Cyera Integration for Elastic
Stack Serverless Observability Serverless Security
Version | 0.3.1 (View all) |
Subscription level What's this? |
Basic |
Level of support What's this? |
Elastic |
Ingestion method(s) | API |
Cyera is a cloud data security platform (DSPM – Data Security Posture Management). It focuses on discovering, classifying, monitoring, and protecting sensitive data across cloud environments (AWS, Azure, GCP, SaaS, M365, Snowflake, etc.).
The Cyera integration for Elastic allows you to collect logs and visualize the data in Kibana.
This integration is compatible with different versions of Cyera APIs for respective data streams as below:
Data streams | Version |
---|---|
Classification | v1 |
Issue | v3 |
Event | v1 |
This integration periodically queries the Cyera API to retrieve classifications, issues and events.
This integration collects log messages of the following types:
Classification
: Collects classifications that have been identified by the Cyera system.Issue
: Collects issues that have been identified by the Cyera system.Event
: Collects all events from the Cyera system.
Classification and Issue data streams currently do not have an ILM policy applied. A policy will be introduced in an upcoming release. Until then, full sync will be performed, which may result in higher storage costs.
Integrating Cyera Classification, Issues, and Events data streams with Elastic SIEM provides visibility into sensitive data, the risks tied to that data, and the security events triggered across cloud and SaaS environments. By correlating Cyera’s classification intelligence with issue context and event activity in Elastic analytics, security teams can strengthen data security posture, accelerate incident response, and simplify compliance. Dashboards in Kibana present breakdowns by sensitivity, category, severity, status, risk status, event type, and trends over time — enabling faster investigations, better prioritization, and improved accountability.
This integration installs Elastic latest transforms. For more details, check the Transform setup and requirements.
While collecting data through the Cyera APIs, authentication is handled using a Client ID
and Client Secret
, which serve as the required credentials. Any requests made without credentials will be rejected by the Cyera APIs.
- Generate a Cyera API client, retrieve the Client ID and Client Secret.
- Confirm your Cyera API URL, a default is loaded in the configuration.
This integration supports both Elastic Agentless-based and Agent-based installations.
Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to Agentless integrations and the Agentless integrations FAQ.
Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.
Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions. You can install only one Elastic Agent per host.
In the top search bar in Kibana, search for Integrations.
In the search bar, type Cyera.
Select the Cyera integration from the search results.
Select Add Cyera to add the integration.
Enable and configure only the collection methods which you will use.
To Collect Cyera logs via API, you'll need to:
- Configure URL, Client ID, and Client Secret.
- Enable/Disable the required datasets.
- For each dataset, adjust the integration configuration parameters if required, including the Initial Interval, Interval, Batch Size etc. to enable data collection.
Select Save and continue to save the integration.
- In Kibana, navigate to Dashboards.
- In the search bar, type cyera.
- Select a dashboard for the dataset you are collecting, and verify the dashboard information is populated.
- In Kibana, navigate to Management > Stack Management.
- Under Data, select Transforms.
- In the search bar, type cyera.
- All transforms from the search results should indicate Healthy under the Health column.
For more information on architectures that can be used for scaling this integration, check the Ingest Architectures documentation.
