Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions packages/tenable_sc/_dev/build/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@

The Tenable Security Center integration collects and parses data from the [Tenable Security Center](https://docs.tenable.com/tenablesc/Content/Welcome.htm) APIs.

## Agentless Enabled Integration

Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to [Agentless integrations](https://www.elastic.co/guide/en/serverless/current/security-agentless-integrations.html) and the [Agentless integrations FAQ](https://www.elastic.co/guide/en/serverless/current/agentless-integration-troubleshooting.html).
Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

## Compatibility

This module has been tested against `Tenable.sc version 5.23` and `Tenable.sc version 6.4.0`.
Expand Down
5 changes: 5 additions & 0 deletions packages/tenable_sc/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "1.31.0"
changes:
- description: Enable Agentless deployment.
type: enhancement
link: https://github.com/elastic/integrations/pull/15364
- version: "1.30.0"
changes:
- description: Add support for "Accept Risk Status" filter in vulnerability data stream.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,27 @@ processors:
- set:
field: ecs.version
value: '8.11.0'
- remove:
field:
- organization
- division
- team
ignore_missing: true
if: ctx.organization instanceof String && ctx.division instanceof String && ctx.team instanceof String
tag: remove_agentless_tags
description: >-
Removes the fields added by Agentless as metadata,
as they can collide with ECS fields.
- rename:
field: message
target_field: event.original
ignore_missing: true
if: ctx.event?.original == null
- remove:
field: message
ignore_missing: true
if: ctx.event?.original != null
description: 'The `message` field is no longer required if the document has an `event.original` field.'
- json:
field: event.original
target_field: json
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,27 @@ processors:
- set:
field: ecs.version
value: '8.11.0'
- remove:
field:
- organization
- division
- team
ignore_missing: true
if: ctx.organization instanceof String && ctx.division instanceof String && ctx.team instanceof String
tag: remove_agentless_tags
description: >-
Removes the fields added by Agentless as metadata,
as they can collide with ECS fields.
- rename:
field: message
target_field: event.original
ignore_missing: true
if: ctx.event?.original == null
- remove:
field: message
ignore_missing: true
if: ctx.event?.original != null
description: 'The `message` field is no longer required if the document has an `event.original` field.'
- json:
field: event.original
target_field: json
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,11 +4,27 @@ processors:
- set:
field: ecs.version
value: '8.11.0'
- remove:
field:
- organization
- division
- team
ignore_missing: true
if: ctx.organization instanceof String && ctx.division instanceof String && ctx.team instanceof String
tag: remove_agentless_tags
description: >-
Removes the fields added by Agentless as metadata,
as they can collide with ECS fields.
- rename:
field: message
target_field: event.original
ignore_missing: true
if: ctx.event?.original == null
- remove:
field: message
ignore_missing: true
if: ctx.event?.original != null
description: 'The `message` field is no longer required if the document has an `event.original` field.'
- json:
field: event.original
target_field: json
Expand Down
5 changes: 5 additions & 0 deletions packages/tenable_sc/docs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,11 @@

The Tenable Security Center integration collects and parses data from the [Tenable Security Center](https://docs.tenable.com/tenablesc/Content/Welcome.htm) APIs.

## Agentless Enabled Integration

Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to [Agentless integrations](https://www.elastic.co/guide/en/serverless/current/security-agentless-integrations.html) and the [Agentless integrations FAQ](https://www.elastic.co/guide/en/serverless/current/agentless-integration-troubleshooting.html).
Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

## Compatibility

This module has been tested against `Tenable.sc version 5.23` and `Tenable.sc version 6.4.0`.
Expand Down
14 changes: 11 additions & 3 deletions packages/tenable_sc/manifest.yml
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
format_version: "3.0.2"
format_version: "3.3.2"
name: tenable_sc
title: Tenable Security Center
# The version must be updated in the input configuration templates as well, in order to set the correct User-Agent header. Until elastic/kibana#121310 is implemented we will have to manually sync these.
version: "1.30.0"
version: "1.31.0"
description: |
Collect data from Tenable Security Center with Elastic Agent.
type: integration
Expand All @@ -11,7 +11,7 @@ categories:
- vulnerability_management
conditions:
kibana:
version: "^8.13.0 || ^9.0.0"
version: "^8.18.0 || ^9.0.0"
screenshots:
- src: /img/tenable_sc-screenshot.png
title: Tenable Security Center vulnerability dashboard screenshot
Expand All @@ -26,6 +26,14 @@ policy_templates:
- name: tenable_sc
title: Tenable Security Center data
description: Collect Tenable Security Center data.
deployment_modes:
default:
enabled: true
agentless:
enabled: true
organization: security
division: engineering
team: security-service-integrations
inputs:
- type: httpjson
vars:
Expand Down