 Jun 19, 2024
e8d7879
added correlationAlert integ tests (#1099)
riysaxen-amzn Jul 2, 2024
65c1519
set blank response when indexNotFound exception (#1125)
riysaxen-amzn Jul 2, 2024
ad62186
Threat Intel Analytics (#1098)
eirsep Jul 2, 2024
5d3dbca
throw error when no iocs are stored due to incompatible ioc types fro…
eirsep Jul 2, 2024
23ab84a
add filter to list ioc api to fetch only from available and refreshin…
eirsep Jul 2, 2024
4d7b29f
fix findingIds filter on ioc findings search api (#1130)
eirsep Jul 2, 2024
d51b5a4
fix gradle check (#1143)
jowg-amazon Jul 8, 2024
3be4828
Changes threat intel default store config model (#1133)
jowg-amazon Jul 9, 2024
16bcef3
adds new tif source config type - url download (#1142)
eirsep Jul 9, 2024
a6eb64d
Adjusted IOCTypes usage. (#1156)
AWSHurneyt Jul 12, 2024
b8496a9
Fix the job scheduler parser, action listeners, and multi-node test (…
jowg-amazon Jul 12, 2024
105e590
Refactored ListIOCs API to return the correct number of findings for …
AWSHurneyt Jul 17, 2024
c8ad00f
Ioc upload integ tests and fix update (#1162)
jowg-amazon Jul 17, 2024
8af8542
[BUG] Resolve aliases in monitor input to concrete indices before com…
eirsep Jul 18, 2024
cf31d58
Fix match query in search tif source configs request to use string va…
eirsep Jul 18, 2024
d676715
fix bug: threat intel monitor finding doesnt contain all doc_ids cont…
eirsep Jul 19, 2024
04b7719
Fixed bulk indexing for IOCs. (#1187)
AWSHurneyt Jul 19, 2024
f1e9d20
Fix ioc upload update behavior and change error response (#1192)
jowg-amazon Jul 23, 2024
3230bda
2.16 release notes (#1196)
jowg-amazon Jul 24, 2024
f8b541d
Catch and wrap exceptions. (#1198)
AWSHurneyt Jul 29, 2024
1cb59d9
Adds user validation for threat intel transport layer classes and sta…
eirsep Jul 31, 2024
bd8f0c4
fix mappings integ tests (#1213)
sbcd90 Aug 2, 2024
ddfa87c
update build.gradle to use alerting-spi snapshot version (#1217)
sbcd90 Aug 5, 2024
03e0d9b
added triggers in getDetectors API response (#1226)
riysaxen-amzn Aug 8, 2024
1483883
Bug fixes for threat intel (#1223)
jowg-amazon Aug 8, 2024
a9423f8
make threat intel run with standard detectors (#1234)
sbcd90 Aug 9, 2024
6916f8c
Fixed searchString bug. Removed nested IOC mapping structure. (#1239)
AWSHurneyt Aug 10, 2024
3e1f59d
adds toggling refresh disable/enable for deactivate/activate operatio…
eirsep Aug 10, 2024
2829887
Update PULL_REQUEST_TEMPLATE to include an API spec change in the che…
dblock Aug 15, 2024
890493a
Make threat intel source config release lock event driven (#1254)
jowg-amazon Aug 20, 2024
2e0ed56
Fix S3 validation errors not caught by action listener (#1257)
jowg-amazon Aug 21, 2024
0920e47
Clean up empty IOC indices created by failed source configs (#1267)
jowg-amazon Aug 23, 2024
15b40db
secure rest tests for threat intel monitor apis (#1212)
eirsep Sep 3, 2024
f89c3ed
Fix threat intel multinode tests (#1274)
jowg-amazon Sep 4, 2024
66f1155
Update threat intel job mapping to new version (#1272)
jowg-amazon Sep 4, 2024
2fce175
Stash context for List IOCs Api (#1278)
jowg-amazon Sep 4, 2024
57a317a
add release notes (#1292)
jowg-amazon Sep 5, 2024
e6884d6
Stashcontext sa (#1297)
riysaxen-amzn Sep 11, 2024
ffcc807
upgrade upload artifacts (#1305)
toepkerd Sep 18, 2024
c36d1c7
remove redundant logic to fix OS launch exception and updates actions…
sbcd90 Sep 23, 2024
39c29d4
threat intel monitor bug fixes (#1317)
eirsep Sep 24, 2024
1ca4090
separate doc-level monitor query indices created by detectors (#1324)
sbcd90 Sep 26, 2024
7017328
add release notes for 2.17.1 (#1331)
sbcd90 Sep 27, 2024
ce2989e
Add null check while adding fetched iocs into per-indicator-type map …
eirsep Oct 3, 2024
5341174
update to lucene 9.12 (#1349)
sbcd90 Oct 16, 2024
c223d1c
update number of replicas of system indices to 1-20 and number of pri…
sbcd90 Oct 17, 2024
98edd70
Fix notifications listener leak in threat intel monitor (#1356)
eirsep Oct 17, 2024
ffcaf43
updated dedicated query index settings to true (#1365)
sbcd90 Oct 21, 2024
b185440
update min number of replicas to 0 (#1364)
sbcd90 Oct 21, 2024
6f543b5
fix for detectors with sigma aggregation rules (#1372)
sbcd90 Oct 23, 2024
d5c8f7a
[Bug] Fixed ListIOCs number of findings cap. (#1373)
AWSHurneyt Oct 23, 2024
3d1fcd5
fix search monitor query in update threat intel alert status API (#1383)
eirsep Oct 25, 2024
4166c79
set the refresh policy to IMMEDIATE when updating correlation alerts …
riysaxen-amzn Oct 25, 2024
4432b36
[Bug] Add exists check for IOCs index. (#1392)
AWSHurneyt Oct 25, 2024
9693501
Added 2.18 release notes. (#1399)
AWSHurneyt Oct 29, 2024
364f42d
Add validation for threat intel source config (#1393)
jowg-amazon Oct 30, 2024
189b9e5
Adding various OCSF 1.1 fields to log type static mappings (#1403)
toepkerd Nov 25, 2024
6dc86c6
Replacing hard-coded password with randomly generated string (#1420)
toepkerd Dec 3, 2024
2a9646e
optimize sigma aggregation rule based detectors execution workflow (#…
sbcd90 Dec 12, 2024
8a4176b
fix detector to work for trigger conditions filtering on aggregation …
eirsep Dec 17, 2024
4845337
fixes the duplicate alerts generated by Aggregation Sigma Roles (#1424)
riysaxen-amzn Dec 18, 2024
3e6320b
OCSF1.1 Fixes (#1439)
toepkerd Jan 7, 2025
dca74ce
Added catch for unexpected inputs. (#1442)
AWSHurneyt Jan 8, 2025
24d782c
Fix CVE-2024-47535. (#1459)
AWSHurneyt Jan 31, 2025
3b6ed5f
Added 2.19 release notes. (#1468)
AWSHurneyt Feb 4, 2025
66de1ae
Refactored flaky test. (#1467)
AWSHurneyt Feb 6, 2025
631dad1
Updated commons jar with CVE fixes. (#1481)
AWSHurneyt Feb 21, 2025
614184a
[Release 3.0] Add alpha1 qualifier. (#1490)
AWSHurneyt Feb 27, 2025
b631924
Update gradle 8.10.2 and support jdk23 (#1492)
peterzhuamazon Feb 28, 2025
f198ac2
Fix security-enabled test workflow. (#1494)
AWSHurneyt Mar 14, 2025
3104c90
Added 3.0.0-alpha1 release notes. (#1496)
AWSHurneyt Mar 14, 2025
f5b7b5f
Adds support for uploading threat intelligence in Custom Format … (#1…
eirsep Mar 14, 2025
1ec8498
Remove overrides of preserveIndicesUponCompletion (#1498)
cwperks Mar 18, 2025
d6bfde0
Update version qualifier to beta1. (#1500)
AWSHurneyt Mar 28, 2025
72fdaff
Added 3.0-beta1 release notes. (#1501)
AWSHurneyt Mar 31, 2025
f6a9036
Remove usage of deprecated batchSize() method (#1503)
andrross Apr 9, 2025
d6ddd5b
Fix build due to phasing off SecurityManager usage in favor of Java A…
pranu2502 Apr 11, 2025
dcd2168
Using java-agent gradle plugin to phase off Security Manager in favor…
pranu2502 Apr 15, 2025
e8ba0e1
Add updateVersion task (#1511)
vikhy-aws Apr 24, 2025
2bf993c
Remove beta1 qualifier (#1519) (#1520)
opensearch-trigger-bot[bot] Apr 29, 2025
d38b726
Increment version to 3.1.0-SNAPSHOT (#1517)
opensearch-trigger-bot[bot] Apr 29, 2025
c00cbef
added release notes for 3.0 (#1523)
riysaxen-amzn May 2, 2025
e61462e
Switch guava deps from compileOnly to implementation (#1530)
cwperks May 13, 2025
85351a1
added release notes for 3.1 (#1541)
KashKondaka Jun 18, 2025
2a7bf1d
Update the maven snapshot publish endpoint and credential (#1544)
zelinh Jul 2, 2025
1ff7f34
Increment version to 3.2.0-SNAPSHOT (#1552)
opensearch-trigger-bot[bot] Jul 2, 2025
e01340e
Use instance of LockService instantiated in JobScheduler through Guic…
cwperks Jul 21, 2025
146cc3d
Upgrade gradle to 8.14 and run CI with JDK 24 (#1560)
cwperks Jul 23, 2025
96a5ca2
Add release notes for 3.2.0 (#1562)
opensearch-ci-bot Aug 6, 2025
00362f1
Increment version to 3.3.0-SNAPSHOT (#1574)
cwperks Sep 19, 2025
0aefad9
Remove direct reference to Job-Scheduler Lock Index in SAP repo (#1577)
cwperks Sep 19, 2025
a4188d6
Ensure that user attributes are in expected format attrKey=attrVal fo…
cwperks Sep 24, 2025
95dd123
Move rules to config directory from classpath resources (#1580)
cwperks Sep 25, 2025
54a6e59
Adding toepkerd to MAINTAINERS.md (#1585)
toepkerd Oct 1, 2025
8857f09
Add release notes for 3.3.0 (#1586)
opensearch-ci-bot Oct 7, 2025
e62bda8
Update SA commons jar to force netty deps to 4.1.125.Final (#1591)
cwperks Oct 10, 2025
9ddc6b7
Onboarding new maven snapshots publishing to s3 (SA) (#1597)
peterzhuamazon Oct 23, 2025
1b1c87f
Bump maven snapshot publishing to java 21 (#1601)
peterzhuamazon Oct 23, 2025
b47ed62
Only use alerting SNAPSHOTS in SNAPSHOT build, otherwise use release …
cwperks Nov 17, 2025
e873c6a
Increment version to 3.4.0-SNAPSHOT (#1588)
opensearch-trigger-bot[bot] Nov 26, 2025
7204db3
jdk upgrade to 25 and gradle upgrade to 9.2 (#1618)
riysaxen-amzn Dec 2, 2025
a747670
maven content added in repositories.gradle (#1621) (#1622)
opensearch-trigger-bot[bot] Dec 11, 2025
c049c7c
Add release notes for 3.4.0 (#1620)
opensearch-ci-bot Dec 12, 2025
c9e7457
createUser func fixed ad part of Security tests (#1623) (#1624)
opensearch-trigger-bot[bot] Dec 15, 2025
d8b385c
Incremented version to 3.4.1
opensearch-ci-bot Dec 17, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
The diff you're trying to view is too large. We only load the first 3000 changed files.
12 changes: 12 additions & 0 deletions .codecov.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
codecov:
require_ci_to_pass: yes

