Skip to content

Commit 1be9c81

Browse files
[cyera][datastore] Add Cyera Datastore datastream (elastic#15207)
The initial release includes datastore data stream and associated dashboard. Cyera fields are mapped to their corresponding ECS fields where possible. Test samples were derived from live data samples, which were subsequently sanitized.
1 parent 059ed57 commit 1be9c81

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+5572
-15
lines changed

packages/cyera/_dev/build/docs/README.md

Lines changed: 16 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,11 @@ This integration is compatible with different versions of Cyera APIs for respect
1515
| Classification | v1 |
1616
| Issue | v3 |
1717
| Event | v1 |
18+
| Datastore | v2 |
1819

1920
### How it works
2021

21-
This integration periodically queries the Cyera API to retrieve classifications, issues and events.
22+
This integration periodically queries the Cyera API to retrieve classifications, issues, events and datastores.
2223

2324
## What data does this integration collect?
2425

@@ -30,10 +31,10 @@ This integration collects log messages of the following types:
3031

3132
- `Event`: Collects all events from the Cyera system.
3233

33-
>**Note:** Classification and Issue data streams currently do not have an ILM policy applied. A policy will be introduced in an upcoming release. Until then, full sync will be performed, which may result in higher storage costs.
34+
- `Datastore`: Collects all datastore objects from the Cyera system.
3435

3536
### Supported use cases
36-
Integrating Cyera Classification, Issues, and Events data streams with Elastic SIEM provides visibility into sensitive data, the risks tied to that data, and the security events triggered across cloud and SaaS environments. By correlating Cyera’s classification intelligence with issue context and event activity in Elastic analytics, security teams can strengthen data security posture, accelerate incident response, and simplify compliance. Dashboards in Kibana present breakdowns by sensitivity, category, severity, status, risk status, event type, and trends over time — enabling faster investigations, better prioritization, and improved accountability.
37+
Integrating Cyera Classification, Issues, Events and Datastore data streams with Elastic SIEM provides end-to-end visibility into where sensitive data resides, the risks tied to that data, and the security events triggered across cloud and SaaS environments. By correlating datastore metadata (such as type, provider, sensitivity, and ownership) with Cyera’s classification intelligence, issue context, and event activity in Elastic analytics, security teams can strengthen data security posture, accelerate incident response, and simplify compliance. Dashboards in Kibana present breakdowns by datastore type, sensitivity, category, severity, status, risk status, event type, and trends over time — enabling faster investigations, better prioritization, and improved accountability.
3738

3839
## What do I need to use this integration?
3940

@@ -111,6 +112,14 @@ For more information on architectures that can be used for scaling this integrat
111112

112113
{{event "classification"}}
113114

115+
### Datastore
116+
117+
{{fields "datastore"}}
118+
119+
#### Example event
120+
121+
{{event "datastore"}}
122+
114123
### Issue
115124

116125
{{fields "issue"}}
@@ -132,3 +141,7 @@ For more information on architectures that can be used for scaling this integrat
132141
These inputs can be used in this integration:
133142

134143
- [cel](https://www.elastic.co/docs/reference/beats/filebeat/filebeat-input-cel)
144+
145+
#### ILM Policy
146+
147+
To facilitate classification, datastore, issues and event data, source data stream-backed indices `.ds-logs-cyera.<data_stream_name>-*` are allowed to contain duplicates from each polling interval. ILM policy `logs-cyera.<data_stream_name>-default_policy` is added to these source indices, so it doesn't lead to unbounded growth. This means that in these source indices data will be deleted after `30 days` from ingested date.

0 commit comments

Comments
 (0)