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. | date |
cyera.classification.classification_name | Name of the classification. | keyword |
cyera.classification.collections | Collections associated with the classification. | keyword |
cyera.classification.context.business_context.key | keyword | |
cyera.classification.context.business_context.value | keyword | |
cyera.classification.context.data_subject_age | Age range of the data subject. | keyword |
cyera.classification.context.geo_locations | Geographical locations associated with the classification. | keyword |
cyera.classification.context.identifiability | keyword | |
cyera.classification.context.identified | boolean | |
cyera.classification.context.role | Role context for the classification. | keyword |
cyera.classification.context.synthetic | Indicates if the classification is synthetic. | boolean |
cyera.classification.context.tokenization | Tokenization context for the classification. | keyword |
cyera.classification.custom_collections | Custom collections associated with the classification. | keyword |
cyera.classification.data.category | keyword | |
cyera.classification.data.class_name | keyword | |
cyera.classification.default_sensitivity.display_name | keyword | |
cyera.classification.default_sensitivity.value | keyword | |
cyera.classification.frameworks | keyword | |
cyera.classification.group | keyword | |
cyera.classification.learned | boolean | |
cyera.classification.level | keyword | |
cyera.classification.name | keyword | |
cyera.classification.sensitivity.display_name | keyword | |
cyera.classification.sensitivity.value | Sensitivity level of the classified data. | keyword |
cyera.classification.uid | Unique identifier for the classification. | keyword |
data_stream.dataset | The field can contain anything that makes sense to signify the source of the data. Examples include nginx.access , prometheus , endpoint etc. For data streams that otherwise fit, but that do not have dataset set we use the value "generic" for the dataset value. event.dataset should have the same value as data_stream.dataset . Beyond the Elasticsearch data stream naming criteria noted above, the dataset value has additional restrictions: * Must not contain - * No longer than 100 characters |
constant_keyword |
data_stream.namespace | A user defined namespace. Namespaces are useful to allow grouping of data. Many users already organize their indices this way, and the data stream naming scheme now provides this best practice as a default. Many users will populate this field with default . If no value is used, it falls back to default . Beyond the Elasticsearch index naming criteria noted above, namespace value has the additional restrictions: * Must not contain - * No longer than 100 characters |
constant_keyword |
data_stream.type | An overarching type for the data stream. Currently allowed values are "logs" and "metrics". We expect to also add "traces" and "synthetics" in the near future. | constant_keyword |
event.dataset | Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. | constant_keyword |
event.module | Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. |
constant_keyword |
input.type | Type of Filebeat input. | keyword |
labels.is_transform_source | Distinguishes between documents that are a source for a transform and documents that are an output of a transform, to facilitate easier filtering. | constant_keyword |
log.offset | Log offset. | long |
observer.product | The product name of the observer. | constant_keyword |
observer.vendor | Vendor name of the observer. | constant_keyword |
Example
{
"@timestamp": "2025-08-25T06:16:36.929Z",
"agent": {
"ephemeral_id": "045c1576-db46-4a15-8cce-064ded7d8c79",
"id": "e132f970-5576-45fa-9395-af4076413d36",
"name": "elastic-agent-61946",
"type": "filebeat",
"version": "8.18.0"
},
"cyera": {
"classification": {
"classification_name": "ABA Routing Number",
"context": {
"data_subject_age": "None",
"identifiability": "PossiblyIdentifiable",
"identified": false,
"synthetic": false,
"tokenization": "Plain"
},
"data": {
"category": "Financial",
"class_name": "ABA Routing Number"
},
"default_sensitivity": {
"display_name": "Internal",
"value": "Internal"
