[
  {
    "name": "1password",
    "title": "1Password",
    "version": "1.34.0",
    "release": "ga",
    "description": "Collect logs from 1Password with Elastic Agent.",
    "type": "integration",
    "download": "/epr/1password/1password-1.34.0.zip",
    "path": "/package/1password/1.34.0",
    "icons": [
      {
        "src": "/img/1password-logo-light-bg.svg",
        "path": "/package/1password/1.34.0/img/1password-logo-light-bg.svg",
        "title": "1Password",
        "size": "116x116",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "1password",
        "title": "1Password Events",
        "description": "Collect events from 1Password Events Reporting",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ^9.0.7"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "credential_management"
    ],
    "signature_path": "/epr/1password/1password-1.34.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "1password.audit_events",
        "title": "Collect 1Password audit events"
      },
      {
        "type": "logs",
        "dataset": "1password.item_usages",
        "title": "Collect 1Password item usages events"
      },
      {
        "type": "logs",
        "dataset": "1password.signin_attempts",
        "title": "1Password sign-in attempt events"
      }
    ]
  },
  {
    "name": "ti_anyrun",
    "title": "ANY.RUN Threat Intelligence Feeds",
    "version": "1.0.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Ingest Threat Intelligence indicators from ANY.RUN TI Feeds with Elastic Agent",
    "type": "integration",
    "download": "/epr/ti_anyrun/ti_anyrun-1.0.0.zip",
    "path": "/package/ti_anyrun/1.0.0",
    "icons": [
      {
        "src": "/img/anyrun-logo.svg",
        "path": "/package/ti_anyrun/1.0.0/img/anyrun-logo.svg",
        "title": "ANY.RUN",
        "size": "1000x1000",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_anyrun",
        "title": "ANY.RUN Threat Intelligence Feeds",
        "description": "Ingest Threat Intelligence indicators from ANY.RUN TI Feeds with Elastic Agent"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_anyrun/ti_anyrun-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_anyrun.ioc",
        "title": "ANY.RUN TI Feeds"
      }
    ]
  },
  {
    "name": "aws",
    "title": "AWS",
    "version": "6.5.1",
    "release": "ga",
    "description": "Collect logs and metrics from Amazon Web Services (AWS) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/aws/aws-6.5.1.zip",
    "path": "/package/aws/6.5.1",
    "icons": [
      {
        "src": "/img/logo_aws.svg",
        "path": "/package/aws/6.5.1/img/logo_aws.svg",
        "title": "logo aws",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "awshealth",
        "title": "AWS Health",
        "description": "Collect AWS Health metrics with Elastic Agent (experimental)",
        "icons": [
          {
            "src": "/img/logo_aws_health.svg",
            "path": "/package/aws/6.5.1/img/logo_aws_health.svg",
            "title": "AWS Health logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "awshealth"
        ]
      },
      {
        "name": "billing",
        "title": "AWS Billing",
        "description": "Collect billing metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_billing.svg",
            "path": "/package/aws/6.5.1/img/logo_billing.svg",
            "title": "AWS Billing logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "billing"
        ]
      },
      {
        "name": "cloudtrail",
        "title": "AWS CloudTrail",
        "description": "Collect AWS CloudTrail logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_cloudtrail.svg",
            "path": "/package/aws/6.5.1/img/logo_cloudtrail.svg",
            "title": "AWS Cloudtrail logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "cloudtrail"
        ]
      },
      {
        "name": "cloudwatch",
        "title": "AWS CloudWatch",
        "description": "Use this integration to collect logs and metrics from Amazon CloudWatch with Elastic Agent, where no out of the box integration is available.",
        "icons": [
          {
            "src": "/img/logo_cloudwatch.svg",
            "path": "/package/aws/6.5.1/img/logo_cloudwatch.svg",
            "title": "AWS CloudWatch logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "monitoring"
        ],
        "data_streams": [
          "cloudwatch_logs",
          "cloudwatch_metrics"
        ]
      },
      {
        "name": "config",
        "title": "AWS Config",
        "description": "Collect AWS Config Logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo-aws-config.svg",
            "path": "/package/aws/6.5.1/img/logo-aws-config.svg",
            "title": "AWS Config logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloudsecurity_cdr",
          "misconfiguration_workflow"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "config"
        ]
      },
      {
        "name": "dynamodb",
        "title": "Amazon DynamoDB",
        "description": "Collect Amazon DynamoDB metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_dynamodb.svg",
            "path": "/package/aws/6.5.1/img/logo_dynamodb.svg",
            "title": "AWS DynamoDB logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "dynamodb"
        ]
      },
      {
        "name": "ebs",
        "title": "Amazon EBS",
        "description": "Collect Amazon Elastic Block Storage metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_ebs.svg",
            "path": "/package/aws/6.5.1/img/logo_ebs.svg",
            "title": "AWS EBS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "ebs"
        ]
      },
      {
        "name": "ec2",
        "title": "Amazon EC2",
        "description": "Collect logs and metrics for Amazon Elastic Compute Cloud service with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_ec2.svg",
            "path": "/package/aws/6.5.1/img/logo_ec2.svg",
            "title": "AWS EC2 logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "ec2_logs",
          "ec2_metrics"
        ]
      },
      {
        "name": "ecs",
        "title": "Amazon ECS",
        "description": "Collect metrics for Amazon Elastic Container Service with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_ecs.svg",
            "path": "/package/aws/6.5.1/img/logo_ecs.svg",
            "title": "AWS ECS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "containers"
        ],
        "data_streams": [
          "ecs_metrics"
        ]
      },
      {
        "name": "elb",
        "title": "AWS ELB",
        "description": "Collect logs and metrics for Amazon Elastic Load Balancing service with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_elb.svg",
            "path": "/package/aws/6.5.1/img/logo_elb.svg",
            "title": "AWS ELB logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "load_balancer"
        ],
        "data_streams": [
          "elb_logs",
          "elb_metrics"
        ]
      },
      {
        "name": "lambda",
        "title": "AWS Lambda",
        "description": "Collect Lambda metrics and logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_lambda.svg",
            "path": "/package/aws/6.5.1/img/logo_lambda.svg",
            "title": "AWS Lambda logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "lambda",
          "lambda_logs"
        ]
      },
      {
        "name": "natgateway",
        "title": "Amazon NAT Gateway",
        "description": "Collect Amazon NAT Gateways metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_natgateway.svg",
            "path": "/package/aws/6.5.1/img/logo_natgateway.svg",
            "title": "AWS NATGateway logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "network"
        ],
        "data_streams": [
          "natgateway"
        ]
      },
      {
        "name": "firewall",
        "title": "AWS Network Firewall",
        "description": "Collect AWS Network Firewall logs and metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_firewall.svg",
            "path": "/package/aws/6.5.1/img/logo_firewall.svg",
            "title": "AWS Network Firewall logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "firewall_security"
        ],
        "data_streams": [
          "firewall_logs",
          "firewall_metrics"
        ]
      },
      {
        "name": "rds",
        "title": "Amazon RDS",
        "description": "Collect Amazon Relational Database Service metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_rds.svg",
            "path": "/package/aws/6.5.1/img/logo_rds.svg",
            "title": "AWS RDS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "rds"
        ]
      },
      {
        "name": "s3",
        "title": "Amazon S3",
        "description": "Monitor Amazon S3 buckets by collecting access logs, storage & request metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_s3.svg",
            "path": "/package/aws/6.5.1/img/logo_s3.svg",
            "title": "AWS S3 logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "s3_daily_storage",
          "s3_request",
          "s3access"
        ]
      },
      {
        "name": "s3_storage_lens",
        "title": "Amazon S3 Storage Lens",
        "description": "Collect Amazon S3 Storage Lens metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_s3_storage_lens.svg",
            "path": "/package/aws/6.5.1/img/logo_s3_storage_lens.svg",
            "title": "AWS S3 storage lens logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "s3_storage_lens"
        ]
      },
      {
        "name": "sns",
        "title": "Amazon SNS",
        "description": "Collect Amazon SNS metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_sns.svg",
            "path": "/package/aws/6.5.1/img/logo_sns.svg",
            "title": "AWS SNS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "notification"
        ],
        "data_streams": [
          "sns"
        ]
      },
      {
        "name": "sqs",
        "title": "Amazon SQS",
        "description": "Collect Amazon SQS metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_sqs.svg",
            "path": "/package/aws/6.5.1/img/logo_sqs.svg",
            "title": "AWS SQS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "sqs"
        ]
      },
      {
        "name": "transitgateway",
        "title": "AWS Transit Gateway",
        "description": "Collect AWS Transit Gateways metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_transitgateway.svg",
            "path": "/package/aws/6.5.1/img/logo_transitgateway.svg",
            "title": "AWS Transit Gateway logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "transitgateway"
        ]
      },
      {
        "name": "usage",
        "title": "AWS Usage",
        "description": "Collect AWS usage metrics with Elastic Agent",
        "categories": [
          "observability"
        ],
        "data_streams": [
          "usage"
        ]
      },
      {
        "name": "vpcflow",
        "title": "Amazon VPC",
        "description": "Collect Amazon VPC flow logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_vpcflow.svg",
            "path": "/package/aws/6.5.1/img/logo_vpcflow.svg",
            "title": "AWS VPC logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "network"
        ],
        "data_streams": [
          "vpcflow"
        ]
      },
      {
        "name": "vpn",
        "title": "Amazon VPN",
        "description": "Collect VPN metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_vpn.svg",
            "path": "/package/aws/6.5.1/img/logo_vpn.svg",
            "title": "AWS VPN logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "network"
        ],
        "data_streams": [
          "vpn"
        ]
      },
      {
        "name": "waf",
        "title": "AWS WAF",
        "description": "Collect AWS WAF logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_waf.svg",
            "path": "/package/aws/6.5.1/img/logo_waf.svg",
            "title": "AWS VPC logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "web_application_firewall"
        ],
        "data_streams": [
          "waf"
        ]
      },
      {
        "name": "route53",
        "title": "AWS Route 53",
        "description": "Collect AWS Route53 logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_route53.svg",
            "path": "/package/aws/6.5.1/img/logo_route53.svg",
            "title": "AWS Route53 logo",
            "size": "32x40",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "dns_security"
        ],
        "data_streams": [
          "route53_public_logs",
          "route53_resolver_logs"
        ]
      },
      {
        "name": "cloudfront",
        "title": "Amazon CloudFront",
        "description": "Collect Amazon CloudFront logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_cloudfront.svg",
            "path": "/package/aws/6.5.1/img/logo_cloudfront.svg",
            "title": "AWS CloudFront logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "monitoring",
          "observability"
        ],
        "data_streams": [
          "cloudfront_logs"
        ]
      },
      {
        "name": "redshift",
        "title": "Amazon Redshift",
        "description": "Collect Amazon Redshift metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_redshift.svg",
            "path": "/package/aws/6.5.1/img/logo_redshift.svg",
            "title": "Amazon Redshift logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "redshift"
        ]
      },
      {
        "name": "kinesis",
        "title": "Amazon Kinesis Data Stream",
        "description": "Collect Amazon Kinesis Data Stream metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_kinesis.svg",
            "path": "/package/aws/6.5.1/img/logo_kinesis.svg",
            "title": "Amazon Kinesis logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "stream_processing"
        ],
        "data_streams": [
          "kinesis"
        ]
      },
      {
        "name": "securityhub",
        "title": "AWS Security Hub CSPM",
        "description": "Collect AWS Security Hub CSPM Logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_securityhub.svg",
            "path": "/package/aws/6.5.1/img/logo_securityhub.svg",
            "title": "AWS Security Hub logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloudsecurity_cdr",
          "misconfiguration_workflow"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "securityhub_findings",
          "securityhub_findings_full_posture",
          "securityhub_insights"
        ]
      },
      {
        "name": "inspector",
        "title": "Amazon Inspector",
        "description": "Collect Amazon Inspector Logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_inspector.svg",
            "path": "/package/aws/6.5.1/img/logo_inspector.svg",
            "title": "Amazon Inspector logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloudsecurity_cdr",
          "vulnerability_workflow"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "inspector"
        ]
      },
      {
        "name": "guardduty",
        "title": "Amazon GuardDuty",
        "description": "Collect Amazon GuardDuty logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_guardduty.svg",
            "path": "/package/aws/6.5.1/img/logo_guardduty.svg",
            "title": "Amazon GuardDuty logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "cloudsecurity_cdr"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "guardduty"
        ]
      },
      {
        "name": "apigateway",
        "title": "AWS API Gateway",
        "description": "Collect logs and metrics for AWS API Gateway with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_apigateway.svg",
            "path": "/package/aws/6.5.1/img/logo_apigateway.svg",
            "title": "AWS API Gateway logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "apigateway_metrics",
          "apigateway_logs"
        ]
      },
      {
        "name": "emr",
        "title": "Amazon EMR",
        "description": "Collect logs and metrics for Amazon EMR service with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_emr.svg",
            "path": "/package/aws/6.5.1/img/logo_emr.svg",
            "title": "AWS EMR logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "emr_metrics",
          "emr_logs"
        ]
      },
      {
        "name": "kafka",
        "title": "Amazon Managed Streaming for Apache Kafka (MSK)",
        "description": "Collect Amazon MSK metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_msk.svg",
            "path": "/package/aws/6.5.1/img/logo_msk.svg",
            "title": "Amazon MSK logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "kafka_metrics"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "aws",
      "cloud",
      "observability",
      "security",
      "containers",
      "network",
      "datastore"
    ],
    "signature_path": "/epr/aws/aws-6.5.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "aws.apigateway_logs",
        "title": "AWS API Gateway logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.apigateway_metrics",
        "title": "AWS API Gateway metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.awshealth",
        "title": "AWS Health"
      },
      {
        "type": "metrics",
        "dataset": "aws.billing",
        "title": "AWS Billing Metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.cloudfront_logs",
        "title": "AWS CloudFront logs"
      },
      {
        "type": "logs",
        "dataset": "aws.cloudtrail",
        "title": "AWS CloudTrail Logs"
      },
      {
        "type": "logs",
        "dataset": "aws.cloudwatch_logs",
        "title": "AWS CloudWatch logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.cloudwatch_metrics",
        "title": "AWS CloudWatch metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.config",
        "title": "Collect AWS Config Findings logs via API"
      },
      {
        "type": "metrics",
        "dataset": "aws.dynamodb",
        "title": "AWS DynamoDB metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.ebs",
        "title": "AWS EBS metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.ec2_logs",
        "title": "AWS EC2 logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.ec2_metrics",
        "title": "AWS EC2 metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.ecs_metrics",
        "title": "AWS ECS metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.elb_logs",
        "title": "AWS ELB logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.elb_metrics",
        "title": "AWS ELB metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.emr_logs",
        "title": "AWS EMR logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.emr_metrics",
        "title": "AWS EMR metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.firewall_logs",
        "title": "AWS Network Firewall logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.firewall_metrics",
        "title": "AWS Network Firewall metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.guardduty",
        "title": "Collect Amazon GuardDuty Findings logs from AWS"
      },
      {
        "type": "logs",
        "dataset": "aws.inspector",
        "title": "Collect Amazon Inspector logs from AWS"
      },
      {
        "type": "metrics",
        "dataset": "aws.kafka_metrics",
        "title": "AWS Kafka metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.kinesis",
        "title": "AWS Kinesis Data Stream metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.lambda",
        "title": "AWS Lambda metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.lambda_logs",
        "title": "AWS Lambda logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.natgateway",
        "title": "AWS NAT gateway metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.rds",
        "title": "AWS RDS metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.redshift",
        "title": "Amazon Redshift metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.route53_public_logs",
        "title": "AWS Route 53 Public Zone Logs"
      },
      {
        "type": "logs",
        "dataset": "aws.route53_resolver_logs",
        "title": "AWS Route 53 Resolver Query Logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.s3_daily_storage",
        "title": "AWS S3 daily storage metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.s3_request",
        "title": "AWS S3 request metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.s3_storage_lens",
        "title": "AWS S3 Storage Lens metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.s3access",
        "title": "AWS s3access logs"
      },
      {
        "type": "logs",
        "dataset": "aws.securityhub_findings",
        "title": "Collect AWS Security Hub CSPM Findings logs from AWS"
      },
      {
        "type": "logs",
        "dataset": "aws.securityhub_findings_full_posture",
        "title": "Collect AWS Security Hub CSPM Findings Full Posture logs from AWS"
      },
      {
        "type": "logs",
        "dataset": "aws.securityhub_insights",
        "title": "Collect AWS Security Hub CSPM Insights logs from AWS"
      },
      {
        "type": "metrics",
        "dataset": "aws.sns",
        "title": "AWS SNS metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.sqs",
        "title": "AWS SQS metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.transitgateway",
        "title": "AWS Transit Gateway metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.usage",
        "title": "AWS usage metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.vpcflow",
        "title": "AWS vpcflow logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.vpn",
        "title": "AWS VPN metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.waf",
        "title": "AWS WAF logs"
      }
    ]
  },
  {
    "name": "aws_cloudtrail_otel",
    "title": "AWS CloudTrail Logs OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "AWS CloudTrail Logs OpenTelemetry Assets",
    "type": "content",
    "download": "/epr/aws_cloudtrail_otel/aws_cloudtrail_otel-0.1.0.zip",
    "path": "/package/aws_cloudtrail_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_cloudtrail_otel.svg",
        "path": "/package/aws_cloudtrail_otel/0.1.0/img/logo_cloudtrail_otel.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/aws_cloudtrail_otel/aws_cloudtrail_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "aws.cloudtrail.otel"
        }
      ]
    }
  },
  {
    "name": "aws_billing",
    "title": "AWS Cost and Usage Report (CUR 2.0)",
    "version": "0.2.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect AWS CUR 2.0 billing data from S3 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/aws_billing/aws_billing-0.2.1.zip",
    "path": "/package/aws_billing/0.2.1",
    "icons": [
      {
        "src": "/img/logo_aws.svg",
        "path": "/package/aws_billing/0.2.1/img/logo_aws.svg",
        "title": "logo aws",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "aws_billing",
        "title": "AWS Cost and Usage Report (CUR)",
        "description": "Collect AWS Cost and Usage Report (CUR 2.0) data with Elastic Agent for cost analysis and visualization."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "observability"
    ],
    "signature_path": "/epr/aws_billing/aws_billing-0.2.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "aws_billing.cur",
        "title": "AWS Cost and Usage Metrics"
      }
    ]
  },
  {
    "name": "aws_elb_otel",
    "title": "AWS ELB OpenTelemetry Assets",
    "version": "0.1.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "AWS ELB logs for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/aws_elb_otel/aws_elb_otel-0.1.1.zip",
    "path": "/package/aws_elb_otel/0.1.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/aws_elb_otel/0.1.1/img/logo.svg",
        "title": "AWS ELB OpenTelemetry Logo",
        "size": "150x150",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/aws_elb_otel/aws_elb_otel-0.1.1.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "aws.elbaccess.otel"
        }
      ]
    }
  },
  {
    "name": "awsfargate",
    "title": "AWS Fargate (for ECS clusters)",
    "version": "1.3.0",
    "release": "ga",
    "description": "Collects metrics from containers and tasks running on Amazon ECS clusters with Elastic Agent.",
    "type": "integration",
    "download": "/epr/awsfargate/awsfargate-1.3.0.zip",
    "path": "/package/awsfargate/1.3.0",
    "icons": [
      {
        "src": "/img/logo_fargate.svg",
        "path": "/package/awsfargate/1.3.0/img/logo_fargate.svg",
        "title": "logo aws fargate",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "awsfargate",
        "title": "AWS Fargate metrics from Amazon ECS clusters",
        "description": "Collect metrics from instances running on Amazon ECS clusters"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "cloud",
      "observability",
      "aws"
    ],
    "signature_path": "/epr/awsfargate/awsfargate-1.3.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "awsfargate.task_stats",
        "title": "AWS Fargate task_stats metrics"
      }
    ]
  },
  {
    "name": "aws_securityhub",
    "title": "AWS Security Hub",
    "version": "0.3.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from AWS Security Hub with Elastic Agent.",
    "type": "integration",
    "download": "/epr/aws_securityhub/aws_securityhub-0.3.0.zip",
    "path": "/package/aws_securityhub/0.3.0",
    "icons": [
      {
        "src": "/img/logo_securityhub.svg",
        "path": "/package/aws_securityhub/0.3.0/img/logo_securityhub.svg",
        "title": "AWS Security Hub logo",
        "size": "33x39",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "aws_securityhub",
        "title": "AWS Security Hub logs",
        "description": "Collect AWS Security Hub logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "aws",
      "security",
      "cloudsecurity_cdr",
      "vulnerability_workflow"
    ],
    "signature_path": "/epr/aws_securityhub/aws_securityhub-0.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "aws_securityhub.finding",
        "title": "Finding"
      }
    ]
  },
  {
    "name": "aws_vpcflow_otel",
    "title": "AWS VPC Flow Logs OpenTelemetry Assets",
    "version": "0.2.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "AWS VPC Flow Logs OpenTelemetry Assets",
    "type": "content",
    "download": "/epr/aws_vpcflow_otel/aws_vpcflow_otel-0.2.0.zip",
    "path": "/package/aws_vpcflow_otel/0.2.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/aws_vpcflow_otel/0.2.0/img/icon.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/aws_vpcflow_otel/aws_vpcflow_otel-0.2.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "aws.vpcflow.otel"
        }
      ]
    }
  },
  {
    "name": "aws_waf_otel",
    "title": "AWS WAF Logs OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "AWS WAF Logs OpenTelemetry Assets",
    "type": "content",
    "download": "/epr/aws_waf_otel/aws_waf_otel-0.1.0.zip",
    "path": "/package/aws_waf_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_waf_otel.svg",
        "path": "/package/aws_waf_otel/0.1.0/img/logo_waf_otel.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "web",
      "observability",
      "opentelemetry",
      "security",
      "web_application_firewall"
    ],
    "signature_path": "/epr/aws_waf_otel/aws_waf_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "aws.waf.otel"
        }
      ]
    }
  },
  {
    "name": "abnormal_security",
    "title": "Abnormal AI",
    "version": "1.14.0",
    "release": "ga",
    "description": "Collect logs from Abnormal AI with Elastic Agent.",
    "type": "integration",
    "download": "/epr/abnormal_security/abnormal_security-1.14.0.zip",
    "path": "/package/abnormal_security/1.14.0",
    "icons": [
      {
        "src": "/img/abnormal-security-logo.svg",
        "path": "/package/abnormal_security/1.14.0/img/abnormal-security-logo.svg",
        "title": "Abnormal AI Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      },
      {
        "src": "/img/abnormal-security-logo-dark.svg",
        "path": "/package/abnormal_security/1.14.0/img/abnormal-security-logo-dark.svg",
        "title": "Abnormal AI Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "abnormal_security",
        "title": "Abnormal AI logs",
        "description": "Collect Abnormal AI logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.2 || ^9.1.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security",
      "threat_intel"
    ],
    "signature_path": "/epr/abnormal_security/abnormal_security-1.14.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "abnormal_security.ai_security_mailbox",
        "title": "AI Security Mailbox logs"
      },
      {
        "type": "logs",
        "dataset": "abnormal_security.ai_security_mailbox_not_analyzed",
        "title": "AI Security Mailbox Not Analyzed"
      },
      {
        "type": "logs",
        "dataset": "abnormal_security.audit",
        "title": "Audit logs"
      },
      {
        "type": "logs",
        "dataset": "abnormal_security.case",
        "title": "Case logs"
      },
      {
        "type": "logs",
        "dataset": "abnormal_security.threat",
        "title": "Threat logs"
      },
      {
        "type": "logs",
        "dataset": "abnormal_security.vendor_case",
        "title": "Vendor Case Logs"
      }
    ]
  },
  {
    "name": "entityanalytics_ad",
    "title": "Active Directory Entity Analytics",
    "version": "0.18.0",
    "release": "beta",
    "description": "Collect User Identities from Active Directory Entity with Elastic Agent.",
    "type": "integration",
    "download": "/epr/entityanalytics_ad/entityanalytics_ad-0.18.0.zip",
    "path": "/package/entityanalytics_ad/0.18.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/entityanalytics_ad/0.18.0/img/logo.svg",
        "title": "Active Directory Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "entity",
        "title": "Identities",
        "description": "Collect identities."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.0.3"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/entityanalytics_ad/entityanalytics_ad-0.18.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "entityanalytics_ad.device",
        "title": "Collect Device Identities logs from Active Directory"
      },
      {
        "type": "logs",
        "dataset": "entityanalytics_ad.entity",
        "title": "Collect Identities logs from Active Directory"
      },
      {
        "type": "logs",
        "dataset": "entityanalytics_ad.user",
        "title": "Collect User Identities logs from Active Directory"
      }
    ]
  },
  {
    "name": "activemq",
    "title": "ActiveMQ",
    "version": "1.9.0",
    "release": "ga",
    "description": "Collect logs and metrics from ActiveMQ instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/activemq/activemq-1.9.0.zip",
    "path": "/package/activemq/1.9.0",
    "icons": [
      {
        "src": "/img/activemq.svg",
        "path": "/package/activemq/1.9.0/img/activemq.svg",
        "title": "activemq",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "activemq",
        "title": "ActiveMQ logs and metrics",
        "description": "This Elastic integration collects logs and metrics from ActiveMQ instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "message_queue",
      "observability"
    ],
    "signature_path": "/epr/activemq/activemq-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "activemq.audit",
        "title": "ActiveMQ audit logs"
      },
      {
        "type": "metrics",
        "dataset": "activemq.broker",
        "title": "ActiveMQ broker metrics"
      },
      {
        "type": "logs",
        "dataset": "activemq.log",
        "title": "ActiveMQ log logs"
      },
      {
        "type": "metrics",
        "dataset": "activemq.queue",
        "title": "ActiveMQ queue metrics"
      },
      {
        "type": "metrics",
        "dataset": "activemq.topic",
        "title": "ActiveMQ topic metrics"
      }
    ]
  },
  {
    "name": "activemq_otel",
    "title": "ActiveMQ OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "ActiveMQ Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/activemq_otel/activemq_otel-0.1.0.zip",
    "path": "/package/activemq_otel/0.1.0",
    "icons": [
      {
        "src": "/img/activemq.svg",
        "path": "/package/activemq_otel/0.1.0/img/activemq.svg",
        "title": "ActiveMQ logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.3"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "message_queue",
      "opentelemetry"
    ],
    "signature_path": "/epr/activemq_otel/activemq_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "activemq.otel"
        }
      ]
    }
  },
  {
    "name": "admin_by_request_epm",
    "title": "Admin By Request EPM",
    "version": "1.1.2",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Admin By Request EPM with Elastic Agent.",
    "type": "integration",
    "download": "/epr/admin_by_request_epm/admin_by_request_epm-1.1.2.zip",
    "path": "/package/admin_by_request_epm/1.1.2",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/admin_by_request_epm/1.1.2/img/logo.svg",
        "title": "Sample logo",
        "size": "832x101",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "admin_by_request_epm",
        "title": "Admin By Request EPM Events",
        "description": "Collect events and audit logs from Admin By Request EPM"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam",
      "credential_management"
    ],
    "signature_path": "/epr/admin_by_request_epm/admin_by_request_epm-1.1.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "admin_by_request_epm.auditlog",
        "title": "Admin By Request EPM Auditlog Data Stream"
      },
      {
        "type": "logs",
        "dataset": "admin_by_request_epm.events",
        "title": "Admin By Request EPM Events Data Stream"
      }
    ]
  },
  {
    "name": "agentless_hello_world",
    "title": "Agentless Hello World",
    "version": "0.2.0",
    "release": "beta",
    "description": "A sample integration to exercise the Agentless infrastructure by fetching https://epr.elastic.co every minute. Optionally includes a counter data stream for high-rate mock metric ingestion testing.",
    "type": "integration",
    "download": "/epr/agentless_hello_world/agentless_hello_world-0.2.0.zip",
    "path": "/package/agentless_hello_world/0.2.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/agentless_hello_world/0.2.0/img/icon.svg",
        "title": "Agentless Hello World",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "agentless_hello_world",
        "title": "Agentless Hello World",
        "description": "Collect data from EPR endpoint every minute.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true,
            "is_default": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ingest-managed-jobs"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/agentless_hello_world/agentless_hello_world-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "agentless_hello_world.generic",
        "title": "Generic logs"
      },
      {
        "type": "metrics",
        "dataset": "agentless_hello_world.mock_counter",
        "title": "Mock counter metrics"
      }
    ]
  },
  {
    "name": "airflow",
    "title": "Airflow",
    "version": "1.0.0",
    "release": "ga",
    "description": "Airflow Integration.",
    "type": "integration",
    "download": "/epr/airflow/airflow-1.0.0.zip",
    "path": "/package/airflow/1.0.0",
    "icons": [
      {
        "src": "/img/airflow.svg",
        "path": "/package/airflow/1.0.0/img/airflow.svg",
        "title": "Airflow logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "server",
        "title": "Airflow metrics",
        "description": "Collect metrics from Airflow instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "process_manager"
    ],
    "signature_path": "/epr/airflow/airflow-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "airflow.statsd",
        "title": "Airflow metrics"
      }
    ]
  },
  {
    "name": "airflow_otel",
    "title": "Airflow OpenTelemetry",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Airflow OpenTelemetry Integration.",
    "type": "content",
    "download": "/epr/airflow_otel/airflow_otel-0.1.0.zip",
    "path": "/package/airflow_otel/0.1.0",
    "icons": [
      {
        "src": "/img/airflow.svg",
        "path": "/package/airflow_otel/0.1.0/img/airflow.svg",
        "title": "Airflow logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "opentelemetry",
      "observability",
      "process_manager"
    ],
    "signature_path": "/epr/airflow_otel/airflow_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "airflow.otel"
        }
      ]
    }
  },
  {
    "name": "airlock_digital",
    "title": "Airlock Digital",
    "version": "0.3.0",
    "release": "beta",
    "description": "Collect logs from Airlock Digital with Elastic Agent.",
    "type": "integration",
    "download": "/epr/airlock_digital/airlock_digital-0.3.0.zip",
    "path": "/package/airlock_digital/0.3.0",
    "icons": [
      {
        "src": "/img/airlock_digital-logo.svg",
        "path": "/package/airlock_digital/0.3.0/img/airlock_digital-logo.svg",
        "title": "Airlock Digital",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "airlock_digital",
        "title": "Airlock Digital Logs",
        "description": "Collect logs from Airlock Digital API.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/airlock_digital/airlock_digital-0.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "airlock_digital.agent",
        "title": "Collect Agent logs from Airlock Digital."
      },
      {
        "type": "logs",
        "dataset": "airlock_digital.execution_histories",
        "title": "Collect Execution Histories logs from Airlock Digital."
      },
      {
        "type": "logs",
        "dataset": "airlock_digital.server_activities",
        "title": "Collect Server Activities logs from Airlock Digital."
      }
    ]
  },
  {
    "name": "akamai",
    "title": "Akamai",
    "version": "3.1.1",
    "release": "ga",
    "description": "Collect logs from Akamai with Elastic Agent.",
    "type": "integration",
    "download": "/epr/akamai/akamai-3.1.1.zip",
    "path": "/package/akamai/3.1.1",
    "icons": [
      {
        "src": "/img/akamai_logo.svg",
        "path": "/package/akamai/3.1.1/img/akamai_logo.svg",
        "title": "Akamai",
        "size": "409×167",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "akamai",
        "title": "Akamai logs",
        "description": "Collect SIEM logs from Akamai"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "cdn_security"
    ],
    "signature_path": "/epr/akamai/akamai-3.1.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "akamai.siem",
        "title": "Akamai SIEM Logs"
      }
    ]
  },
  {
    "name": "ti_otx",
    "title": "AlienVault OTX",
    "version": "1.30.1",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from AlienVault Open Threat Exchange (OTX) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_otx/ti_otx-1.30.1.zip",
    "path": "/package/ti_otx/1.30.1",
    "icons": [
      {
        "src": "/img/otx.svg",
        "path": "/package/ti_otx/1.30.1/img/otx.svg",
        "title": "Alienvault OTX",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_otx",
        "title": "Alienvault OTX",
        "description": "Ingest threat intelligence indicators from AlienVault Open Threat Exchange (OTX) with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_otx/ti_otx-1.30.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_otx.pulses_subscribed",
        "title": "Alienvault OTX Subcribed Pulses"
      },
      {
        "type": "logs",
        "dataset": "ti_otx.threat",
        "title": "Alienvault OTX logs"
      }
    ]
  },
  {
    "name": "aws_bedrock",
    "title": "Amazon Bedrock",
    "version": "1.5.1",
    "release": "ga",
    "description": "Collect Amazon Bedrock model invocation logs and runtime metrics with Elastic Agent.",
    "type": "integration",
    "download": "/epr/aws_bedrock/aws_bedrock-1.5.1.zip",
    "path": "/package/aws_bedrock/1.5.1",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/aws_bedrock/1.5.1/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "aws_bedrock",
        "title": "Amazon Bedrock",
        "description": "Collect Amazon Bedrock model invocation logs with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "observability",
      "security"
    ],
    "signature_path": "/epr/aws_bedrock/aws_bedrock-1.5.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "aws_bedrock.guardrails",
        "title": "Amazon Bedrock Guardrails Metrics"
      },
      {
        "type": "logs",
        "dataset": "aws_bedrock.invocation",
        "title": "Amazon Bedrock model invocation logs"
      },
      {
        "type": "metrics",
        "dataset": "aws_bedrock.runtime",
        "title": "Amazon Bedrock Runtime Metrics"
      }
    ]
  },
  {
    "name": "aws_bedrock_agentcore",
    "title": "Amazon Bedrock AgentCore",
    "version": "0.7.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Amazon Bedrock AgentCore's Agent runtime, Gateway, Identity, Memory, Browser Tools and Code Interpreter metrics and logs using Elastic Agent",
    "type": "integration",
    "download": "/epr/aws_bedrock_agentcore/aws_bedrock_agentcore-0.7.0.zip",
    "path": "/package/aws_bedrock_agentcore/0.7.0",
    "icons": [
      {
        "src": "/img/amazon_bedrock_agentcore.svg",
        "path": "/package/aws_bedrock_agentcore/0.7.0/img/amazon_bedrock_agentcore.svg",
        "title": "Amazon Bedrock AgentCore logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "aws_bedrock_agentcore",
        "title": "Amazon Bedrock AgentCore",
        "description": "Collect Amazon Bedrock AgentCore metrics using AWS CloudWatch."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "observability"
    ],
    "signature_path": "/epr/aws_bedrock_agentcore/aws_bedrock_agentcore-0.7.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "aws_bedrock_agentcore.gateway_application_logs",
        "title": "Amazon Bedrock AgentCore gateway application logs"
      },
      {
        "type": "logs",
        "dataset": "aws_bedrock_agentcore.memory_application_logs",
        "title": "Amazon Bedrock AgentCore memory application logs"
      },
      {
        "type": "metrics",
        "dataset": "aws_bedrock_agentcore.metrics",
        "title": "Amazon Bedrock AgentCore metrics"
      },
      {
        "type": "logs",
        "dataset": "aws_bedrock_agentcore.runtime_application_logs",
        "title": "Amazon Bedrock AgentCore runtime application logs"
      }
    ]
  },
  {
    "name": "awsfirehose",
    "title": "Amazon Data Firehose",
    "version": "1.9.0",
    "release": "ga",
    "description": "Stream logs and metrics from Amazon Data Firehose into Elastic Cloud.",
    "type": "integration",
    "download": "/epr/awsfirehose/awsfirehose-1.9.0.zip",
    "path": "/package/awsfirehose/1.9.0",
    "icons": [
      {
        "src": "/img/logo_firehose.svg",
        "path": "/package/awsfirehose/1.9.0/img/logo_firehose.svg",
        "title": "logo aws firehose",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "cloud",
      "observability",
      "aws"
    ],
    "signature_path": "/epr/awsfirehose/awsfirehose-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "awsfirehose",
        "title": "Logs from Amazon Data Firehose"
      },
      {
        "type": "metrics",
        "dataset": "aws.cloudwatch",
        "title": "Metrics ingested from Amazon Data Firehose"
      }
    ]
  },
  {
    "name": "aws_mq",
    "title": "Amazon MQ",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collect Amazon MQ metrics and logs with Elastic Agent",
    "type": "integration",
    "download": "/epr/aws_mq/aws_mq-1.0.0.zip",
    "path": "/package/aws_mq/1.0.0",
    "icons": [
      {
        "src": "/img/aws-mq-logo.svg",
        "path": "/package/aws_mq/1.0.0/img/aws-mq-logo.svg",
        "title": "Amazon MQ logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "amazon_mq",
        "title": "Amazon MQ",
        "description": "Collect Amazon MQ metrics and logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "message_queue",
      "observability"
    ],
    "signature_path": "/epr/aws_mq/aws_mq-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "aws_mq.activemq_audit_logs",
        "title": "ActiveMQ audit logs"
      },
      {
        "type": "logs",
        "dataset": "aws_mq.activemq_general_logs",
        "title": "ActiveMQ general logs"
      },
      {
        "type": "metrics",
        "dataset": "aws_mq.activemq_metrics",
        "title": "ActiveMQ Metrics"
      },
      {
        "type": "logs",
        "dataset": "aws_mq.rabbitmq_general_logs",
        "title": "RabbitMQ general logs"
      },
      {
        "type": "metrics",
        "dataset": "aws_mq.rabbitmq_metrics",
        "title": "RabbitMQ Metrics"
      }
    ]
  },
  {
    "name": "amazon_security_lake",
    "title": "Amazon Security Lake",
    "version": "2.8.2",
    "release": "ga",
    "description": "Collect logs from Amazon Security Lake with Elastic Agent.",
    "type": "integration",
    "download": "/epr/amazon_security_lake/amazon_security_lake-2.8.2.zip",
    "path": "/package/amazon_security_lake/2.8.2",
    "icons": [
      {
        "src": "/img/amazon-security-lake-logo.svg",
        "path": "/package/amazon_security_lake/2.8.2/img/amazon-security-lake-logo.svg",
        "title": "Amazon Security Lake Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "amazon_security_lake",
        "title": "Amazon Security Lake logs",
        "description": "Collect logs from Amazon Security Lake instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "aws",
      "security",
      "siem"
    ],
    "signature_path": "/epr/amazon_security_lake/amazon_security_lake-2.8.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "amazon_security_lake.application_activity",
        "title": "Amazon Security Lake Application Activity Events"
      },
      {
        "type": "logs",
        "dataset": "amazon_security_lake.discovery",
        "title": "Amazon Security Lake Discovery Events"
      },
      {
        "type": "logs",
        "dataset": "amazon_security_lake.event",
        "title": "Collect Amazon Security Lake Events"
      },
      {
        "type": "logs",
        "dataset": "amazon_security_lake.findings",
        "title": "Amazon Security Lake Findings Events"
      },
      {
        "type": "logs",
        "dataset": "amazon_security_lake.iam",
        "title": "Amazon Security Lake Identity and Access Management Events"
      },
      {
        "type": "logs",
        "dataset": "amazon_security_lake.network_activity",
        "title": "Amazon Security Lake Network Activity Events"
      },
      {
        "type": "logs",
        "dataset": "amazon_security_lake.system_activity",
        "title": "Amazon Security Lake System Activity Events"
      }
    ]
  },
  {
    "name": "otel_android_dashboards",
    "title": "Android OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "description": "Dashboards for visualizing Android application's telemetry",
    "type": "content",
    "download": "/epr/otel_android_dashboards/otel_android_dashboards-0.1.0.zip",
    "path": "/package/otel_android_dashboards/0.1.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/otel_android_dashboards/0.1.0/img/logo.svg",
        "title": "Android OpenTelemetry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/apm-agent-android"
    },
    "categories": [
      "observability",
      "application_observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/otel_android_dashboards/otel_android_dashboards-0.1.0.zip.sig"
  },
  {
    "name": "ti_anomali",
    "title": "Anomali ThreatStream",
    "version": "2.6.1",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from Anomali ThreatStream with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_anomali/ti_anomali-2.6.1.zip",
    "path": "/package/ti_anomali/2.6.1",
    "icons": [
      {
        "src": "/img/anomali.svg",
        "path": "/package/ti_anomali/2.6.1/img/anomali.svg",
        "title": "Anomali ThreatStream",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_anomali",
        "title": "Anomali ThreatStream",
        "description": "Ingest threat intelligence indicators from Anomali ThreatStream with Elastic Agent.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_anomali/ti_anomali-2.6.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_anomali.intelligence",
        "title": "Anomali ThreatStream"
      },
      {
        "type": "logs",
        "dataset": "ti_anomali.threatstream",
        "title": "Anomali ThreatStream"
      }
    ]
  },
  {
    "name": "apache",
    "title": "Apache HTTP Server",
    "version": "3.0.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs and metrics from Apache servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/apache/apache-3.0.0.zip",
    "path": "/package/apache/3.0.0",
    "icons": [
      {
        "src": "/img/logo_apache.svg",
        "path": "/package/apache/3.0.0/img/logo_apache.svg",
        "title": "Apache Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "apache",
        "title": "Apache logs and metrics",
        "description": "Collect logs and metrics from Apache instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability"
    ],
    "signature_path": "/epr/apache/apache-3.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "apache.access",
        "title": "Apache access logs"
      },
      {
        "type": "logs",
        "dataset": "apache.error",
        "title": "Apache error logs"
      },
      {
        "type": "metrics",
        "dataset": "apache.status",
        "title": "Apache status metrics"
      }
    ]
  },
  {
    "name": "apache_input_otel",
    "title": "Apache HTTP Server OpenTelemetry Input Package",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Apache HTTP Server status metrics using OpenTelemetry Collector",
    "type": "input",
    "download": "/epr/apache_input_otel/apache_input_otel-0.1.0.zip",
    "path": "/package/apache_input_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_apache_otel.svg",
        "path": "/package/apache_input_otel/0.1.0/img/logo_apache_otel.svg",
        "title": "Apache OpenTelemetry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "apachereceiver",
        "title": "Apache HTTP Server Metrics (OpenTelemetry)",
        "description": "Collect Apache HTTP Server status metrics using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/apache_input_otel/apache_input_otel-0.1.0.zip.sig"
  },
  {
    "name": "apache_otel",
    "title": "Apache OpenTelemetry Assets",
    "version": "0.3.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Apache HTTP Server Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/apache_otel/apache_otel-0.3.0.zip",
    "path": "/package/apache_otel/0.3.0",
    "icons": [
      {
        "src": "/img/logo_apache_otel.svg",
        "path": "/package/apache_otel/0.3.0/img/logo_apache_otel.svg",
        "title": "Apache Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "web",
      "opentelemetry"
    ],
    "signature_path": "/epr/apache_otel/apache_otel-0.3.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "apachereceiver.otel"
        }
      ]
    }
  },
  {
    "name": "apache_spark",
    "title": "Apache Spark",
    "version": "1.5.0",
    "release": "ga",
    "description": "Collect metrics from Apache Spark with Elastic Agent.",
    "type": "integration",
    "download": "/epr/apache_spark/apache_spark-1.5.0.zip",
    "path": "/package/apache_spark/1.5.0",
    "icons": [
      {
        "src": "/img/apache_spark-logo.svg",
        "path": "/package/apache_spark/1.5.0/img/apache_spark-logo.svg",
        "title": "Apache Spark logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "apache_spark",
        "title": "Apache Spark metrics",
        "description": "Collect Apache Spark metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "analytics_engine",
      "big_data",
      "stream_processing"
    ],
    "signature_path": "/epr/apache_spark/apache_spark-1.5.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "apache_spark.application",
        "title": "Apache Spark application metrics"
      },
      {
        "type": "metrics",
        "dataset": "apache_spark.driver",
        "title": "Apache Spark driver metrics"
      },
      {
        "type": "metrics",
        "dataset": "apache_spark.executor",
        "title": "Apache Spark executor metrics"
      },
      {
        "type": "metrics",
        "dataset": "apache_spark.node",
        "title": "Apache Spark node metrics"
      }
    ]
  },
  {
    "name": "apache_tomcat",
    "title": "Apache Tomcat",
    "version": "1.13.0",
    "release": "ga",
    "description": "Collect and parse logs and metrics from Apache Tomcat servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/apache_tomcat/apache_tomcat-1.13.0.zip",
    "path": "/package/apache_tomcat/1.13.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/apache_tomcat/1.13.0/img/logo.svg",
        "title": "Apache Tomcat logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Apache Tomcat",
        "title": "Apache Tomcat",
        "description": "Collect Apache Tomcat metrics and logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability",
      "application_observability"
    ],
    "signature_path": "/epr/apache_tomcat/apache_tomcat-1.13.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "apache_tomcat.access",
        "title": "Apache Tomcat Access logs"
      },
      {
        "type": "metrics",
        "dataset": "apache_tomcat.cache",
        "title": "Apache Tomcat Cache metrics"
      },
      {
        "type": "logs",
        "dataset": "apache_tomcat.catalina",
        "title": "Apache Tomcat Catalina logs"
      },
      {
        "type": "metrics",
        "dataset": "apache_tomcat.connection_pool",
        "title": "Apache Tomcat Connection Pool metrics"
      },
      {
        "type": "logs",
        "dataset": "apache_tomcat.localhost",
        "title": "Apache Tomcat Localhost logs"
      },
      {
        "type": "metrics",
        "dataset": "apache_tomcat.memory",
        "title": "Apache Tomcat Memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "apache_tomcat.request",
        "title": "Apache Tomcat Request metrics"
      },
      {
        "type": "metrics",
        "dataset": "apache_tomcat.session",
        "title": "Apache Tomcat Session metrics"
      },
      {
        "type": "metrics",
        "dataset": "apache_tomcat.thread_pool",
        "title": "Apache Tomcat Thread Pool metrics"
      }
    ]
  },
  {
    "name": "apache_tomcat_otel",
    "title": "Apache Tomcat OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Apache Tomcat Assets from OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/apache_tomcat_otel/apache_tomcat_otel-0.1.0.zip",
    "path": "/package/apache_tomcat_otel/0.1.0",
    "icons": [
      {
        "src": "/img/apache_tomcat_otel_logo.svg",
        "path": "/package/apache_tomcat_otel/0.1.0/img/apache_tomcat_otel_logo.svg",
        "title": "Apache Tomcat OTel",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "web",
      "application_observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/apache_tomcat_otel/apache_tomcat_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "tomcat.otel"
        }
      ]
    }
  },
  {
    "name": "netscout",
    "title": "Arbor Peakflow SP Logs (Deprecated)",
    "version": "0.22.1",
    "release": "beta",
    "description": "Deprecated. Netscout Arbor Peakflow SP is no longer supported.",
    "type": "integration",
    "download": "/epr/netscout/netscout-0.22.1.zip",
    "path": "/package/netscout/0.22.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/netscout/0.22.1/img/logo.svg",
        "title": "Arbor Peakflow SP logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sightline",
        "title": "Arbor Peakflow SP",
        "description": "Collect Arbor Peakflow SP logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      }
    },
    "owner": {
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/netscout/netscout-0.22.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "netscout.sightline",
        "title": "Arbor Peakflow SP logs"
      }
    ]
  },
  {
    "name": "arista_ngfw",
    "title": "Arista NG Firewall",
    "version": "1.6.2",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs and metrics from Arista NG Firewall.",
    "type": "integration",
    "download": "/epr/arista_ngfw/arista_ngfw-1.6.2.zip",
    "path": "/package/arista_ngfw/1.6.2",
    "icons": [
      {
        "src": "/img/arista-logo.svg",
        "path": "/package/arista_ngfw/1.6.2/img/arista-logo.svg",
        "title": "Arista logo",
        "size": "400x76",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "log",
        "title": "Arista NG Firewall logs",
        "description": "Collect logs from Arista NG Firewall instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "network_security",
      "firewall_security",
      "ids_ips",
      "security"
    ],
    "signature_path": "/epr/arista_ngfw/arista_ngfw-1.6.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "arista_ngfw.log",
        "title": "Firewall Event"
      }
    ]
  },
  {
    "name": "armis",
    "title": "Armis",
    "version": "0.4.1",
    "release": "beta",
    "description": "Collect logs from Armis with Elastic Agent.",
    "type": "integration",
    "download": "/epr/armis/armis-0.4.1.zip",
    "path": "/package/armis/0.4.1",
    "icons": [
      {
        "src": "/img/armis-logo.svg",
        "path": "/package/armis/0.4.1/img/armis-logo.svg",
        "title": "Armis logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "armis",
        "title": "Armis logs",
        "description": "Collect Armis logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management",
      "network_security"
    ],
    "signature_path": "/epr/armis/armis-0.4.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "armis.alert",
        "title": "Alert"
      },
      {
        "type": "logs",
        "dataset": "armis.device",
        "title": "Device"
      },
      {
        "type": "logs",
        "dataset": "armis.vulnerability",
        "title": "Vulnerability"
      }
    ]
  },
  {
    "name": "atlassian_bitbucket",
    "title": "Atlassian Bitbucket",
    "version": "2.6.0",
    "release": "ga",
    "description": "Collect logs from Atlassian Bitbucket with Elastic Agent.",
    "type": "integration",
    "download": "/epr/atlassian_bitbucket/atlassian_bitbucket-2.6.0.zip",
    "path": "/package/atlassian_bitbucket/2.6.0",
    "icons": [
      {
        "src": "/img/bitbucket-logo.svg",
        "path": "/package/atlassian_bitbucket/2.6.0/img/bitbucket-logo.svg",
        "title": "Bitbucket Logo",
        "size": "625x564",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "audit",
        "title": "Audit Logs",
        "description": "Collect audit logs from Atlassian Bitbucket with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/atlassian_bitbucket/atlassian_bitbucket-2.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "atlassian_bitbucket.audit",
        "title": "Bitbucket Audit Logs"
      }
    ]
  },
  {
    "name": "atlassian_confluence",
    "title": "Atlassian Confluence",
    "version": "1.30.0",
    "release": "ga",
    "description": "Collect logs from Atlassian Confluence with Elastic Agent.",
    "type": "integration",
    "download": "/epr/atlassian_confluence/atlassian_confluence-1.30.0.zip",
    "path": "/package/atlassian_confluence/1.30.0",
    "icons": [
      {
        "src": "/img/confluence-logo.svg",
        "path": "/package/atlassian_confluence/1.30.0/img/confluence-logo.svg",
        "title": "Confluence Logo",
        "size": "400x400",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "audit",
        "title": "Audit Logs",
        "description": "Collect audit logs from Atlassian Confluence with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/atlassian_confluence/atlassian_confluence-1.30.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "atlassian_confluence.audit",
        "title": "Confluence Audit Logs"
      }
    ]
  },
  {
    "name": "atlassian_jira",
    "title": "Atlassian Jira",
    "version": "1.31.0",
    "release": "ga",
    "description": "Collect logs from Atlassian Jira with Elastic Agent.",
    "type": "integration",
    "download": "/epr/atlassian_jira/atlassian_jira-1.31.0.zip",
    "path": "/package/atlassian_jira/1.31.0",
    "icons": [
      {
        "src": "/img/jira-software-logo.svg",
        "path": "/package/atlassian_jira/1.31.0/img/jira-software-logo.svg",
        "title": "Jira Software Logo",
        "size": "590x625",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "audit",
        "title": "Audit Logs",
        "description": "Collect audit logs from Atlassian Jira with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/atlassian_jira/atlassian_jira-1.31.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "atlassian_jira.audit",
        "title": "Jira Audit Logs"
      }
    ]
  },
  {
    "name": "auditd",
    "title": "Auditd Logs",
    "version": "3.22.2",
    "release": "ga",
    "description": "Collect logs from Linux audit daemon with Elastic Agent.",
    "type": "integration",
    "download": "/epr/auditd/auditd-3.22.2.zip",
    "path": "/package/auditd/3.22.2",
    "icons": [
      {
        "src": "/img/linux.svg",
        "path": "/package/auditd/3.22.2/img/linux.svg",
        "title": "linux",
        "size": "299x354",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "auditd",
        "title": "Auditd logs",
        "description": "Collect logs from Auditd instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "security",
      "auditd"
    ],
    "signature_path": "/epr/auditd/auditd-3.22.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "auditd.log",
        "title": "Auditd logs"
      }
    ]
  },
  {
    "name": "auditd_manager",
    "title": "Auditd Manager",
    "version": "1.19.1",
    "release": "ga",
    "description": "The Auditd Manager Integration receives audit events from the Linux Audit Framework that is a part of the Linux kernel.",
    "type": "integration",
    "download": "/epr/auditd_manager/auditd_manager-1.19.1.zip",
    "path": "/package/auditd_manager/1.19.1",
    "icons": [
      {
        "src": "/img/linux.svg",
        "path": "/package/auditd_manager/1.19.1/img/linux.svg",
        "title": "linux",
        "size": "299x354",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "auditd",
        "title": "Auditd",
        "description": "Collect auditd events"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "security",
      "auditd"
    ],
    "signature_path": "/epr/auditd_manager/auditd_manager-1.19.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "auditd_manager.auditd",
        "title": "Auditd Manager"
      }
    ]
  },
  {
    "name": "auth0",
    "title": "Auth0",
    "version": "1.23.1",
    "release": "ga",
    "description": "Collect logs from Auth0 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/auth0/auth0-1.23.1.zip",
    "path": "/package/auth0/1.23.1",
    "icons": [
      {
        "src": "/img/auth0-logo.svg",
        "path": "/package/auth0/1.23.1/img/auth0-logo.svg",
        "title": "Auth0 logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "auth0_events",
        "title": "Auth0 log stream events",
        "description": "Collect Auth0 log streams events."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/auth0/auth0-1.23.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "auth0.logs",
        "title": "Auth0 logs"
      }
    ]
  },
  {
    "name": "azure_app_service",
    "title": "Azure App Service",
    "version": "1.1.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Azure App Service with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_app_service/azure_app_service-1.1.0.zip",
    "path": "/package/azure_app_service/1.1.0",
    "icons": [
      {
        "src": "/img/app-service-logo.svg",
        "path": "/package/azure_app_service/1.1.0/img/app-service-logo.svg",
        "title": "App Service Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "app_service_logs",
        "title": "Azure App Service logs",
        "description": "Azure App Service logs integration",
        "data_streams": [
          "app_service_logs"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "cloud",
      "observability",
      "security"
    ],
    "signature_path": "/epr/azure_app_service/azure_app_service-1.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_app_service.app_service_logs",
        "title": "Collect App Service logs from Azure"
      }
    ]
  },
  {
    "name": "azure_application_insights",
    "title": "Azure Application Insights Metrics Overview",
    "version": "1.10.0",
    "release": "ga",
    "description": "Collect application insights metrics from Azure Monitor with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_application_insights/azure_application_insights-1.10.0.zip",
    "path": "/package/azure_application_insights/1.10.0",
    "icons": [
      {
        "src": "/img/app_insights.png",
        "path": "/package/azure_application_insights/1.10.0/img/app_insights.png",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "app_insights",
        "title": "Azure Application Insights Metrics",
        "description": "Collect application insights metrics from Azure Monitor with Elastic Agent.",
        "icons": [
          {
            "src": "/img//app_insights.png",
            "path": "/package/azure_application_insights/1.10.0/img/app_insights.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "app_insights"
        ]
      },
      {
        "name": "app_state",
        "title": "Azure Application State Insights Metrics",
        "description": "Collect application state related metrics from Azure Monitor with Elastic Agent.",
        "icons": [
          {
            "src": "/img/application_insights_blue.png",
            "path": "/package/azure_application_insights/1.10.0/img/application_insights_blue.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "app_state"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~8.19.14 || ~9.2.8 || ^9.3.3"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "cloud",
      "observability"
    ],
    "signature_path": "/epr/azure_application_insights/azure_application_insights-1.10.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "azure.app_insights",
        "title": "Azure Application Insights"
      },
      {
        "type": "metrics",
        "dataset": "azure.app_state",
        "title": "Azure Application State"
      }
    ]
  },
  {
    "name": "azure_billing",
    "title": "Azure Billing Metrics",
    "version": "1.9.0",
    "release": "ga",
    "description": "Collect billing metrics with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_billing/azure_billing-1.9.0.zip",
    "path": "/package/azure_billing/1.9.0",
    "icons": [
      {
        "src": "/img/billing.png",
        "path": "/package/azure_billing/1.9.0/img/billing.png",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "billing",
        "title": "Azure Billing Metrics",
        "description": "Collect billing information with Elastic Agent.",
        "icons": [
          {
            "src": "/img//billing.png",
            "path": "/package/azure_billing/1.9.0/img/billing.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "billing"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "cloud",
      "observability",
      "azure"
    ],
    "signature_path": "/epr/azure_billing/azure_billing-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "azure.billing",
        "title": "Azure Billing Metrics"
      }
    ]
  },
  {
    "name": "azure_frontdoor",
    "title": "Azure Frontdoor",
    "version": "2.3.0",
    "release": "ga",
    "description": "This Elastic integration collects logs from Azure Frontdoor.",
    "type": "integration",
    "download": "/epr/azure_frontdoor/azure_frontdoor-2.3.0.zip",
    "path": "/package/azure_frontdoor/2.3.0",
    "icons": [
      {
        "src": "/img/front-door.svg",
        "path": "/package/azure_frontdoor/2.3.0/img/front-door.svg",
        "title": "Frontdoor logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure_frontdoor",
        "title": "Azure Frontdoor logs",
        "description": "Collect sample logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "azure",
      "cloud",
      "network",
      "observability",
      "security",
      "web"
    ],
    "signature_path": "/epr/azure_frontdoor/azure_frontdoor-2.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_frontdoor.access",
        "title": "FrontDoor Access"
      },
      {
        "type": "logs",
        "dataset": "azure_frontdoor.waf",
        "title": "FrontDoor WAF"
      }
    ]
  },
  {
    "name": "azure_functions",
    "title": "Azure Functions",
    "version": "0.12.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Get metrics and logs from Azure Functions",
    "type": "integration",
    "download": "/epr/azure_functions/azure_functions-0.12.0.zip",
    "path": "/package/azure_functions/0.12.0",
    "icons": [
      {
        "src": "/img/azure-functions-icon.svg",
        "path": "/package/azure_functions/0.12.0/img/azure-functions-icon.svg",
        "title": "Azure Functions logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure_functions",
        "title": "Azure Functions logs and metrics",
        "description": "Azure Functions logs and metrics with Elastic Agent.",
        "categories": [
          "azure",
          "cloud"
        ],
        "data_streams": [
          "functionapplogs",
          "metrics"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "cloud",
      "observability"
    ],
    "signature_path": "/epr/azure_functions/azure_functions-0.12.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_functions.functionapplogs",
        "title": "Collect Azure Functions logs"
      },
      {
        "type": "metrics",
        "dataset": "azure.function",
        "title": "Azure Functions App Metrics"
      }
    ]
  },
  {
    "name": "azure",
    "title": "Azure Logs",
    "version": "1.36.1",
    "release": "ga",
    "description": "This Elastic integration collects logs from Azure",
    "type": "integration",
    "download": "/epr/azure/azure-1.36.1.zip",
    "path": "/package/azure/1.36.1",
    "icons": [
      {
        "src": "/img/azure_logs_logo.png",
        "path": "/package/azure/1.36.1/img/azure_logs_logo.png",
        "title": "logo azure",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "events",
        "title": "Azure Logs (v2 preview)",
        "description": "Azure Logs (v2 preview) integration",
        "icons": [
          {
            "src": "/img/eventhub.png",
            "path": "/package/azure/1.36.1/img/eventhub.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "stream_processing"
        ],
        "data_streams": [
          "events"
        ]
      },
      {
        "name": "eventhub",
        "title": "Azure Event Hub Input",
        "description": "Azure Event Hub input integration",
        "icons": [
          {
            "src": "/img/eventhub.png",
            "path": "/package/azure/1.36.1/img/eventhub.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "stream_processing"
        ],
        "data_streams": [
          "eventhub"
        ]
      },
      {
        "name": "adlogs",
        "title": "Microsoft Entra ID",
        "description": "Collect logs from Microsoft Entra ID (formerly Azure Active Directory) with Elastic Agent.",
        "icons": [
          {
            "src": "/img/microsoft-entra-id-logo.svg",
            "path": "/package/azure/1.36.1/img/microsoft-entra-id-logo.svg",
            "title": "Microsoft Entra ID logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "auditlogs",
          "signinlogs",
          "identity_protection",
          "provisioning"
        ]
      },
      {
        "name": "platformlogs",
        "title": "Azure platform logs",
        "description": "Azure platform logs integration",
        "icons": [
          {
            "src": "/img/platformlogs_logo.png",
            "path": "/package/azure/1.36.1/img/platformlogs_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "platformlogs"
        ]
      },
      {
        "name": "activitylogs",
        "title": "Azure Activity Logs",
        "description": "Azure Activity Logs integration",
        "icons": [
          {
            "src": "/img/platformlogs_logo.png",
            "path": "/package/azure/1.36.1/img/platformlogs_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "activitylogs"
        ]
      },
      {
        "name": "graphactivitylogs",
        "title": "Microsoft Graph Activity Logs",
        "description": "Microsoft Graph Activity Logs integration",
        "icons": [
          {
            "src": "/img/graph_activity.png",
            "path": "/package/azure/1.36.1/img/graph_activity.png",
            "title": "logo graphactivity",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "graphactivitylogs"
        ]
      },
      {
        "name": "springcloudlogs",
        "title": "Azure Spring Apps logs",
        "description": "Azure Spring Apps logs integration",
        "icons": [
          {
            "src": "/img/spring_logs.svg",
            "path": "/package/azure/1.36.1/img/spring_logs.svg",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "springcloudlogs"
        ]
      },
      {
        "name": "firewall_logs",
        "title": "Azure Firewall logs",
        "description": "Azure firewall logs integration",
        "icons": [
          {
            "src": "/img/firewall_logo.svg",
            "path": "/package/azure/1.36.1/img/firewall_logo.svg",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "firewall_security"
        ],
        "data_streams": [
          "firewall_logs"
        ]
      },
      {
        "name": "application_gateway",
        "title": "Azure Application Gateway",
        "description": "Collect Azure Application Gateway logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/application_gateway_logo.svg",
            "path": "/package/azure/1.36.1/img/application_gateway_logo.svg",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "application_gateway"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "cloud",
      "azure",
      "observability",
      "security"
    ],
    "signature_path": "/epr/azure/azure-1.36.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure.activitylogs",
        "title": "Azure Activity Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.application_gateway",
        "title": "Azure Application Gateway logs"
      },
      {
        "type": "logs",
        "dataset": "azure.auditlogs",
        "title": "Azure Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.eventhub",
        "title": "Azure Event Hub Input"
      },
      {
        "type": "logs",
        "dataset": "azure.events",
        "title": "Azure Logs (v2 preview)"
      },
      {
        "type": "logs",
        "dataset": "azure.firewall_logs",
        "title": "Collect Network rule logs from Azure Firewall"
      },
      {
        "type": "logs",
        "dataset": "azure.graphactivitylogs",
        "title": "Microsoft Graph Activity Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.identity_protection",
        "title": "Microsoft Entra ID Identity Protection Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.platformlogs",
        "title": "Azure Platform Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.provisioning",
        "title": "Microsoft Entra ID Provisioning Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.signinlogs",
        "title": "Azure Signin Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.springcloudlogs",
        "title": "Azure Spring Apps Logs"
      }
    ]
  },
  {
    "name": "azure_network_watcher_nsg",
    "title": "Azure Network Watcher NSG",
    "version": "1.5.1",
    "release": "ga",
    "description": "Collect logs from Azure Network Watcher NSG with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_network_watcher_nsg/azure_network_watcher_nsg-1.5.1.zip",
    "path": "/package/azure_network_watcher_nsg/1.5.1",
    "icons": [
      {
        "src": "/img/azure_network_watcher_logo.svg",
        "path": "/package/azure_network_watcher_nsg/1.5.1/img/azure_network_watcher_logo.svg",
        "title": "Azure Network Watcher logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure_network_watcher_nsg",
        "title": "Azure Network Watcher NSG logs",
        "description": "Collect Azure Network Watcher NSG logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "azure",
      "security"
    ],
    "signature_path": "/epr/azure_network_watcher_nsg/azure_network_watcher_nsg-1.5.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_network_watcher_nsg.log",
        "title": "Collect NSG logs from Azure Network Watcher"
      }
    ]
  },
  {
    "name": "azure_network_watcher_vnet",
    "title": "Azure Network Watcher VNet",
    "version": "1.6.0",
    "release": "ga",
    "description": "Collect logs from Azure Network Watcher VNet with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_network_watcher_vnet/azure_network_watcher_vnet-1.6.0.zip",
    "path": "/package/azure_network_watcher_vnet/1.6.0",
    "icons": [
      {
        "src": "/img/azure_network_watcher_logo.svg",
        "path": "/package/azure_network_watcher_vnet/1.6.0/img/azure_network_watcher_logo.svg",
        "title": "Azure Network Watcher logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure_network_watcher_vnet",
        "title": "Azure Network Watcher VNet logs",
        "description": "Collect Azure Network Watcher VNet logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "azure",
      "security"
    ],
    "signature_path": "/epr/azure_network_watcher_vnet/azure_network_watcher_vnet-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_network_watcher_vnet.log",
        "title": "Collect VNet logs from Azure Network Watcher"
      }
    ]
  },
  {
    "name": "azure_openai",
    "title": "Azure OpenAI",
    "version": "1.11.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collects Azure OpenAI Logs and Metrics",
    "type": "integration",
    "download": "/epr/azure_openai/azure_openai-1.11.0.zip",
    "path": "/package/azure_openai/1.11.0",
    "icons": [
      {
        "src": "/img/open_ai.png",
        "path": "/package/azure_openai/1.11.0/img/open_ai.png",
        "title": "Azure OpenAI logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure_open_ai",
        "title": "Collects Azure OpenAI logs and metrics",
        "description": "Azure OpenAI logs and metrics with Elastic Agent.",
        "categories": [
          "azure",
          "cloud"
        ],
        "data_streams": [
          "logs",
          "metrics"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "cloud",
      "observability",
      "security"
    ],
    "signature_path": "/epr/azure_openai/azure_openai-1.11.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_openai.logs",
        "title": "Collect Azure OpenAI logs"
      },
      {
        "type": "metrics",
        "dataset": "azure.open_ai",
        "title": "Collect OpenAI metrics"
      }
    ]
  },
  {
    "name": "azure_metrics",
    "title": "Azure Resource Metrics",
    "version": "1.11.0",
    "release": "ga",
    "description": "Collect metrics from Azure resources with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_metrics/azure_metrics-1.11.0.zip",
    "path": "/package/azure_metrics/1.11.0",
    "icons": [
      {
        "src": "/img/azure_metrics_logo.png",
        "path": "/package/azure_metrics/1.11.0/img/azure_metrics_logo.png",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "monitor",
        "title": "Azure Monitor Metrics",
        "description": "Collect metrics from Azure Monitor with Elastic Agent.",
        "icons": [
          {
            "src": "/img/monitor_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/monitor_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "monitor"
        ]
      },
      {
        "name": "compute_vm",
        "title": "Azure Virtual Machines Metrics",
        "description": "Collect metrics from Azure Virtual Machines with Elastic Agent.",
        "icons": [
          {
            "src": "/img/compute_vm_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/compute_vm_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "compute_vm"
        ]
      },
      {
        "name": "compute_vm_scaleset",
        "title": "Azure Virtual Machines Scaleset Metrics",
        "description": "Collect metrics from Azure Virtual Machine Scalesets with Elastic Agent.",
        "icons": [
          {
            "src": "/img/compute_vm_scaleset_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/compute_vm_scaleset_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "compute_vm_scaleset"
        ]
      },
      {
        "name": "container_registry",
        "title": "Azure Container Registry Metrics",
        "description": "Collect metrics from Azure Container Registry with Elastic Agent.",
        "icons": [
          {
            "src": "/img/container_registry_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/container_registry_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "containers"
        ],
        "data_streams": [
          "container_registry"
        ]
      },
      {
        "name": "container_instance",
        "title": "Azure Container Instance Metrics",
        "description": "Collect metrics from Azure Container Instances with Elastic Agent.",
        "icons": [
          {
            "src": "/img/container_instance_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/container_instance_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "containers"
        ],
        "data_streams": [
          "container_instance"
        ]
      },
      {
        "name": "container_service",
        "title": "Azure Container Service Metrics",
        "description": "Collect metrics from Azure Container Service with Elastic Agent.",
        "icons": [
          {
            "src": "/img/container_service_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/container_service_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "containers"
        ],
        "data_streams": [
          "container_service"
        ]
      },
      {
        "name": "database_account",
        "title": "Azure Database Account Metrics",
        "description": "Collect metrics from Azure Database accounts with Elastic Agent.",
        "icons": [
          {
            "src": "/img/database_account_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/database_account_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "datastore"
        ],
        "data_streams": [
          "database_account"
        ]
      },
      {
        "name": "storage_account",
        "title": "Azure Storage Account Metrics",
        "description": "Collect metrics from Azure Storage accounts with Elastic Agent.",
        "icons": [
          {
            "src": "/img/storage_account_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/storage_account_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "storage_account"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~8.18.8 || ~8.19.5 || ~9.0.8 || ^9.1.5"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "cloud",
      "observability",
      "azure",
      "custom"
    ],
    "signature_path": "/epr/azure_metrics/azure_metrics-1.11.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "azure.compute_vm",
        "title": "Compute VM"
      },
      {
        "type": "metrics",
        "dataset": "azure.compute_vm_scaleset",
        "title": "Compute VM Scaleset"
      },
      {
        "type": "metrics",
        "dataset": "azure.container_instance",
        "title": "Container Instance"
      },
      {
        "type": "metrics",
        "dataset": "azure.container_registry",
        "title": "Container Registry"
      },
      {
        "type": "metrics",
        "dataset": "azure.container_service",
        "title": "Container Service"
      },
      {
        "type": "metrics",
        "dataset": "azure.database_account",
        "title": "Database Account"
      },
      {
        "type": "metrics",
        "dataset": "azure.monitor",
        "title": "Monitor"
      },
      {
        "type": "metrics",
        "dataset": "azure.storage_account",
        "title": "Storage Account"
      }
    ]
  },
  {
    "name": "bbot",
    "title": "BBOT (Bighuge BLS OSINT Tool)",
    "version": "1.4.0",
    "release": "ga",
    "description": "BBOT is a recursive internet scanner inspired by Spiderfoot, but designed to be faster, more reliable, and friendlier to pentesters, bug bounty hunters, and developers. ",
    "type": "integration",
    "download": "/epr/bbot/bbot-1.4.0.zip",
    "path": "/package/bbot/1.4.0",
    "icons": [
      {
        "src": "/img/BlackLantern-LOGO.svg",
        "path": "/package/bbot/1.4.0/img/BlackLantern-LOGO.svg",
        "title": "BBOT Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "bbot",
        "title": "BBOT Scan Data",
        "description": "Collect BBOT output.ndjson"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/bbot/bbot-1.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "bbot.asm_intel",
        "title": "BBOT-Data-Ingest"
      }
    ]
  },
  {
    "name": "barracuda_cloudgen_firewall",
    "title": "Barracuda CloudGen Firewall Logs",
    "version": "1.16.0",
    "release": "ga",
    "description": "Collect logs from Barracuda CloudGen Firewall devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/barracuda_cloudgen_firewall/barracuda_cloudgen_firewall-1.16.0.zip",
    "path": "/package/barracuda_cloudgen_firewall/1.16.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/barracuda_cloudgen_firewall/1.16.0/img/logo.svg",
        "title": "Barracuda logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "barracuda_cloudgen_firewall",
        "title": "Barracuda CloudGen Firewall Logs",
        "description": "Receive firewall activity, threat logs, and information related to network, version, and location of managed firewall units."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security",
      "firewall_security"
    ],
    "signature_path": "/epr/barracuda_cloudgen_firewall/barracuda_cloudgen_firewall-1.16.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "barracuda_cloudgen_firewall.log",
        "title": "Barracuda CloudGen Firewall Logs"
      }
    ]
  },
  {
    "name": "barracuda",
    "title": "Barracuda Web Application Firewall",
    "version": "1.18.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Barracuda Web Application Firewall with Elastic Agent.",
    "type": "integration",
    "download": "/epr/barracuda/barracuda-1.18.0.zip",
    "path": "/package/barracuda/1.18.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/barracuda/1.18.0/img/logo.svg",
        "title": "Barracuda logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "barracuda",
        "title": "Barracuda Web Application Firewall logs",
        "description": "Collect logs from Barracuda Web Application Firewall instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security",
      "web_application_firewall"
    ],
    "signature_path": "/epr/barracuda/barracuda-1.18.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "barracuda.waf",
        "title": "Barracuda WAF Logs"
      }
    ]
  },
  {
    "name": "beat",
    "title": "Beat",
    "version": "1.0.1",
    "release": "ga",
    "description": "Beat Integration",
    "type": "integration",
    "download": "/epr/beat/beat-1.0.1.zip",
    "path": "/package/beat/1.0.1",
    "icons": [
      {
        "src": "/img/logo_beat.svg",
        "path": "/package/beat/1.0.1/img/logo_beat.svg",
        "title": "logo beat",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/stack-monitoring"
    },
    "signature_path": "/epr/beat/beat-1.0.1.zip.sig"
  },
  {
    "name": "beelzebub",
    "title": "Beelzebub",
    "version": "0.4.0",
    "release": "beta",
    "description": "Beelzebub is an advanced honeypot framework designed to provide a highly secure environment for detecting and analyzing cyber attacks. It offers a low code approach for easy implementation and uses AI to mimic the behavior of a high-interaction honeypot.",
    "type": "integration",
    "download": "/epr/beelzebub/beelzebub-0.4.0.zip",
    "path": "/package/beelzebub/0.4.0",
    "icons": [
      {
        "src": "/img/beelzebub.svg",
        "path": "/package/beelzebub/0.4.0/img/beelzebub.svg",
        "title": "Beelzebub logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Beelzebub",
        "title": "Beelzebub logs",
        "description": "Collect Beelzebub logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/beelzebub/beelzebub-0.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "beelzebub.logs",
        "title": "Beelzebub Logs"
      }
    ]
  },
  {
    "name": "beyondinsight_password_safe",
    "title": "BeyondInsight and Password Safe",
    "version": "1.0.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Ingest privileged access management (PAM) data from BeyondTrust's BeyondInsight PAM Reporting Platform and Password Safe, using Elastic Agent.",
    "type": "integration",
    "download": "/epr/beyondinsight_password_safe/beyondinsight_password_safe-1.0.0.zip",
    "path": "/package/beyondinsight_password_safe/1.0.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/beyondinsight_password_safe/1.0.0/img/logo.svg",
        "title": "BeyondTrust logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "beyondinsight",
        "title": "BeyondInsight and Password Safe Events",
        "description": "Collect events from BeyondInsight and Password Safe"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "credential_management",
      "iam"
    ],
    "signature_path": "/epr/beyondinsight_password_safe/beyondinsight_password_safe-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "beyondinsight_password_safe.asset",
        "title": "BeyondInsight and Password Safe Assets Events"
      },
      {
        "type": "logs",
        "dataset": "beyondinsight_password_safe.managedaccount",
        "title": "BeyondInsight and Password Safe Managed Accounts Events"
      },
      {
        "type": "logs",
        "dataset": "beyondinsight_password_safe.managedsystem",
        "title": "BeyondInsight and Password Safe Managed Systems Events"
      },
      {
        "type": "logs",
        "dataset": "beyondinsight_password_safe.session",
        "title": "BeyondInsight and Password Safe Session Events"
      },
      {
        "type": "logs",
        "dataset": "beyondinsight_password_safe.useraudit",
        "title": "BeyondInsight and Password Safe User Audit Events"
      }
    ]
  },
  {
    "name": "beyondtrust_pra",
    "title": "BeyondTrust PRA",
    "version": "0.3.3",
    "release": "beta",
    "description": "Collect logs from BeyondTrust PRA with Elastic Agent.",
    "type": "integration",
    "download": "/epr/beyondtrust_pra/beyondtrust_pra-0.3.3.zip",
    "path": "/package/beyondtrust_pra/0.3.3",
    "icons": [
      {
        "src": "/img/beyondtrust_pra-logo.png",
        "path": "/package/beyondtrust_pra/0.3.3/img/beyondtrust_pra-logo.png",
        "title": "BeyondTrust PRA",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "beyondtrust_pra",
        "title": "BeyondTrust PRA",
        "description": "Collect logs from BeyondTrust PRA.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam",
      "network_security"
    ],
    "signature_path": "/epr/beyondtrust_pra/beyondtrust_pra-0.3.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "beyondtrust_pra.access_session",
        "title": "Access Session"
      }
    ]
  },
  {
    "name": "bitdefender",
    "title": "BitDefender",
    "version": "2.8.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Ingest BitDefender GravityZone logs and data",
    "type": "integration",
    "download": "/epr/bitdefender/bitdefender-2.8.0.zip",
    "path": "/package/bitdefender/2.8.0",
    "icons": [
      {
        "src": "/img/bitdefender_gravityzone.svg",
        "path": "/package/bitdefender/2.8.0/img/bitdefender_gravityzone.svg",
        "title": "BitDefender GravityZone",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "bitdefender_gravityzone",
        "title": "BitDefender GravityZone",
        "description": "Collect push notification events and related data from BitDefender GravityZone"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/bitdefender/bitdefender-2.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "bitdefender.push_configuration",
        "title": "BitDefender GravityZone Push Notification Configuration"
      },
      {
        "type": "logs",
        "dataset": "bitdefender.push_notifications",
        "title": "BitDefender GravityZone Push Notifications"
      },
      {
        "type": "logs",
        "dataset": "bitdefender.push_statistics",
        "title": "BitDefender GravityZone Push Notification Statistics"
      }
    ]
  },
  {
    "name": "bitsight",
    "title": "Bitsight",
    "version": "0.1.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Ingest data from the Bitsight API.",
    "type": "integration",
    "download": "/epr/bitsight/bitsight-0.1.1.zip",
    "path": "/package/bitsight/0.1.1",
    "icons": [
      {
        "src": "/img/bitsight.svg",
        "path": "/package/bitsight/0.1.1/img/bitsight.svg",
        "title": "Bitsight Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "bitsight",
        "title": "Bitsight",
        "description": "Collect data from Bitsight API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "security"
    ],
    "signature_path": "/epr/bitsight/bitsight-0.1.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "bitsight.vulnerability",
        "title": "Bitsight Vulnerability"
      }
    ]
  },
  {
    "name": "bitwarden",
    "title": "Bitwarden",
    "version": "1.18.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Bitwarden with Elastic Agent.",
    "type": "integration",
    "download": "/epr/bitwarden/bitwarden-1.18.0.zip",
    "path": "/package/bitwarden/1.18.0",
    "icons": [
      {
        "src": "/img/bitwarden-logo.svg",
        "path": "/package/bitwarden/1.18.0/img/bitwarden-logo.svg",
        "title": "Bitwarden logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "bitwarden",
        "title": "Bitwarden logs",
        "description": "Collect Bitwarden logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "credential_management"
    ],
    "signature_path": "/epr/bitwarden/bitwarden-1.18.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "bitwarden.collection",
        "title": "Collect Collection logs from Bitwarden"
      },
      {
        "type": "logs",
        "dataset": "bitwarden.event",
        "title": "Collect Event logs from Bitwarden"
      },
      {
        "type": "logs",
        "dataset": "bitwarden.group",
        "title": "Collect Group logs from Bitwarden"
      },
      {
        "type": "logs",
        "dataset": "bitwarden.member",
        "title": "Collect Member logs from Bitwarden"
      },
      {
        "type": "logs",
        "dataset": "bitwarden.policy",
        "title": "Collect Policy logs from Bitwarden"
      }
    ]
  },
  {
    "name": "bluecoat",
    "title": "Blue Coat Director Logs (Deprecated)",
    "version": "0.18.1",
    "release": "beta",
    "description": "Deprecated. Director is no longer supported.",
    "type": "integration",
    "download": "/epr/bluecoat/bluecoat-0.18.1.zip",
    "path": "/package/bluecoat/0.18.1",
    "policy_templates": [
      {
        "name": "director",
        "title": "Blue Coat Director",
        "description": "Collect Blue Coat Director logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.14.1 || ^8.8.0"
      }
    },
    "owner": {
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "proxy_security"
    ],
    "signature_path": "/epr/bluecoat/bluecoat-0.18.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "bluecoat.director",
        "title": "Blue Coat Director logs"
      }
    ]
  },
  {
    "name": "box_events",
    "title": "Box Events",
    "version": "3.1.2",
    "release": "ga",
    "description": "Collect logs from Box with Elastic Agent",
    "type": "integration",
    "download": "/epr/box_events/box_events-3.1.2.zip",
    "path": "/package/box_events/3.1.2",
    "icons": [
      {
        "src": "/img/box.svg",
        "path": "/package/box_events/3.1.2/img/box.svg",
        "title": "Box Blue Logo",
        "size": "60x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "box_events",
        "title": "Box Events",
        "description": "Collect Events from BOX"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/box_events/box_events-3.1.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "box_events.events",
        "title": "List user and enterprise events"
      }
    ]
  },
  {
    "name": "hid_bravura_monitor",
    "title": "Bravura Monitor",
    "version": "1.21.0",
    "release": "ga",
    "description": "Collect logs from Bravura Security Fabric with Elastic Agent.",
    "type": "integration",
    "download": "/epr/hid_bravura_monitor/hid_bravura_monitor-1.21.0.zip",
    "path": "/package/hid_bravura_monitor/1.21.0",
    "icons": [
      {
        "src": "/img/logo_hid_bravura_monitor.svg",
        "path": "/package/hid_bravura_monitor/1.21.0/img/logo_hid_bravura_monitor.svg",
        "title": "logo Bravura Monitor",
        "size": "50x50",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "hid_bravura_monitor",
        "title": "Bravura Monitor logs",
        "description": "Collect logs from Bravura Security Fabric instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/hid_bravura_monitor/hid_bravura_monitor-1.21.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "hid_bravura_monitor.log",
        "title": "Bravura Monitor"
      },
      {
        "type": "logs",
        "dataset": "hid_bravura_monitor.winlog",
        "title": "Bravura Security Fabric logs"
      }
    ]
  },
  {
    "name": "proxysg",
    "title": "Broadcom ProxySG",
    "version": "0.8.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect access logs from Broadcom ProxySG with Elastic Agent.",
    "type": "integration",
    "download": "/epr/proxysg/proxysg-0.8.0.zip",
    "path": "/package/proxysg/0.8.0",
    "icons": [
      {
        "src": "/img/proxysg_logo.svg",
        "path": "/package/proxysg/0.8.0/img/proxysg_logo.svg",
        "title": "ProxySG logo",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "proxysg-access-logs",
        "title": "ProxySG access logs",
        "description": "Collect access logs from ProxySG instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/proxysg/proxysg-0.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proxysg.log",
        "title": "ProxySG Access Logs"
      }
    ]
  },
  {
    "name": "cisa_kevs",
    "title": "CISA Known Exploited Vulnerabilities",
    "version": "1.7.0",
    "release": "ga",
    "description": "This package allows the ingest of known exploited vulnerabilities according to the Cybersecurity and Infrastructure Security Agency of the United States of America. This information could be used to enrich or track exisiting vulnerabilities that are known to be exploited in the wild.",
    "type": "integration",
    "download": "/epr/cisa_kevs/cisa_kevs-1.7.0.zip",
    "path": "/package/cisa_kevs/1.7.0",
    "icons": [
      {
        "src": "/img/icon-threat-detection-64-color.svg",
        "path": "/package/cisa_kevs/1.7.0/img/icon-threat-detection-64-color.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisa_kevs",
        "title": "CISA Known Exploited Vulnerabilities",
        "description": "Ingest the CISA KEVs with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/cisa_kevs/cisa_kevs-1.7.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisa_kevs.vulnerability",
        "title": "CISA Known Exploited Vulnerabilities List"
      }
    ]
  },
  {
    "name": "canva",
    "title": "Canva",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collect logs from Canva with Elastic Agent.",
    "type": "integration",
    "download": "/epr/canva/canva-1.0.0.zip",
    "path": "/package/canva/1.0.0",
    "icons": [
      {
        "src": "/img/canva-logo.svg",
        "path": "/package/canva/1.0.0/img/canva-logo.svg",
        "title": "Canva logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "canva",
        "title": "Canva logs",
        "description": "Collect Canva logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity"
    ],
    "signature_path": "/epr/canva/canva-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "canva.audit",
        "title": "Collect Audit Logs from Canva"
      }
    ]
  },
  {
    "name": "cassandra",
    "title": "Cassandra",
    "version": "1.20.0",
    "release": "ga",
    "description": "This Elastic integration collects logs and metrics from cassandra.",
    "type": "integration",
    "download": "/epr/cassandra/cassandra-1.20.0.zip",
    "path": "/package/cassandra/1.20.0",
    "icons": [
      {
        "src": "/img/cassandra.svg",
        "path": "/package/cassandra/1.20.0/img/cassandra.svg",
        "title": "cassandra",
        "size": "279x187",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cassandra",
        "title": "Cassandra logs and metrics",
        "description": "Collect logs and metrics from Cassandra"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/cassandra/cassandra-1.20.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cassandra.log",
        "title": "Cassandra System Logs"
      },
      {
        "type": "metrics",
        "dataset": "cassandra.metrics",
        "title": "Metrics"
      }
    ]
  },
  {
    "name": "cassandra_otel",
    "title": "Cassandra OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Apache Cassandra Assets from OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/cassandra_otel/cassandra_otel-0.1.0.zip",
    "path": "/package/cassandra_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_cassandra_otel.svg",
        "path": "/package/cassandra_otel/0.1.0/img/logo_cassandra_otel.svg",
        "title": "Cassandra OTel logo",
        "size": "279x279",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "opentelemetry"
    ],
    "signature_path": "/epr/cassandra_otel/cassandra_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "cassandra.otel"
        }
      ]
    }
  },
  {
    "name": "ceph",
    "title": "Ceph",
    "version": "1.9.0",
    "release": "ga",
    "description": "This Elastic integration collects metrics from Ceph instance.",
    "type": "integration",
    "download": "/epr/ceph/ceph-1.9.0.zip",
    "path": "/package/ceph/1.9.0",
    "icons": [
      {
        "src": "/img/ceph-logo.svg",
        "path": "/package/ceph/1.9.0/img/ceph-logo.svg",
        "title": "Ceph logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Ceph",
        "title": "Ceph metrics",
        "description": "Collect Ceph metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "os_system",
      "observability"
    ],
    "signature_path": "/epr/ceph/ceph-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ceph.cluster_disk",
        "title": "Cluster Disk metrics"
      },
      {
        "type": "logs",
        "dataset": "ceph.cluster_health",
        "title": "Cluster Health metrics"
      },
      {
        "type": "logs",
        "dataset": "ceph.cluster_status",
        "title": "Cluster Status metrics"
      },
      {
        "type": "logs",
        "dataset": "ceph.osd_performance",
        "title": "OSD Performance metrics"
      },
      {
        "type": "logs",
        "dataset": "ceph.osd_pool_stats",
        "title": "OSD Pool Stats"
      },
      {
        "type": "logs",
        "dataset": "ceph.osd_tree",
        "title": "OSD Tree metrics"
      },
      {
        "type": "logs",
        "dataset": "ceph.pool_disk",
        "title": "Pool Disk metrics"
      }
    ]
  },
  {
    "name": "checkpoint",
    "title": "Check Point",
    "version": "1.45.4",
    "release": "ga",
    "description": "Collect logs from Check Point with Elastic Agent.",
    "type": "integration",
    "download": "/epr/checkpoint/checkpoint-1.45.4.zip",
    "path": "/package/checkpoint/1.45.4",
    "icons": [
      {
        "src": "/img/checkpoint-logo.svg",
        "path": "/package/checkpoint/1.45.4/img/checkpoint-logo.svg",
        "title": "Check Point",
        "size": "761x341",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "checkpoint",
        "title": "Check Point logs",
        "description": "Collect logs from Check Point instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "firewall_security"
    ],
    "signature_path": "/epr/checkpoint/checkpoint-1.45.4.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "checkpoint.firewall",
        "title": "Check Point firewall logs"
      }
    ]
  },
  {
    "name": "checkpoint_email",
    "title": "Check Point Harmony Email & Collaboration",
    "version": "1.4.0",
    "release": "ga",
    "description": "Collect logs from Check Point Harmony Email & Collaboration with Elastic Agent.",
    "type": "integration",
    "download": "/epr/checkpoint_email/checkpoint_email-1.4.0.zip",
    "path": "/package/checkpoint_email/1.4.0",
    "icons": [
      {
        "src": "/img/checkpoint-logo.svg",
        "path": "/package/checkpoint_email/1.4.0/img/checkpoint-logo.svg",
        "title": "Check Point logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "checkpoint_email",
        "title": "Check Point Harmony Email & Collaboration logs",
        "description": "Collect Check Point Harmony Email & Collaboration logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/checkpoint_email/checkpoint_email-1.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "checkpoint_email.event",
        "title": "Check Point Harmony Email & Collaboration Event logs"
      }
    ]
  },
  {
    "name": "checkpoint_harmony_endpoint",
    "title": "Check Point Harmony Endpoint",
    "version": "1.2.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Check Point Harmony Endpoint",
    "type": "integration",
    "download": "/epr/checkpoint_harmony_endpoint/checkpoint_harmony_endpoint-1.2.0.zip",
    "path": "/package/checkpoint_harmony_endpoint/1.2.0",
    "icons": [
      {
        "src": "/img/checkpoint-logo.svg",
        "path": "/package/checkpoint_harmony_endpoint/1.2.0/img/checkpoint-logo.svg",
        "title": "Check Point logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "harmony",
        "title": "Check Point Harmony Endpoint Events Collector",
        "description": "Collect Check Point Harmony Endpoint Events",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/checkpoint_harmony_endpoint/checkpoint_harmony_endpoint-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.antibot",
        "title": "Anti-Bot"
      },
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.antimalware",
        "title": "Anti-Malware"
      },
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.forensics",
        "title": "Forensics"
      },
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.threatemulation",
        "title": "Threat Emulation"
      },
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.threatextraction",
        "title": "Threat Extraction"
      },
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.urlfiltering",
        "title": "URL Filtering"
      },
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.zerophishing",
        "title": "Zero Phishing"
      }
    ]
  },
  {
    "name": "cilium_tetragon",
    "title": "Cilium Tetragon",
    "version": "0.4.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Cilium Tetragon logs from Kubernetes environments.",
    "type": "integration",
    "download": "/epr/cilium_tetragon/cilium_tetragon-0.4.0.zip",
    "path": "/package/cilium_tetragon/0.4.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/cilium_tetragon/0.4.0/img/logo.svg",
        "title": "Cilium Tetragon Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cilium_tetragon",
        "title": "Cilium Tetragon",
        "description": "Cilium Tetragon is an open-source security observability tool that leverages eBPF technology to provide real-time visibility and monitoring for containerized applications."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "cloud",
      "cloudsecurity_cdr",
      "kubernetes",
      "observability"
    ],
    "signature_path": "/epr/cilium_tetragon/cilium_tetragon-0.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cilium_tetragon.log",
        "title": "log\n"
      }
    ]
  },
  {
    "name": "cisco_asa",
    "title": "Cisco ASA",
    "version": "2.45.0",
    "release": "ga",
    "description": "Collect logs from Cisco ASA with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_asa/cisco_asa-2.45.0.zip",
    "path": "/package/cisco_asa/2.45.0",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_asa/2.45.0/img/cisco.svg",
        "title": "cisco",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_asa",
        "title": "Cisco ASA logs",
        "description": "Collect logs from Cisco ASA instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "firewall_security"
    ],
    "signature_path": "/epr/cisco_asa/cisco_asa-2.45.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_asa.log",
        "title": "Cisco ASA logs"
      }
    ]
  },
  {
    "name": "cisco_aironet",
    "title": "Cisco Aironet",
    "version": "1.20.0",
    "release": "ga",
    "description": "Integration for Cisco Aironet WLC Logs",
    "type": "integration",
    "download": "/epr/cisco_aironet/cisco_aironet-1.20.0.zip",
    "path": "/package/cisco_aironet/1.20.0",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_aironet/1.20.0/img/cisco.svg",
        "title": "Cisco",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_aironet",
        "title": "Cisco Aironet logs",
        "description": "Collect logs from Cisco Aironet instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/cisco_aironet/cisco_aironet-1.20.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_aironet.log",
        "title": "Cisco Aironet logs"
      }
    ]
  },
  {
    "name": "cisco_duo",
    "title": "Cisco Duo",
    "version": "2.9.0",
    "release": "ga",
    "description": "Collect logs from Cisco Duo with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_duo/cisco_duo-2.9.0.zip",
    "path": "/package/cisco_duo/2.9.0",
    "icons": [
      {
        "src": "/img/cisco_duo-logo.svg",
        "path": "/package/cisco_duo/2.9.0/img/cisco_duo-logo.svg",
        "title": "Cisco Duo logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_duo",
        "title": "Cisco Duo logs",
        "description": "Collect Cisco Duo logs",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/cisco_duo/cisco_duo-2.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_duo.activity",
        "title": "Cisco Duo activity logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.admin",
        "title": "Cisco Duo administrator logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.auth",
        "title": "Cisco Duo authentication logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.offline_enrollment",
        "title": "Cisco Duo offline enrollment logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.summary",
        "title": "Cisco Duo summary logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.telephony",
        "title": "Cisco Duo telephony logs (legacy)"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.telephony_v2",
        "title": "Cisco Duo telephony logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.trust_monitor",
        "title": "Cisco Duo trust monitor logs"
      }
    ]
  },
  {
    "name": "cisco_ftd",
    "title": "Cisco FTD",
    "version": "3.13.3",
    "release": "ga",
    "description": "Collect logs from Cisco FTD with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_ftd/cisco_ftd-3.13.3.zip",
    "path": "/package/cisco_ftd/3.13.3",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_ftd/3.13.3/img/cisco.svg",
        "title": "cisco",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_ftd",
        "title": "Cisco FTD logs",
        "description": "Collect logs from Cisco FTD instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "firewall_security"
    ],
    "signature_path": "/epr/cisco_ftd/cisco_ftd-3.13.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_ftd.log",
        "title": "Cisco FTD logs"
      }
    ]
  },
  {
    "name": "cisco_ios",
    "title": "Cisco IOS",
    "version": "1.35.2",
    "release": "ga",
    "description": "Collect logs from Cisco IOS with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_ios/cisco_ios-1.35.2.zip",
    "path": "/package/cisco_ios/1.35.2",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_ios/1.35.2/img/cisco.svg",
        "title": "cisco",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_ios",
        "title": "Cisco IOS logs",
        "description": "Collect logs from Cisco IOS instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/cisco_ios/cisco_ios-1.35.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_ios.log",
        "title": "Cisco IOS logs"
      }
    ]
  },
  {
    "name": "cisco_ise",
    "title": "Cisco ISE",
    "version": "1.32.3",
    "release": "ga",
    "description": "Collect logs from Cisco ISE with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_ise/cisco_ise-1.32.3.zip",
    "path": "/package/cisco_ise/1.32.3",
    "icons": [
      {
        "src": "/img/cisco-ise-logo.svg",
        "path": "/package/cisco_ise/1.32.3/img/cisco-ise-logo.svg",
        "title": "Cisco ISE logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Cisco ISE",
        "title": "Cisco_ISE logs",
        "description": "Collect Cisco ISE logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "iam"
    ],
    "signature_path": "/epr/cisco_ise/cisco_ise-1.32.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_ise.log",
        "title": "Cisco ISE logs"
      }
    ]
  },
  {
    "name": "cisco_meraki",
    "title": "Cisco Meraki",
    "version": "1.31.1",
    "release": "ga",
    "description": "Collect logs from Cisco Meraki with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_meraki/cisco_meraki-1.31.1.zip",
    "path": "/package/cisco_meraki/1.31.1",
    "icons": [
      {
        "src": "/img/cisco-logo.svg",
        "path": "/package/cisco_meraki/1.31.1/img/cisco-logo.svg",
        "title": "Cisco logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_meraki",
        "title": "Cisco Meraki logs or events",
        "description": "Collect logs or events from Cisco Meraki"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security",
      "cloud"
    ],
    "signature_path": "/epr/cisco_meraki/cisco_meraki-1.31.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_meraki.events",
        "title": "Cisco Meraki webhook events"
      },
      {
        "type": "logs",
        "dataset": "cisco_meraki.log",
        "title": "Cisco Meraki logs (via Syslog)"
      }
    ]
  },
  {
    "name": "cisco_meraki_metrics",
    "title": "Cisco Meraki Metrics",
    "version": "0.4.3",
    "release": "beta",
    "description": "Collect metrics from Cisco Meraki with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_meraki_metrics/cisco_meraki_metrics-0.4.3.zip",
    "path": "/package/cisco_meraki_metrics/0.4.3",
    "icons": [
      {
        "src": "/img/cisco-logo.svg",
        "path": "/package/cisco_meraki_metrics/0.4.3/img/cisco-logo.svg",
        "title": "Cisco Meraki logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_meraki_metrics",
        "title": "Cisco Meraki metrics",
        "description": "Collects metrics from Cisco Meraki with Elastic Agent"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.2 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "network",
      "observability",
      "security"
    ],
    "signature_path": "/epr/cisco_meraki_metrics/cisco_meraki_metrics-0.4.3.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "cisco_meraki_metrics.device_health",
        "title": "Cisco Meraki Device Health Metrics"
      }
    ]
  },
  {
    "name": "cisco_nexus",
    "title": "Cisco Nexus",
    "version": "1.6.0",
    "release": "ga",
    "description": "Collect logs from Cisco Nexus with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_nexus/cisco_nexus-1.6.0.zip",
    "path": "/package/cisco_nexus/1.6.0",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_nexus/1.6.0/img/cisco.svg",
        "title": "cisco",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_nexus",
        "title": "Cisco Nexus logs",
        "description": "Collect logs from Cisco Nexus instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/cisco_nexus/cisco_nexus-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_nexus.log",
        "title": "Collect logs from Cisco Nexus"
      }
    ]
  },
  {
    "name": "cisco_secure_email_gateway",
    "title": "Cisco Secure Email Gateway",
    "version": "1.29.0",
    "release": "ga",
    "description": "Collect logs from Cisco Secure Email Gateway with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_secure_email_gateway/cisco_secure_email_gateway-1.29.0.zip",
    "path": "/package/cisco_secure_email_gateway/1.29.0",
    "icons": [
      {
        "src": "/img/cisco-logo.svg",
        "path": "/package/cisco_secure_email_gateway/1.29.0/img/cisco-logo.svg",
        "title": "Cisco logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Cisco Secure Email Gateway",
        "title": "Cisco Secure Email Gateway logs",
        "description": "Collect Cisco Secure Email Gateway logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "email_security"
    ],
    "signature_path": "/epr/cisco_secure_email_gateway/cisco_secure_email_gateway-1.29.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_secure_email_gateway.log",
        "title": "Cisco Secure Email Gateway logs"
      }
    ]
  },
  {
    "name": "cisco_secure_endpoint",
    "title": "Cisco Secure Endpoint",
    "version": "2.33.1",
    "release": "ga",
    "description": "Collect logs from Cisco Secure Endpoint (AMP) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_secure_endpoint/cisco_secure_endpoint-2.33.1.zip",
    "path": "/package/cisco_secure_endpoint/2.33.1",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_secure_endpoint/2.33.1/img/cisco.svg",
        "title": "cisco",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_secure_endpoint",
        "title": "Cisco Secure Endpoint logs",
        "description": "Collect logs from Cisco Secure Endpoint"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/cisco_secure_endpoint/cisco_secure_endpoint-2.33.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_secure_endpoint.event",
        "title": "Cisco Secure Endpoint logs"
      }
    ]
  },
  {
    "name": "cisco_umbrella",
    "title": "Cisco Umbrella",
    "version": "1.33.1",
    "release": "ga",
    "description": "Collect logs from Cisco Umbrella with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_umbrella/cisco_umbrella-1.33.1.zip",
    "path": "/package/cisco_umbrella/1.33.1",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_umbrella/1.33.1/img/cisco.svg",
        "title": "cisco",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_umbrella",
        "title": "Cisco Umbrella logs",
        "description": "Collect logs from Cisco Umbrella instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security",
      "dns_security"
    ],
    "signature_path": "/epr/cisco_umbrella/cisco_umbrella-1.33.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_umbrella.log",
        "title": "Cisco Umbrella logs"
      }
    ]
  },
  {
    "name": "citrix_adc",
    "title": "Citrix ADC",
    "version": "1.18.4",
    "release": "ga",
    "description": "This Elastic integration collects logs and metrics from Citrix ADC product.",
    "type": "integration",
    "download": "/epr/citrix_adc/citrix_adc-1.18.4.zip",
    "path": "/package/citrix_adc/1.18.4",
    "icons": [
      {
        "src": "/img/citrix_adc-logo.svg",
        "path": "/package/citrix_adc/1.18.4/img/citrix_adc-logo.svg",
        "title": "Citrix ADC logo",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Citrix ADC",
        "title": "Citrix ADC metrics",
        "description": "Collect Citrix ADC metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "network"
    ],
    "signature_path": "/epr/citrix_adc/citrix_adc-1.18.4.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "citrix_adc.interface",
        "title": "Interface metrics"
      },
      {
        "type": "logs",
        "dataset": "citrix_adc.lbvserver",
        "title": "Load Balancing Virtual Server metrics"
      },
      {
        "type": "logs",
        "dataset": "citrix_adc.log",
        "title": "Citrix ADC logs"
      },
      {
        "type": "logs",
        "dataset": "citrix_adc.service",
        "title": "Citrix ADC Service metrics"
      },
      {
        "type": "logs",
        "dataset": "citrix_adc.system",
        "title": "System metrics"
      },
      {
        "type": "logs",
        "dataset": "citrix_adc.vpn",
        "title": "VPN metrics"
      }
    ]
  },
  {
    "name": "citrix_waf",
    "title": "Citrix Web App Firewall",
    "version": "1.20.0",
    "release": "ga",
    "description": "Ingest events from Citrix Systems Web App Firewall.",
    "type": "integration",
    "download": "/epr/citrix_waf/citrix_waf-1.20.0.zip",
    "path": "/package/citrix_waf/1.20.0",
    "icons": [
      {
        "src": "/img/Citrix_Systems_logo.svg",
        "path": "/package/citrix_waf/1.20.0/img/Citrix_Systems_logo.svg",
        "title": "Citrix Systems",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "citrix_waf",
        "title": "Citrix Web App Firewall logs",
        "description": "Collect logs from Citrix Web App Firewall instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "web_application_firewall"
    ],
    "signature_path": "/epr/citrix_waf/citrix_waf-1.20.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "citrix_waf.log",
        "title": "Citrix WAF logs"
      }
    ]
  },
  {
    "name": "claroty_ctd",
    "title": "Claroty CTD",
    "version": "1.2.0",
    "release": "ga",
    "description": "Collect logs from Claroty CTD using Elastic Agent.",
    "type": "integration",
    "download": "/epr/claroty_ctd/claroty_ctd-1.2.0.zip",
    "path": "/package/claroty_ctd/1.2.0",
    "icons": [
      {
        "src": "/img/claroty-ctd-logo.svg",
        "path": "/package/claroty_ctd/1.2.0/img/claroty-ctd-logo.svg",
        "title": "Claroty CTD logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "claroty_ctd",
        "title": "claroty CTD  logs",
        "description": "Collect sample logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/claroty_ctd/claroty_ctd-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "claroty_ctd.asset",
        "title": "Asset logs"
      },
      {
        "type": "logs",
        "dataset": "claroty_ctd.baseline",
        "title": "Baseline logs"
      },
      {
        "type": "logs",
        "dataset": "claroty_ctd.event",
        "title": "Event logs"
      }
    ]
  },
  {
    "name": "claroty_xdome",
    "title": "Claroty xDome",
    "version": "1.0.2",
    "release": "ga",
    "description": "Collect logs from Claroty xDome with Elastic Agent.",
    "type": "integration",
    "download": "/epr/claroty_xdome/claroty_xdome-1.0.2.zip",
    "path": "/package/claroty_xdome/1.0.2",
    "icons": [
      {
        "src": "/img/claroty-xdome-logo.svg",
        "path": "/package/claroty_xdome/1.0.2/img/claroty-xdome-logo.svg",
        "title": "Claroty xDome",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "claroty_xdome",
        "title": "Claroty xDome",
        "description": "Collect logs from Claroty xDome.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management"
    ],
    "signature_path": "/epr/claroty_xdome/claroty_xdome-1.0.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "claroty_xdome.alert",
        "title": "Collect Alert logs from Claroty xDome"
      },
      {
        "type": "logs",
        "dataset": "claroty_xdome.event",
        "title": "Collect Event logs from Claroty xDome"
      },
      {
        "type": "logs",
        "dataset": "claroty_xdome.vulnerability",
        "title": "Collect Vulnerability logs from Claroty xDome"
      }
    ]
  },
  {
    "name": "cloud_asset_inventory",
    "title": "Cloud Asset Discovery",
    "version": "1.5.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Discover and Create Cloud Assets Discovery",
    "type": "integration",
    "download": "/epr/cloud_asset_inventory/cloud_asset_inventory-1.5.0.zip",
    "path": "/package/cloud_asset_inventory/1.5.0",
    "icons": [
      {
        "src": "/img/logo_cloud_security_posture.svg",
        "path": "/package/cloud_asset_inventory/1.5.0/img/logo_cloud_security_posture.svg",
        "title": "Cloud Security Posture logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "asset_inventory",
        "title": "Cloud Asset Discovery",
        "description": "Discover assets in your Cloud Environment and store within Elastic Search",
        "icons": [
          {
            "src": "/img/logo_cloud_security_posture.svg",
            "path": "/package/cloud_asset_inventory/1.5.0/img/logo_cloud_security_posture.svg",
            "title": "CSPM logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloud"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true,
            "is_default": true
          }
        },
        "data_streams": [
          "asset_inventory"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": ">=9.4.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/cloud-services"
    },
    "categories": [
      "security",
      "asset_inventory",
      "cloudsecurity_cdr",
      "cloud"
    ],
    "signature_path": "/epr/cloud_asset_inventory/cloud_asset_inventory-1.5.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cloud_asset_inventory.asset_inventory",
        "title": "Cloud Assets Discovery"
      }
    ]
  },
  {
    "name": "cloudflare",
    "title": "Cloudflare",
    "version": "2.33.0",
    "release": "ga",
    "description": "Collect logs from Cloudflare with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cloudflare/cloudflare-2.33.0.zip",
    "path": "/package/cloudflare/2.33.0",
    "icons": [
      {
        "src": "/img/cf-logo-v.svg",
        "path": "/package/cloudflare/2.33.0/img/cf-logo-v.svg",
        "title": "Cloudflare",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cloudflare",
        "title": "Cloudflare logs",
        "description": "Collect logs from Cloudflare",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "cdn_security"
    ],
    "signature_path": "/epr/cloudflare/cloudflare-2.33.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cloudflare.audit",
        "title": "Cloudflare Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "cloudflare.logpull",
        "title": "Cloudflare Logpull"
      }
    ]
  },
  {
    "name": "cloudflare_logpush",
    "title": "Cloudflare Logpush",
    "version": "1.43.5",
    "release": "ga",
    "description": "Collect and parse logs from Cloudflare API with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cloudflare_logpush/cloudflare_logpush-1.43.5.zip",
    "path": "/package/cloudflare_logpush/1.43.5",
    "icons": [
      {
        "src": "/img/cloudflare-logo.svg",
        "path": "/package/cloudflare_logpush/1.43.5/img/cloudflare-logo.svg",
        "title": "Cloudflare Logpush logo",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cloudflare",
        "title": "Cloudflare Logpush logs",
        "description": "Collect logs from Cloudflare."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.1 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "cdn_security"
    ],
    "signature_path": "/epr/cloudflare_logpush/cloudflare_logpush-1.43.5.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.access_request",
        "title": "Collect Access Request logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.audit",
        "title": "Collect Audit logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.casb",
        "title": "Collect CASB Findings logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.device_posture",
        "title": "Collect Device Posture Results logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.dlp_forensic_copies",
        "title": "Collect DLP Forensic Copies logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.dns",
        "title": "Collect DNS logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.dns_firewall",
        "title": "Collect DNS Firewall logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.email_security_alerts",
        "title": "Collect Email Security Alert logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.firewall_event",
        "title": "Collect Firewall Event logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.gateway_dns",
        "title": "Collect Gateway DNS logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.gateway_http",
        "title": "Collect Gateway HTTP logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.gateway_network",
        "title": "Collect Gateway Network logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.http_request",
        "title": "Collect HTTP Request logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.magic_ids",
        "title": "Collect Magic IDS logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.nel_report",
        "title": "Collect NEL Report logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.network_analytics",
        "title": "Collect Network Analytics logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.network_session",
        "title": "Collect Zero Trust Network Session logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.page_shield_events",
        "title": "Collect Page Shield Event logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.sinkhole_http",
        "title": "Collect Sinkhole HTTP logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.spectrum_event",
        "title": "Collect Spectrum Event logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.workers_trace",
        "title": "Collect Workers Trace Event logs from Cloudflare"
      }
    ]
  },
  {
    "name": "cockroachdb",
    "title": "CockroachDB Metrics",
    "version": "1.13.1",
    "release": "ga",
    "description": "Collect metrics from CockroachDB servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cockroachdb/cockroachdb-1.13.1.zip",
    "path": "/package/cockroachdb/1.13.1",
    "icons": [
      {
        "src": "/img/cockroachdb.png",
        "path": "/package/cockroachdb/1.13.1/img/cockroachdb.png",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "status",
        "title": "CockroachDB",
        "description": "CockroachDB metrics Integration",
        "icons": [
          {
            "src": "/img/cockroachdb.png",
            "path": "/package/cockroachdb/1.13.1/img/cockroachdb.png",
            "title": "logo cockroachdb",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "status"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore"
    ],
    "signature_path": "/epr/cockroachdb/cockroachdb-1.13.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "cockroachdb.status",
        "title": "Status"
      }
    ]
  },
  {
    "name": "cockroachdb_otel",
    "title": "CockroachDB OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "CockroachDB Assets from OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/cockroachdb_otel/cockroachdb_otel-0.1.0.zip",
    "path": "/package/cockroachdb_otel/0.1.0",
    "icons": [
      {
        "src": "/img/cockroachdb_otel.svg",
        "path": "/package/cockroachdb_otel/0.1.0/img/cockroachdb_otel.svg",
        "title": "CockroachDB OTel",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "opentelemetry"
    ],
    "signature_path": "/epr/cockroachdb_otel/cockroachdb_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "cockroachdb.otel"
        }
      ]
    }
  },
  {
    "name": "ti_cif3",
    "title": "Collective Intelligence Framework v3",
    "version": "1.18.2",
    "release": "ga",
    "description": "Ingest threat indicators from a Collective Intelligence Framework v3 instance with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_cif3/ti_cif3-1.18.2.zip",
    "path": "/package/ti_cif3/1.18.2",
    "icons": [
      {
        "src": "/img/csg_logo_big.svg",
        "path": "/package/ti_cif3/1.18.2/img/csg_logo_big.svg",
        "title": "csirtgadgets logo",
        "size": "1047x748",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_cif3",
        "title": "Collective Intelligence Framework v3",
        "description": "Ingest threat indicators from a Collective Intelligence Framework v3 instance with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_cif3/ti_cif3-1.18.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_cif3.feed",
        "title": "CIFv3 Feed"
      }
    ]
  },
  {
    "name": "cef",
    "title": "Common Event Format (CEF)",
    "version": "2.23.1",
    "release": "ga",
    "description": "Collect logs from CEF Logs with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cef/cef-2.23.1.zip",
    "path": "/package/cef/2.23.1",
    "policy_templates": [
      {
        "name": "cef",
        "title": "CEF logs",
        "description": "Collect logs from CEF instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.1 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "custom",
      "network_security"
    ],
    "signature_path": "/epr/cef/cef-2.23.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cef.log",
        "title": "CEF log logs"
      }
    ]
  },
  {
    "name": "containerd",
    "title": "Containerd",
    "version": "0.6.0",
    "release": "beta",
    "description": "Collect metrics from containerd containers.",
    "type": "integration",
    "download": "/epr/containerd/containerd-0.6.0.zip",
    "path": "/package/containerd/0.6.0",
    "icons": [
      {
        "src": "/img/containerd-logo.svg",
        "path": "/package/containerd/0.6.0/img/containerd-logo.svg",
        "title": "logo containerd",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "containerd",
        "title": "Containerd Metrics",
        "description": "Collect metrics from Containerd API with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "observability",
      "containers"
    ],
    "signature_path": "/epr/containerd/containerd-0.6.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "containerd.blkio",
        "title": "Containerd blkio metrics"
      },
      {
        "type": "metrics",
        "dataset": "containerd.cpu",
        "title": "Containerd cpu metrics"
      },
      {
        "type": "metrics",
        "dataset": "containerd.memory",
        "title": "Containerd memory metrics"
      }
    ]
  },
  {
    "name": "coredns",
    "title": "CoreDNS",
    "version": "0.10.0",
    "release": "beta",
    "description": "Collect logs from CoreDNS instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/coredns/coredns-0.10.0.zip",
    "path": "/package/coredns/0.10.0",
    "icons": [
      {
        "src": "/img/coredns-logo.svg",
        "path": "/package/coredns/0.10.0/img/coredns-logo.svg",
        "title": "CoreDNS logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "coredns",
        "title": "CoreDNS",
        "description": "Collect logs from CoreDNS instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/coredns/coredns-0.10.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "coredns.log",
        "title": "CoreDNS logs"
      }
    ]
  },
  {
    "name": "corelight",
    "title": "Corelight",
    "version": "1.1.0",
    "release": "ga",
    "description": "Collect logs from Corelight with Elastic Agent.",
    "type": "integration",
    "download": "/epr/corelight/corelight-1.1.0.zip",
    "path": "/package/corelight/1.1.0",
    "icons": [
      {
        "src": "/img/corelight-logo.svg",
        "path": "/package/corelight/1.1.0/img/corelight-logo.svg",
        "title": "Corelight logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "dns_security",
      "network",
      "network_security",
      "vpn_security"
    ],
    "signature_path": "/epr/corelight/corelight-1.1.0.zip.sig"
  },
  {
    "name": "couchdb",
    "title": "CouchDB",
    "version": "1.5.1",
    "release": "ga",
    "description": "Collect metrics from CouchDB with Elastic Agent.",
    "type": "integration",
    "download": "/epr/couchdb/couchdb-1.5.1.zip",
    "path": "/package/couchdb/1.5.1",
    "icons": [
      {
        "src": "/img/couchdb.svg",
        "path": "/package/couchdb/1.5.1/img/couchdb.svg",
        "title": "CouchDB",
        "size": "289x293",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "couchdb",
        "title": "CouchDB metrics",
        "description": "Collect CouchDB metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/couchdb/couchdb-1.5.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "couchdb.server",
        "title": "Server"
      }
    ]
  },
  {
    "name": "couchdb_otel",
    "title": "CouchDB OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "CouchDB Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/couchdb_otel/couchdb_otel-0.1.0.zip",
    "path": "/package/couchdb_otel/0.1.0",
    "icons": [
      {
        "src": "/img/couchdb_otel.svg",
        "path": "/package/couchdb_otel/0.1.0/img/couchdb_otel.svg",
        "title": "Couchdb logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "opentelemetry"
    ],
    "signature_path": "/epr/couchdb_otel/couchdb_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "couchdbreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "couchbase",
    "title": "Couchbase",
    "version": "1.9.1",
    "release": "ga",
    "description": "Collect metrics from Couchbase databases with Elastic Agent.",
    "type": "integration",
    "download": "/epr/couchbase/couchbase-1.9.1.zip",
    "path": "/package/couchbase/1.9.1",
    "icons": [
      {
        "src": "/img/couchbase-logo.svg",
        "path": "/package/couchbase/1.9.1/img/couchbase-logo.svg",
        "title": "Couchbase logo",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "couchbase",
        "title": "Couchbase metrics",
        "description": "Collect Couchbase metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/couchbase/couchbase-1.9.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "couchbase.bucket",
        "title": "Couchbase bucket metrics"
      },
      {
        "type": "metrics",
        "dataset": "couchbase.cache",
        "title": "Couchbase Sync Gateway Cache metrics."
      },
      {
        "type": "metrics",
        "dataset": "couchbase.cbl_replication",
        "title": "Couchbase Sync Gateway CBL Replications metrics"
      },
      {
        "type": "metrics",
        "dataset": "couchbase.cluster",
        "title": "Couchbase cluster metrics"
      },
      {
        "type": "metrics",
        "dataset": "couchbase.database_stats",
        "title": "Couchbase Sync Gateway Database Stats metrics."
      },
      {
        "type": "metrics",
        "dataset": "couchbase.miscellaneous",
        "title": "Couchbase Sync Gateway Delta Sync, Import, Security and GSI views metrics."
      },
      {
        "type": "logs",
        "dataset": "couchbase.node",
        "title": "Node metrics"
      },
      {
        "type": "metrics",
        "dataset": "couchbase.query_index",
        "title": "Query Index metrics"
      },
      {
        "type": "metrics",
        "dataset": "couchbase.resource",
        "title": "Couchbase Sync Gateway Resource Utilization metrics."
      },
      {
        "type": "metrics",
        "dataset": "couchbase.xdcr",
        "title": "Couchbase XDCR Metrics"
      }
    ]
  },
  {
    "name": "cribl",
    "title": "Cribl",
    "version": "1.1.1",
    "release": "ga",
    "description": "Stream logs from Cribl into Elastic.",
    "type": "integration",
    "download": "/epr/cribl/cribl-1.1.1.zip",
    "path": "/package/cribl/1.1.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/cribl/1.1.1/img/logo.svg",
        "title": "Cribl logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom"
    ],
    "signature_path": "/epr/cribl/cribl-1.1.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cribl",
        "title": "Logs"
      },
      {
        "type": "metrics",
        "dataset": "cribl",
        "title": "Metrics"
      }
    ]
  },
  {
    "name": "crowdstrike",
    "title": "CrowdStrike",
    "version": "3.15.0",
    "release": "ga",
    "description": "Collect logs from Crowdstrike with Elastic Agent.",
    "type": "integration",
    "download": "/epr/crowdstrike/crowdstrike-3.15.0.zip",
    "path": "/package/crowdstrike/3.15.0",
    "icons": [
      {
        "src": "/img/logo-integrations-crowdstrike.svg",
        "path": "/package/crowdstrike/3.15.0/img/logo-integrations-crowdstrike.svg",
        "title": "CrowdStrike",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "crowdstrike",
        "title": "CrowdStrike",
        "description": "Collect events and data from CrowdStrike Falcon",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/crowdstrike/crowdstrike-3.15.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "crowdstrike.alert",
        "title": "Collect alerts from CrowdStrike."
      },
      {
        "type": "logs",
        "dataset": "crowdstrike.falcon",
        "title": "CrowdStrike Falcon events"
      },
      {
        "type": "logs",
        "dataset": "crowdstrike.fdr",
        "title": "Falcon Data Replicator"
      },
      {
        "type": "logs",
        "dataset": "crowdstrike.host",
        "title": "Collect host inventory from CrowdStrike."
      },
      {
        "type": "logs",
        "dataset": "crowdstrike.vulnerability",
        "title": "Collect vulnerability data from CrowdStrike."
      }
    ]
  },
  {
    "name": "ti_crowdstrike",
    "title": "CrowdStrike Falcon Intelligence",
    "version": "2.7.1",
    "release": "ga",
    "description": "Collect logs from CrowdStrike Falcon Intelligence with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_crowdstrike/ti_crowdstrike-2.7.1.zip",
    "path": "/package/ti_crowdstrike/2.7.1",
    "icons": [
      {
        "src": "/img/crowdstrike_falcon_intelligence-logo.svg",
        "path": "/package/ti_crowdstrike/2.7.1/img/crowdstrike_falcon_intelligence-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_crowdstrike",
        "title": "CrowdStrike Falcon Intelligence logs",
        "description": "Collect CrowdStrike Falcon Intelligence logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_crowdstrike/ti_crowdstrike-2.7.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_crowdstrike.intel",
        "title": "Collect Intel logs from CrowdStrike Falcon Intelligence."
      },
      {
        "type": "logs",
        "dataset": "ti_crowdstrike.ioc",
        "title": "Collect IOC logs from CrowdStrike Falcon Intelligence."
      }
    ]
  },
  {
    "name": "httpjson",
    "title": "Custom API",
    "version": "1.24.0",
    "release": "ga",
    "description": "Collect custom events from an API endpoint with Elastic agent",
    "type": "integration",
    "download": "/epr/httpjson/httpjson-1.24.0.zip",
    "path": "/package/httpjson/1.24.0",
    "policy_templates": [
      {
        "name": "generic",
        "title": "Custom API Input",
        "description": "Collect custom data from REST API's"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom"
    ],
    "signature_path": "/epr/httpjson/httpjson-1.24.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "httpjson.generic",
        "title": "Custom API Input"
      }
    ]
  },
  {
    "name": "cel",
    "title": "Custom API using Common Expression Language",
    "version": "1.19.0",
    "release": "ga",
    "description": "Collect custom events from an API with Elastic agent",
    "type": "input",
    "download": "/epr/cel/cel-1.19.0.zip",
    "path": "/package/cel/1.19.0",
    "policy_templates": [
      {
        "name": "cel",
        "title": "CEL Custom API Input",
        "description": "Collect custom data from HTTP and file-system APIs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom"
    ],
    "signature_path": "/epr/cel/cel-1.19.0.zip.sig"
  },
  {
    "name": "aws_logs",
    "title": "Custom AWS Logs",
    "version": "1.8.3",
    "release": "ga",
    "description": "Collect raw logs from AWS S3 or CloudWatch with Elastic Agent.",
    "type": "integration",
    "download": "/epr/aws_logs/aws_logs-1.8.3.zip",
    "path": "/package/aws_logs/1.8.3",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/aws_logs/1.8.3/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "aws_logs",
        "title": "Custom AWS Logs",
        "description": "Collect raw logs from AWS S3 or CloudWatch with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "cloud",
      "observability",
      "custom",
      "aws"
    ],
    "signature_path": "/epr/aws_logs/aws_logs-1.8.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "aws_logs.generic",
        "title": "Custom logs from AWS"
      }
    ]
  },
  {
    "name": "azure_blob_storage",
    "title": "Custom Azure Blob Storage Input",
    "version": "2.3.0",
    "release": "ga",
    "description": "Collect log data from configured Azure Blob Storage Container with Elastic Agent.",
    "type": "input",
    "download": "/epr/azure_blob_storage/azure_blob_storage-2.3.0.zip",
    "path": "/package/azure_blob_storage/2.3.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/azure_blob_storage/2.3.0/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure-blob-storage",
        "title": "Custom Azure Blob Storage Input",
        "description": "Collect log data from configured Azure Blob Storage Container with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "azure",
      "observability",
      "cloud",
      "custom"
    ],
    "signature_path": "/epr/azure_blob_storage/azure_blob_storage-2.3.0.zip.sig"
  },
  {
    "name": "azure_logs",
    "title": "Custom Azure Logs",
    "version": "0.6.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect log events from Azure Event Hubs with Elastic Agent",
    "type": "input",
    "download": "/epr/azure_logs/azure_logs-0.6.0.zip",
    "path": "/package/azure_logs/0.6.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/azure_logs/0.6.0/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure-logs",
        "title": "Collect Azure logs from Event Hub",
        "description": "Collect Azure logs from Event Hub using the azure-eventhub input."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "custom",
      "observability"
    ],
    "signature_path": "/epr/azure_logs/azure_logs-0.6.0.zip.sig"
  },
  {
    "name": "google_cloud_storage",
    "title": "Custom GCS (Google Cloud Storage) Input",
    "version": "2.2.0",
    "release": "ga",
    "description": "Collect JSON data from configured GCS Bucket with Elastic Agent.",
    "type": "input",
    "download": "/epr/google_cloud_storage/google_cloud_storage-2.2.0.zip",
    "path": "/package/google_cloud_storage/2.2.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/google_cloud_storage/2.2.0/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "gcs",
        "title": "Custom GCS (Google Cloud Storage) Input",
        "description": "Collect JSON data from configured GCS Bucket with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "cloud"
    ],
    "signature_path": "/epr/google_cloud_storage/google_cloud_storage-2.2.0.zip.sig"
  },
  {
    "name": "gcp_pubsub",
    "title": "Custom Google Pub/Sub Logs",
    "version": "2.2.1",
    "release": "ga",
    "description": "Collect Logs from Google Pub/Sub topics",
    "type": "input",
    "download": "/epr/gcp_pubsub/gcp_pubsub-2.2.1.zip",
    "path": "/package/gcp_pubsub/2.2.1",
    "icons": [
      {
        "src": "/img/logo_gcp.svg",
        "path": "/package/gcp_pubsub/2.2.1/img/logo_gcp.svg",
        "title": "logo gcp",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "gcp",
        "title": "Custom Google Pub/Sub Logs",
        "description": "Collect Logs from Google Pub/Sub topics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "observability",
      "google_cloud",
      "cloud",
      "custom"
    ],
    "signature_path": "/epr/gcp_pubsub/gcp_pubsub-2.2.1.zip.sig"
  },
  {
    "name": "http_endpoint",
    "title": "Custom HTTP Endpoint Logs",
    "version": "2.5.0",
    "release": "ga",
    "description": "Collect JSON data from listening HTTP port with Elastic Agent.",
    "type": "input",
    "download": "/epr/http_endpoint/http_endpoint-2.5.0.zip",
    "path": "/package/http_endpoint/2.5.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/http_endpoint/2.5.0/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "http_endpoint",
        "title": "Custom HTTP Endpoint Logs",
        "description": "Collect JSON data from listening HTTP port with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "observability"
    ],
    "signature_path": "/epr/http_endpoint/http_endpoint-2.5.0.zip.sig"
  },
  {
    "name": "journald",
    "title": "Custom Journald logs",
    "version": "1.2.1",
    "release": "ga",
    "description": "Collect logs from journald with Elastic Agent.",
    "type": "input",
    "download": "/epr/journald/journald-1.2.1.zip",
    "path": "/package/journald/1.2.1",
    "icons": [
      {
        "src": "/img/systemd-logo.svg",
        "path": "/package/journald/1.2.1/img/systemd-logo.svg",
        "title": "systemd logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Journald logs",
        "description": "Collect journald logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "observability",
      "custom"
    ],
    "signature_path": "/epr/journald/journald-1.2.1.zip.sig"
  },
  {
    "name": "kafka_log",
    "title": "Custom Kafka Logs",
    "version": "1.9.1",
    "release": "ga",
    "description": "Collect data from kafka topic with Elastic Agent.",
    "type": "integration",
    "download": "/epr/kafka_log/kafka_log-1.9.1.zip",
    "path": "/package/kafka_log/1.9.1",
    "icons": [
      {
        "src": "/img/logo_kafka.svg",
        "path": "/package/kafka_log/1.9.1/img/logo_kafka.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kafka_log",
        "title": "Custom Kafka Logs",
        "description": "Collect data from kafka topic with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "custom"
    ],
    "signature_path": "/epr/kafka_log/kafka_log-1.9.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "kafka_log.generic",
        "title": "Custom Kafka Logs"
      }
    ]
  },
  {
    "name": "log",
    "title": "Custom Logs (Deprecated)",
    "version": "2.4.4",
    "release": "ga",
    "description": "Collect custom logs with Elastic Agent.",
    "type": "input",
    "download": "/epr/log/log-2.4.4.zip",
    "path": "/package/log/2.4.4",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/log/2.4.4/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Custom log file",
        "description": "Collect your custom log files."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0|| ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "custom",
      "custom_logs"
    ],
    "signature_path": "/epr/log/log-2.4.4.zip.sig"
  },
  {
    "name": "filestream",
    "title": "Custom Logs (Filestream)",
    "version": "2.4.0",
    "release": "ga",
    "description": "Collect log data using filestream with Elastic Agent.",
    "type": "input",
    "download": "/epr/filestream/filestream-2.4.0.zip",
    "path": "/package/filestream/2.4.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/filestream/2.4.0/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "filestream",
        "title": "Custom Filestream Logs",
        "description": "Collect log data from filestream with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "custom",
      "custom_logs"
    ],
    "signature_path": "/epr/filestream/filestream-2.4.0.zip.sig"
  },
  {
    "name": "tcp",
    "title": "Custom TCP Logs",
    "version": "2.3.0",
    "release": "ga",
    "description": "Collect raw TCP data from listening TCP port with Elastic Agent.",
    "type": "input",
    "download": "/epr/tcp/tcp-2.3.0.zip",
    "path": "/package/tcp/2.3.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/tcp/2.3.0/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tcp",
        "title": "Custom TCP Logs",
        "description": "Collect raw TCP data from listening TCP port with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "custom",
      "custom_logs"
    ],
    "signature_path": "/epr/tcp/tcp-2.3.0.zip.sig"
  },
  {
    "name": "ti_custom",
    "title": "Custom Threat Intelligence",
    "version": "1.5.0",
    "release": "ga",
    "description": "Ingest threat intelligence data in STIX 2.1 format with Elastic Agent",
    "type": "integration",
    "download": "/epr/ti_custom/ti_custom-1.5.0.zip",
    "path": "/package/ti_custom/1.5.0",
    "icons": [
      {
        "src": "/img/stix-logo.png",
        "path": "/package/ti_custom/1.5.0/img/stix-logo.png",
        "title": "STIX-TAXII logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_custom",
        "title": "Custom Threat Intelligence",
        "description": "Collect threat intelligence IOCs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_custom/ti_custom-1.5.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_custom.indicator",
        "title": "STIX 2.1 indicators"
      }
    ]
  },
  {
    "name": "udp",
    "title": "Custom UDP Logs",
    "version": "2.5.0",
    "release": "ga",
    "description": "Collect raw UDP data from listening UDP port with Elastic Agent.",
    "type": "input",
    "download": "/epr/udp/udp-2.5.0.zip",
    "path": "/package/udp/2.5.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/udp/2.5.0/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "udp",
        "title": "Custom UDP Logs",
        "description": "Collect raw UDP data from listening UDP port with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "custom",
      "custom_logs",
      "network"
    ],
    "signature_path": "/epr/udp/udp-2.5.0.zip.sig"
  },
  {
    "name": "wmi",
    "title": "Custom WMI Input Package",
    "version": "0.0.2",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Custom WMI Input Package",
    "type": "input",
    "download": "/epr/wmi/wmi-0.0.2.zip",
    "path": "/package/wmi/0.0.2",
    "icons": [
      {
        "src": "/img/logo_windows.svg",
        "path": "/package/wmi/0.0.2/img/logo_windows.svg",
        "title": "Windows logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "wmi",
        "title": "Custom WMI Input",
        "description": "Collect the Windows metrics via WMI"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "custom"
    ],
    "signature_path": "/epr/wmi/wmi-0.0.2.zip.sig"
  },
  {
    "name": "websocket",
    "title": "Custom Websocket logs",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect custom events from a socket server with Elastic agent.",
    "type": "input",
    "download": "/epr/websocket/websocket-1.0.1.zip",
    "path": "/package/websocket/1.0.1",
    "policy_templates": [
      {
        "name": "websocket",
        "title": "Websocket Custom Socket Input",
        "description": "Collect custom data from websocket server."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.3 || ^8.17.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "network"
    ],
    "signature_path": "/epr/websocket/websocket-1.0.1.zip.sig"
  },
  {
    "name": "windows_etw",
    "title": "Custom Windows ETW logs",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collect and parse logs from any Windows ETW provider with Elastic Agent.",
    "type": "input",
    "download": "/epr/windows_etw/windows_etw-1.0.0.zip",
    "path": "/package/windows_etw/1.0.0",
    "icons": [
      {
        "src": "/img/logo_windows.svg",
        "path": "/package/windows_etw/1.0.0/img/logo_windows.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "etw",
        "title": "Custom Windows ETW logs",
        "description": "Collect custom Windows ETW logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "custom",
      "os_system"
    ],
    "signature_path": "/epr/windows_etw/windows_etw-1.0.0.zip.sig"
  },
  {
    "name": "winlog",
    "title": "Custom Windows Event Logs",
    "version": "2.5.0",
    "release": "ga",
    "description": "Collect and parse logs from any Windows event log channel with Elastic Agent.",
    "type": "input",
    "download": "/epr/winlog/winlog-2.5.0.zip",
    "path": "/package/winlog/2.5.0",
    "icons": [
      {
        "src": "/img/logo_windows.svg",
        "path": "/package/winlog/2.5.0/img/logo_windows.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "winlogs",
        "title": "Custom Windows event logs",
        "description": "Collect your custom Windows event logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "custom",
      "os_system",
      "security",
      "observability"
    ],
    "signature_path": "/epr/winlog/winlog-2.5.0.zip.sig"
  },
  {
    "name": "unifiedlogs",
    "title": "Custom macOS Unified Logs",
    "version": "0.5.1",
    "release": "beta",
    "description": "Collect and parse logs from macOS unified logs with Elastic Agent.",
    "type": "input",
    "download": "/epr/unifiedlogs/unifiedlogs-0.5.1.zip",
    "path": "/package/unifiedlogs/0.5.1",
    "icons": [
      {
        "src": "/img/logo_macos.svg",
        "path": "/package/unifiedlogs/0.5.1/img/logo_macos.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "unifiedlogs",
        "title": "Custom macOS unified logs",
        "description": "Collect your custom macOS logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "custom",
      "os_system",
      "observability",
      "security"
    ],
    "signature_path": "/epr/unifiedlogs/unifiedlogs-0.5.1.zip.sig"
  },
  {
    "name": "cyberark_epm",
    "title": "CyberArk EPM",
    "version": "1.3.3",
    "release": "ga",
    "description": "Collect logs from CyberArk EPM with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cyberark_epm/cyberark_epm-1.3.3.zip",
    "path": "/package/cyberark_epm/1.3.3",
    "icons": [
      {
        "src": "/img/cyberark-logo.svg",
        "path": "/package/cyberark_epm/1.3.3/img/cyberark-logo.svg",
        "title": "CyberArk logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cyberark_epm",
        "title": "CyberArk EPM logs",
        "description": "Collect CyberArk EPM logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/cyberark_epm/cyberark_epm-1.3.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cyberark_epm.admin_audit",
        "title": "Admin Audit Event"
      },
      {
        "type": "logs",
        "dataset": "cyberark_epm.aggregated_event",
        "title": "Aggregated Event"
      },
      {
        "type": "logs",
        "dataset": "cyberark_epm.policyaudit_aggregated_event",
        "title": "Policy Audit Aggregated Event"
      },
      {
        "type": "logs",
        "dataset": "cyberark_epm.policyaudit_raw_event",
        "title": "Policy Audit Raw Event"
      },
      {
        "type": "logs",
        "dataset": "cyberark_epm.raw_event",
        "title": "Raw Event"
      }
    ]
  },
  {
    "name": "cyberarkpas",
    "title": "CyberArk Privileged Access Security",
    "version": "2.28.0",
    "release": "ga",
    "description": "Collect logs from CyberArk Privileged Access Security with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cyberarkpas/cyberarkpas-2.28.0.zip",
    "path": "/package/cyberarkpas/2.28.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/cyberarkpas/2.28.0/img/logo.svg",
        "title": "CyberArk logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cyberarkpas",
        "title": "CyberArk Privileged Access Security audit logs",
        "description": "Collect data from Vault instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/cyberarkpas/cyberarkpas-2.28.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cyberarkpas.audit",
        "title": "CyberArk PAS audit logs"
      },
      {
        "type": "logs",
        "dataset": "cyberarkpas.monitor",
        "title": "CyberArk PAS monitor Events"
      }
    ]
  },
  {
    "name": "cyberark_pta",
    "title": "Cyberark Privileged Threat Analytics",
    "version": "1.15.0",
    "release": "ga",
    "description": "Collect security logs from Cyberark PTA integration.",
    "type": "integration",
    "download": "/epr/cyberark_pta/cyberark_pta-1.15.0.zip",
    "path": "/package/cyberark_pta/1.15.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/cyberark_pta/1.15.0/img/logo.svg",
        "title": "CyberArk logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cyberark_pta",
        "title": "CyberArk Privileged Threat Analytics logs",
        "description": "Collect logs from syslog"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/cyberark_pta/cyberark_pta-1.15.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cyberark_pta.events",
        "title": "CyberArk PTA logs"
      }
    ]
  },
  {
    "name": "cybereason",
    "title": "Cybereason",
    "version": "1.5.0",
    "release": "ga",
    "description": "Collect logs from Cybereason with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cybereason/cybereason-1.5.0.zip",
    "path": "/package/cybereason/1.5.0",
    "icons": [
      {
        "src": "/img/cybereason-logo.svg",
        "path": "/package/cybereason/1.5.0/img/cybereason-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Cybereason",
        "title": "Cybereason logs",
        "description": "Collect Cybereason logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/cybereason/cybereason-1.5.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cybereason.logon_session",
        "title": "Collect Logon Session logs from Cybereason."
      },
      {
        "type": "logs",
        "dataset": "cybereason.malop_connection",
        "title": "Collect Malop Connection logs from Cybereason."
      },
      {
        "type": "logs",
        "dataset": "cybereason.malop_process",
        "title": "Collect Malop Process logs from Cybereason."
      },
      {
        "type": "logs",
        "dataset": "cybereason.malware",
        "title": "Collect Malware logs from Cybereason."
      },
      {
        "type": "logs",
        "dataset": "cybereason.poll_malop",
        "title": "Collect Poll Malop logs from Cybereason."
      },
      {
        "type": "logs",
        "dataset": "cybereason.suspicions_process",
        "title": "Collect Suspicions Process logs from Cybereason."
      }
    ]
  },
  {
    "name": "ti_cybersixgill",
    "title": "Cybersixgill",
    "version": "1.34.1",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from Cybersixgill with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_cybersixgill/ti_cybersixgill-1.34.1.zip",
    "path": "/package/ti_cybersixgill/1.34.1",
    "icons": [
      {
        "src": "/img/cybersixgill.svg",
        "path": "/package/ti_cybersixgill/1.34.1/img/cybersixgill.svg",
        "title": "Cybersixgill",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cybersixgill",
        "title": "Cybersixgill Threat Intel",
        "description": "Ingest threat intelligence indicators from Cybersixgill with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_cybersixgill/ti_cybersixgill-1.34.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_cybersixgill.threat",
        "title": "Cybersixgill Darkfeed Logs"
      }
    ]
  },
  {
    "name": "cyera",
    "title": "Cyera",
    "version": "0.6.0",
    "release": "beta",
    "description": "Collect logs from Cyera with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cyera/cyera-0.6.0.zip",
    "path": "/package/cyera/0.6.0",
    "icons": [
      {
        "src": "/img/cyera-logo.svg",
        "path": "/package/cyera/0.6.0/img/cyera-logo.svg",
        "title": "Cyera logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cyera",
        "title": "Cyera logs",
        "description": "Collect Cyera logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.7 || ^9.1.7 || ^9.2.1 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/cyera/cyera-0.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cyera.classification",
        "title": "Classification"
      },
      {
        "type": "logs",
        "dataset": "cyera.datastore",
        "title": "Datastore"
      },
      {
        "type": "logs",
        "dataset": "cyera.event",
        "title": "Event"
      },
      {
        "type": "logs",
        "dataset": "cyera.issue",
        "title": "Issue"
      }
    ]
  },
  {
    "name": "cylance",
    "title": "CylanceProtect Logs (Deprecated)",
    "version": "0.24.0",
    "release": "beta",
    "description": "Collect logs from CylanceProtect devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cylance/cylance-0.24.0.zip",
    "path": "/package/cylance/0.24.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/cylance/0.24.0/img/logo.svg",
        "title": "CylanceProtect logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "protect",
        "title": "CylanceProtect",
        "description": "Collect CylanceProtect logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/cylance/cylance-0.24.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cylance.protect",
        "title": "CylanceProtect logs"
      }
    ]
  },
  {
    "name": "ti_cyware_intel_exchange",
    "title": "Cyware Intel Exchange",
    "version": "0.2.0",
    "release": "beta",
    "description": "Collect logs from Cyware Intel Exchange with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_cyware_intel_exchange/ti_cyware_intel_exchange-0.2.0.zip",
    "path": "/package/ti_cyware_intel_exchange/0.2.0",
    "icons": [
      {
        "src": "/img/cyware_logo.svg",
        "path": "/package/ti_cyware_intel_exchange/0.2.0/img/cyware_logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_cyware_intel_exchange",
        "title": "Cyware Intel Exchange",
        "description": "Collect indicator logs from Cyware Intel Exchange.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_cyware_intel_exchange/ti_cyware_intel_exchange-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_cyware_intel_exchange.indicator",
        "title": "Collect Indicator logs from Cyware Intel Exchange"
      }
    ]
  },
  {
    "name": "darktrace",
    "title": "Darktrace",
    "version": "2.0.0",
    "release": "ga",
    "description": "Collect logs from Darktrace with Elastic Agent.",
    "type": "integration",
    "download": "/epr/darktrace/darktrace-2.0.0.zip",
    "path": "/package/darktrace/2.0.0",
    "icons": [
      {
        "src": "/img/darktrace-logo.svg",
        "path": "/package/darktrace/2.0.0/img/darktrace-logo.svg",
        "title": "Darktrace Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "darktrace",
        "title": "Darktrace logs",
        "description": "Collect logs from Darktrace."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network_security"
    ],
    "signature_path": "/epr/darktrace/darktrace-2.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "darktrace.ai_analyst_alert",
        "title": "Collect AI Analyst Alert logs from Darktrace"
      },
      {
        "type": "logs",
        "dataset": "darktrace.model_breach_alert",
        "title": "Collect Model Breach Alert logs from Darktrace"
      },
      {
        "type": "logs",
        "dataset": "darktrace.system_status_alert",
        "title": "Collect System Status Alert logs from Darktrace"
      }
    ]
  },
  {
    "name": "ded",
    "title": "Data Exfiltration Detection",
    "version": "2.4.2",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "ML package to detect data exfiltration in your network and file data.",
    "type": "integration",
    "download": "/epr/ded/ded-2.4.2.zip",
    "path": "/package/ded/2.4.2",
    "icons": [
      {
        "src": "/img/ded_Icon.svg",
        "path": "/package/ded/2.4.2/img/ded_Icon.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "platinum",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-applied-ml"
    },
    "categories": [
      "security",
      "network",
      "advanced_analytics_ueba"
    ],
    "signature_path": "/epr/ded/ded-2.4.2.zip.sig"
  },
  {
    "name": "dataminr_pulse",
    "title": "Dataminr Pulse",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect real-time alerts from Dataminr Pulse API",
    "type": "integration",
    "download": "/epr/dataminr_pulse/dataminr_pulse-0.1.0.zip",
    "path": "/package/dataminr_pulse/0.1.0",
    "icons": [
      {
        "src": "/img/Dataminr_Logo-Mark_Full-Color_RGB.svg",
        "path": "/package/dataminr_pulse/0.1.0/img/Dataminr_Logo-Mark_Full-Color_RGB.svg",
        "title": "Dataminr Pulse Logo",
        "size": "any",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "dataminr_pulse",
        "title": "Dataminr Pulse Alerts",
        "description": "Collect real-time alerts from Dataminr Pulse API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/dataminr_pulse/dataminr_pulse-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "dataminr_pulse.alerts",
        "title": "Dataminr Pulse Alerts"
      }
    ]
  },
  {
    "name": "cloud_defend",
    "title": "Defend for Containers (BETA)",
    "version": "1.4.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Elastic Defend for Containers (BETA) provides cloud-native runtime protections for containerized environments.",
    "type": "integration",
    "download": "/epr/cloud_defend/cloud_defend-1.4.0.zip",
    "path": "/package/cloud_defend/1.4.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/cloud_defend/1.4.0/img/logo.svg",
        "title": "Defend for containers logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cloud_defend",
        "title": "Defend for Containers",
        "description": "Collects cloud defend alerts and metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.3.0"
      },
      "elastic": {
        "subscription": "enterprise",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "containers",
      "kubernetes",
      "observability",
      "security"
    ],
    "signature_path": "/epr/cloud_defend/cloud_defend-1.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cloud_defend.alerts",
        "title": "alerts"
      },
      {
        "type": "logs",
        "dataset": "cloud_defend.file",
        "title": "File telemetry"
      },
      {
        "type": "metrics",
        "dataset": "cloud_defend.heartbeat",
        "title": "Cloud Defend Liveness Heartbeat"
      },
      {
        "type": "metrics",
        "dataset": "cloud_defend.metrics",
        "title": "Cloud defend metrics"
      },
      {
        "type": "logs",
        "dataset": "cloud_defend.process",
        "title": "Process telemetry"
      }
    ]
  },
  {
    "name": "digital_guardian",
    "title": "Digital Guardian",
    "version": "1.8.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Digital Guardian with Elastic Agent.",
    "type": "integration",
    "download": "/epr/digital_guardian/digital_guardian-1.8.0.zip",
    "path": "/package/digital_guardian/1.8.0",
    "icons": [
      {
        "src": "/img/digital-guardian-logo.svg",
        "path": "/package/digital_guardian/1.8.0/img/digital-guardian-logo.svg",
        "title": "Digital Guardian logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "digital_guardian",
        "title": "Digital Guardian logs",
        "description": "Collect Digital Guardian logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/digital_guardian/digital_guardian-1.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "digital_guardian.arc",
        "title": "Digital Guardian ARC Logs"
      }
    ]
  },
  {
    "name": "docker",
    "title": "Docker",
    "version": "2.15.1",
    "release": "ga",
    "description": "Collect metrics and logs from Docker instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/docker/docker-2.15.1.zip",
    "path": "/package/docker/2.15.1",
    "icons": [
      {
        "src": "/img/logo_docker.svg",
        "path": "/package/docker/2.15.1/img/logo_docker.svg",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "docker",
        "title": "Docker logs and metrics",
        "description": "Collect logs and metrics from Docker instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.2 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "observability",
      "containers"
    ],
    "signature_path": "/epr/docker/docker-2.15.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "docker.container",
        "title": "Docker container metrics"
      },
      {
        "type": "logs",
        "dataset": "docker.container_logs",
        "title": "Docker container logs"
      },
      {
        "type": "metrics",
        "dataset": "docker.cpu",
        "title": "Docker cpu metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.diskio",
        "title": "Docker diskio metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.event",
        "title": "Docker event metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.healthcheck",
        "title": "Docker healthcheck metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.image",
        "title": "Docker image metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.info",
        "title": "Docker info metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.memory",
        "title": "Docker memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.network",
        "title": "Docker network metrics"
      }
    ]
  },
  {
    "name": "docker_otel",
    "title": "Docker OpenTelemetry Assets",
    "version": "0.2.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Utilise the pre-built dashboard for OTel-native metrics of Docker hosts and their running containers",
    "type": "content",
    "download": "/epr/docker_otel/docker_otel-0.2.0.zip",
    "path": "/package/docker_otel/0.2.0",
    "icons": [
      {
        "src": "/img/docker_logo.svg",
        "path": "/package/docker_otel/0.2.0/img/docker_logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "containers",
      "monitoring",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/docker_otel/docker_otel-0.2.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "dockerstatsreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "docker_input_otel",
    "title": "Docker OpenTelemetry Input Package",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Docker container metrics using OpenTelemetry Collector",
    "type": "input",
    "download": "/epr/docker_input_otel/docker_input_otel-0.1.0.zip",
    "path": "/package/docker_input_otel/0.1.0",
    "icons": [
      {
        "src": "/img/docker_otel_logo.svg",
        "path": "/package/docker_input_otel/0.1.0/img/docker_otel_logo.svg",
        "title": "Docker OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "dockerstatsreceiver",
        "title": "Docker Stats",
        "description": "Collect Docker container performance metrics including CPU, memory, network, and block I/O"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "containers",
      "monitoring",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/docker_input_otel/docker_input_otel-0.1.0.zip.sig"
  },
  {
    "name": "dga",
    "title": "Domain Generation Algorithm Detection",
    "version": "2.3.7",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "ML solution package to detect domain generation algorithm (DGA) activity in your network data.",
    "type": "integration",
    "download": "/epr/dga/dga-2.3.7.zip",
    "path": "/package/dga/2.3.7",
    "icons": [
      {
        "src": "/img/icon-machine-learning.svg",
        "path": "/package/dga/2.3.7/img/icon-machine-learning.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "platinum"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-applied-ml"
    },
    "categories": [
      "security",
      "network_security",
      "advanced_analytics_ueba"
    ],
    "signature_path": "/epr/dga/dga-2.3.7.zip.sig"
  },
  {
    "name": "ti_domaintools",
    "title": "DomainTools Feeds",
    "version": "1.3.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "DomainTools Feeds provide data on the different stages of the domain lifecycle: from first-observed in the wild, to newly re-activated after a period of quiet.",
    "type": "integration",
    "download": "/epr/ti_domaintools/ti_domaintools-1.3.0.zip",
    "path": "/package/ti_domaintools/1.3.0",
    "icons": [
      {
        "src": "/img/logo.png",
        "path": "/package/ti_domaintools/1.3.0/img/logo.png",
        "title": "DomainTools logo",
        "size": "250x250",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "domaintools",
        "title": "DomainTools Feeds",
        "description": "The DomainTools Feed provides real-time access to newly registered and observed domains, enabling proactive threat detection and defense."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_domaintools/ti_domaintools-1.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_domaintools.domaindiscovery_feed",
        "title": "DomainTools Domain Discovery Feed"
      },
      {
        "type": "logs",
        "dataset": "ti_domaintools.domainhotlist_feed",
        "title": "DomainTools Domain Hotlist Feed"
      },
      {
        "type": "logs",
        "dataset": "ti_domaintools.domainrdap_feed",
        "title": "DomainTools Domain RDAP Feed"
      },
      {
        "type": "logs",
        "dataset": "ti_domaintools.domainrisk_feed",
        "title": "DomainTools Domain Risk Feed"
      },
      {
        "type": "logs",
        "dataset": "ti_domaintools.nad_feed",
        "title": "DomainTools Newly Active Domains Feed"
      },
      {
        "type": "logs",
        "dataset": "ti_domaintools.nod_feed",
        "title": "DomainTools Newly Observed Domains Feed"
      }
    ]
  },
  {
    "name": "eset_protect",
    "title": "ESET PROTECT",
    "version": "2.2.0",
    "release": "ga",
    "description": "Collect logs from ESET PROTECT with Elastic Agent.",
    "type": "integration",
    "download": "/epr/eset_protect/eset_protect-2.2.0.zip",
    "path": "/package/eset_protect/2.2.0",
    "icons": [
      {
        "src": "/img/eset-protect-logo.svg",
        "path": "/package/eset_protect/2.2.0/img/eset-protect-logo.svg",
        "title": "ESET PROTECT logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "eset_protect",
        "title": "ESET PROTECT logs",
        "description": "Collect logs from ESET PROTECT."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/eset_protect/eset_protect-2.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "eset_protect.detection",
        "title": "Collect Detection logs from ESET PROTECT"
      },
      {
        "type": "logs",
        "dataset": "eset_protect.device_task",
        "title": "Collect Device Task logs from ESET PROTECT"
      },
      {
        "type": "logs",
        "dataset": "eset_protect.event",
        "title": "Collect Event logs from ESET PROTECT"
      }
    ]
  },
  {
    "name": "ti_eset",
    "title": "ESET Threat Intelligence",
    "version": "1.9.0",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from ESET Threat Intelligence with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_eset/ti_eset-1.9.0.zip",
    "path": "/package/ti_eset/1.9.0",
    "icons": [
      {
        "src": "/img/eset-lozenge-color-rgb.svg",
        "path": "/package/ti_eset/1.9.0/img/eset-lozenge-color-rgb.svg",
        "title": "Sample logo",
        "size": "96x96",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "eset",
        "title": "ETI feeds (TAXII version 2)",
        "description": "Collect data from ETI feeds (TAXII version 2)"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_eset/ti_eset-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_eset.apt",
        "title": "APT"
      },
      {
        "type": "logs",
        "dataset": "ti_eset.botnet",
        "title": "Botnet"
      },
      {
        "type": "logs",
        "dataset": "ti_eset.cc",
        "title": "Botnet C&C"
      },
      {
        "type": "logs",
        "dataset": "ti_eset.domains",
        "title": "Domain"
      },
      {
        "type": "logs",
        "dataset": "ti_eset.files",
        "title": "Malicious files"
      },
      {
        "type": "logs",
        "dataset": "ti_eset.ip",
        "title": "IP"
      },
      {
        "type": "logs",
        "dataset": "ti_eset.url",
        "title": "URL"
      }
    ]
  },
  {
    "name": "ti_eclecticiq",
    "title": "EclecticIQ",
    "version": "1.5.0",
    "release": "ga",
    "description": "Ingest threat intelligence from EclecticIQ with Elastic Agent",
    "type": "integration",
    "download": "/epr/ti_eclecticiq/ti_eclecticiq-1.5.0.zip",
    "path": "/package/ti_eclecticiq/1.5.0",
    "icons": [
      {
        "src": "/img/logo_RGB.svg",
        "path": "/package/ti_eclecticiq/1.5.0/img/logo_RGB.svg",
        "title": "EIQ logo",
        "size": "133x43",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_eclecticiq",
        "title": "EclecticIQ",
        "description": "Collect data provided by EclecticIQ IC outgoing feeds."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_eclecticiq/ti_eclecticiq-1.5.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_eclecticiq.threat",
        "title": "Poll Outgoing feed"
      }
    ]
  },