coverage:
precision: 2
round: down
range: "75...100"
status:
project:
default:
target: 75% # the required coverage value
threshold: 1% # the leniency in hitting the target
3 changes: 1 addition & 2 deletions .github/CODEOWNERS
Original file line number Diff line number Diff line change
@@ -1,2 +1 @@
# This should match the owning team set up in https://github.com/orgs/opensearch-project/teams
* @opensearch-project/security-analytics
* @amsiglan @AWSHurneyt @getsaurabh02 @lezzago @praveensameneni @sbcd90 @eirsep @jowg-amazon @engechas @goyamegh @riysaxen-amzn @toepkerd
2 changes: 1 addition & 1 deletion .github/ISSUE_TEMPLATE/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,4 +4,4 @@ contact_links:
about: Please ask and answer questions here.
- name: AWS/Amazon Security
url: https://aws.amazon.com/security/vulnerability-reporting/
about: Please report security vulnerabilities here.
about: Please report security vulnerabilities here.
18 changes: 18 additions & 0 deletions .github/ISSUE_TEMPLATE/office_hours.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
---
name: 🎆 Office Hours
about: Discuss project issues, feature requests/ enhancements, PRs
title: '[OFFICE HOURS]'
labels: 'office hours, untriaged'
assignees: ''
---
**Is your topic related to a problem?**
A clear and concise description of what the problem is, e.g. _I'm always frustrated when [...]_

**What would you like to review?**
A clear and concise description of what you want to happen.

**What alternatives have you considered?**
A clear and concise description of any alternative solutions or features you've considered.

**Do you have any additional context?**
Add any other context or screenshots about the topic here.
17 changes: 9 additions & 8 deletions .github/PULL_REQUEST_TEMPLATE.md
Original file line number Diff line number Diff line change
@@ -1,15 +1,16 @@
### Description
[Describe what this change achieves]

### Issues Resolved
[List any issues this PR will resolve]


### Related Issues
Resolves #[Issue number to be closed when this PR is merged]
<!-- List any other related issues here -->

### Check List
- [ ] New functionality includes testing.
- [ ] All tests pass
- [ ] New functionality has been documented.
- [ ] New functionality has javadoc added
- [ ] Commits are signed per the DCO using --signoff
- [ ] API changes companion pull request [created](https://github.com/opensearch-project/opensearch-api-specification/blob/main/DEVELOPER_GUIDE.md).
- [ ] Commits are signed per the DCO using `--signoff`.
- [ ] Public documentation issue/PR [created](https://github.com/opensearch-project/documentation-website/issues/new/choose).

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check [here](https://github.com/opensearch-project/OpenSearch/blob/main/CONTRIBUTING.md#developer-certificate-of-origin).
For more information on following Developer Certificate of Origin and signing off your commits, please check [here](https://github.com/opensearch-project/security-analytics/blob/main/CONTRIBUTING.md#developer-certificate-of-origin).
19 changes: 19 additions & 0 deletions .github/workflows/add-untriaged.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
name: Apply 'untriaged' label during issue lifecycle

on:
issues:
types: [opened, reopened, transferred]

jobs:
apply-label:
runs-on: ubuntu-latest
steps:
- uses: actions/github-script@v6
with:
script: |
github.rest.issues.addLabels({
issue_number: context.issue.number,
owner: context.repo.owner,
repo: context.repo.repo,
labels: ['untriaged']
})
31 changes: 31 additions & 0 deletions .github/workflows/backport.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@

name: Backport
on:
pull_request_target:
types:
- closed
- labeled

jobs:
backport:
runs-on: ubuntu-latest
permissions:
contents: write
pull-requests: write
name: Backport
steps:
- name: GitHub App token
id: github_app_token
uses: tibdex/github-app-token@v1.5.0
with:
app_id: ${{ secrets.APP_ID }}
private_key: ${{ secrets.APP_PRIVATE_KEY }}
installation_id: 22958780

- name: Backport
uses: VachaShah/backport@v2.2.0
with:
github_token: ${{ steps.github_app_token.outputs.token }}
branch_name: backport/backport-${{ github.event.number }}
labels_template: "<%= JSON.stringify([...labels, 'autocut']) %>"
failure_labels: "failed backport"
114 changes: 93 additions & 21 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,34 +8,95 @@ on:
- "*"

jobs:
build:
Get-CI-Image-Tag:
uses: opensearch-project/opensearch-build/.github/workflows/get-ci-image-tag.yml@main
with:
product: opensearch

build-linux:
needs: Get-CI-Image-Tag
strategy:
# This setting says that all jobs should finish, even if one fails
fail-fast: false
matrix:
java: [21, 25]
os:
- ubuntu-24.04-arm # arm64-preview
- ubuntu-24.04 # x64

name: Build and Test security-analytics with JDK ${{ matrix.java }} on ${{ matrix.os }}
runs-on: ${{ matrix.os }}
container:
# using the same image which is used by opensearch-build team to build the OpenSearch Distribution
# this image tag is subject to change as more dependencies and updates will arrive over time
image: ${{ needs.Get-CI-Image-Tag.outputs.ci-image-version-linux }}
# need to switch to root so that github actions can install runner binary on container without permission issues.
options: ${{ needs.Get-CI-Image-Tag.outputs.ci-image-start-options }}

steps:
- name: Run start commands
run: ${{ needs.Get-CI-Image-Tag.outputs.ci-image-start-command }}

- name: Checkout
uses: actions/checkout@v4

- name: Setup Java ${{ matrix.java }}
uses: actions/setup-java@v4
with:
distribution: temurin # Temurin is a distribution of adoptium
java-version: ${{ matrix.java }}

- name: Build and Test
run: |
chown -R 1000:1000 `pwd`
su `id -un 1000` -c "whoami && java -version && ./gradlew build"

- name: Create Artifact Path
run: |
mkdir -p security-analytics-artifacts
cp ./build/distributions/*.zip security-analytics-artifacts

- name: Upload Coverage Report
uses: codecov/codecov-action@v4
with:
token: ${{ secrets.CODECOV_TOKEN }}

- name: Upload failed logs
uses: actions/upload-artifact@v4
if: failure()
with:
name: logs-ubuntu
path: build/testclusters/integTest-*/logs/*
overwrite: true

- name: Upload Artifacts
uses: actions/upload-artifact@v4
with:
name: security-analytics-plugin-${{ matrix.os }}-${{ matrix.java }}
path: security-analytics-artifacts
overwrite: true

build-windows-macos:
env:
BUILD_ARGS: ${{ matrix.os_build_args }}
WORKING_DIR: ${{ matrix.working_directory }}.
strategy:
matrix:
java: [11, 17]
os: [ ubuntu-latest, windows-latest, macos-latest ]
java: [21, 25]
os: [ windows-latest, macos-latest ]
include:
- os: windows-latest
os_build_args: -x integTest -x jacocoTestReport
working_directory: X:\
os_build_args: -x integTest
os_java_options: -Xmx4096M
- os: macos-latest
os_build_args: -x integTest -x jacocoTestReport
os_build_args: -x jacocoTestReport

name: Build and Test security-analytics with JDK ${{ matrix.java }} on ${{ matrix.os }}
runs-on: ${{ matrix.os }}

steps:
- name: Checkout
uses: actions/checkout@v2

# This is a hack, but this step creates a link to the X: mounted drive, which makes the path
# short enough to work on Windows
- name: Shorten Path
if: ${{ matrix.os == 'windows-latest' }}
run: subst 'X:' .
- name: Checkout Branch
uses: actions/checkout@v4

- name: Setup Java ${{ matrix.java }}
uses: actions/setup-java@v1
Expand All @@ -53,14 +114,25 @@ jobs:
mkdir -p security-analytics-artifacts
cp ./build/distributions/*.zip security-analytics-artifacts

- name: Upload Coverage Report
if: ${{ matrix.os == 'ubuntu-latest' }}
uses: codecov/codecov-action@v1
- name: Upload failed logs
uses: actions/upload-artifact@v4
if: ${{ failure() && matrix.os == 'macos-latest' }}
with:
token: ${{ secrets.CODECOV_TOKEN }}
name: logs-mac
path: build/testclusters/integTest-*/logs/*
overwrite: true

- name: Upload failed logs
uses: actions/upload-artifact@v4
if: ${{ failure() && matrix.os == 'windows-latest' }}
with:
name: logs-windows
path: build\testclusters\integTest-*\logs\*
overwrite: true

- name: Upload Artifacts
uses: actions/upload-artifact@v1
uses: actions/upload-artifact@v4
with:
name: security-analytics-plugin-${{ matrix.os }}
path: security-analytics-artifacts
name: security-analytics-plugin-${{ matrix.os }}-${{ matrix.java }}
path: security-analytics-artifacts
overwrite: true
18 changes: 0 additions & 18 deletions .github/workflows/dco.yml

This file was deleted.

20 changes: 20 additions & 0 deletions .github/workflows/delete_backport_branch.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
##
# Copyright OpenSearch Contributors
# SPDX-License-Identifier: Apache-2.0
##

name: Delete merged branch of the backport PRs
on:
pull_request:
types:
- closed

jobs:
delete-branch:
runs-on: ubuntu-latest
if: startsWith(github.event.pull_request.head.ref,'backport/')
steps:
- name: Delete merged branch
uses: SvanBoxel/delete-merged-branch@main
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
47 changes: 47 additions & 0 deletions .github/workflows/maven-publish.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
name: Publish snapshots to maven

on:
workflow_dispatch:
push:
branches:
- 'main'
- '[0-9]+.[0-9]+'
- '[0-9]+.x'

jobs:
build-and-publish-snapshots:
strategy:
fail-fast: false
if: github.repository == 'opensearch-project/security-analytics'
runs-on: ubuntu-latest

permissions:
id-token: write
contents: write

steps:
- uses: actions/setup-java@v3
with:
distribution: temurin # Temurin is a distribution of adoptium
java-version: 21
- uses: actions/checkout@v4

- name: Load secret
uses: 1password/load-secrets-action@v2
with:
# Export loaded secrets as environment variables
export-env: true
env:
OP_SERVICE_ACCOUNT_TOKEN: ${{ secrets.OP_SERVICE_ACCOUNT_TOKEN }}
MAVEN_SNAPSHOTS_S3_REPO: op://opensearch-infra-secrets/maven-snapshots-s3/repo
MAVEN_SNAPSHOTS_S3_ROLE: op://opensearch-infra-secrets/maven-snapshots-s3/role

- name: Configure AWS credentials
uses: aws-actions/configure-aws-credentials@v5
with:
role-to-assume: ${{ env.MAVEN_SNAPSHOTS_S3_ROLE }}
aws-region: us-east-1

- name: publish snapshots to maven
run: |
./gradlew publishPluginZipPublicationToSnapshotsRepository
Loading
Loading