ModSecurity Audit Integration for Elastic
| Version | 1.23.1 (View all) |
| Subscription level What's this? |
Basic |
| Developed by What's this? |
Community |
| Ingestion method(s) | File |
| Minimum Kibana version(s) | 9.0.0 8.11.0 |
This AI-assisted guide was validated by our engineers. You may need to adjust the steps to match your environment.
The ModSecurity Audit integration for Elastic enables you to collect and analyze logs from ModSecurity, the open-source Web Application Firewall (WAF). This integration allows you to ingest detailed transaction logs into the Elastic Stack, providing visibility into HTTP requests and responses for real-time threat detection and forensic investigation.
This integration is compatible with the following third-party components:
- ModSecurity v3 (LibModSecurity) with Nginx connector
- ModSecurity v2 for Apache (v2.9.x)
Support for JSON output in ModSecurity v3 requires ModSecurity to be compiled with YAJL (Yet Another JSON Library) support.
This integration collects data from ModSecurity by monitoring log files on the host where the WAF is running. You deploy an Elastic Agent to the host and configure it to read the JSON-formatted audit logs produced by the ModSecurity logging engine. The agent uses the logfile input to ingest the data, parses the JSON structure into Elastic Common Schema (ECS) fields, and forwards the information to your Elastic deployment.
The integration performs the following tasks:
- Monitors log files matching the default pattern
/var/log/modsec-audit* - Processes the data using the
auditlogdata stream - Maps ModSecurity fields to ECS for consistent analysis across different log sources
The ModSecurity Audit integration collects log messages of the following types:
auditlog: This data stream collects ModSecurity audit logs using thelogfileinput and parses theJSONstructure into Elastic Common Schema (ECS) fields. This provides records of HTTP requests and responses, including headers and metadata, used for security auditing and forensic analysis. By default, the integration monitors files matching the pattern/var/log/modsec-audit*.
Integrating ModSecurity audit logs with the Elastic Stack provides you with enhanced visibility and security analysis capabilities:
- Web application attack detection: You can monitor logs for common web attacks such as SQL injection (SQLi), Cross-Site Scripting (XSS), and Local File Inclusion (LFI) as identified by ModSecurity rules.
- Regulatory compliance: You can maintain a comprehensive audit trail of all HTTP transactions and security interventions to satisfy your compliance requirements.
- WAF rule tuning and false positive analysis: You can review detailed audit logs to identify legitimate traffic being blocked by restrictive rules, enabling you to create rule exceptions and reduce business disruption.
- Security incident response: You can correlate WAF events with other system and network logs in Kibana to trace the path of an attacker across your infrastructure during a security breach.
Before you configure the integration, ensure you meet these requirements on the ModSecurity host:
- Administrative access: You must have
sudoor root privileges to modify web server configurations for Nginx or Apache and ModSecurity configuration files. YAJLsupport: Verify that your ModSecurity installation was compiled withYAJLsupport. Without it, theSecAuditLogFormat JSONdirective will cause a configuration error.- Logging directory permissions: The Elastic Agent must have read permissions for the directory and file where ModSecurity writes its audit logs, such as
/var/log/. - Disk space: Ensure you have adequate disk space available for the serial audit log file. You'll want to implement log rotation using a tool like
logrotateto prevent disk exhaustion on high-traffic servers.
To use this integration, you need the following Elastic Stack components:
- Elastic Agent: You must have an Elastic Agent installed on the host where ModSecurity is running and enrolled in a fleet policy.
- Kibana and Elasticsearch: This integration requires Kibana version 8.11.0 or later (or 9.0.0+).
- Network connectivity: The host must have outbound connectivity to the Elastic Stack (Elasticsearch and Fleet Server) on ports
443or9200/8220. - Integration asset installation: You must install the ModSecurity Audit integration in Kibana through the Integrations app before data can be correctly parsed.
Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions. You can install only one Elastic Agent per host.
Elastic Agent is required to stream data from the log file receiver and ship the data to Elastic, where the events will then be processed using the integration's ingest pipelines.
