Skip to content

Commit 03b6ee7

Browse files
sysdig: add support for cspm data stream to collect compliance results
The CSPM data stream logs provide an overview of the evaluation results of your Cloud and Kubernetes environment’s adherence to specific security standards, regulations, and policies. The findings highlight areas where your organization is meeting or failing to meet the required security controls and procedures. Sanitized test case inputs were obtained from live Sysdig Secure instance using the Sysdig API.
1 parent 8301cba commit 03b6ee7

29 files changed

+4170
-135
lines changed

packages/sysdig/_dev/build/docs/README.md

Lines changed: 18 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,15 @@
22
This integration allows for the shipping of [Sysdig](https://sysdig.com/) logs to Elastic for security, observability and organizational awareness. Logs can then be analyzed by using either the dashboard included with the integration or via the creation of custom dashboards within Kibana.
33

44
## Data Streams
5-
The Sysdig integration collects three types of logs:
5+
The Sysdig integration collects four types of logs:
66

77
**Alerts** The Alerts data stream collected by the Sysdig integration is comprised of Sysdig Alerts. See more details about Sysdig Alerts in [Sysdig's Alerts Documentation](https://docs.sysdig.com/en/docs/sysdig-monitor/alerts/). A complete list of potential fields used by this integration can be found in the [Logs reference](#logs-reference)
88

9-
**Event** The event data stream collected through the Sysdig integration consists of Sysdig Security Events. See more details about Security Events in [Sysdig's Events Feed Documentation](https://docs.sysdig.com/en/docs/sysdig-secure/threats/activity/events-feed/).
9+
**Event** The event data stream collected through the Sysdig integration consists of Sysdig Security Events. See more details about Security Events in [Sysdig's Events Feed Documentation](https://docs.sysdig.com/en/docs/sysdig-secure/threats/activity/events-feed/). It uses Sysdig's Next Gen API (standardized). You can access your regional documentation through the links [here](https://docs.sysdig.com/en/developer-tools/sysdig-api/#access-next-gen-api-documentation-using-regional-endpoints).
1010

11-
**Vulnerability** The vulnerability data stream collected through the Sysdig integration consists of Sysdig vulnerability scan results. See more details about vulnerabilities in [Sysdig's Vulnerability Management documentation](https://docs.sysdig.com/en/sysdig-secure/vulnerability-management/).
11+
**CSPM** The CSPM data stream collected through the Sysdig integration consists of Sysdig compliance results. See more details about compliance results in [Sysdig's Compliance documentation](https://docs.sysdig.com/en/sysdig-secure/compliance/). It uses Sysdig's Current API (non-standardised). You can access your regional documentation through the links [here](https://docs.sysdig.com/en/developer-tools/sysdig-api/#access-current-api-documentation-using-regional-endpoints).
12+
13+
**Vulnerability** The vulnerability data stream collected through the Sysdig integration consists of Sysdig vulnerability scan results. See more details about vulnerabilities in [Sysdig's Vulnerability Management documentation](https://docs.sysdig.com/en/sysdig-secure/vulnerability-management/). It uses Sysdig's Next Gen API (standardized). You can access your regional documentation through the links [here](https://docs.sysdig.com/en/developer-tools/sysdig-api/#access-next-gen-api-documentation-using-regional-endpoints).
1214

1315
For vulnerability data, Each interval fetches all available scan results from the configured stage. Currently, only one stage can be configured at a time. Users wishing to collect scan results from different stages must configure additional integrations for each desired stage.
1416

@@ -36,9 +38,12 @@ The HTTP input allows the Elastic Agent to receive Sysdig Alerts via HTTP webhoo
3638

3739
**Required:** To configure Sysdig to output JSON, you must set up as webhook notification channel as outlined in the [Sysdig Documentation](https://docs.sysdig.com/en/docs/administration/administration-settings/outbound-integrations/notifications-management/set-up-notification-channels/configure-a-webhook-channel/).
3840

39-
### To collect data from the Sysdig Next Gen API:
41+
### To collect data from the Sysdig API:
4042

41-
- Retrieve the API Token by following [Sysdig's API Token Guide](https://docs.sysdig.com/en/retrieve-the-sysdig-api-token).
43+
- Retrieve the API Token by following the [Sysdig API Token Guide](https://docs.sysdig.com/en/retrieve-the-sysdig-api-token).
44+
- The API URL varies by region. To determine the correct URL for your region, use the following guides:
45+
- For Sysdig's Next Gen API, refer to the [regional endpoints guide](https://docs.sysdig.com/en/developer-tools/sysdig-api/#access-the-sysdig-api-using-the-regional-endpoints).
46+
- For Sysdig's Current API, refer to the [SaaS regions and IP ranges guide](https://docs.sysdig.com/en/administration/saas-regions-and-ip-ranges/#overview).
4247

4348
### Enabling the integration in Elastic:
4449

@@ -50,7 +55,6 @@ The HTTP input allows the Elastic Agent to receive Sysdig Alerts via HTTP webhoo
5055
6. Select "Save and continue" to save the integration.
5156

5257
**Note**:
53-
- The URL may vary depending on your region. Please refer to the [Documentation](https://docs.sysdig.com/en/developer-tools/sysdig-api/#access-the-sysdig-api-using-the-regional-endpoints) to find the correct URL for your region.
5458
- If you see an error saying `exceeded maximum number of CEL executions` during data ingestion, it usually means a large volume of data is being processed for the selected time interval. To fix this, try increasing the `Maximum Pages Per Interval` setting in the configuration.
5559
- Users wishing to collect vulnerability scan results from multiple stages must configure individual integrations for each desired stage.
5660

@@ -60,8 +64,6 @@ The HTTP input allows the Elastic Agent to receive Sysdig Alerts via HTTP webhoo
6064

6165
Sysdig alerts can contain a multitude of various fields pertaining to the type of activity on the host machine.
6266

63-
#### Example
64-
6567
{{ event "alerts" }}
6668

6769
{{ fields "alerts" }}
@@ -70,18 +72,22 @@ Sysdig alerts can contain a multitude of various fields pertaining to the type o
7072

7173
This is the `event` dataset.
7274

73-
#### Example
74-
7575
{{event "event"}}
7676

7777
{{fields "event"}}
7878

79+
### CSPM
80+
81+
This is the `CSPM` dataset.
82+
83+
{{event "cspm"}}
84+
85+
{{fields "cspm"}}
86+
7987
### Vulnerability
8088

8189
This is the `vulnerability` dataset.
8290

83-
#### Example
84-
8591
{{event "vulnerability"}}
8692

8793
{{fields "vulnerability"}}

0 commit comments

Comments
 (0)