  {
    "name": "apm",
    "title": "Elastic APM",
    "version": "8.4.2",
    "release": "ga",
    "description": "Monitor, detect, and diagnose complex application performance issues.",
    "type": "integration",
    "download": "/epr/apm/apm-8.4.2.zip",
    "path": "/package/apm/8.4.2",
    "icons": [
      {
        "src": "/img/logo_apm.svg",
        "path": "/package/apm/8.4.2/img/logo_apm.svg",
        "title": "APM Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "apmserver",
        "title": "Elastic APM Integration",
        "description": "Elastic APM Integration"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.4.0"
      }
    },
    "owner": {
      "github": "elastic/apm-server"
    },
    "categories": [
      "elastic_stack",
      "monitoring"
    ],
    "signature_path": "/epr/apm/apm-8.4.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "apm.app",
        "title": "APM application logs"
      },
      {
        "type": "metrics",
        "dataset": "apm.app",
        "title": "APM application metrics"
      },
      {
        "type": "logs",
        "dataset": "apm.error",
        "title": "APM errors"
      },
      {
        "type": "metrics",
        "dataset": "apm.internal",
        "title": "APM internal metrics"
      },
      {
        "type": "metrics",
        "dataset": "apm.profiling",
        "title": "APM profiles"
      },
      {
        "type": "traces",
        "dataset": "apm.rum",
        "title": "APM RUM traces"
      },
      {
        "type": "traces",
        "dataset": "apm.sampled",
        "title": "APM tail-sampled traces"
      },
      {
        "type": "traces",
        "dataset": "apm",
        "title": "APM traces"
      }
    ]
  },
  {
    "name": "elastic_agent",
    "title": "Elastic Agent",
    "version": "2.7.6",
    "release": "ga",
    "description": "Collect logs and metrics from Elastic Agents.",
    "type": "integration",
    "download": "/epr/elastic_agent/elastic_agent-2.7.6.zip",
    "path": "/package/elastic_agent/2.7.6",
    "icons": [
      {
        "src": "/img/logo_elastic_agent.svg",
        "path": "/package/elastic_agent/2.7.6/img/logo_elastic_agent.svg",
        "title": "logo Elastic Agent",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent"
    },
    "categories": [
      "elastic_stack"
    ],
    "signature_path": "/epr/elastic_agent/elastic_agent-2.7.6.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "elastic_agent.apm_server",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.apm_server",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.auditbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.auditbeat",
        "title": "Elastic Agent Auditbeat Metrics"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.cloud_defend",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.cloudbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.cloudbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.elastic_agent",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.endpoint_security",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.endpoint_security",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.filebeat_input",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.filebeat_input",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.filebeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.filebeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.fleet_server",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.fleet_server",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.heartbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.heartbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.metricbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.metricbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.osquerybeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.osquerybeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.packetbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.packetbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.pf_elastic_collector",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.pf_elastic_symbolizer",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.pf_host_agent",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.status_change",
        "title": "Elastic Agent Status Change"
      }
    ]
  },
  {
    "name": "ece",
    "title": "Elastic Cloud Enterprise",
    "version": "0.0.2",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "This is a helpful integration for all customers using ECE and need to track the events generated within the ECE admin UI or against the ECE API.",
    "type": "integration",
    "download": "/epr/ece/ece-0.0.2.zip",
    "path": "/package/ece/0.0.2",
    "icons": [
      {
        "src": "/img/ece_logo.svg",
        "path": "/package/ece/0.0.2/img/ece_logo.svg",
        "title": "logo ECE",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ece admin console log",
        "title": "ECE Adminconsole logs",
        "description": "Collect the ECE Adminconsole logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "enterprise"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/stack-monitoring"
    },
    "categories": [
      "elastic_stack"
    ],
    "signature_path": "/epr/ece/ece-0.0.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ece.adminconsole",
        "title": "ECE Adminconsole log"
      }
    ]
  },
  {
    "name": "elastic_connectors",
    "title": "Elastic Connectors",
    "version": "1.0.3",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Sync data from source to the Elasticsearch index.",
    "type": "integration",
    "download": "/epr/elastic_connectors/elastic_connectors-1.0.3.zip",
    "path": "/package/elastic_connectors/1.0.3",
    "icons": [
      {
        "src": "/img/connectors-logo.svg",
        "path": "/package/elastic_connectors/1.0.3/img/connectors-logo.svg",
        "title": "Connectors Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates_behavior": "individual_policies",
    "policy_templates": [
      {
        "name": "github",
        "title": "GitHub & GitHub Enterprise Server Connector",
        "description": "Use a connector to sync data from your GitHub data source.",
        "icons": [
          {
            "src": "/img/service_type/github.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/github.svg",
            "title": "GitHub logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "google_drive",
        "title": "Google Drive Connector",
        "description": "Use a connector to sync from your Google Drive data source.",
        "icons": [
          {
            "src": "/img/service_type/google_drive.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/google_drive.svg",
            "title": "Google Drive logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "gmail",
        "title": "Gmail Connector",
        "description": "Use a connector to sync from your Gmail data source.",
        "icons": [
          {
            "src": "/img/service_type/gmail.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/gmail.svg",
            "title": "Gmail logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "azure_blob_storage",
        "title": "Azure Blob Storage Connector",
        "description": "Use a connector to sync from your Azure Blob Storage data source.",
        "icons": [
          {
            "src": "/img/service_type/azure_blob_storage.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/azure_blob_storage.svg",
            "title": "Azure Blob Storage logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "box",
        "title": "Box Connector",
        "description": "Use a connector to sync from your Box data source.",
        "icons": [
          {
            "src": "/img/service_type/box.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/box.svg",
            "title": "Box logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "confluence",
        "title": "Confluence Connector",
        "description": "Use a connector to sync from your Confluence data source.",
        "icons": [
          {
            "src": "/img/service_type/confluence.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/confluence.svg",
            "title": "Confluence logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "dropbox",
        "title": "Dropbox Connector",
        "description": "Use a connector to sync from your Dropbox data source.",
        "icons": [
          {
            "src": "/img/service_type/dropbox.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/dropbox.svg",
            "title": "Dropbox logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "google_cloud_storage",
        "title": "Google Cloud Storage Connector",
        "description": "Use a connector to sync from your Google Cloud Storage data source.",
        "icons": [
          {
            "src": "/img/service_type/google_cloud_storage.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/google_cloud_storage.svg",
            "title": "Google Cloud Storage logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "jira",
        "title": "Jira Connector",
        "description": "Use a connector to sync from your Jira data source.",
        "icons": [
          {
            "src": "/img/service_type/jira.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/jira.svg",
            "title": "Jira logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "microsoft_sql",
        "title": "Microsoft SQL Connector",
        "description": "Use a connector to sync from your Microsoft SQL data source.",
        "icons": [
          {
            "src": "/img/service_type/microsoft_sql.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/microsoft_sql.svg",
            "title": "Microsoft SQL logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "mongodb",
        "title": "MongoDB Connector",
        "description": "Use a connector to sync from your MongoDB data source.",
        "icons": [
          {
            "src": "/img/service_type/mongodb.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/mongodb.svg",
            "title": "MongoDB logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "mysql",
        "title": "MySQL Connector",
        "description": "Use a connector to sync from your MySQL data source.",
        "icons": [
          {
            "src": "/img/service_type/mysql.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/mysql.svg",
            "title": "MySQL logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "network_drive",
        "title": "Network Drive Connector",
        "description": "Use a connector to sync from your Network Drive data source.",
        "icons": [
          {
            "src": "/img/service_type/network_drive.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/network_drive.svg",
            "title": "Network Drive logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "notion",
        "title": "Notion Connector",
        "description": "Use a connector to sync from your Notion data source.",
        "icons": [
          {
            "src": "/img/service_type/notion.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/notion.svg",
            "title": "Notion logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "onedrive",
        "title": "OneDrive Connector",
        "description": "Use a connector to sync from your OneDrive data source.",
        "icons": [
          {
            "src": "/img/service_type/onedrive.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/onedrive.svg",
            "title": "OneDrive logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "oracle",
        "title": "Oracle Connector",
        "description": "Use a connector to sync from your Oracle data source.",
        "icons": [
          {
            "src": "/img/service_type/oracle.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/oracle.svg",
            "title": "Oracle logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "outlook",
        "title": "Outlook Connector",
        "description": "Use a connector to sync from your Outlook data source.",
        "icons": [
          {
            "src": "/img/service_type/outlook.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/outlook.svg",
            "title": "Outlook logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "postgresql",
        "title": "PostgreSQL Connector",
        "description": "Use a connector to sync from your PostgreSQL data source.",
        "icons": [
          {
            "src": "/img/service_type/postgresql.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/postgresql.svg",
            "title": "PostgreSQL logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "amazon_s3",
        "title": "Amazon S3 Connector",
        "description": "Use a connector to sync from your Amazon S3 data source.",
        "icons": [
          {
            "src": "/img/service_type/amazon_s3.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/amazon_s3.svg",
            "title": "Amazon S3 logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "salesforce",
        "title": "Salesforce Connector",
        "description": "Use a connector to sync from your Salesforce data source.",
        "icons": [
          {
            "src": "/img/service_type/salesforce.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/salesforce.svg",
            "title": "Salesforce logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "sandfly",
        "title": "Sandfly Security Connector",
        "description": "Use a connector to sync from your Sandfly Security data source.",
        "icons": [
          {
            "src": "/img/service_type/sandfly.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/sandfly.svg",
            "title": "Sandfly Security logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "servicenow",
        "title": "ServiceNow Connector",
        "description": "Use a connector to sync from your ServiceNow data source.",
        "icons": [
          {
            "src": "/img/service_type/servicenow.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/servicenow.svg",
            "title": "ServiceNow logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "sharepoint_online",
        "title": "SharePoint Online Connector",
        "description": "Use a connector to sync from your SharePoint Online data source.",
        "icons": [
          {
            "src": "/img/service_type/sharepoint_online.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/sharepoint_online.svg",
            "title": "SharePoint Online logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "sharepoint_server",
        "title": "SharePoint Server Connector",
        "description": "Use a connector to sync from your SharePoint Server data source.",
        "icons": [
          {
            "src": "/img/service_type/sharepoint_server.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/sharepoint_server.svg",
            "title": "SharePoint Server logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "slack",
        "title": "Slack Connector",
        "description": "Use a connector to sync from your Slack data source.",
        "icons": [
          {
            "src": "/img/service_type/slack.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/slack.svg",
            "title": "Slack logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "teams",
        "title": "Teams Connector",
        "description": "Use a connector to sync from your Teams data source.",
        "icons": [
          {
            "src": "/img/service_type/teams.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/teams.svg",
            "title": "Teams logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "zoom",
        "title": "Zoom Connector",
        "description": "Use a connector to sync from your Zoom data source.",
        "icons": [
          {
            "src": "/img/service_type/zoom.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/zoom.svg",
            "title": "Zoom logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "platinum"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/search-extract-and-transform"
    },
    "categories": [
      "connector",
      "enterprise_search"
    ],
    "signature_path": "/epr/elastic_connectors/elastic_connectors-1.0.3.zip.sig"
  },
  {
    "name": "endpoint",
    "title": "Elastic Defend",
    "version": "9.3.0",
    "release": "ga",
    "description": "Protect your hosts and cloud workloads with threat prevention, detection, and deep security data visibility.",
    "type": "integration",
    "download": "/epr/endpoint/endpoint-9.3.0.zip",
    "path": "/package/endpoint/9.3.0",
    "icons": [
      {
        "src": "/img/security-logo-color-64px.svg",
        "path": "/package/endpoint/9.3.0/img/security-logo-color-64px.svg",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "endpoint",
        "title": "Endpoint Security Integration",
        "description": "Interact with the endpoint."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-defend-workflows"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/endpoint/endpoint-9.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "endpoint.action.responses",
        "title": "Endpoint Action Responses"
      },
      {
        "type": "logs",
        "dataset": "endpoint.actions",
        "title": "Endpoint Actions"
      },
      {
        "type": "logs",
        "dataset": "endpoint.alerts",
        "title": "Endpoint Alerts"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.api",
        "title": "Endpoint API Events"
      },
      {
        "type": "logs",
        "dataset": "endpoint.diagnostic.collection",
        "title": "Endpoint Alert Collection"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.device",
        "title": "Endpoint Device Events"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.file",
        "title": "Endpoint File Events"
      },
      {
        "type": "logs",
        "dataset": "endpoint.heartbeat",
        "title": "Endpoint Heartbeat"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.library",
        "title": "Endpoint Library and Driver Events"
      },
      {
        "type": "metrics",
        "dataset": "endpoint.metadata",
        "title": "Endpoint Metadata"
      },
      {
        "type": "metrics",
        "dataset": "endpoint.metrics",
        "title": "Endpoint Metrics"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.network",
        "title": "Endpoint Network Events"
      },
      {
        "type": "metrics",
        "dataset": "endpoint.policy",
        "title": "Endpoint Policy Response"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.process",
        "title": "Endpoint Process Events"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.registry",
        "title": "Endpoint Registry Events"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.security",
        "title": "Endpoint Security Events"
      }
    ]
  },
  {
    "name": "elastic_package_registry",
    "title": "Elastic Package Registry",
    "version": "0.3.1",
    "release": "beta",
    "description": "Collect metrics from a Elastic Package Registry instance",
    "type": "integration",
    "download": "/epr/elastic_package_registry/elastic_package_registry-0.3.1.zip",
    "path": "/package/elastic_package_registry/0.3.1",
    "icons": [
      {
        "src": "/img/elastic_package_registry-logo.svg",
        "path": "/package/elastic_package_registry/0.3.1/img/elastic_package_registry-logo.svg",
        "title": "Elastic Package Registry logo",
        "size": "256x256",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "elastic_package_registry",
        "title": "Elastic Package Registry metrics",
        "description": "Collect metrics from Elastic Package Registry instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.0.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "elastic_stack"
    ],
    "signature_path": "/epr/elastic_package_registry/elastic_package_registry-0.3.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "elastic_package_registry.metrics",
        "title": "Prometheus Metrics"
      }
    ]
  },
  {
    "name": "elastic_security",
    "title": "Elastic Security",
    "version": "0.4.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Elastic Instance with Elastic Agent.",
    "type": "integration",
    "download": "/epr/elastic_security/elastic_security-0.4.0.zip",
    "path": "/package/elastic_security/0.4.0",
    "icons": [
      {
        "src": "/img/elastic-security-logo.svg",
        "path": "/package/elastic_security/0.4.0/img/elastic-security-logo.svg",
        "title": "Elastic Security Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "elastic_security",
        "title": "Elastic Security logs",
        "description": "Collect Elastic Security logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.1.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "siem"
    ],
    "signature_path": "/epr/elastic_security/elastic_security-0.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "elastic_security.alert",
        "title": "Alert"
      }
    ]
  },
  {
    "name": "synthetics",
    "title": "Elastic Synthetics",
    "version": "1.6.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Internal Elastic integration for providing access to private locations.",
    "type": "integration",
    "download": "/epr/synthetics/synthetics-1.6.1.zip",
    "path": "/package/synthetics/1.6.1",
    "icons": [
      {
        "src": "/img/uptime-logo-color-64px.svg",
        "path": "/package/synthetics/1.6.1/img/uptime-logo-color-64px.svg",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "synthetics",
        "title": "Elastic Synthetics",
        "description": "Perform synthetic health checks on network endpoints."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "uptime"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/actionable-obs-team"
    },
    "categories": [
      "observability",
      "monitoring"
    ],
    "signature_path": "/epr/synthetics/synthetics-1.6.1.zip.sig",
    "data_streams": [
      {
        "type": "synthetics",
        "dataset": "browser",
        "title": "synthetic monitor check"
      },
      {
        "type": "synthetics",
        "dataset": "browser.network",
        "title": "synthetic monitor check"
      },
      {
        "type": "synthetics",
        "dataset": "browser.screenshot",
        "title": "synthetic monitor check"
      },
      {
        "type": "synthetics",
        "dataset": "http",
        "title": "synthetic monitor check"
      },
      {
        "type": "synthetics",
        "dataset": "icmp",
        "title": "synthetic monitor check"
      },
      {
        "type": "synthetics",
        "dataset": "tcp",
        "title": "synthetic monitor check"
      }
    ]
  },
  {
    "name": "synthetics_dashboards",
    "title": "Elastic Synthetics Dashboards",
    "version": "1.0.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Explore Elastic Synthetics metrics with these dashboards.",
    "type": "integration",
    "download": "/epr/synthetics_dashboards/synthetics_dashboards-1.0.1.zip",
    "path": "/package/synthetics_dashboards/1.0.1",
    "icons": [
      {
        "src": "/img/uptime-logo-color-64px.svg",
        "path": "/package/synthetics_dashboards/1.0.1/img/uptime-logo-color-64px.svg",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "uptime"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ux-infra_services-team"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/synthetics_dashboards/synthetics_dashboards-1.0.1.zip.sig"
  },
  {
    "name": "elasticsearch",
    "title": "Elasticsearch",
    "version": "1.20.1",
    "release": "ga",
    "description": "Elasticsearch Integration",
    "type": "integration",
    "download": "/epr/elasticsearch/elasticsearch-1.20.1.zip",
    "path": "/package/elasticsearch/1.20.1",
    "icons": [
      {
        "src": "/img/logo_elasticsearch.svg",
        "path": "/package/elasticsearch/1.20.1/img/logo_elasticsearch.svg",
        "title": "logo elasticsearch",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "elasticsearch",
        "title": "Elasticsearch logs and metrics",
        "description": "Collect logs and metrics from Elasticsearch instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/stack-monitoring"
    },
    "categories": [
      "elastic_stack",
      "datastore"
    ],
    "signature_path": "/epr/elasticsearch/elasticsearch-1.20.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "elasticsearch.audit",
        "title": "Elasticsearch audit logs"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.ccr",
        "title": "Elasticsearch ccr metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.cluster_stats",
        "title": "Elasticsearch cluster_stats metrics"
      },
      {
        "type": "logs",
        "dataset": "elasticsearch.deprecation",
        "title": "Elasticsearch deprecation logs"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.enrich",
        "title": "Elasticsearch enrich metrics"
      },
      {
        "type": "logs",
        "dataset": "elasticsearch.gc",
        "title": "Elasticsearch gc logs"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.index",
        "title": "Elasticsearch index metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.index_recovery",
        "title": "Elasticsearch index_recovery metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.index_summary",
        "title": "Elasticsearch index_summary metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.ingest_pipeline",
        "title": "Elasticsearch ingest metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.ml_job",
        "title": "Elasticsearch ml_job metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.node",
        "title": "Elasticsearch node metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.node_stats",
        "title": "Elasticsearch node_stats metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.pending_tasks",
        "title": "Elasticsearch pending_tasks metrics"
      },
      {
        "type": "logs",
        "dataset": "elasticsearch.server",
        "title": "Elasticsearch server logs"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.shard",
        "title": "Elasticsearch shard metrics"
      },
      {
        "type": "logs",
        "dataset": "elasticsearch.slowlog",
        "title": "Elasticsearch slowlog logs"
      }
    ]
  },
  {
    "name": "ess_billing",
    "title": "Elasticsearch Service Billing",
    "version": "1.7.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collects billing metrics from Elasticsearch Service billing API",
    "type": "integration",
    "download": "/epr/ess_billing/ess_billing-1.7.1.zip",
    "path": "/package/ess_billing/1.7.1",
    "icons": [
      {
        "src": "/img/sample-logo.svg",
        "path": "/package/ess_billing/1.7.1/img/sample-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ESS Billing",
        "title": "Elasticsearch Service Billing Metrics",
        "description": "Collect billing metrics from Elasticsearch Service billing API.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true,
            "is_default": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "cloud"
    ],
    "signature_path": "/epr/ess_billing/ess_billing-1.7.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "ess_billing.billing",
        "title": "Elasticsearch Service Billing"
      },
      {
        "type": "metrics",
        "dataset": "ess_billing.credits",
        "title": "Elasticsearch Service Credits"
      }
    ]
  },
  {
    "name": "endace",
    "title": "Endace",
    "version": "0.2.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "This Endace integration configures Network Packet Capture for flow generation and adds a pivot field to your Endace platform.",
    "type": "integration",
    "download": "/epr/endace/endace-0.2.0.zip",
    "path": "/package/endace/0.2.0",
    "icons": [
      {
        "src": "/img/endace-logo.svg",
        "path": "/package/endace/0.2.0/img/endace-logo.svg",
        "title": "Endace logo",
        "size": "128x128",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "endace",
        "title": "Endace Flow logs",
        "description": "Capture network traffic via Endace Flow or Network Packet Capture"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "aws",
      "cloud",
      "custom",
      "network"
    ],
    "signature_path": "/epr/endace/endace-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "endace.flow",
        "title": "Flows"
      },
      {
        "type": "logs",
        "dataset": "endace.log",
        "title": "NetFlow logs"
      }
    ]
  },
  {
    "name": "enterprisesearch",
    "title": "Enterprise Search",
    "version": "1.0.1",
    "release": "ga",
    "description": "Enterprise Search Integration",
    "type": "integration",
    "download": "/epr/enterprisesearch/enterprisesearch-1.0.1.zip",
    "path": "/package/enterprisesearch/1.0.1",
    "icons": [
      {
        "src": "/img/logo_entsearch.svg",
        "path": "/package/enterprisesearch/1.0.1/img/logo_entsearch.svg",
        "title": "logo enterprisesearch",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "enterprisesearch",
        "title": "Enterprise Search metrics",
        "description": "Collect metrics from Enterprise Search instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/infra-monitoring-ui"
    },
    "signature_path": "/epr/enterprisesearch/enterprisesearch-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "enterprisesearch.stack_monitoring.health",
        "title": "Enterprise Search health metrics"
      },
      {
        "type": "metrics",
        "dataset": "enterprisesearch.stack_monitoring.stats",
        "title": "Enterprise Search stats metrics"
      }
    ]
  },
  {
    "name": "entro",
    "title": "Entro",
    "version": "0.2.0",
    "release": "beta",
    "description": "Collect logs from Entro with Elastic Agent.",
    "type": "integration",
    "download": "/epr/entro/entro-0.2.0.zip",
    "path": "/package/entro/0.2.0",
    "icons": [
      {
        "src": "/img/entro_security-logo.svg",
        "path": "/package/entro/0.2.0/img/entro_security-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "entro",
        "title": "Entro audit events",
        "description": "Collect Entro audit events."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "security"
    ],
    "signature_path": "/epr/entro/entro-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "entro.audit",
        "title": "Audit Logs"
      }
    ]
  },
  {
    "name": "envoyproxy",
    "title": "Envoyproxy",
    "version": "0.4.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Envoyproxy Integration",
    "type": "integration",
    "download": "/epr/envoyproxy/envoyproxy-0.4.0.zip",
    "path": "/package/envoyproxy/0.4.0",
    "icons": [
      {
        "src": "/img/envoy.svg",
        "path": "/package/envoyproxy/0.4.0/img/envoy.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "envoyproxy",
        "title": "Envoyproxy logs",
        "description": "Collect logs from Envoyproxy instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/envoyproxy/envoyproxy-0.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "envoyproxy.log",
        "title": "Envoy Logs"
      },
      {
        "type": "metrics",
        "dataset": "envoyproxy.stats",
        "title": "Envoyproxy statistics"
      }
    ]
  },
  {
    "name": "envoyproxy_otel",
    "title": "Envoyproxy OpenTelemetry assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Envoyproxy Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/envoyproxy_otel/envoyproxy_otel-0.1.0.zip",
    "path": "/package/envoyproxy_otel/0.1.0",
    "icons": [
      {
        "src": "/img/envoy_otel.svg",
        "path": "/package/envoyproxy_otel/0.1.0/img/envoy_otel.svg",
        "title": "Envoyproxy logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/envoyproxy_otel/envoyproxy_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "statsdreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "extrahop",
    "title": "ExtraHop",
    "version": "0.2.1",
    "release": "beta",
    "description": "Collect logs from ExtraHop RevealX 360 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/extrahop/extrahop-0.2.1.zip",
    "path": "/package/extrahop/0.2.1",
    "icons": [
      {
        "src": "/img/extrahop-logo.svg",
        "path": "/package/extrahop/0.2.1/img/extrahop-logo.svg",
        "title": "ExtraHop logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "extrahop",
        "title": "ExtraHop RevealX 360 Logs",
        "description": "Collect logs from ExtraHop RevealX 360 API.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.5 || ^8.19.2  || ^9.0.5  || ^9.1.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/extrahop/extrahop-0.2.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "extrahop.detection",
        "title": "Collect Detection logs from ExtaHop RevealX 360."
      },
      {
        "type": "logs",
        "dataset": "extrahop.investigation",
        "title": "Collect Investigation logs from ExtaHop RevealX 360."
      }
    ]
  },
  {
    "name": "f5_bigip",
    "title": "F5 BIG-IP",
    "version": "1.27.3",
    "release": "ga",
    "description": "Collect logs from F5 BIG-IP with Elastic Agent.",
    "type": "integration",
    "download": "/epr/f5_bigip/f5_bigip-1.27.3.zip",
    "path": "/package/f5_bigip/1.27.3",
    "icons": [
      {
        "src": "/img/f5-bigip-logo.svg",
        "path": "/package/f5_bigip/1.27.3/img/f5-bigip-logo.svg",
        "title": "F5 BIG-IP logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "F5 BIG-IP",
        "title": "F5 BIG-IP logs",
        "description": "Collect F5 BIG-IP logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/f5_bigip/f5_bigip-1.27.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "f5_bigip.log",
        "title": "Collect logs from F5 BIG-IP"
      }
    ]
  },
  {
    "name": "falco",
    "title": "Falco",
    "version": "2.0.2",
    "release": "ga",
    "description": "Collect events and alerts from Falco using Elastic Agent",
    "type": "integration",
    "download": "/epr/falco/falco-2.0.2.zip",
    "path": "/package/falco/2.0.2",
    "icons": [
      {
        "src": "/img/falco-stacked-color.svg",
        "path": "/package/falco/2.0.2/img/falco-stacked-color.svg",
        "title": "Falco logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "falco",
        "title": "Falco Alerts",
        "description": "Collect Alerts from Falco using Elastic Agent"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "containers",
      "kubernetes",
      "monitoring",
      "observability",
      "security"
    ],
    "signature_path": "/epr/falco/falco-2.0.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "falco.alerts",
        "title": "Falco Alerts"
      },
      {
        "type": "logs",
        "dataset": "falco.alerts_agent",
        "title": "Falco Alerts Agent"
      }
    ]
  },
  {
    "name": "fim",
    "title": "File Integrity Monitoring",
    "version": "1.17.0",
    "release": "ga",
    "description": "The File Integrity Monitoring integration reports filesystem changes in real time.",
    "type": "integration",
    "download": "/epr/fim/fim-1.17.0.zip",
    "path": "/package/fim/1.17.0",
    "icons": [
      {
        "src": "/img/sample-logo.svg",
        "path": "/package/fim/1.17.0/img/sample-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fim",
        "title": "File Integrity Monitoring",
        "description": "Collect filesystem events"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/fim/fim-1.17.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fim.event",
        "title": "Filesystem events"
      }
    ]
  },
  {
    "name": "filelog_otel",
    "title": "File Log OpenTelemetry input",
    "version": "0.2.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Tails and parses logs from files using the filelog receiver of the OTel collector.",
    "type": "input",
    "download": "/epr/filelog_otel/filelog_otel-0.2.0.zip",
    "path": "/package/filelog_otel/0.2.0",
    "icons": [
      {
        "src": "/img/logs-icon.svg",
        "path": "/package/filelog_otel/0.2.0/img/logs-icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "filelogreceiver",
        "title": "Custom log file",
        "description": "Collect your custom log files."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "custom",
      "custom_logs",
      "opentelemetry"
    ],
    "signature_path": "/epr/filelog_otel/filelog_otel-0.2.0.zip.sig"
  },
  {
    "name": "fireeye",
    "title": "FireEye Network Security",
    "version": "1.27.1",
    "release": "ga",
    "description": "Collect logs from FireEye NX with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fireeye/fireeye-1.27.1.zip",
    "path": "/package/fireeye/1.27.1",
    "icons": [
      {
        "src": "/img/FireEye-logo.svg",
        "path": "/package/fireeye/1.27.1/img/FireEye-logo.svg",
        "title": "Fireeye logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fireeye",
        "title": "Fireeye NX logs",
        "description": "Collect Fireeye NX logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/fireeye/fireeye-1.27.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fireeye.nx",
        "title": "Fireeye NX"
      }
    ]
  },
  {
    "name": "first_epss",
    "title": "First EPSS",
    "version": "1.2.0",
    "release": "ga",
    "description": "Collect exploit prediction score data from the First EPSS API with Elastic Agent.",
    "type": "integration",
    "download": "/epr/first_epss/first_epss-1.2.0.zip",
    "path": "/package/first_epss/1.2.0",
    "icons": [
      {
        "src": "/img/first-org-RGB.svg",
        "path": "/package/first_epss/1.2.0/img/first-org-RGB.svg",
        "title": "First logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "first_epss",
        "title": "First EPSS data",
        "description": "Collect First EPSS data."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management"
    ],
    "signature_path": "/epr/first_epss/first_epss-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "first_epss.vulnerability",
        "title": "Collect EPSS data from First API."