},
"group": "Financial",
"learned": false,
"level": "Element",
"name": "ABA Routing Number",
"sensitivity": {
"display_name": "Internal",
"value": "Internal"
},
"uid": "01980ae3-3870-7f54-86b8-81aac1416d93"
}
},
"data_stream": {
"dataset": "cyera.classification",
"namespace": "68658",
"type": "logs"
},
"ecs": {
"version": "8.17.0"
},
"elastic_agent": {
"id": "e132f970-5576-45fa-9395-af4076413d36",
"snapshot": false,
"version": "8.18.0"
},
"event": {
"agent_id_status": "verified",
"dataset": "cyera.classification",
"id": "01980ae3-3870-7f54-86b8-81aac1416d93",
"ingested": "2025-08-25T06:16:39Z",
"kind": "event",
"original": "{\"classificationGroup\":\"Financial\",\"classificationLevel\":\"Element\",\"classificationName\":\"ABA Routing Number\",\"collections\":[],\"context\":{\"businessContext\":[],\"dataSubjectAge\":\"None\",\"geoLocations\":[],\"identifiability\":\"PossiblyIdentifiable\",\"identified\":false,\"role\":null,\"synthetic\":false,\"tokenization\":\"Plain\"},\"customCollections\":[],\"dataCategory\":\"Financial\",\"dataClassName\":\"ABA Routing Number\",\"defaultSensitivity\":\"Internal\",\"defaultSensitivityDisplayName\":\"Internal\",\"frameworks\":[],\"learned\":false,\"name\":\"ABA Routing Number\",\"sensitivity\":\"Internal\",\"sensitivityDisplayName\":\"Internal\",\"uid\":\"01980ae3-3870-7f54-86b8-81aac1416d93\"}"
},
"input": {
"type": "cel"
},
"observer": {
"product": "Cyera",
"vendor": "Cyera"
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"cyera-classification"
]
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. | date |
cyera.issue.account.in_platform_identifier | In-platform identifier for the account. | keyword |
cyera.issue.account.name | Name of the account associated with the issue. | keyword |
cyera.issue.classification_groups | Classification groups related to the issue. | keyword |
cyera.issue.cloud_provider_tags.key | Keys of cloud provider tags. | keyword |
cyera.issue.cloud_provider_tags.value | Values of cloud provider tags. | keyword |
cyera.issue.created_date | Date when the issue was created. | date |
cyera.issue.data.affected_records | long | |
cyera.issue.data.data_classes_uids | Unique identifiers of data classes at risk. | keyword |
cyera.issue.data.objects_at_risk | long of records at risk due to this issue. | long |
cyera.issue.data.records_at_risk | long | |
cyera.issue.datastore_cloud_provider_tags.key | Keys of cloud provider tags for the associated datastore. | keyword |
cyera.issue.datastore_cloud_provider_tags.value | Values of cloud provider tags for the associated datastore. | keyword |
cyera.issue.datastore_name | Name of the datastore associated with the issue. | keyword |
cyera.issue.datastore_owners.datastore_owner_uid | keyword | |
cyera.issue.datastore_owners.email | keyword | |
cyera.issue.datastore_owners.owner_type | keyword | |
cyera.issue.datastore_owners.sources | keyword | |
cyera.issue.datastore_uid | Unique identifier of the datastore associated with the issue. | keyword |
cyera.issue.datastore_user_tags.key | Keys of user-defined tags for the associated datastore. | keyword |
cyera.issue.datastore_user_tags.uid | keyword | |
cyera.issue.datastore_user_tags.value | Values of user-defined tags for the associated datastore. | keyword |
cyera.issue.engine | Engine type associated with the issue. | keyword |
cyera.issue.infrastructure | Infrastructure type related to the issue. | keyword |
cyera.issue.itsm_tickets.uid | keyword | |
cyera.issue.itsm_tickets.vendor.link | keyword | |
cyera.issue.itsm_tickets.vendor.status | keyword | |
cyera.issue.itsm_tickets.vendor.ticket_id | keyword | |
cyera.issue.name | Name of the issue. | keyword |
cyera.issue.owner | Owner of the issue. | keyword |
cyera.issue.policy_uid | keyword | |
cyera.issue.provider | Cloud provider associated with the issue. | keyword |
cyera.issue.regions | Regions affected by the issue. | keyword |
cyera.issue.remediation_advice | keyword | |
cyera.issue.resolution | Resolution details for the issue. | keyword |
cyera.issue.resolution_note | keyword | |
cyera.issue.risk.description | keyword | |
cyera.issue.risk.frameworks | Description of the risk associated with the issue. | keyword |
cyera.issue.risk.policy_uid | Unique identifier of the risk policy associated with the issue. | keyword |
cyera.issue.risk.use_cases | Risk frameworks associated with the issue. | keyword |
cyera.issue.risk_status | Risk status of the issue. | keyword |
cyera.issue.severity | Severity level of the issue. | keyword |
cyera.issue.status | Current status of the issue. | keyword |
cyera.issue.uid | Unique identifier for the issue. | keyword |
cyera.issue.updated_date | Date when the issue was last updated. | date |
data_stream.dataset | The field can contain anything that makes sense to signify the source of the data. Examples include nginx.access , prometheus , endpoint etc. For data streams that otherwise fit, but that do not have dataset set we use the value "generic" for the dataset value. event.dataset should have the same value as data_stream.dataset . Beyond the Elasticsearch data stream naming criteria noted above, the dataset value has additional restrictions: * Must not contain - * No longer than 100 characters |
constant_keyword |
data_stream.namespace | A user defined namespace. Namespaces are useful to allow grouping of data. Many users already organize their indices this way, and the data stream naming scheme now provides this best practice as a default. Many users will populate this field with default . If no value is used, it falls back to default . Beyond the Elasticsearch index naming criteria noted above, namespace value has the additional restrictions: * Must not contain - * No longer than 100 characters |
constant_keyword |
data_stream.type | An overarching type for the data stream. Currently allowed values are "logs" and "metrics". We expect to also add "traces" and "synthetics" in the near future. | constant_keyword |
event.dataset | Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. | constant_keyword |
event.module | Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. |
constant_keyword |
input.type | Type of Filebeat input. | keyword |
labels.is_transform_source | Distinguishes between documents that are a source for a transform and documents that are an output of a transform, to facilitate easier filtering. | constant_keyword |
log.offset | Log offset. | long |
observer.product | The product name of the observer. | constant_keyword |
observer.vendor | Vendor name of the observer. | constant_keyword |
Example
{
"@timestamp": "2025-07-22T11:45:30.987Z",
"agent": {
"ephemeral_id": "087bdf28-ec24-4bb5-9c8d-fd5bcabc9c92",
"id": "6992bc6a-6323-48bf-9913-0b22a7f4c057",
"name": "elastic-agent-86428",
"type": "filebeat",
"version": "8.18.0"
},
"cloud": {
"account": {
"id": "a1b2c3d4-5678-90ab-cdef-1234567890ab",
"name": "AWS Account - Finance"
},
"provider": "AWS",
"region": [
"us-east-1"
],
"service": {
"name": "rds-mysql"
}
},
"cyera": {
"issue": {
"account": {
"in_platform_identifier": "a1b2c3d4-5678-90ab-cdef-1234567890ab",
"name": "AWS Account - Finance"
},
"classification_groups": [
"Financial",
"IT & Security"
],
"created_date": "2025-07-10T08:20:45.123Z",
"data": {
"affected_records": 2500,
"data_classes_uids": [
"0198c3ba-1234-5678-9abc-def098765432"
],
"objects_at_risk": 3,
"records_at_risk": 2500
},
"datastore_cloud_provider_tags": [
{
"key": "BusinessUnit",
"value": "Finance"
},
{
"key": "CostCenter",
"value": "99887"
},
{
"key": "Department",
"value": "CloudOps"
},
{
"key": "Environment",
"value": "Prod"
},
{
"key": "Project",
"value": "Everest"
}
],
"datastore_name": "mock-database-prod-xyz",
"datastore_owners": [
{
"datastore_owner_uid": "0198efgh-6789-1234-abcd-ef9876543210",
"email": "[email protected]",
"owner_type": "application-owner",
"sources": [
"IAM"
]
}
],
"datastore_uid": "0198dbcd-4321-8765-9def-abcdef987654",
"datastore_user_tags": [
{
"key": "owner",
"value": "TeamX"
}
],
"engine": "mysql",
"infrastructure": "rds-mysql",
"itsm_tickets": [
{
"uid": "abc12345-6789-def0-1234-56789abcdef0",
"vendor": {
"link": "https://company.service-now.com/nav_to.do?uri=incident.do?sys_id=12345",
"status": "Open",
"ticket_id": "SNOW-98765"
}
}
],
"name": "Credit card number in plain text",
"owner": "[email protected]",
"policy_uid": "0198c2ec-55ef-77ab-cc12-778899aabbcc",
"provider": "AWS",
"regions": [
"us-east-1"
],
"remediation_advice": "- Evaluate the need for storing credit card data in the current location. If it is not necessary, promptly delete the information to reduce the risk of unauthorized access.\n- Encrypt the data using strong encryption algorithms.\n- Choose either masking or tokenization as a method for securely displaying or storing credit card numbers.",
"risk": {
"description": "According to PCI DSS section 3.4 if PAN storage is unavoidable, the data must be rendered unreadable wherever it is stored. The PCI-DSS explicitly enumerates the acceptable methods for rendering this data unreadable. These methods include - strong one-way hash functions of the entire PAN, truncation, index token with securely stored pads, strong cryptography.",
"frameworks": [
"PCI DSS",
"SOC 2",
"ISO 27001"
],
"policy_uid": "0198c2ec-55ef-77ab-cc12-778899aabbcc",
"use_cases": [
"DataSprawl",
"DataRetention"
]
},
"risk_status": "Unmitigated",
"severity": "Critical",
"status": "Open",
"uid": "0198abcd-1234-5678-9abc-def012345678",
"updated_date": "2025-07-22T11:45:30.987Z"
}
},
"data_stream": {
"dataset": "cyera.issue",
"namespace": "95460",
"type": "logs"
},
"ecs": {
"version": "8.17.0"
},
"elastic_agent": {
"id": "6992bc6a-6323-48bf-9913-0b22a7f4c057",
"snapshot": false,
"version": "8.18.0"
},
"event": {
"agent_id_status": "verified",
"created": "2025-07-10T08:20:45.123Z",
"dataset": "cyera.issue",
"id": "0198abcd-1234-5678-9abc-def012345678",
"ingested": "2025-09-08T11:13:42Z",
"kind": "alert",
"original": "{\"account\":{\"inPlatformIdentifier\":\"a1b2c3d4-5678-90ab-cdef-1234567890ab\",\"name\":\"AWS Account - Finance\"},\"classificationGroups\":[\"Financial\",\"IT \\u0026 Security\"],\"createdDate\":\"2025-07-10T08:20:45.123Z\",\"data\":{\"affectedRecords\":2500,\"dataClassesUids\":[\"0198c3ba-1234-5678-9abc-def098765432\"],\"objectsAtRisk\":3,\"recordsAtRisk\":2500},\"datastoreCloudProviderTags\":[{\"key\":\"BusinessUnit\",\"value\":\"Finance\"},{\"key\":\"CostCenter\",\"value\":\"99887\"},{\"key\":\"Department\",\"value\":\"CloudOps\"},{\"key\":\"Environment\",\"value\":\"Prod\"},{\"key\":\"Project\",\"value\":\"Everest\"}],\"datastoreName\":\"mock-database-prod-xyz\",\"datastoreOwners\":[{\"datastoreOwnerUid\":\"0198efgh-6789-1234-abcd-ef9876543210\",\"email\":\"[email protected]\",\"ownerType\":\"application-owner\",\"sources\":[\"IAM\"]}],\"datastoreUid\":\"0198dbcd-4321-8765-9def-abcdef987654\",\"datastoreUserTags\":[{\"key\":\"owner\",\"value\":\"TeamX\"}],\"engine\":\"mysql\",\"infrastructure\":\"rds-mysql\",\"itsmTickets\":[{\"uid\":\"abc12345-6789-def0-1234-56789abcdef0\",\"vendorLink\":\"https://company.service-now.com/nav_to.do?uri=incident.do?sys_id=12345\",\"vendorStatus\":\"Open\",\"vendorTicketId\":\"SNOW-98765\"}],\"name\":\"Credit card number in plain text\",\"owner\":\"[email protected]\",\"policyUid\":\"0198c2ec-55ef-77ab-cc12-778899aabbcc\",\"provider\":\"AWS\",\"regions\":[\"us-east-1\"],\"remediationAdvice\":\"- Evaluate the need for storing credit card data in the current location. If it is not necessary, promptly delete the information to reduce the risk of unauthorized access.\\n- Encrypt the data using strong encryption algorithms.\\n- Choose either masking or tokenization as a method for securely displaying or storing credit card numbers.\",\"risk\":{\"description\":\"According to PCI DSS section 3.4 if PAN storage is unavoidable, the data must be rendered unreadable wherever it is stored. The PCI-DSS explicitly enumerates the acceptable methods for rendering this data unreadable. These methods include - strong one-way hash functions of the entire PAN, truncation, index token with securely stored pads, strong cryptography.\",\"frameworks\":[\"PCI DSS\",\"SOC 2\",\"ISO 27001\"],\"policyUid\":\"0198c2ec-55ef-77ab-cc12-778899aabbcc\",\"useCases\":[\"DataSprawl\",\"DataRetention\"]},\"riskStatus\":\"Unmitigated\",\"severity\":\"Critical\",\"status\":\"Open\",\"uid\":\"0198abcd-1234-5678-9abc-def012345678\",\"updatedDate\":\"2025-07-22T11:45:30.987Z\"}",
"severity": 99
},
"input": {
"type": "cel"
},
"message": "Credit card number in plain text",
"related": {
"user": [
"0198efgh-6789-1234-abcd-ef9876543210",
"[email protected]",
"[email protected]"
]
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"cyera-issue"
],
"user": {
"domain": "mockmail.com",
"email": "[email protected]",
"name": "owner",
"roles": [
"application-owner"
]
}
}
Exported fields
Field | Description | Type |
---|---|---|
@timestamp | Date/time when the event originated. This is the date/time extracted from the event, typically representing when the event was generated by the source. If the event source has no original timestamp, this value is typically populated by the first time the event was received by the pipeline. Required field for all events. | date |
cyera.event.account.name | Name of the account associated with the event. | keyword |
cyera.event.account.platform | Platform of the account associated with the event. | keyword |
cyera.event.account.uid | Unique identifier of the account associated with the event. | keyword |
cyera.event.affected.data_class_appearances.records_count.data_class.classification_name | Name of the affected data class. | keyword |
cyera.event.affected.data_class_appearances.records_count.data_class.uid | Unique identifier of the affected data class. | keyword |
cyera.event.affected.data_class_appearances.records_count.value | Count of records in the affected data class. | long |
cyera.event.affected.objects_count | Count of affected objects. | long |
cyera.event.affected.objects_diff | Difference in affected objects count. | long |
cyera.event.affected.records_diff | Difference in affected records count. | long |
cyera.event.automatic_scanning | keyword | |
cyera.event.changed_classification_uid | keyword | |
cyera.event.classification_name | Name of the classification associated with the event. | keyword |
cyera.event.classifications.name | Names of classifications associated with the event. | keyword |
cyera.event.classifications.uid | Unique identifiers of classifications associated with the event. | keyword |
cyera.event.cloud_provider | Cloud provider associated with the event. | keyword |
cyera.event.datastore.data_owner | Data owner of the datastore associated with the event. | keyword |
cyera.event.datastore.infrastructure | Infrastructure type of the datastore associated with the event. | keyword |
cyera.event.datastore.name | Name of the datastore associated with the event. | keyword |
cyera.event.datastore.records_at_high_risk | long of records at high risk in the datastore. | long |
cyera.event.datastore.tags.user_tags | keyword | |
cyera.event.datastore.uid | Unique identifier of the datastore associated with the event. | keyword |
cyera.event.datastore.user_tags | User tags associated with the datastore. | keyword |
cyera.event.datastore.vpc_id | VPC ID of the datastore associated with the event. | keyword |
cyera.event.date | Date when the event occurred. | date |
cyera.event.deployment_name | Name of the deployment associated with the event. | keyword |
cyera.event.domain_name | keyword | |
cyera.event.expected_m365_sensitivity_label_assignments_count | Expected count of M365 sensitivity label assignments. | long |
cyera.event.failed_m365_sensitivity_label_assignments_count | Count of failed M365 sensitivity label assignments. | long |
cyera.event.frequency | Frequency of the report associated with the event. | keyword |
cyera.event.in_platform_identifier | Inplatform identifier associated with the event. | keyword |
cyera.event.is_domain_trusted | boolean | |
cyera.event.is_report.deleted | Indicates if the report associated with the event is deleted. | boolean |
cyera.event.is_report.expired | Indicates if the report associated with the event is expired. | boolean |
cyera.event.issue.name | Name of the issue associated with the event. | keyword |
cyera.event.issue.policy.name | Name of the policy associated with the issue. | keyword |
cyera.event.issue.policy.uid | Unique identifier of the policy associated with the issue. | keyword |
cyera.event.issue.policy.use_cases | Use cases of the policy associated with the issue. | keyword |
cyera.event.issue.resolution.note | Resolution note of the issue associated with the event. | keyword |
cyera.event.issue.resolution.value | Resolution of the issue associated with the event. | keyword |
cyera.event.issue.risk_status | Risk status of the issue associated with the event. | keyword |
cyera.event.issue.uid | Unique identifier of the issue associated with the event. | keyword |
cyera.event.issue_name | Name of the issue associated with the event. | keyword |
cyera.event.issue_uid | Unique identifier of the issue associated with the event. | keyword |
cyera.event.issues.policy.name | Names of policies associated with the issues. | keyword |
cyera.event.issues.policy.uid | Unique identifiers of policies associated with the issues. | keyword |
cyera.event.issues.policy.use_cases | Use cases of policies associated with the issues. | keyword |
cyera.event.issues.resolution_note | Resolution notes of issues associated with the event. | keyword |
cyera.event.issues.resolution_value | Resolutions of issues associated with the event. | keyword |
cyera.event.issues.risk_status | Risk statuses of issues associated with the event. | keyword |
cyera.event.issues.uid | Unique identifiers of issues associated with the event. | keyword |
cyera.event.m365_assigned_sensitivity_label_name | Name of the M365 assigned sensitivity label. | keyword |
cyera.event.original_sensitivity.display_name | Display name of the original sensitivity level. | keyword |
cyera.event.original_sensitivity.value | Original sensitivity level. | keyword |
cyera.event.policy.name | Name of the policy associated with the event. | keyword |
cyera.event.policy.uid | Unique identifier of the policy associated with the event. | keyword |
cyera.event.policy.use_cases | Use cases of the policy associated with the event. | keyword |
cyera.event.project.name | Name of the project associated with the event. | keyword |
cyera.event.project.uid | Unique identifier of the project associated with the event. | keyword |
cyera.event.recipients | Recipients associated with the event. | keyword |
cyera.event.report.file_name | File name of the report associated with the event. | keyword |
cyera.event.report.instance_uid | Unique identifier of the report instance associated with the event. | keyword |
cyera.event.report.job_uid | Unique identifier of the report job associated with the event. | keyword |
cyera.event.report.name | Name of the report associated with the event. | keyword |
cyera.event.report.type | Type of the report associated with the event. | keyword |
cyera.event.sku | SKU associated with the event. | keyword |
cyera.event.source_classifications.name | Names of source classifications. | keyword |
cyera.event.source_classifications.uid | Unique identifiers of source classifications. | keyword |
cyera.event.subscription_uid | Unique identifier of the subscription associated with the event. | keyword |
cyera.event.successful_m365_sensitivity_label_assignments_count | Count of successful M365 sensitivity label assignments. | long |
cyera.event.target_classifications.name | Names of target classifications. | keyword |
cyera.event.target_classifications.uid | Unique identifiers of target classifications. | keyword |
cyera.event.target_sensitivity.display_name | Display name of the target sensitivity level. | keyword |
cyera.event.target_sensitivity.value | Target sensitivity level. | keyword |
cyera.event.type | Type of the event. | keyword |
cyera.event.uid | Unique identifier for the event. | keyword |
cyera.event.user | User associated with the event. | keyword |
cyera.event.vendor.link | Vendor link associated with the event. | keyword |
cyera.event.vendor.status | Vendor status associated with the event. | keyword |
cyera.event.vendor.ticket_id | Vendor ticket ID associated with the event. | keyword |
data_stream.dataset | The field can contain anything that makes sense to signify the source of the data. Examples include nginx.access , prometheus , endpoint etc. For data streams that otherwise fit, but that do not have dataset set we use the value "generic" for the dataset value. event.dataset should have the same value as data_stream.dataset . Beyond the Elasticsearch data stream naming criteria noted above, the dataset value has additional restrictions: * Must not contain - * No longer than 100 characters |
constant_keyword |
data_stream.namespace | A user defined namespace. Namespaces are useful to allow grouping of data. Many users already organize their indices this way, and the data stream naming scheme now provides this best practice as a default. Many users will populate this field with default . If no value is used, it falls back to default . Beyond the Elasticsearch index naming criteria noted above, namespace value has the additional restrictions: * Must not contain - * No longer than 100 characters |
constant_keyword |
data_stream.type | An overarching type for the data stream. Currently allowed values are "logs" and "metrics". We expect to also add "traces" and "synthetics" in the near future. | constant_keyword |
event.dataset | Name of the dataset. If an event source publishes more than one type of log or events (e.g. access log, error log), the dataset is used to specify which one the event comes from. It's recommended but not required to start the dataset name with the module name, followed by a dot, then the dataset name. | constant_keyword |
event.module | Name of the module this data is coming from. If your monitoring agent supports the concept of modules or plugins to process events of a given source (e.g. Apache logs), event.module should contain the name of this module. |
constant_keyword |
input.type | Type of Filebeat input. | keyword |
log.offset | Log offset. | long |
observer.product | The product name of the observer. | constant_keyword |
observer.vendor | Vendor name of the observer. | constant_keyword |
Example
{
"@timestamp": "2025-07-29T17:41:51.058Z",
"agent": {
"ephemeral_id": "3037cc24-ebf5-4e0c-a44d-ae55894543a8",
"id": "2f07e144-4589-4750-ab0a-2a81d787999c",
"name": "elastic-agent-90612",
"type": "filebeat",
"version": "8.18.0"
},
"cloud": {
"account": {
"id": "mock-account-uid-002",
"name": "MockAccount"
}
},
"cyera": {
"event": {
"account": {
"name": "MockAccount",
"uid": "mock-account-uid-002"
},
"affected": {
"data_class_appearances": [
{
"records_count": {
"data_class": {
"classification_name": "Mock Classification A",
"uid": "mock-dc-010"
},
"value": 81
}
}
]
},
"date": "2025-07-29T17:41:51.058Z",
"expected_m365_sensitivity_label_assignments_count": 1,
"failed_m365_sensitivity_label_assignments_count": 0,
"issue": {
"risk_status": "RemediationInProgress",
"uid": "mock-issue-uid-002"
},
"m365_assigned_sensitivity_label_name": "Mock Sensitivity Label",
"policy": {
"name": "Mock Policy - Missing Label"
},
"successful_m365_sensitivity_label_assignments_count": 1,
"type": "M365SensitivityLabelRemediationFinishedEvent",
"uid": "mock-uid-2001"
}
},
"data_stream": {
"dataset": "cyera.event",
"namespace": "60961",
"type": "logs"
},
"ecs": {
"version": "8.17.0"
},
"elastic_agent": {
"id": "2f07e144-4589-4750-ab0a-2a81d787999c",
"snapshot": false,
"version": "8.18.0"
},
"event": {
"agent_id_status": "verified",
"dataset": "cyera.event",
"id": "mock-uid-2001",
"ingested": "2025-08-30T14:51:23Z",
"kind": "alert",
"original": "{\"account\":{\"name\":\"MockAccount\",\"uid\":\"mock-account-uid-002\"},\"affectedDataClassAppearances\":[{\"recordsCount\":{\"dataClass\":{\"classificationName\":\"Mock Classification A\",\"uid\":\"mock-dc-010\"},\"recordsCount\":81}}],\"date\":\"2025-07-29T17:41:51.058Z\",\"expectedM365SensitivityLabelAssignmentsCount\":1,\"failedM365SensitivityLabelAssignmentsCount\":0,\"issue\":{\"riskStatus\":\"RemediationInProgress\",\"uid\":\"mock-issue-uid-002\"},\"m365AssignedSensitivityLabelName\":\"Mock Sensitivity Label\",\"policy\":{\"name\":\"Mock Policy - Missing Label\"},\"successfulM365SensitivityLabelAssignmentsCount\":1,\"type\":\"M365SensitivityLabelRemediationFinishedEvent\",\"uid\":\"mock-uid-2001\"}"
},
"input": {
"type": "cel"
},
"tags": [
"preserve_original_event",
"preserve_duplicate_custom_fields",
"forwarded",
"cyera-event"
]
}
These inputs can be used in this integration:
This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.
Changelog
Version | Details | Kibana version(s) |
---|---|---|
0.3.1 | Bug fix (View pull request) Add ILM policy note inside Readme. |
— |
0.3.0 | Enhancement (View pull request) Add support of Event Data Stream. |
— |
0.2.0 | Enhancement (View pull request) Add support of Issue Data Stream. |
— |
0.1.0 | Enhancement (View pull request) Initial release. |
— |