To configure ModSecurity for log collection, follow these steps to enable JSON-formatted serial logging:
- Locate the configuration file: Identify your main
modsecurity.conffile. Common paths include/etc/nginx/modsec/modsecurity.conffor Nginx or/etc/modsecurity/modsecurity.conffor Apache. - Enable the audit engine: Set the engine to log only relevant events to reduce volume.
SecAuditEngine RelevantOnly - Configure JSON format: Ensure the logs are structured for the integration parser.
SecAuditLogFormat JSON - Set logging type: Use serial logging to write all events to a single file.
SecAuditLogType Serial - Define log parts: Specify which transaction parts to include. It's recommended to exclude part
Kto prevent ingestion issues. You can also includeCfor the full request body.SecAuditLogParts ABFHJZ - Specify log path: Set the destination file for the audit logs (for example,
/var/log/modsec-audit.json).SecAuditLog /var/log/modsec-audit.json - Integrate with the web server: Ensure your web server configuration loads these rules.
- Nginx: Add
modsecurity_rules_file /etc/nginx/modsec/modsecurity.conf;to your server block. - Apache: Verify that
mod_security2is enabled and includes the configuration file.
- Nginx: Add
- Restart the service: Apply changes by restarting the web server.
- For Nginx, run
sudo systemctl restart nginx. - For Apache, run
sudo systemctl restart apache2orsudo systemctl restart httpd.
- For Nginx, run
To set up the integration in Kibana, follow these steps:
- In Kibana, navigate to Management > Integrations.
- Search for and select ModSecurity Audit.
- Click Add ModSecurity Audit.
- Under the Collect logs from modsecurity instances input, configure the settings listed below.
- Select the Elastic Agent policy to which you want to add this integration.
- Click Save and continue and then Add Elastic Agent to your hosts if you haven't already deployed an agent.
This integration supports the following configuration settings:
- Paths: The list of file paths to monitor (for example,
/var/log/modsec-audit.json). This must match theSecAuditLogpath defined in your configuration. The default is['/var/log/modsec-audit*']. - Preserve original event: If enabled, a raw copy of the original log is stored in the
event.originalfield. The default isfalse. - Timezone offset: The timezone used for parsing timestamps. This accepts canonical IDs (like
Europe/Amsterdam), abbreviated IDs (likeEST), or HH:mm differentials (like-05:00). The default islocal. - Tags: Custom tags to include with the exported data for easier filtering. The default is
['modsec-audit']. - Processors: Optional processors to enhance or reduce event fields before parsing.
To validate that the integration is working properly and data is flowing into Elasticsearch, follow these steps:
- Verify the Elastic Agent status by navigating to Management > Fleet > Agents and confirming that the agent is online and healthy.
- Trigger a security event by generating a request with a common malicious payload:
curl "http://localhost/?id=1'%20OR%20'1'='1" - Attempt to access a sensitive system file to trigger local file inclusion rules:
curl "http://localhost/../etc/passwd" - Verify that the log file is being updated locally on the host machine:
tail -n 5 /var/log/modsec-audit.json - In Kibana, navigate to Analytics > Discover.
- Select the
logs-*data view. - Enter the following KQL filter in the search bar:
data_stream.dataset : "modsecurity.auditlog" - Verify that events appear with recent timestamps. Expand an entry to confirm that fields such as
event.dataset,source.ip, andevent.original(if enabled) are populated correctly.
For help with Elastic ingest tools, check the Common problems documentation. If you encounter issues specific to the ModSecurity Audit integration, refer to the sections below.
If you encounter issues while setting up or running this integration, refer to these common problems and their solutions:
- Logs are not being parsed into fields:
- Ensure that
SecAuditLogFormat JSONis active in yourmodsecurity.conffile. If logs are written in a different format, the integration won't be able to structure the data correctly.
- Ensure that
- Permission denied errors:
- Check that the Elastic Agent user has read permissions for the log files and execution permissions for the parent directories. You can grant access by running a command like
chmod 644 /var/log/modsec-audit.jsonas needed.
- Check that the Elastic Agent user has read permissions for the log files and execution permissions for the parent directories. You can grant access by running a command like
- ModSecurity fails to start with an unknown directive error:
- If you get an error about
SecAuditLogFormat, your version of ModSecurity might have been compiled without YAJL support. You'll need to reinstall or recompile ModSecurity with the YAJL library to enable JSON logging.
- If you get an error about
- Extremely large log lines causing truncation or ingestion failures:
- You should exclude part
K(the list of all rules matched) from yourSecAuditLogPartsdirective. Including this part can create log entries that exceed the agent's buffer limits. Try usingSecAuditLogParts ABFHJZinstead.
- You should exclude part
- Parsing errors like "cannot unmarshal":
- This usually happens if the log file contains data that isn't valid JSON, possibly due to multiple logging formats writing to the same file. You can verify the file content by running the following command:
jq . /var/log/modsec-audit.json
- This usually happens if the log file contains data that isn't valid JSON, possibly due to multiple logging formats writing to the same file. You can verify the file content by running the following command:
- Logs appear in the wrong time range:
- Check the timezone settings on your web server. You can adjust the
tz_offset(Timezone Offset) variable in the integration settings to match your server's local time.
- Check the timezone settings on your web server. You can adjust the
This integration uses the Elastic Agent logfile input to monitor local audit logs. To ensure optimal performance in high-volume environments, you can consider the following adjustments:
- Set
SecAuditLogTypetoSerialto write all audit events to a single file. TheConcurrentlogging method creates a separate file for every transaction and increases the risk of I/O becoming a bottleneck. - Exclude
Part K(the list of all rules matched) from theSecAuditLogPartsdirective to manage data volume and prevent ingestion failures. IncludingPart Kcan create excessively large log entries that exceed the maximum line size limits for parsing. - Reduce storage overhead and ingestion noise by only logging relevant transactions. Use
SecAuditEngine RelevantOnlyso only transactions that trigger a warning or error are logged, or useSecAuditLogRelevantStatusto filter for specific HTTP codes. - Deploy an Elastic Agent on each node in distributed environments with multiple web server nodes to collect logs locally rather than forwarding them over the network.
- Ensure the host has enough CPU and memory for real-time JSON parsing if you're operating in a high-traffic environment.
For more information on architectures that can be used for scaling this integration, check the Ingest Architectures documentation.
The ModSecurity Audit integration uses the following inputs to collect data:
These inputs can be used with this integration:
logfile
For more details about the logfile input settings, check the Filebeat documentation.
To collect logs via logfile, select Collect logs via the logfile input and configure the following parameter:
- Paths: List of glob-based paths to crawl and fetch log files from. Supports glob patterns like
/var/log/*.logor/var/log/*/*.logfor subfolder matching. Each file found starts a separate harvester.
You can find more information about ModSecurity and its rulesets in these resources:
- ModSecurity GitHub Repository - Source code and community issue tracker.
- OWASP Core Rule Set (CRS) - The standard rule set used with ModSecurity.
- ModSecurity v3 Reference Manual
- ModSecurity v2 Reference Manual
The ModSecurity Audit integration provides the following data stream:
The auditlog data stream provides events from ModSecurity audit logs, specifically security audit logs. You'll get detailed information about HTTP transactions that match rules, which includes request and response headers as well as bodies.
This table provides a list of all fields exported by the auditlog data stream:
Exported fields
| Field | Description | Type |
|---|---|---|
| @timestamp | Event timestamp. | date |
| cloud.account.id | The cloud account or organization id used to identify different entities in a multi-tenant environment. Examples: AWS account id, Google Cloud ORG Id, or other unique identifier. | keyword |
| cloud.availability_zone | Availability zone in which this host is running. | keyword |
| cloud.image.id | Image ID for the cloud instance. | keyword |
| cloud.instance.id | Instance ID of the host machine. | keyword |
| cloud.instance.name | Instance name of the host machine. | keyword |
| cloud.machine.type | Machine type of the host machine. | keyword |
| cloud.project.id | Name of the project in Google Cloud. | keyword |
| cloud.provider | Name of the cloud provider. Example values are aws, azure, gcp, or digitalocean. | keyword |
| cloud.region | Region in which this host is running. | keyword |
| container.id | Unique container id. | keyword |
| container.image.name | Name of the image the container was built on. | keyword |
| container.labels | Image labels. | object |
| container.name | Container name. | keyword |
| data_stream.dataset | Data stream dataset. | constant_keyword |
| data_stream.namespace | Data stream namespace. | constant_keyword |
| data_stream.type | Data stream type. | constant_keyword |
| destination.address | Some event destination addresses are defined ambiguously. The event will sometimes list an IP, a domain or a unix socket. You should always store the raw address in the .address field. Then it should be duplicated to .ip or .domain, depending on which one it is. |
keyword |
| destination.as.number | Unique number allocated to the autonomous system. The autonomous system number (ASN) uniquely identifies each network on the Internet. | long |
| destination.as.organization.name | Organization name. | keyword |
| destination.as.organization.name.text | Multi-field of destination.as.organization.name. |
match_only_text |
| destination.domain | The domain name of the destination system. This value may be a host name, a fully qualified domain name, or another host naming format. The value may derive from the original event or be added from enrichment. | keyword |
| destination.geo.city_name | City name. | keyword |
| destination.geo.continent_name | Name of the continent. | keyword |
| destination.geo.country_iso_code | Country ISO code. | keyword |
| destination.geo.country_name | Country name. | keyword |
| destination.geo.location | Longitude and latitude. | geo_point |
| destination.geo.region_iso_code | Region ISO code. | keyword |
| destination.geo.region_name | Region name. | keyword |
| destination.ip | IP address of the destination (IPv4 or IPv6). | ip |
| destination.port | Port of the destination. | long |
| ecs.version | ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events. |
keyword |
| event.dataset | Event dataset | constant_keyword |
| event.module | Event module | constant_keyword |
| host.architecture | Operating system architecture. | keyword |
| host.containerized | If the host is a container. | boolean |
| host.domain | Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider. | keyword |
| host.hostname | Hostname of the host. It normally contains what the hostname command returns on the host machine. |
keyword |
| host.id | Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name. |
keyword |
| host.ip | Host ip addresses. | ip |
| host.mac | Host mac addresses. | keyword |
| host.name | Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use. |
keyword |
| host.os.build | OS build information. | keyword |
| host.os.codename | OS codename, if any. | keyword |
| host.os.family | OS family (such as redhat, debian, freebsd, windows). | keyword |
| host.os.kernel | Operating system kernel version as a raw string. | keyword |
| host.os.name | Operating system name, without the version. | keyword |
| host.os.name.text | Multi-field of host.os.name. |
text |
| host.os.platform | Operating system platform (such centos, ubuntu, windows). | keyword |
| host.os.version | Operating system version as a raw string. | keyword |
| host.type | Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment. |
keyword |
| http.request.body.content | The full HTTP request body. | wildcard |
| http.request.body.content.text | Multi-field of http.request.body.content. |
match_only_text |
| http.request.bytes | Total size in bytes of the request (body and headers). | long |
| http.request.method | HTTP request method. The value should retain its casing from the original event. For example, GET, get, and GeT are all considered valid values for this field. |
keyword |
| http.request.mime_type | Mime type of the body of the request. This value must only be populated based on the content of the request body, not on the Content-Type header. Comparing the mime type of a request with the request's Content-Type header can be helpful in detecting threats or misconfigured clients. |
keyword |
| http.request.referrer | Referrer for this HTTP request. | keyword |
| http.response.body.content | The full HTTP response body. | wildcard |
| http.response.body.content.text | Multi-field of http.response.body.content. |
match_only_text |
| http.response.bytes | Total size in bytes of the response (body and headers). | long |
| http.response.mime_type | Mime type of the body of the response. This value must only be populated based on the content of the response body, not on the Content-Type header. Comparing the mime type of a response with the response's Content-Type header can be helpful in detecting misconfigured servers. |
keyword |
| http.response.status_code | HTTP response status code. | long |
| http.version | HTTP version. | keyword |
| input.type | Input type | keyword |
| log.file.path | Full path to the log file this event came from, including the file name. It should include the drive letter, when appropriate. If the event wasn't read from a log file, do not populate this field. | keyword |
| log.offset | Log offset | long |
| message | human-readable summary of the event | text |
| modsec.audit.connector | The name of the connector between the web server and libmodsecurity. | keyword |
| modsec.audit.details | Modsecurity audit details. | flattened |
| modsec.audit.messages | Modsecurity audit message. | keyword |
| modsec.audit.server | Modsecurity server name. | keyword |
| related.ip | All of the IPs seen on your event. | ip |
| rule.id | A rule ID that is unique within the scope of an agent, observer, or other entity using the rule for detection of this event. | keyword |
| source.address | Some event source addresses are defined ambiguously. The event will sometimes list an IP, a domain or a unix socket. You should always store the raw address in the .address field. Then it should be duplicated to .ip or .domain, depending on which one it is. |
keyword |
| source.as.number | Unique number allocated to the autonomous system. The autonomous system number (ASN) uniquely identifies each network on the Internet. | long |
| source.as.organization.name | Organization name. | keyword |
| source.as.organization.name.text | Multi-field of source.as.organization.name. |
match_only_text |
| source.geo.city_name | City name. | keyword |
| source.geo.continent_name | Name of the continent. | keyword |
| source.geo.country_iso_code | Country ISO code. | keyword |
| source.geo.country_name | Country name. | keyword |
| source.geo.location | Longitude and latitude. | geo_point |
| source.geo.region_iso_code | Region ISO code. | keyword |
| source.geo.region_name | Region name. | keyword |
| source.ip | IP address of the source (IPv4 or IPv6). | ip |
| source.port | Port of the source. | long |
| tags | List of keywords used to tag each event. | keyword |
| transaction.id | Unique identifier of the transaction within the scope of its trace. A transaction is the highest level of work measured within a service, such as a request to a server. | keyword |
| url.domain | Domain of the url, such as "www.elastic.co". In some cases a URL may refer to an IP and/or port directly, without a domain name. In this case, the IP address would go to the domain field. If the URL contains a literal IPv6 address enclosed by [ and ] (IETF RFC 2732), the [ and ] characters should also be captured in the domain field. |
keyword |
| url.extension | The field contains the file extension from the original request url, excluding the leading dot. The file extension is only set if it exists, as not every url has a file extension. The leading period must not be included. For example, the value must be "png", not ".png". Note that when the file name has multiple extensions (example.tar.gz), only the last one should be captured ("gz", not "tar.gz"). | keyword |
| url.fragment | Portion of the url after the #, such as "top". The # is not part of the fragment. |
keyword |
| url.original | Unmodified original url as seen in the event source. Note that in network monitoring, the observed URL may be a full URL, whereas in access logs, the URL is often just represented as a path. This field is meant to represent the URL as it was observed, complete or not. | wildcard |
| url.original.text | Multi-field of url.original. |
match_only_text |
| url.path | Path of the request, such as "/search". | wildcard |
| url.port | Port of the request, such as 443. | long |
| url.query | The query field describes the query string of the request, such as "q=elasticsearch". The ? is excluded from the query string. If a URL contains no ?, there is no query field. If there is a ? but no query, the query field exists with an empty string. The exists query can be used to differentiate between the two cases. |
keyword |
| url.scheme | Scheme of the request, such as "https". Note: The : is not part of the scheme. |
keyword |
| user.name | Short name or login of the user. | keyword |
| user.name.text | Multi-field of user.name. |
match_only_text |
| user_agent.device.name | Name of the device. | keyword |
| user_agent.name | Name of the user agent. | keyword |
| user_agent.original | Unparsed user_agent string. | keyword |
| user_agent.original.text | Multi-field of user_agent.original. |
match_only_text |
| user_agent.os.full | Operating system name, including the version or code name. | keyword |
| user_agent.os.full.text | Multi-field of user_agent.os.full. |
match_only_text |
| user_agent.os.name | Operating system name, without the version. | keyword |
| user_agent.os.name.text | Multi-field of user_agent.os.name. |
match_only_text |
| user_agent.os.version | Operating system version as a raw string. | keyword |
| user_agent.version | Version of the user agent. | keyword |
This is a sample event from the auditlog data stream:
Example
{
"@timestamp": "2021-05-14T14:38:37.000+05:00",
"agent": {
"ephemeral_id": "1739e1e4-bab6-4445-968b-7726bd486433",
"id": "a27141ba-9754-4dc0-9468-bd32f5cbe036",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.5.1"
},
"data_stream": {
"dataset": "modsecurity.auditlog",
"namespace": "ep",
"type": "logs"
},
"ecs": {
"version": "8.17.0"
},
"elastic_agent": {
"id": "a27141ba-9754-4dc0-9468-bd32f5cbe036",
"snapshot": false,
"version": "8.5.1"
},
"event": {
"agent_id_status": "verified",
"category": [
"web"
],
"dataset": "modsecurity.auditlog",
"ingested": "2023-01-30T22:34:38Z",
"kind": "event",
"timezone": "+05:00",
"type": [
"access"
]
},
"host": {
"architecture": "x86_64",
"containerized": false,
"hostname": "docker-fleet-agent",
"id": "75e38940166b4dbc90b6f5610e8e9c39",
"ip": [
"172.18.0.7"
],
"mac": [
"02-42-AC-12-00-07"
],
"name": "docker-fleet-agent",
"os": {
"codename": "focal",
"family": "debian",
"kernel": "5.10.104-linuxkit",
"name": "Ubuntu",
"platform": "ubuntu",
"type": "linux",
"version": "20.04.5 LTS (Focal Fossa)"
}
},
"http": {
"request": {
"method": "PUT"
},
"response": {
"mime_type": "application/json; charset=utf-8",
"status_code": 400
},
"version": "1.1"
},
"input": {
"type": "log"
},
"log": {
"file": {
"path": "/tmp/service_logs/modsec-audit-tz.log"
},
"offset": 0
},
"modsec": {
"audit": {
"server": "nginx/1.14.0"
}
},
"source": {
"ip": "37.120.205.2",
"port": 56047
},
"tags": [
"modsec-audit"
],
"url": {
"domain": "www.example.com",
"original": "https://www.example.com:443/orders/2734183/finish",
"path": "/orders/2734183/finish",
"port": 443,
"scheme": "https"
},
"user_agent": {
"device": {
"name": "Other"
},
"name": "okhttp",
"original": "okhttp/2.7.5",
"version": "2.7.5"
}
}
Changelog
| Version | Details | Minimum Kibana version |
|---|---|---|
| 1.23.1 | Enhancement (View pull request) Update the documentation. |
9.0.0 8.11.0 |
| 1.23.0 | Enhancement (View pull request) Update the documentation. |
9.0.0 8.11.0 |
| 1.22.0 | Enhancement (View pull request) Preserve event.original on pipeline error. |
9.0.0 8.11.0 |
| 1.21.2 | Enhancement (View pull request) Generate processor tags and normalize error handler. |
9.0.0 8.11.0 |
| 1.21.1 | Enhancement (View pull request) Changed owners. |
9.0.0 8.11.0 |
| 1.21.0 | Enhancement (View pull request) Allow @custom pipeline access to event.original without setting preserve_original_event. |
9.0.0 8.11.0 |
| 1.20.0 | Enhancement (View pull request) Support stack version 9.0. |
9.0.0 8.0.0 7.16.0 |
| 1.19.0 | Enhancement (View pull request) ECS version updated to 8.17.0. |
8.0.0 7.16.0 |
| 1.18.2 | Bug fix (View pull request) Use triple-brace Mustache templating when referencing variables in ingest pipelines. |
8.0.0 7.16.0 |
| 1.18.1 | Bug fix (View pull request) Use triple-brace Mustache templating when referencing variables in ingest pipelines. |
8.0.0 7.16.0 |
| 1.18.0 | Enhancement (View pull request) Update package spec to 3.0.3. |
8.0.0 7.16.0 |
| 1.17.2 | Enhancement (View pull request) Changed owners |
8.0.0 7.16.0 |
| 1.17.1 | Bug fix (View pull request) Fix exclude_files pattern. |
8.0.0 7.16.0 |
| 1.17.0 | Enhancement (View pull request) ECS version updated to 8.11.0. |
8.0.0 7.16.0 |
| 1.16.1 | Bug fix (View pull request) Add missing destination.as.* and denstination.geo.* field definitions and mapping. |
8.0.0 7.16.0 |
| 1.16.0 | Enhancement (View pull request) Improve 'event.original' check to avoid errors if set. |
8.0.0 7.16.0 |
| 1.15.0 | Enhancement (View pull request) Set 'community' owner type. |
8.0.0 7.16.0 |
| 1.14.0 | Enhancement (View pull request) ECS version updated to 8.10.0. |
8.0.0 7.16.0 |
| 1.13.0 | Enhancement (View pull request) The format_version in the package manifest changed from 2.11.0 to 3.0.0. Removed dotted YAML keys from package manifest. Added 'owner.type: elastic' to package manifest. |
8.0.0 7.16.0 |
| 1.12.0 | Enhancement (View pull request) Add tags.yml file so that integration's dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI. |
8.0.0 7.16.0 |
| 1.11.1 | Bug fix (View pull request) Make pipeline selection more robust when nginx is configured with server_tokens off. |
8.0.0 7.16.0 |
| 1.11.0 | Enhancement (View pull request) Update package to ECS 8.9.0. |
8.0.0 7.16.0 |
| 1.10.0 | Enhancement (View pull request) Ensure event.kind is correctly set for pipeline errors. |
8.0.0 7.16.0 |
| 1.9.1 | Bug fix (View pull request) Fix handling of apache details. |
8.0.0 7.16.0 |
| 1.9.0 | Enhancement (View pull request) Update package to ECS 8.8.0. |
8.0.0 7.16.0 |
| 1.8.0 | Enhancement (View pull request) Update package-spec version to 2.7.0. |
8.0.0 7.16.0 |
| 1.7.0 | Enhancement (View pull request) Update package to ECS 8.7.0. |
8.0.0 7.16.0 |
| 1.6.1 | Enhancement (View pull request) Added categories and/or subcategories. |
8.0.0 7.16.0 |
| 1.6.0 | Bug fix (View pull request) Handle sub-second resolution timestamps. Enhancement (View pull request) Improve error handling. |
8.0.0 7.16.0 |
| 1.5.1 | Bug fix (View pull request) Add support for time zone configuration. |
8.0.0 7.16.0 |
| 1.5.0 | Enhancement (View pull request) Update package to ECS 8.6.0. |
8.0.0 7.16.0 |
| 1.4.1 | Bug fix (View pull request) Remove duplicate fields. |
8.0.0 7.16.0 |
| 1.4.0 | Enhancement (View pull request) Update package to ECS 8.5.0. |
8.0.0 7.16.0 |
| 1.3.0 | Enhancement (View pull request) Adding better extraction of http request headers |
8.0.0 7.16.0 |
| 1.2.1 | Enhancement (View pull request) Use ECS geo.location definition. |
8.0.0 7.16.0 |
| 1.2.0 | Enhancement (View pull request) Update package to ECS 8.4.0 |
8.0.0 7.16.0 |
| 1.1.3 | Bug fix (View pull request) Fix typo in the build/docs/README.md |
8.0.0 7.16.0 |
| 1.1.2 | Bug fix (View pull request) Fix date format, Json issues and apache modesecurity issues |
8.0.0 7.16.0 |
| 1.1.1 | Enhancement (View pull request) Update package name and description to align with standard wording |
8.0.0 7.16.0 |
| 1.1.0 | Enhancement (View pull request) Update package to ECS 8.3.0. |
8.0.0 7.16.0 |
| 1.0.0 | Enhancement (View pull request) Make GA |
8.0.0 7.16.0 |
| 0.1.5 | Enhancement (View pull request) Add documentation for multi-fields |
— |
| 0.1.4 | Enhancement (View pull request) Change ownership to correct owner and update versions to support 8.x |
— |
| 0.1.3 | Bug fix (View pull request) Regenerate test files using the new GeoIP database |
— |
| 0.1.2 | Bug fix (View pull request) Change test public IPs to the supported subset |
— |
| 0.1.1 | Bug fix (View pull request) Fix logic that checks for the 'forwarded' tag |
— |
| 0.1.0 | Enhancement (View pull request) Initial draft of the package |
— |