Skip to content

Conversation

@andrewkroh
Copy link
Member

@andrewkroh andrewkroh commented Oct 29, 2025

Proposed commit message

Adds whitespace normalization for the SidList field in Windows
Security event 4908 (Special Groups Logon table modified). The
ingest pipeline now uses a gsub processor to normalize separators
before parsing, and the Painless script handles the normalized
format correctly.

Test data originates from
https://github.com/elastic/beats/commit/dd7a1b3808eb98e77fb49b268cd3764cc17eff5b

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.
  • I have verified that any added dashboard complies with Kibana's Dashboard good practices

Author's Checklist

  • [ ]

How to test this PR locally

Related issues

Screenshots

@andrewkroh andrewkroh force-pushed the windows/fix-sidlist branch 2 times, most recently from 7cdc420 to 5cf077b Compare October 29, 2025 15:08
@elastic-vault-github-plugin-prod

🚀 Benchmarks report

To see the full report comment with /test benchmark fullreport

Adds whitespace normalization for the SidList field in Windows
Security event 4908 (Special Groups Logon table modified). The
ingest pipeline now uses a gsub processor to normalize separators
before parsing, and the Painless script handles the normalized
format correctly.

Test data originates from
elastic/beats@dd7a1b3
@elasticmachine
Copy link

💚 Build Succeeded

History

@andrewkroh andrewkroh marked this pull request as ready for review October 29, 2025 18:30
@andrewkroh andrewkroh requested review from a team as code owners October 29, 2025 18:30
}
void splitSidList(def sids, def params, def ctx) {
ArrayList al = new ArrayList();
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This highlights that that system/security and windows/forwarded pipelines are no longer in sync. We will need to address that separately, hopefully taking advantage of new tooling in elastic-package that avoids duplicating content.

@andrewkroh andrewkroh added the Team:Security-Windows Platform Security Windows Platform team [elastic/sec-windows-platform] label Oct 29, 2025
@elasticmachine
Copy link

Pinging @elastic/sec-windows-platform (Team:Security-Windows Platform)

@pierrehilbert pierrehilbert added the Team:Elastic-Agent-Data-Plane Agent Data Plane team [elastic/elastic-agent-data-plane] label Oct 30, 2025
@elasticmachine
Copy link

Pinging @elastic/elastic-agent-data-plane (Team:Elastic-Agent-Data-Plane)

@pierrehilbert pierrehilbert added the Team:Obs-InfraObs Observability Infrastructure Monitoring team [elastic/obs-infraobs-integrations] label Oct 30, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Integration:system System Integration:windows Windows Team:Elastic-Agent-Data-Plane Agent Data Plane team [elastic/elastic-agent-data-plane] Team:Obs-InfraObs Observability Infrastructure Monitoring team [elastic/obs-infraobs-integrations] Team:Security-Windows Platform Security Windows Platform team [elastic/sec-windows-platform]

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants