-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS SecurityHub Connector does not ingest GuardDuty and Macie events present in SecurityHub #10180
Comments
Hi @CyberHunter7 , Thanks for flagging this issue, we will investigate this issue and get back to you with some updates by 26Mar24. Thanks! |
Hi @CyberHunter7 ,Working on detailed analysis for further replication and changes,will update you |
Thank you @v-muuppugund for the update. |
Hi @CyberHunter7 ,Still need some more time for completing the detailed analysis for this issue, will post update once done. |
Hi @CyberHunter7 ,I am able to replicate the issue and the data is not ingested from guard duty in to AWS Security hub, we have done the complete analysis for this requirement and will be picking up in our queue and will update you once the changes have been completed.Please let me know if you have any questions we can have a detailed discussion on this requirement. |
Hi @v-muuppugund thanks for the update, is there any workaround for the mean time ? is there an estimate when this issue will be resolved ? |
Hi @CyberHunter7 ,Apologies as of now ,with generated_id from guard duty and no filters the data is not coming up,Please find below screen shot for reference |
Hi @v-muuppugund I checked again no logs are present. I understand there is no quick fix for this that can be available, is that correct ? |
Hello @v-muuppugund any updates ? |
Describe the bug
AWS SecurityHub Connector does not ingest GuardDuty and Macie events present in SecurityHub events.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
SecurityHub event related to GuardDuty should be present in the Log Analytics.
NB 1 : AWS SecurityHub Connector is functional because we receive other SecurityHub events in the Log Analytics.
NB 2 : In the function App of the connector -> configurations -> Application settings -> SecurityHubFilters could be set with no filter so all event regardless of severity label are captured
The text was updated successfully, but these errors were encountered: