Skip to content

ssi: add or fix support for request trace deletion#17963

Open
efd6 wants to merge 3 commits intoelastic:mainfrom
efd6:13002-ssi_all
Open

ssi: add or fix support for request trace deletion#17963
efd6 wants to merge 3 commits intoelastic:mainfrom
efd6:13002-ssi_all

Conversation

@efd6
Copy link
Contributor

@efd6 efd6 commented Mar 23, 2026

Proposed commit message

ssi: add or fix support for request trace deletion

This adds or fixes support for request trace deletion for integrations using
input versions of CEL or HTTPJSON that support the feature.

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.
  • I have verified that any added dashboard complies with Kibana's Dashboard good practices

Author's Checklist

  • [ ]

How to test this PR locally

Related issues

Screenshots

@efd6 efd6 self-assigned this Mar 23, 2026
@efd6 efd6 added enhancement New feature or request bugfix Pull request that fixes a bug issue Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations] labels Mar 23, 2026
@efd6 efd6 added Integration:cisco_duo Cisco Duo Integration:bitdefender BitDefender (Community supported) Integration:ti_opencti OpenCTI Integration:eset_protect ESET PROTECT Integration:ti_crowdstrike CrowdStrike Falcon Intelligence Integration:digital_guardian Digital Guardian Integration:authentik authentik Integration:spycloud SpyCloud Enterprise Protection (Partner supported) Integration:first_epss First EPSS (Community supported) Integration:claroty_ctd Claroty CTD Integration:sysdig Sysdig Integration:ti_custom Custom Threat Intelligence Integration:checkpoint_harmony_endpoint Check Point Harmony Endpoint Integration:entro Entro Integration:withsecure_elements WithSecure Elements (Community supported) labels Mar 23, 2026
@elastic-vault-github-plugin-prod
Copy link

elastic-vault-github-plugin-prod bot commented Mar 23, 2026

🚀 Benchmarks report

To see the full report comment with /test benchmark fullreport

efd6 added 3 commits March 23, 2026 13:31
The enable_request_tracer manifest variable must declare
default: false when using the v8.15+ tracer configuration
syntax. Without it the variable has no default and the tracer
block in the agent template is not safely configured.
This adds support for request trace deletion for integration using input
versions of CEL or HTTPJSON that support the feature.
@elasticmachine
Copy link

💚 Build Succeeded

History

cc @efd6

@efd6 efd6 marked this pull request as ready for review March 23, 2026 03:30
@efd6 efd6 requested a review from a team as a code owner March 23, 2026 03:30
@elasticmachine
Copy link

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

bugfix Pull request that fixes a bug issue enhancement New feature or request Integration:authentik authentik Integration:bitdefender BitDefender (Community supported) Integration:checkpoint_harmony_endpoint Check Point Harmony Endpoint Integration:cisco_duo Cisco Duo Integration:claroty_ctd Claroty CTD Integration:digital_guardian Digital Guardian Integration:entro Entro Integration:eset_protect ESET PROTECT Integration:first_epss First EPSS (Community supported) Integration:spycloud SpyCloud Enterprise Protection (Partner supported) Integration:sysdig Sysdig Integration:ti_crowdstrike CrowdStrike Falcon Intelligence Integration:ti_custom Custom Threat Intelligence Integration:ti_opencti OpenCTI Integration:withsecure_elements WithSecure Elements (Community supported) Team:Security-Service Integrations Security Service Integrations team [elastic/security-service-integrations]

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants