Versions (relevant - OpenSearch/Dashboard/Server OS/Browser): 2.5
I was exploring the Security Analytics Plugin, and I created one detector with this rule enabled: security-analytics/aws_sts_assumerole_misuse.yml at main · opensearch-project/security-analytics · GitHub
As per the rule, I didn’t find any alert created when I am having data like this
{
"eventVersion": "1.08",
"userIdentity": {
"type": "AssumedRole",
"principalId": "aaa:hained-role",
"arn": "arn:aws:sts::xxx:assumed-role/chained-role-ciem/chained-role",
"accountId": "xxx",
"accessKeyId": "aaa",
"sessionContext": {
"sessionIssuer": {
"type": "Role",
"principalId": "aaa",
"arn": "arn:aws:iam::xxx:role/chained-role-ciem",
"accountId": "xxx",
"userName": "chained-role-ciem"
},
"webIdFederationData": {},
"attributes": {
"creationDate": "2022-09-30T10:19:19Z",
"mfaAuthenticated": "false"
}
}
}
...
}
But when I flatten the data and insert the below json in index, alert got generated
{
"userIdentity.type": "AssumedRole",
"userIdentity.sessionContext.sessionIssuer.type": "Role"
}
Is this the expected behavior?