      }
    ]
  },
  {
    "name": "ti_flashpoint",
    "title": "Flashpoint",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from Flashpoint with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_flashpoint/ti_flashpoint-0.1.0.zip",
    "path": "/package/ti_flashpoint/0.1.0",
    "icons": [
      {
        "src": "/img/ti_flashpoint-logo.svg",
        "path": "/package/ti_flashpoint/0.1.0/img/ti_flashpoint-logo.svg",
        "title": "Flashpoint logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_flashpoint",
        "title": "Flashpoint",
        "description": "Collect logs from Flashpoint.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_flashpoint/ti_flashpoint-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_flashpoint.alert",
        "title": "Alert"
      },
      {
        "type": "logs",
        "dataset": "ti_flashpoint.indicator",
        "title": "Indicator"
      },
      {
        "type": "logs",
        "dataset": "ti_flashpoint.vulnerability",
        "title": "Vulnerability"
      }
    ]
  },
  {
    "name": "fleet_server",
    "title": "Fleet Server",
    "version": "1.6.1",
    "release": "ga",
    "description": "Centrally manage Elastic Agents with the Fleet Server integration.",
    "type": "integration",
    "download": "/epr/fleet_server/fleet_server-1.6.1.zip",
    "path": "/package/fleet_server/1.6.1",
    "icons": [
      {
        "src": "/img/logo_fleet_server.svg",
        "path": "/package/fleet_server/1.6.1/img/logo_fleet_server.svg",
        "title": "logo Fleet Server",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fleet_server",
        "title": "Fleet Server",
        "description": "Fleet Server setup"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.12.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/fleet"
    },
    "categories": [
      "elastic_stack"
    ],
    "signature_path": "/epr/fleet_server/fleet_server-1.6.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "fleet_server.agent_status",
        "title": "Fleet Agent Status"
      },
      {
        "type": "metrics",
        "dataset": "fleet_server.agent_versions",
        "title": "Fleet Agent Versions"
      },
      {
        "type": "logs",
        "dataset": "fleet_server.output_health",
        "title": "Output Health"
      }
    ]
  },
  {
    "name": "forcepoint_web",
    "title": "Forcepoint Web Security",
    "version": "1.13.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Forcepoint Web Security",
    "type": "integration",
    "download": "/epr/forcepoint_web/forcepoint_web-1.13.0.zip",
    "path": "/package/forcepoint_web/1.13.0",
    "icons": [
      {
        "src": "/img/forcepoint.svg",
        "path": "/package/forcepoint_web/1.13.0/img/forcepoint.svg",
        "title": "Forcepoint",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Secret Server",
        "description": "Collect Forcepoint Web Security logs from syslog or file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/forcepoint_web/forcepoint_web-1.13.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "forcepoint_web.logs",
        "title": "Forcepoint Web Security Logs"
      }
    ]
  },
  {
    "name": "forgerock",
    "title": "ForgeRock",
    "version": "1.22.0",
    "release": "ga",
    "description": "Collect audit logs from ForgeRock with Elastic Agent.",
    "type": "integration",
    "download": "/epr/forgerock/forgerock-1.22.0.zip",
    "path": "/package/forgerock/1.22.0",
    "icons": [
      {
        "src": "/img/forgerock-icon.svg",
        "path": "/package/forgerock/1.22.0/img/forgerock-icon.svg",
        "title": "ForgeRock Identity Platform",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "forgerock",
        "title": "Collect ForgeRock logs via API",
        "description": "Collecting ForgeRock logs via API with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/forgerock/forgerock-1.22.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "forgerock.am_access",
        "title": "AM-Access audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.am_activity",
        "title": "AM-Activity audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.am_authentication",
        "title": "AM-Authentication audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.am_config",
        "title": "AM-Config audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.am_core",
        "title": "AM-Core debug logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.idm_access",
        "title": "IDM-Access audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.idm_activity",
        "title": "IDM-Activity audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.idm_authentication",
        "title": "IDM-Authentication audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.idm_config",
        "title": "IDM-Config audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.idm_core",
        "title": "IDM-Core debug logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.idm_sync",
        "title": "IDM-Sync audit logs"
      }
    ]
  },
  {
    "name": "fortinet",
    "title": "Fortinet",
    "version": "1.9.0",
    "release": "ga",
    "description": "Deprecated. Collect logs from Fortinet instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fortinet/fortinet-1.9.0.zip",
    "path": "/package/fortinet/1.9.0",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet/1.9.0/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet",
        "title": "Fortinet logs",
        "description": "Collect logs from Fortinet instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.14.1 || ^8.0.0"
      }
    },
    "owner": {
      "github": "elastic/security-external-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/fortinet/fortinet-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet.clientendpoint",
        "title": "Fortinet FortiClient Endpoint Security logs"
      },
      {
        "type": "logs",
        "dataset": "fortinet.firewall",
        "title": "Fortinet firewall logs"
      },
      {
        "type": "logs",
        "dataset": "fortinet.fortimail",
        "title": "Fortinet FortiMail logs"
      },
      {
        "type": "logs",
        "dataset": "fortinet.fortimanager",
        "title": "Fortinet Manager/Analyzer logs"
      }
    ]
  },
  {
    "name": "fortinet_forticlient",
    "title": "Fortinet FortiClient Logs (Deprecated)",
    "version": "1.12.1",
    "release": "ga",
    "description": "Deprecated. Fortinet FortiClient Logs is no longer supported.",
    "type": "integration",
    "download": "/epr/fortinet_forticlient/fortinet_forticlient-1.12.1.zip",
    "path": "/package/fortinet_forticlient/1.12.1",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet_forticlient/1.12.1/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet",
        "title": "Fortinet FortiClient logs",
        "description": "Collect logs from Fortinet FortiClient instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/fortinet_forticlient/fortinet_forticlient-1.12.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet_forticlient.log",
        "title": "Fortinet FortiClient Endpoint Security logs"
      }
    ]
  },
  {
    "name": "fortinet_fortiedr",
    "title": "Fortinet FortiEDR Logs",
    "version": "1.21.0",
    "release": "ga",
    "description": "Collect logs from Fortinet FortiEDR instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fortinet_fortiedr/fortinet_fortiedr-1.21.0.zip",
    "path": "/package/fortinet_fortiedr/1.21.0",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet_fortiedr/1.21.0/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet",
        "title": "Fortinet FortiEDR logs",
        "description": "Collect logs from Fortinet FortiEDR instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/fortinet_fortiedr/fortinet_fortiedr-1.21.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet_fortiedr.log",
        "title": "Fortinet FortiEDR Endpoint Detection and Response logs"
      }
    ]
  },
  {
    "name": "fortinet_fortigate",
    "title": "Fortinet FortiGate Firewall Logs",
    "version": "1.36.5",
    "release": "ga",
    "description": "Collect logs from Fortinet FortiGate firewalls with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fortinet_fortigate/fortinet_fortigate-1.36.5.zip",
    "path": "/package/fortinet_fortigate/1.36.5",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet_fortigate/1.36.5/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet_fortigate",
        "title": "Fortinet FortiGate logs",
        "description": "Collect logs from Fortinet FortiGate instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "firewall_security"
    ],
    "signature_path": "/epr/fortinet_fortigate/fortinet_fortigate-1.36.5.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet_fortigate.log",
        "title": "Fortinet FortiGate logs"
      }
    ]
  },
  {
    "name": "fortinet_fortimail",
    "title": "Fortinet FortiMail",
    "version": "2.19.0",
    "release": "ga",
    "description": "Collect logs from Fortinet FortiMail instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fortinet_fortimail/fortinet_fortimail-2.19.0.zip",
    "path": "/package/fortinet_fortimail/2.19.0",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet_fortimail/2.19.0/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet_fortimail",
        "title": "Fortinet FortiMail logs",
        "description": "Collect logs from Fortinet FortiMail instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/fortinet_fortimail/fortinet_fortimail-2.19.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet_fortimail.log",
        "title": "Collect logs from Fortinet FortiMail"
      }
    ]
  },
  {
    "name": "fortinet_fortimanager",
    "title": "Fortinet FortiManager Logs",
    "version": "2.18.0",
    "release": "ga",
    "description": "Collect logs from Fortinet FortiManager instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fortinet_fortimanager/fortinet_fortimanager-2.18.0.zip",
    "path": "/package/fortinet_fortimanager/2.18.0",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet_fortimanager/2.18.0/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet_fortimanager",
        "title": "Fortinet FortiManager logs",
        "description": "Collect logs from Fortinet FortiManager instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "firewall_security"
    ],
    "signature_path": "/epr/fortinet_fortimanager/fortinet_fortimanager-2.18.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet_fortimanager.log",
        "title": "Collect logs from Fortinet FortiManager"
      }
    ]
  },
  {
    "name": "fortinet_fortiproxy",
    "title": "Fortinet FortiProxy",
    "version": "1.4.0",
    "release": "ga",
    "description": "Collect logs from Fortinet FortiProxy with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fortinet_fortiproxy/fortinet_fortiproxy-1.4.0.zip",
    "path": "/package/fortinet_fortiproxy/1.4.0",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet_fortiproxy/1.4.0/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet_fortiproxy",
        "title": "Fortinet FortiProxy logs",
        "description": "Collect logs from Fortinet FortiProxy instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.12.2 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "observability",
      "proxy_security",
      "security",
      "web"
    ],
    "signature_path": "/epr/fortinet_fortiproxy/fortinet_fortiproxy-1.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet_fortiproxy.log",
        "title": "Collect logs from Fortinet FortiProxy"
      }
    ]
  },
  {
    "name": "gcp_audit_otel",
    "title": "GCP Audit Logs OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "GCP Audit Logs OpenTelemetry Assets",
    "type": "content",
    "download": "/epr/gcp_audit_otel/gcp_audit_otel-0.1.0.zip",
    "path": "/package/gcp_audit_otel/0.1.0",
    "icons": [
      {
        "src": "/img/gcp_otel_logo.svg",
        "path": "/package/gcp_audit_otel/0.1.0/img/gcp_otel_logo.svg",
        "title": "GCP OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "google_cloud",
      "cloud",
      "security",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/gcp_audit_otel/gcp_audit_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "gcp.auditlog.otel"
        }
      ]
    }
  },
  {
    "name": "gcp_metrics",
    "title": "GCP Metrics Input",
    "version": "0.3.1",
    "release": "beta",
    "description": "GCP Metrics Input",
    "type": "input",
    "download": "/epr/gcp_metrics/gcp_metrics-0.3.1.zip",
    "path": "/package/gcp_metrics/0.3.1",
    "icons": [
      {
        "src": "/img/logo_gcp.svg",
        "path": "/package/gcp_metrics/0.3.1/img/logo_gcp.svg",
        "title": "logo gcp",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "gcp_metrics",
        "title": "GCP Metrics",
        "description": "GCP Metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "cloud",
      "observability",
      "google_cloud",
      "custom"
    ],
    "signature_path": "/epr/gcp_metrics/gcp_metrics-0.3.1.zip.sig"
  },
  {
    "name": "gcp_vpcflow_otel",
    "title": "GCP VPC Flow Logs OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "GCP VPC Flow Logs OpenTelemetry Assets",
    "type": "content",
    "download": "/epr/gcp_vpcflow_otel/gcp_vpcflow_otel-0.1.0.zip",
    "path": "/package/gcp_vpcflow_otel/0.1.0",
    "icons": [
      {
        "src": "/img/gcp_otel_logo.svg",
        "path": "/package/gcp_vpcflow_otel/0.1.0/img/gcp_otel_logo.svg",
        "title": "GCP OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "google_cloud",
      "cloud",
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/gcp_vpcflow_otel/gcp_vpcflow_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "gcp.vpcflow.otel"
        }
      ]
    }
  },
  {
    "name": "gcp_vertexai",
    "title": "GCP Vertex AI",
    "version": "1.4.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect GCP Vertex AI metrics and logs with Elastic Agent",
    "type": "integration",
    "download": "/epr/gcp_vertexai/gcp_vertexai-1.4.0.zip",
    "path": "/package/gcp_vertexai/1.4.0",
    "icons": [
      {
        "src": "/img/gcp_vertexai.svg",
        "path": "/package/gcp_vertexai/1.4.0/img/gcp_vertexai.svg",
        "title": "Vertex AI logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates_behavior": "combined_policy",
    "policy_templates": [
      {
        "name": "GCP Vertex AI Metrics",
        "title": "GCP Vertex AI Metrics",
        "description": "GCP Vertex AI Metrics",
        "data_streams": [
          "metrics"
        ]
      },
      {
        "name": "GCP Vertex AI  Logs",
        "title": "GCP Vertex AI  Logs",
        "description": "GCP Vertex AI Logs",
        "data_streams": [
          "prompt_response_logs",
          "auditlogs"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "cloud",
      "google_cloud",
      "observability"
    ],
    "signature_path": "/epr/gcp_vertexai/gcp_vertexai-1.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "gcp_vertexai.auditlogs",
        "title": "Google Cloud Platform (GCP) VertexAI Audit Logs"
      },
      {
        "type": "metrics",
        "dataset": "gcp_vertexai.metrics",
        "title": "GCP Vertex AI Metrics"
      },
      {
        "type": "logs",
        "dataset": "gcp_vertexai.prompt_response_logs",
        "title": "Google Cloud Platform (GCP) VertexAI Prompt Response Logs"
      }
    ]
  },
  {
    "name": "gigamon",
    "title": "Gigamon",
    "version": "2.2.0",
    "release": "ga",
    "description": "Collect logs from Gigamon with Elastic Agent.",
    "type": "integration",
    "download": "/epr/gigamon/gigamon-2.2.0.zip",
    "path": "/package/gigamon/2.2.0",
    "icons": [
      {
        "src": "/img/gigamon-logo.svg",
        "path": "/package/gigamon/2.2.0/img/gigamon-logo.svg",
        "title": "Gigamon logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "gigamon",
        "title": "Gigamon AMI json",
        "description": "Collect json data from Gigamon AMI"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "security",
      "network",
      "application_observability",
      "observability"
    ],
    "signature_path": "/epr/gigamon/gigamon-2.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "gigamon.ami",
        "title": "Gigamon Application Metadata Intelligence (AMI) Logs"
      }
    ]
  },
  {
    "name": "github",
    "title": "GitHub",
    "version": "2.22.1",
    "release": "ga",
    "description": "Collect logs from GitHub with Elastic Agent.",
    "type": "integration",
    "download": "/epr/github/github-2.22.1.zip",
    "path": "/package/github/2.22.1",
    "icons": [
      {
        "src": "/img/github.svg",
        "path": "/package/github/2.22.1/img/github.svg",
        "title": "GitHub",
        "size": "1024x1024",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "github",
        "title": "GitHub logs",
        "description": "Collect logs from GitHub"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/github/github-2.22.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "github.audit",
        "title": "GitHub Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "github.code_scanning",
        "title": "GHAS Code Scanning"
      },
      {
        "type": "logs",
        "dataset": "github.dependabot",
        "title": "GHAS Dependabot"
      },
      {
        "type": "logs",
        "dataset": "github.issues",
        "title": "GitHub Issue"
      },
      {
        "type": "logs",
        "dataset": "github.secret_scanning",
        "title": "GHAS Secret Scanning"
      },
      {
        "type": "logs",
        "dataset": "github.security_advisories",
        "title": "Collect GitHub Security Advisories data from GitHub REST API."
      }
    ]
  },
  {
    "name": "gitlab",
    "title": "GitLab",
    "version": "2.6.0",
    "release": "ga",
    "description": "Collect logs from GitLab with Elastic Agent.",
    "type": "integration",
    "download": "/epr/gitlab/gitlab-2.6.0.zip",
    "path": "/package/gitlab/2.6.0",
    "icons": [
      {
        "src": "/img/gitlab-logo.svg",
        "path": "/package/gitlab/2.6.0/img/gitlab-logo.svg",
        "title": "gitlab Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "gitlab",
        "title": "GitLab",
        "description": "Collect logs from GitLab with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/gitlab/gitlab-2.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "gitlab.api",
        "title": "GitLab API logs"
      },
      {
        "type": "logs",
        "dataset": "gitlab.application",
        "title": "Application"
      },
      {
        "type": "logs",
        "dataset": "gitlab.audit",
        "title": "Audit"
      },
      {
        "type": "logs",
        "dataset": "gitlab.auth",
        "title": "Auth"
      },
      {
        "type": "logs",
        "dataset": "gitlab.pages",
        "title": "GitLab Pages logs"
      },
      {
        "type": "logs",
        "dataset": "gitlab.production",
        "title": "GitLab Production logs"
      },
      {
        "type": "logs",
        "dataset": "gitlab.sidekiq",
        "title": "GitLab Sidekiq logs"
      }
    ]
  },
  {
    "name": "goflow2",
    "title": "GoFlow2 logs",
    "version": "0.7.0",
    "release": "beta",
    "description": "Collect logs from goflow2 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/goflow2/goflow2-0.7.0.zip",
    "path": "/package/goflow2/0.7.0",
    "icons": [
      {
        "src": "/img/goflow2-logo.svg",
        "path": "/package/goflow2/0.7.0/img/goflow2-logo.svg",
        "title": "goflow2 logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "goflow2",
        "title": "goflow2 logs",
        "description": "Collect logs generated with goflow2"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network"
    ],
    "signature_path": "/epr/goflow2/goflow2-0.7.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "goflow2.sflow",
        "title": "Goflow2 sFlow"
      }
    ]
  },
  {
    "name": "golang",
    "title": "Golang",
    "version": "1.9.0",
    "release": "ga",
    "description": "This Elastic integration collects metrics from Golang applications.",
    "type": "integration",
    "download": "/epr/golang/golang-1.9.0.zip",
    "path": "/package/golang/1.9.0",
    "icons": [
      {
        "src": "/img/golang-logo.svg",
        "path": "/package/golang/1.9.0/img/golang-logo.svg",
        "title": "golang logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Golang",
        "title": "Golang metrics",
        "description": "Collect Golang metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/golang/golang-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "golang.expvar",
        "title": "Golang expvar metrics"
      },
      {
        "type": "logs",
        "dataset": "golang.heap",
        "title": "Golang Heap metrics"
      }
    ]
  },
  {
    "name": "gcp",
    "title": "Google Cloud Platform",
    "version": "2.49.0",
    "release": "ga",
    "description": "Collect logs and metrics from Google Cloud Platform with Elastic Agent.",
    "type": "integration",
    "download": "/epr/gcp/gcp-2.49.0.zip",
    "path": "/package/gcp/2.49.0",
    "icons": [
      {
        "src": "/img/logo_gcp.svg",
        "path": "/package/gcp/2.49.0/img/logo_gcp.svg",
        "title": "logo gcp",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "audit",
        "title": "Google Cloud Platform (GCP) Audit logs",
        "description": "Collect audit logs from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "security"
        ],
        "data_streams": [
          "audit"
        ]
      },
      {
        "name": "firewall",
        "title": "Google Cloud Platform (GCP) Firewall logs",
        "description": "Collect firewall logs from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "security",
          "firewall_security"
        ],
        "data_streams": [
          "firewall"
        ]
      },
      {
        "name": "vpcflow",
        "title": "Google Cloud Platform (GCP) VPC Flow logs",
        "description": "Collect vpcflow logs from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "security"
        ],
        "data_streams": [
          "vpcflow"
        ]
      },
      {
        "name": "dns",
        "title": "Google Cloud Platform (GCP) DNS logs",
        "description": "Collect DNS logs from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "security",
          "dns_security"
        ],
        "data_streams": [
          "dns"
        ]
      },
      {
        "name": "billing",
        "title": "Google Cloud Platform (GCP) Billing metrics",
        "description": "Collect billing metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "observability"
        ],
        "data_streams": [
          "billing"
        ]
      },
      {
        "name": "compute",
        "title": "Google Cloud Platform (GCP) Compute metrics",
        "description": "Collect compute metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "observability"
        ],
        "data_streams": [
          "compute"
        ]
      },
      {
        "name": "firestore",
        "title": "Google Cloud Platform (GCP) Firestore metrics",
        "description": "Collect firestore metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "datastore",
          "observability"
        ],
        "data_streams": [
          "firestore"
        ]
      },
      {
        "name": "loadbalancing",
        "title": "Google Cloud Platform (GCP) Load Balancing metrics",
        "description": "Collect Load Balancing metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "security"
        ],
        "data_streams": [
          "loadbalancing_metrics",
          "loadbalancing_logs"
        ]
      },
      {
        "name": "storage",
        "title": "Google Cloud Platform (GCP) Storage metrics",
        "description": "Collect storage metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "datastore",
          "observability"
        ],
        "data_streams": [
          "storage"
        ]
      },
      {
        "name": "gke",
        "title": "Google Cloud Platform (GCP) GKE metrics",
        "description": "Collect gke metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "containers",
          "observability"
        ],
        "data_streams": [
          "gke"
        ]
      },
      {
        "name": "dataproc",
        "title": "Google Cloud Platform (GCP) Dataproc metrics",
        "description": "Collect dataproc metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "observability"
        ],
        "data_streams": [
          "dataproc"
        ]
      },
      {
        "name": "pubsub",
        "title": "Google Cloud Platform (GCP) PubSub metrics",
        "description": "Collect pubsub metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "message_queue",
          "observability"
        ],
        "data_streams": [
          "pubsub"
        ]
      },
      {
        "name": "redis",
        "title": "Google Cloud Platform (GCP) Redis metrics",
        "description": "Collect Redis metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "datastore",
          "observability"
        ],
        "data_streams": [
          "redis"
        ]
      },
      {
        "name": "cloudrun",
        "title": "Google Cloud Platform (GCP) Cloud Run metrics",
        "description": "Collect Cloud Run metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "data_streams": [
          "cloudrun_metrics"
        ]
      },
      {
        "name": "cloudsql",
        "title": "Google Cloud Platform (GCP) CloudSQL metrics",
        "description": "Collect CloudSQL metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "data_streams": [
          "cloudsql_mysql",
          "cloudsql_postgresql",
          "cloudsql_sqlserver"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "google_cloud",
      "cloud",
      "observability",
      "containers",
      "datastore",
      "security"
    ],
    "signature_path": "/epr/gcp/gcp-2.49.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "gcp.audit",
        "title": "Google Cloud Platform (GCP) audit logs"
      },
      {
        "type": "metrics",
        "dataset": "gcp.billing",
        "title": "GCP Billing Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.cloudrun_metrics",
        "title": "GCP Cloud Run Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.cloudsql_mysql",
        "title": "GCP CloudSQL MySQL Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.cloudsql_postgresql",
        "title": "GCP CloudSQL PostgreSQL Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.cloudsql_sqlserver",
        "title": "GCP CloudSQL SQL Server Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.compute",
        "title": "GCP Compute Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.dataproc",
        "title": "GCP Dataproc Metrics"
      },
      {
        "type": "logs",
        "dataset": "gcp.dns",
        "title": "Google Cloud Platform (GCP) DNS logs"
      },
      {
        "type": "metrics",
        "dataset": "gcp.firestore",
        "title": "GCP Firestore Metrics"
      },
      {
        "type": "logs",
        "dataset": "gcp.firewall",
        "title": "Google Cloud Platform (GCP) firewall logs"
      },
      {
        "type": "metrics",
        "dataset": "gcp.gke",
        "title": "GCP GKE Metrics"
      },
      {
        "type": "logs",
        "dataset": "gcp.loadbalancing_logs",
        "title": "Google Cloud Platform (GCP) Load Balancing logs"
      },
      {
        "type": "metrics",
        "dataset": "gcp.loadbalancing_metrics",
        "title": "GCP Load Balancing Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.pubsub",
        "title": "GCP PubSub Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.redis",
        "title": "GCP Redis Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.storage",
        "title": "GCP Storage Metrics"
      },
      {
        "type": "logs",
        "dataset": "gcp.vpcflow",
        "title": "Google Cloud Platform (GCP) vpcflow logs"
      }
    ]
  },
  {
    "name": "santa",
    "title": "Google Santa",
    "version": "3.24.0",
    "release": "ga",
    "description": "Collect logs from Google Santa with Elastic Agent.",
    "type": "integration",
    "download": "/epr/santa/santa-3.24.0.zip",
    "path": "/package/santa/3.24.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/santa/3.24.0/img/icon.svg",
        "title": "Google Santa",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "santa",
        "title": "Google Santa logs",
        "description": "Collect logs from Google Santa instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/santa/santa-3.24.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "santa.log",
        "title": "Google Santa log logs"
      }
    ]
  },
  {
    "name": "google_secops",
    "title": "Google SecOps",
    "version": "1.2.2",
    "release": "ga",
    "description": "Collect alerts from Google SecOps with Elastic Agent.",
    "type": "integration",
    "download": "/epr/google_secops/google_secops-1.2.2.zip",
    "path": "/package/google_secops/1.2.2",
    "icons": [
      {
        "src": "/img/google-secops-logo.svg",
        "path": "/package/google_secops/1.2.2/img/google-secops-logo.svg",
        "title": "Google SecOps logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "google_secops",
        "title": "Google SecOps alerts",
        "description": "Collect Google SecOps alerts.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "google_cloud",
      "security",
      "siem"
    ],
    "signature_path": "/epr/google_secops/google_secops-1.2.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "google_secops.alert",
        "title": "Collect Alerts from Google SecOps."
      }
    ]
  },
  {
    "name": "google_scc",
    "title": "Google Security Command Center",
    "version": "2.4.0",
    "release": "ga",
    "description": "Collect logs from Google Security Command Center with Elastic Agent.",
    "type": "integration",
    "download": "/epr/google_scc/google_scc-2.4.0.zip",
    "path": "/package/google_scc/2.4.0",
    "icons": [
      {
        "src": "/img/google-scc-logo.svg",
        "path": "/package/google_scc/2.4.0/img/google-scc-logo.svg",
        "title": "Google SCC logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "google_scc",
        "title": "Google SCC logs",
        "description": "Collect logs from Google SCC.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "google_cloud",
      "security",
      "cloudsecurity_cdr",
      "vulnerability_workflow",
      "misconfiguration_workflow"
    ],
    "signature_path": "/epr/google_scc/google_scc-2.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "google_scc.asset",
        "title": "Collect Asset logs from Google Security Command Center."
      },
      {
        "type": "logs",
        "dataset": "google_scc.audit",
        "title": "Collect Audit logs from Google Security Command Center."
      },
      {
        "type": "logs",
        "dataset": "google_scc.finding",
        "title": "Collect Finding logs from Google Security Command Center."
      },
      {
        "type": "logs",
        "dataset": "google_scc.source",
        "title": "Collect Source logs from Google Security Command Center."
      }
    ]
  },
  {
    "name": "ti_google_threat_intelligence",
    "title": "Google Threat Intelligence",
    "version": "0.8.1",
    "release": "beta",
    "description": "Collect Threat Intelligence Events from Google Threat Intelligence using Elastic Agent, and perform enrichment on Elasticsearch by correlating Indicators of Compromise (IOCs).",
    "type": "integration",
    "download": "/epr/ti_google_threat_intelligence/ti_google_threat_intelligence-0.8.1.zip",
    "path": "/package/ti_google_threat_intelligence/0.8.1",
    "icons": [
      {
        "src": "/img/ti_google_threat_intelligence-logo.png",
        "path": "/package/ti_google_threat_intelligence/0.8.1/img/ti_google_threat_intelligence-logo.png",
        "title": "Google Threat Intelligence Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_google_threat_intelligence",
        "title": "Google Threat Intelligence events",
        "description": "Collect Google Threat Intelligence events.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_google_threat_intelligence/ti_google_threat_intelligence-0.8.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.cryptominer",
        "title": "Cryptominer Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.first_stage_delivery_vectors",
        "title": "First Stage Delivery Vectors Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.infostealer",
        "title": "Infostealer Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.ioc_stream",
        "title": "IOC Stream Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.iot",
        "title": "Internet of Things Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.linux",
        "title": "Linux Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.malicious_network_infrastructure",
        "title": "Malicious Network Infrastructure Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.malware",
        "title": "Malware Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.mobile",
        "title": "Mobile Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.osx",
        "title": "OS X Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.phishing",
        "title": "Phishing Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.ransomware",
        "title": "Ransomware Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.threat_actor",
        "title": "Threat Actor Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.trending",
        "title": "Daily Top trending Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.vulnerability_weaponization",
        "title": "Vulnerability Weaponization Events"
      }
    ]
  },
  {
    "name": "google_workspace",
    "title": "Google Workspace",
    "version": "3.3.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Google Workspace with Elastic Agent.",
    "type": "integration",
    "download": "/epr/google_workspace/google_workspace-3.3.1.zip",
    "path": "/package/google_workspace/3.3.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/google_workspace/3.3.1/img/logo.svg",
        "title": "logo Google",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "google_workspace",
        "title": "Google Workspace logs",
        "description": "Collect logs from Google Workspace APIs",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/google_workspace/google_workspace-3.3.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "google_workspace.access_transparency",
        "title": "Access Transparency logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.admin",
        "title": "Admin logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.alert",
        "title": "Collect Alert logs from Google Workspace"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.calendar",
        "title": "Google Workspace Calendar logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.chat",
        "title": "Google Workspace Chat logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.chrome",
        "title": "Google Workspace Chrome logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.context_aware_access",
        "title": "Context Aware Access logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.data_studio",
        "title": "Google Workspace Data Studio logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.device",
        "title": "Device logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.drive",
        "title": "Drive logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.gcp",
        "title": "GCP logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.gmail",
        "title": "Google Workspace Gmail logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.group_enterprise",
        "title": "Group Enterprise logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.groups",
        "title": "Groups logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.keep",
        "title": "Google Workspace Keep logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.login",
        "title": "Login logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.meet",
        "title": "Google Workspace Meet logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.rules",
        "title": "Rules logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.saml",
        "title": "SAML logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.token",
        "title": "Token logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.user_accounts",
        "title": "User accounts logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.vault",
        "title": "Google Workspace Vault logs"
      }
    ]
  },
  {
    "name": "grafana",
    "title": "Grafana",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect metrics and logs from Grafana instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/grafana/grafana-0.1.0.zip",
    "path": "/package/grafana/0.1.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/grafana/0.1.0/img/logo.svg",
        "title": "Grafana",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "grafana",
        "title": "Grafana",
        "description": "Collect metrics and logs from Grafana instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "monitoring"
    ],
    "signature_path": "/epr/grafana/grafana-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "grafana.logs",
        "title": "Grafana logs"
      },
      {
        "type": "metrics",
        "dataset": "grafana.metrics",
        "title": "Grafana metrics"
      }
    ]
  },
  {
    "name": "greenhouse",
    "title": "Greenhouse",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect audit logs from Greenhouse ATS with Elastic Agent.",
    "type": "integration",
    "download": "/epr/greenhouse/greenhouse-0.1.0.zip",
    "path": "/package/greenhouse/0.1.0",
    "icons": [
      {
        "src": "/img/greenhouse-logo.svg",
        "path": "/package/greenhouse/0.1.0/img/greenhouse-logo.svg",
        "title": "Greenhouse logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "greenhouse",
        "title": "Greenhouse Audit Logs",
        "description": "Collect audit logs from Greenhouse API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/greenhouse/greenhouse-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "greenhouse.audit",
        "title": "Collect Greenhouse Audit Logs"
      }
    ]
  },
  {
    "name": "ti_greynoise",
    "title": "GreyNoise",
    "version": "0.7.3",
    "release": "beta",
    "description": "Collect Threat Intelligence Indicators from GreyNoise using Elastic Agent, and perform enrichment on Elasticsearch by correlating Indicators of Compromise (IOCs).",
    "type": "integration",
    "download": "/epr/ti_greynoise/ti_greynoise-0.7.3.zip",
    "path": "/package/ti_greynoise/0.7.3",
    "icons": [
      {
        "src": "/img/greynoise_logo.jpeg",
        "path": "/package/ti_greynoise/0.7.3/img/greynoise_logo.jpeg",
        "title": "GreyNoise Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_greynoise",
        "title": "GreyNoise events",
        "description": "Collect GreyNoise events.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "threat_intel",
      "security"
    ],
    "signature_path": "/epr/ti_greynoise/ti_greynoise-0.7.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_greynoise.ip",
        "title": "IP Indicators"
      }
    ]
  },
  {
    "name": "haproxy",
    "title": "HAProxy",
    "version": "1.18.0",
    "release": "ga",
    "description": "Collect logs and metrics from HAProxy servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/haproxy/haproxy-1.18.0.zip",
    "path": "/package/haproxy/1.18.0",
    "icons": [
      {
        "src": "/img/logo_haproxy.svg",
        "path": "/package/haproxy/1.18.0/img/logo_haproxy.svg",
        "title": "logo HAProxy",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "haproxy",
        "title": "HAProxy logs and metrics",
        "description": "Collect logs and metrics from HAProxy instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "load_balancer",
      "observability"
    ],
    "signature_path": "/epr/haproxy/haproxy-1.18.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "haproxy.info",
        "title": "HAProxy info metrics"
      },
      {
        "type": "logs",
        "dataset": "haproxy.log",
        "title": "HAProxy logs"
      },
      {
        "type": "metrics",
        "dataset": "haproxy.stat",
        "title": "HAProxy stat metrics"
      }
    ]
  },
  {
    "name": "hpe_aruba_cx",
    "title": "HPE Aruba CX",
    "version": "0.4.1",
    "release": "beta",
    "description": "Collect logs from HPE Aruba CX with Elastic Agent",
    "type": "integration",
    "download": "/epr/hpe_aruba_cx/hpe_aruba_cx-0.4.1.zip",
    "path": "/package/hpe_aruba_cx/0.4.1",
    "icons": [
      {
        "src": "/img/aruba-networks-logo.svg",
        "path": "/package/hpe_aruba_cx/0.4.1/img/aruba-networks-logo.svg",
        "title": "Aruba Networks Logo",
        "size": "800x800",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "hpe_aruba_cx",
        "title": "HPE Aruba CX logs",
        "description": "Collect HPE Aruba CX logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "config_management",
      "network",
      "security"
    ],
    "signature_path": "/epr/hpe_aruba_cx/hpe_aruba_cx-0.4.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "hpe_aruba_cx.log",
        "title": "Aruba CX logs"
      }
    ]
  },
  {
    "name": "hadoop",
    "title": "Hadoop",
    "version": "1.9.0",
    "release": "ga",
    "description": "Collect metrics from Apache Hadoop with Elastic Agent.",
    "type": "integration",
    "download": "/epr/hadoop/hadoop-1.9.0.zip",
    "path": "/package/hadoop/1.9.0",
    "icons": [
      {
        "src": "/img/hadoop-logo.svg",
        "path": "/package/hadoop/1.9.0/img/hadoop-logo.svg",
        "title": "Hadoop logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "hadoop_metrics",
        "title": "Hadoop Metrics",
        "description": "Collect hadoop metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability",
      "big_data"
    ],
    "signature_path": "/epr/hadoop/hadoop-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "hadoop.application",
        "title": "Application metrics"
      },
      {
        "type": "metrics",
        "dataset": "hadoop.cluster",
        "title": "Cluster metrics"
      },
      {
        "type": "metrics",
        "dataset": "hadoop.datanode",
        "title": "DataNode metrics"
      },
      {
        "type": "metrics",
        "dataset": "hadoop.namenode",
        "title": "NameNode Metrics"
      },
      {
        "type": "metrics",
        "dataset": "hadoop.node_manager",
        "title": "Node Manager metrics"
      }
    ]
  },
  {
    "name": "haproxy_otel",
    "title": "Haproxy OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Haproxy Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/haproxy_otel/haproxy_otel-0.1.0.zip",
    "path": "/package/haproxy_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_haproxy_otel.svg",
        "path": "/package/haproxy_otel/0.1.0/img/logo_haproxy_otel.svg",
        "title": "logo HAProxy otel",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "web",
      "opentelemetry"
    ],
    "signature_path": "/epr/haproxy_otel/haproxy_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "haproxyreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "hashicorp_vault",
    "title": "Hashicorp Vault",
    "version": "1.30.1",
    "release": "ga",
    "description": "Collect logs and metrics from Hashicorp Vault with Elastic Agent.",
    "type": "integration",
    "download": "/epr/hashicorp_vault/hashicorp_vault-1.30.1.zip",
    "path": "/package/hashicorp_vault/1.30.1",
    "icons": [
      {
        "src": "/img/Vault_VerticalLogo_Color_RGB.svg",
        "path": "/package/hashicorp_vault/1.30.1/img/Vault_VerticalLogo_Color_RGB.svg",
        "title": "Vault Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "hashicorp_vault",
        "title": "Hashicorp Vault",
        "description": "Collect logs and monitor Hashicorp Vault."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.12.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/hashicorp_vault/hashicorp_vault-1.30.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "hashicorp_vault.audit",
        "title": "Hashicorp Vault Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "hashicorp_vault.log",
        "title": "Hashicorp Vault Operational Logs"
      },
      {
        "type": "metrics",
        "dataset": "hashicorp_vault.metrics",
        "title": "Hashicorp Vault Metrics"
      }
    ]
  },
  {
    "name": "hostmetrics_input_otel",
    "title": "Host Metrics OpenTelemetry Input Package",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect system metrics using OpenTelemetry Collector",
    "type": "input",
    "download": "/epr/hostmetrics_input_otel/hostmetrics_input_otel-0.1.0.zip",
    "path": "/package/hostmetrics_input_otel/0.1.0",
    "icons": [
      {
        "src": "/img/system-otel.svg",
        "path": "/package/hostmetrics_input_otel/0.1.0/img/system-otel.svg",
        "title": "System OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "hostmetricsreceiver",
        "title": "Host Metrics OpenTelemetry Input",
        "description": "Collect system metrics using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "monitoring",
      "os_system",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/hostmetrics_input_otel/hostmetrics_input_otel-0.1.0.zip.sig"
  },
  {
    "name": "hta",
    "title": "Host Traffic Anomalies",
    "version": "1.0.2",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Prebuilt dashboard for Machine Learning module Security: Host.",
    "type": "integration",
    "download": "/epr/hta/hta-1.0.2.zip",
    "path": "/package/hta/1.0.2",
    "icons": [
      {
        "src": "/img/security-logo-color-64px.svg",
        "path": "/package/hta/1.0.2/img/security-logo-color-64px.svg",
        "title": "Elastic Security logo",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "platinum",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-applied-ml"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/hta/hta-1.0.2.zip.sig"
  },
  {
    "name": "ibmmq",
    "title": "IBM MQ",
    "version": "1.8.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs and metrics from IBM MQ with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ibmmq/ibmmq-1.8.0.zip",
    "path": "/package/ibmmq/1.8.0",
    "icons": [
      {
        "src": "/img/ibmmq.svg",
        "path": "/package/ibmmq/1.8.0/img/ibmmq.svg",
        "title": "ibmmq",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ibmmq",
        "title": "IBM MQ logs and metrics",
        "description": "Collect logs and metrics from IBM MQ instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "message_queue",
      "observability"
    ],
    "signature_path": "/epr/ibmmq/ibmmq-1.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ibmmq.errorlog",
        "title": "IBM MQ Error logs"
      },
      {
        "type": "metrics",
        "dataset": "ibmmq.qmgr",
        "title": "IBM MQ Queue Manager performance metrics"
      }
    ]
  },
  {
    "name": "ibmmq_otel",
    "title": "IBM MQ OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "IBM MQ Assets from OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/ibmmq_otel/ibmmq_otel-0.1.0.zip",
    "path": "/package/ibmmq_otel/0.1.0",
    "icons": [
      {
        "src": "/img/ibmmq_otel_logo.svg",
        "path": "/package/ibmmq_otel/0.1.0/img/ibmmq_otel_logo.svg",
        "title": "IBM MQ OTel",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "message_queue",
      "opentelemetry",
      "observability"
    ],
    "signature_path": "/epr/ibmmq_otel/ibmmq_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "ibmmq.otel"
        }
      ]
    }
  },
  {
    "name": "ibm_qradar",
    "title": "IBM QRadar",
    "version": "0.2.0",
    "release": "beta",
    "description": "Collect logs from IBM QRadar with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ibm_qradar/ibm_qradar-0.2.0.zip",
    "path": "/package/ibm_qradar/0.2.0",
    "icons": [
      {
        "src": "/img/ibm_qradar-logo.svg",
        "path": "/package/ibm_qradar/0.2.0/img/ibm_qradar-logo.svg",
        "title": "IBM QRadar logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ibm_qradar",
        "title": "IBM QRadar",
        "description": "Collect logs from IBM QRadar.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "siem"
    ],
    "signature_path": "/epr/ibm_qradar/ibm_qradar-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ibm_qradar.offense",
        "title": "Collect Offenses from IBM QRadar."
      }
    ]
  },
  {
    "name": "iis",
    "title": "IIS",
    "version": "1.24.4",
    "release": "ga",
    "description": "Collect logs and metrics from Internet Information Services (IIS) servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/iis/iis-1.24.4.zip",
    "path": "/package/iis/1.24.4",
    "icons": [
      {
        "src": "/img/iis.svg",
        "path": "/package/iis/1.24.4/img/iis.svg",
        "title": "iis",
        "size": "100x100",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "iis",
        "title": "IIS logs and metrics",
        "description": "Collect logs and metrics from IIS instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability"
    ],
    "signature_path": "/epr/iis/iis-1.24.4.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "iis.access",
        "title": "IIS access logs"
      },
      {
        "type": "metrics",
        "dataset": "iis.application_pool",
        "title": "IIS application_pool metrics"
      },
      {
        "type": "logs",
        "dataset": "iis.error",
        "title": "IIS error logs"
      },
      {
        "type": "metrics",
        "dataset": "iis.webserver",
        "title": "IIS web server metrics"
      },
      {
        "type": "metrics",
        "dataset": "iis.website",
        "title": "IIS website metrics"
      }
    ]
  },
  {
    "name": "iis_otel_input",
    "title": "IIS OpenTelemetry Input Package",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "IIS OpenTelemetry Input Package",
    "type": "input",
    "download": "/epr/iis_otel_input/iis_otel_input-0.1.0.zip",
    "path": "/package/iis_otel_input/0.1.0",
    "icons": [
      {
        "src": "/img/iis_otellogo.svg",
        "path": "/package/iis_otel_input/0.1.0/img/iis_otellogo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "iisreceiver",
        "title": "IIS OpenTelemetry Input",
        "description": "Collect IIS metrics using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/iis_otel_input/iis_otel_input-0.1.0.zip.sig"
  },
  {
    "name": "iis_otel",
    "title": "IIS OpenTelemetry assets",
    "version": "0.3.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "IIS Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/iis_otel/iis_otel-0.3.0.zip",
    "path": "/package/iis_otel/0.3.0",
    "icons": [
      {
        "src": "/img/iis_otel.svg",
        "path": "/package/iis_otel/0.3.0/img/iis_otel.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/iis_otel/iis_otel-0.3.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "iisreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "ironscales",
    "title": "IRONSCALES",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from IRONSCALES with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ironscales/ironscales-0.1.0.zip",
    "path": "/package/ironscales/0.1.0",
    "icons": [
      {
        "src": "/img/ironscales-logo.svg",
        "path": "/package/ironscales/0.1.0/img/ironscales-logo.svg",
        "title": "IRONSCALES logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ironscales",
        "title": "IRONSCALES",
        "description": "Collect logs from IRONSCALES.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.8 || ^9.1.8 || ^9.2.2 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/ironscales/ironscales-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ironscales.incident",
        "title": "Collect Incidents from IRONSCALES."
      }
    ]
  },
  {
    "name": "imperva",
    "title": "Imperva",
    "version": "1.10.0",
    "release": "ga",
    "description": "Collect logs from Imperva devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/imperva/imperva-1.10.0.zip",
    "path": "/package/imperva/1.10.0",
    "icons": [
      {
        "src": "/img/imperva-logo.svg",
        "path": "/package/imperva/1.10.0/img/imperva-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "securesphere",
        "title": "Imperva SecureSphere",
        "description": "Collect Imperva SecureSphere logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/imperva/imperva-1.10.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "imperva.securesphere",
        "title": "Collect logs from Imperva SecureSphere"
      }
    ]
  },
  {
    "name": "imperva_cloud_waf",
    "title": "Imperva Cloud WAF",
    "version": "1.13.1",
    "release": "ga",
    "description": "Collect logs from Imperva Cloud WAF with Elastic Agent.",
    "type": "integration",
    "download": "/epr/imperva_cloud_waf/imperva_cloud_waf-1.13.1.zip",
    "path": "/package/imperva_cloud_waf/1.13.1",
    "icons": [
      {
        "src": "/img/imperva-logo.svg",
        "path": "/package/imperva_cloud_waf/1.13.1/img/imperva-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "imperva_cloud_waf",
        "title": "Imperva Cloud WAF logs",
        "description": "Collect logs from Imperva Cloud WAF instance."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/imperva_cloud_waf/imperva_cloud_waf-1.13.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "imperva_cloud_waf.event",
        "title": "Collect Imperva Cloud WAF Events"
      }
    ]
  },
  {
    "name": "influxdb",
    "title": "InfluxDb",
    "version": "0.11.0",
    "release": "beta",
    "description": "Collect metrics from Influxdb database",
    "type": "integration",
    "download": "/epr/influxdb/influxdb-0.11.0.zip",
    "path": "/package/influxdb/0.11.0",
    "icons": [
      {
        "src": "/img/influxdb-logo.svg",
        "path": "/package/influxdb/0.11.0/img/influxdb-logo.svg",
        "title": "Influxdb logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "influxdb",
        "title": "InfluxDb Status",
        "description": "Collect InfluxDb status metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/influxdb/influxdb-0.11.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "influxdb.advstatus",
        "title": "InfluxDB database advanced status metrics"
      },
      {
        "type": "metrics",
        "dataset": "influxdb.status",
        "title": "InfluxDB database status metrics"
      }
    ]
  },
  {
    "name": "influxdb_otel",
    "title": "InfluxDb OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "InfluxDb Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/influxdb_otel/influxdb_otel-0.1.0.zip",
    "path": "/package/influxdb_otel/0.1.0",
    "icons": [
      {
        "src": "/img/influxdb_otel.svg",
        "path": "/package/influxdb_otel/0.1.0/img/influxdb_otel.svg",
        "title": "InfluxDb OpenTelemetry Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/influxdb_otel/influxdb_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "influxdb.otel"
        }
      ]
    }
  },
  {
    "name": "infoblox_bloxone_ddi",
    "title": "Infoblox BloxOne DDI",
    "version": "1.22.0",
    "release": "ga",
    "description": "Collect logs from Infoblox BloxOne DDI with Elastic Agent.",
    "type": "integration",
    "download": "/epr/infoblox_bloxone_ddi/infoblox_bloxone_ddi-1.22.0.zip",
    "path": "/package/infoblox_bloxone_ddi/1.22.0",
    "icons": [
      {
        "src": "/img/infoblox-bloxone-ddi-logo.svg",
        "path": "/package/infoblox_bloxone_ddi/1.22.0/img/infoblox-bloxone-ddi-logo.svg",
        "title": "Infoblox BloxOne DDI logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "infoblox_bloxone_ddi",
        "title": "Infoblox BloxOne DDI",
        "description": "Collect logs from Infoblox BloxOne DDI."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "dns_security"
    ],
    "signature_path": "/epr/infoblox_bloxone_ddi/infoblox_bloxone_ddi-1.22.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "infoblox_bloxone_ddi.dhcp_lease",
        "title": "Collect DHCP Lease logs from Infoblox BloxOne DDI"
      },
      {
        "type": "logs",
        "dataset": "infoblox_bloxone_ddi.dns_config",
        "title": "Collect DNS Config logs from Infoblox BloxOne DDI"
      },
      {
        "type": "logs",
        "dataset": "infoblox_bloxone_ddi.dns_data",
        "title": "Collect DNS Data logs from Infoblox BloxOne DDI"
      }
    ]
  },
  {
    "name": "infoblox_nios",
    "title": "Infoblox NIOS",
    "version": "2.1.1",
    "release": "ga",
    "description": "Collect logs from Infoblox NIOS with Elastic Agent.",
    "type": "integration",
    "download": "/epr/infoblox_nios/infoblox_nios-2.1.1.zip",
    "path": "/package/infoblox_nios/2.1.1",
    "icons": [
      {
        "src": "/img/infoblox-logo.svg",
        "path": "/package/infoblox_nios/2.1.1/img/infoblox-logo.svg",
        "title": "Infoblox NIOS logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Infoblox NIOS",
        "title": "Infoblox NIOS logs",
        "description": "Collect Infoblox NIOS logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "dns_security"
    ],
    "signature_path": "/epr/infoblox_nios/infoblox_nios-2.1.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "infoblox_nios.log",
        "title": "Infoblox NIOS logs"
      }
    ]
  },
  {
    "name": "infoblox_threat_defense",
    "title": "Infoblox Threat Defense",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from Infoblox Threat Defense with Elastic Agent.",
    "type": "integration",
    "download": "/epr/infoblox_threat_defense/infoblox_threat_defense-0.1.0.zip",
    "path": "/package/infoblox_threat_defense/0.1.0",
    "icons": [
      {
        "src": "/img/infoblox-threat-defense-logo.svg",
        "path": "/package/infoblox_threat_defense/0.1.0/img/infoblox-threat-defense-logo.svg",
        "title": "Infoblox Threat Defense logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "infoblox_threat_defense",
        "title": "Infoblox Threat Defense logs",
        "description": "Collect Infoblox Threat Defense logs from syslog."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0 "
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/infoblox_threat_defense/infoblox_threat_defense-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "infoblox_threat_defense.event",
        "title": "Event"
      }
    ]
  },
  {
    "name": "iptables",
    "title": "Iptables",
    "version": "1.23.0",
    "release": "ga",
    "description": "Collect logs from Iptables with Elastic Agent.",
    "type": "integration",
    "download": "/epr/iptables/iptables-1.23.0.zip",
    "path": "/package/iptables/1.23.0",
    "icons": [
      {
        "src": "/img/linux.svg",
        "path": "/package/iptables/1.23.0/img/linux.svg",
        "title": "linux",
        "size": "299x354",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "iptables",
        "title": "Iptables logs",
        "description": "Collect logs from iptables instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/iptables/iptables-1.23.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "iptables.log",
        "title": "Iptables log logs"
      }
    ]
  },
  {
    "name": "island_browser",
    "title": "Island Browser",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collect logs from Island Browser with Elastic Agent.",
    "type": "integration",
    "download": "/epr/island_browser/island_browser-1.0.0.zip",
    "path": "/package/island_browser/1.0.0",
    "icons": [
      {
        "src": "/img/island-browser-logo.svg",
        "path": "/package/island_browser/1.0.0/img/island-browser-logo.svg",
        "title": "Island Browser logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "island_browser",
        "title": "Island Browser",
        "description": "Collect logs from Island Browser.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.8 || ^8.19.5  || ^9.0.8  || ^9.1.5"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/island_browser/island_browser-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "island_browser.admin_actions",
        "title": "Collect Admin Action logs from Island Browser."
      },
      {
        "type": "logs",
        "dataset": "island_browser.audit",
        "title": "Collect Audit logs from Island Browser."
      },
      {
        "type": "logs",
        "dataset": "island_browser.compromised_credential",
        "title": "Collect Compromised Credential logs from Island Browser."
      },
      {
        "type": "logs",
        "dataset": "island_browser.device",
        "title": "Collect Device logs from Island Browser."
      },
      {
        "type": "logs",
        "dataset": "island_browser.user",
        "title": "Collect User logs from Island Browser."
      }
    ]
  },
  {
    "name": "istio",
    "title": "Istio",
    "version": "0.8.0",
    "release": "beta",
    "description": "Collect logs and metrics from the service mesh Istio with Elastic Agent.",
    "type": "integration",
    "download": "/epr/istio/istio-0.8.0.zip",
    "path": "/package/istio/0.8.0",
    "icons": [
      {
        "src": "/img/logo_istio.svg",
        "path": "/package/istio/0.8.0/img/logo_istio.svg",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "istio",
        "title": "Istio logs and metrics",
        "description": "Collect access logs and metrics from Istio service mesh.",
        "data_streams": [
          "access_logs",
          "proxy_metrics",
          "istiod_metrics"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "observability",
      "network",
      "containers",
      "kubernetes"
    ],
    "signature_path": "/epr/istio/istio-0.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "istio.access_logs",
        "title": "Istio access logs"
      },
      {
        "type": "metrics",
        "dataset": "istio.istiod_metrics",
        "title": "Istiod Metrics"
      },
      {
        "type": "metrics",
        "dataset": "istio.proxy_metrics",
        "title": "Istio Proxy Metrics"
      }
    ]
  },
  {
    "name": "jamf_compliance_reporter",
    "title": "Jamf Compliance Reporter",
    "version": "1.16.0",
    "release": "ga",
    "description": "Collect logs from Jamf Compliance Reporter with Elastic Agent.",
    "type": "integration",
    "download": "/epr/jamf_compliance_reporter/jamf_compliance_reporter-1.16.0.zip",
    "path": "/package/jamf_compliance_reporter/1.16.0",
    "icons": [
      {
        "src": "/img/jamf-compliance-reporter-logo.svg",
        "path": "/package/jamf_compliance_reporter/1.16.0/img/jamf-compliance-reporter-logo.svg",
        "title": "Jamf Compliance Reporter Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Jamf Compliance Reporter",
        "title": "Jamf Compliance Reporter logs",
        "description": "Collect Jamf Compliance Reporter logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/jamf_compliance_reporter/jamf_compliance_reporter-1.16.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "jamf_compliance_reporter.log",
        "title": "Jamf Compliance Reporter logs"
      }
    ]
  },
  {
    "name": "jamf_pro",
    "title": "Jamf Pro",
    "version": "1.1.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs and inventory data from Jamf Pro with Elastic Agent",
    "type": "integration",
    "download": "/epr/jamf_pro/jamf_pro-1.1.0.zip",
    "path": "/package/jamf_pro/1.1.0",
    "icons": [
      {
        "src": "/img/logo.png",
        "path": "/package/jamf_pro/1.1.0/img/logo.png",
        "title": "Jamf Pro logo",
        "size": "128x128",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "general_settings",
        "title": "Jamf Pro settings",
        "description": "Jamf Pro related settings"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "custom"
    ],
    "signature_path": "/epr/jamf_pro/jamf_pro-1.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "jamf_pro.events",
        "title": "Jamf Pro Events"
      },
      {
        "type": "logs",
        "dataset": "jamf_pro.inventory",
        "title": "Inventory data"
      }
    ]
  },
  {
    "name": "jamf_protect",
    "title": "Jamf Protect",
    "version": "3.3.0",
    "release": "ga",
    "description": "Receives events from Jamf Protect with Elastic Agent.",
    "type": "integration",
    "download": "/epr/jamf_protect/jamf_protect-3.3.0.zip",
    "path": "/package/jamf_protect/3.3.0",
    "icons": [
      {
        "src": "/img/jamf_logo.svg",
        "path": "/package/jamf_protect/3.3.0/img/jamf_logo.svg",
        "title": "Jamf Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Jamf Protect",
        "title": "Jamf Protect events",
        "description": "Receive Jamf Protect events."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/jamf_protect/jamf_protect-3.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "jamf_protect.alerts",
        "title": "Receives Alerts from Jamf Protect with Elastic Agent."
      },
      {
        "type": "logs",
        "dataset": "jamf_protect.telemetry",
        "title": "Receives Telemetry from Jamf Protect with Elastic Agent."
      },
      {
        "type": "logs",
        "dataset": "jamf_protect.telemetry_legacy",
        "title": "Jamf Protect Telemetry (Legacy)."
      },
      {
        "type": "logs",
        "dataset": "jamf_protect.web_threat_events",
        "title": "Receives Web Threat Events from Jamf Protect with Elastic Agent."
      },
      {
        "type": "logs",
        "dataset": "jamf_protect.web_traffic_events",
        "title": "Receives Web Traffic Events from Jamf Protect with Elastic Agent."
      }
    ]
  },
  {
    "name": "jolokia",
    "title": "Jolokia Input",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collects Metrics from Jolokia Agents",
    "type": "input",
    "download": "/epr/jolokia/jolokia-1.0.0.zip",
    "path": "/package/jolokia/1.0.0",
    "icons": [
      {
        "src": "/img/jolokia_logo.svg",
        "path": "/package/jolokia/1.0.0/img/jolokia_logo.svg",
        "title": "Jolokia logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "jolokia",
        "title": "Jolokia Metrics",
        "description": "Collect Jolokia metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "custom"
    ],
    "signature_path": "/epr/jolokia/jolokia-1.0.0.zip.sig"
  },
  {
    "name": "jumpcloud",
    "title": "JumpCloud",
    "version": "1.17.1",
    "release": "ga",
    "description": "Collect logs from JumpCloud Directory as a Service",
    "type": "integration",
    "download": "/epr/jumpcloud/jumpcloud-1.17.1.zip",
    "path": "/package/jumpcloud/1.17.1",
    "icons": [
      {
        "src": "/img/jumpcloud.svg",
        "path": "/package/jumpcloud/1.17.1/img/jumpcloud.svg",
        "title": "JumpCloud",
        "size": "100x100",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "jumpcloud",
        "title": "JumpCloud Events",
        "description": "Collect JumpCloud Directory as a Service Events"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "security"
    ],
    "signature_path": "/epr/jumpcloud/jumpcloud-1.17.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "jumpcloud.events",
        "title": "JumpCloud Directory as a Service Events"
      }
    ]
  },
  {
    "name": "juniper",
    "title": "Juniper Logs",
    "version": "1.2.0",
    "release": "ga",
    "description": "Deprecated. Use a specific Juniper package instead.",
    "type": "integration",
    "download": "/epr/juniper/juniper-1.2.0.zip",
    "path": "/package/juniper/1.2.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/juniper/1.2.0/img/logo.svg",
        "title": "Juniper logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "juniper",
        "title": "Juniper logs",
        "description": "Collect Juniper logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.0.0"
      }
    },
    "owner": {
      "github": "elastic/security-external-integrations"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/juniper/juniper-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "juniper.junos",
        "title": "Juniper JUNOS logs"
      },
      {
        "type": "logs",
        "dataset": "juniper.netscreen",
        "title": "Netscreen logs"
      },
      {
        "type": "logs",
        "dataset": "juniper.srx",
        "title": "Juniper SRX logs"
      }
    ]
  },
  {
    "name": "juniper_srx",
    "title": "Juniper SRX",
    "version": "1.27.0",
    "release": "ga",
    "description": "Collect logs from Juniper SRX devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/juniper_srx/juniper_srx-1.27.0.zip",
    "path": "/package/juniper_srx/1.27.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/juniper_srx/1.27.0/img/logo.svg",
        "title": "Juniper logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "juniper",
        "title": "Juniper SRX logs",
        "description": "Collect Juniper SRX logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "firewall_security"
    ],
    "signature_path": "/epr/juniper_srx/juniper_srx-1.27.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "juniper_srx.log",
        "title": "Juniper SRX logs"
      }
    ]
  },
  {
    "name": "jupiter_one",
    "title": "JupiterOne",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from JupiterOne with Elastic Agent.",
    "type": "integration",
    "download": "/epr/jupiter_one/jupiter_one-0.1.0.zip",
    "path": "/package/jupiter_one/0.1.0",
    "icons": [
      {
        "src": "/img/jupiter_one-logo.svg",
        "path": "/package/jupiter_one/0.1.0/img/jupiter_one-logo.svg",
        "title": "JupiterOne logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "jupiter_one",
        "title": "JupiterOne",
        "description": "Collect logs from JupiterOne.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ^9.1.10 || ^9.2.4 || ^9.3.1 || ^9.4.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/jupiter_one/jupiter_one-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "jupiter_one.asset",
        "title": "Collect Assets from JupiterOne."
      },
      {
        "type": "logs",
        "dataset": "jupiter_one.risks_and_alerts",
        "title": "JupiterOne Risks and Alerts"
      }
    ]
  },
  {
    "name": "kafka",
    "title": "Kafka",
    "version": "1.27.0",
    "release": "ga",
    "description": "Collect logs and metrics from Kafka servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/kafka/kafka-1.27.0.zip",
    "path": "/package/kafka/1.27.0",
    "icons": [
      {
        "src": "/img/logo_kafka.svg",
        "path": "/package/kafka/1.27.0/img/logo_kafka.svg",
        "title": "logo kafka",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kafka",
        "title": "Kafka logs and metrics",
        "description": "Collect logs and metrics from Kafka brokers"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.6 || ^9.0.6"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "stream_processing",
      "observability"
    ],
    "signature_path": "/epr/kafka/kafka-1.27.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "kafka.broker",
        "title": "Kafka broker metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka.consumer",
        "title": "Kafka consumer metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka.consumergroup",
        "title": "Kafka consumergroup metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka.controller",
        "title": "Apache Kafka controller metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka.jvm",
        "title": "Apache Kafka JVM metrics"
      },
      {
        "type": "logs",
        "dataset": "kafka.log",
        "title": "Kafka log logs"
      },
      {
        "type": "metrics",
        "dataset": "kafka.log_manager",
        "title": "Apache Kafka Log Manager metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka.network",
        "title": "Apache Kafka network metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka.partition",
        "title": "Kafka partition metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka.producer",
        "title": "Kafka producer metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka.raft",
        "title": "Apache Kafka Raft metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka.replica_manager",
        "title": "Apache Kafka replica manager metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka.topic",
        "title": "Apache Kafka topic metrics"
      }
    ]
  },
  {
    "name": "kafka_connect",
    "title": "Kafka Connect",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect metrics from Kafka Connect instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/kafka_connect/kafka_connect-0.1.0.zip",
    "path": "/package/kafka_connect/0.1.0",
    "icons": [
      {
        "src": "/img/kafka-connect.svg",
        "path": "/package/kafka_connect/0.1.0/img/kafka-connect.svg",
        "title": "Kafka Connect",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kafka_connect",
        "title": "Kafka Connect metrics",
        "description": "This Elastic integration collects metrics from Kafka Connect instances via Jolokia."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "message_queue",
      "observability",
      "monitoring",
      "infrastructure"
    ],
    "signature_path": "/epr/kafka_connect/kafka_connect-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "kafka_connect.client",
        "title": "Kafka Connect client metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka_connect.connector",
        "title": "Kafka Connect connector metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka_connect.task",
        "title": "Kafka Connect task metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka_connect.worker",
        "title": "Kafka Connect worker metrics"
      }
    ]
  },
  {
    "name": "kafka_otel",
    "title": "Kafka OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Kafka Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/kafka_otel/kafka_otel-0.1.0.zip",
    "path": "/package/kafka_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_kafka.svg",
        "path": "/package/kafka_otel/0.1.0/img/logo_kafka.svg",
        "title": "Kafka logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "message_queue",
      "opentelemetry"
    ],
    "signature_path": "/epr/kafka_otel/kafka_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "kafkametricsreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "keeper",
    "title": "Keeper Security",
    "version": "0.1.0",
    "release": "beta",
    "description": "Keeper Security agentless integration for collecting audit events directly via Elasticsearch Bulk API. No agents required - Keeper pushes data directly to Elasticsearch.\n",
    "type": "integration",
    "download": "/epr/keeper/keeper-0.1.0.zip",
    "path": "/package/keeper/0.1.0",
    "icons": [
      {
        "src": "/img/keeper-logo.svg",
        "path": "/package/keeper/0.1.0/img/keeper-logo.svg",
        "title": "Keeper Security",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "authentication",
      "custom"
    ],
    "signature_path": "/epr/keeper/keeper-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "keeper.audit",
        "title": "Keeper Audit Events"
      }
    ]
  },
  {
    "name": "keycloak",
    "title": "Keycloak",
    "version": "1.31.2",
    "release": "ga",
    "description": "Collect logs from Keycloak with Elastic Agent.",
    "type": "integration",
    "download": "/epr/keycloak/keycloak-1.31.2.zip",
    "path": "/package/keycloak/1.31.2",
    "icons": [
      {
        "src": "/img/keycloak-logo.svg",
        "path": "/package/keycloak/1.31.2/img/keycloak-logo.svg",
        "title": "Keycloak",
        "size": "256x256",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "keycloak",
        "title": "Keycloak logs",
        "description": "Collect logs from Keycloak"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/keycloak/keycloak-1.31.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "keycloak.log",
        "title": "Keycloak"
      }
    ]
  },
  {
    "name": "kibana",
    "title": "Kibana",
    "version": "2.8.0",
    "release": "ga",
    "description": "Collect logs and metrics from Kibana with Elastic Agent.",
    "type": "integration",
    "download": "/epr/kibana/kibana-2.8.0.zip",
    "path": "/package/kibana/2.8.0",
    "icons": [
      {
        "src": "/img/logo_kibana.svg",
        "path": "/package/kibana/2.8.0/img/logo_kibana.svg",
        "title": "logo kibana",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kibana",
        "title": "Kibana logs and metrics",
        "description": "Collect logs and metrics from Kibana instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/stack-monitoring"
    },
    "categories": [
      "elastic_stack"
    ],
    "signature_path": "/epr/kibana/kibana-2.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "kibana.audit",
        "title": "kibana audit logs"
      },
      {
        "type": "metrics",
        "dataset": "kibana.background_task_utilization",
        "title": "Kibana background task utilization metrics"
      },
      {
        "type": "metrics",
        "dataset": "kibana.stack_monitoring.cluster_actions",
        "title": "Kibana cluster_actions metrics"
      },
      {
        "type": "metrics",
        "dataset": "kibana.stack_monitoring.cluster_rules",
        "title": "Kibana cluster_rules metrics"
      },
      {
        "type": "logs",
        "dataset": "kibana.log",
        "title": "Kibana logs"
      },
      {
        "type": "metrics",
        "dataset": "kibana.stack_monitoring.node_actions",
        "title": "Kibana node_actions metrics"
      },
      {
        "type": "metrics",
        "dataset": "kibana.stack_monitoring.node_rules",
        "title": "Kibana node_rules metrics"
      },
      {
        "type": "metrics",
        "dataset": "kibana.stack_monitoring.stats",
        "title": "Kibana stats metrics"
      },
      {
        "type": "metrics",
        "dataset": "kibana.stack_monitoring.status",
        "title": "Kibana status metrics"
      },
      {
        "type": "metrics",
        "dataset": "kibana.task_manager_metrics",
        "title": "Kibana task manager metrics"
      }
    ]
  },
  {
    "name": "kubernetes",
    "title": "Kubernetes",
    "version": "1.85.0",
    "release": "ga",
    "description": "Collect logs and metrics from Kubernetes clusters with Elastic Agent.",
    "type": "integration",
    "download": "/epr/kubernetes/kubernetes-1.85.0.zip",
    "path": "/package/kubernetes/1.85.0",
    "icons": [
      {
        "src": "/img/logo_kubernetes.svg",
        "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
        "title": "Logo Kubernetes",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kubelet",
        "title": "Kubelet Metrics",
        "description": "Collect metrics from Kubernetes Kubelet API with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "container",
          "node",
          "pod",
          "system",
          "volume"
        ]
      },
      {
        "name": "kube-state-metrics",
        "title": "Kube-state-metrics",
        "description": "Collect container metrics from Kubernetes Kube-state-metrics with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "state_container",
          "state_cronjob",
          "state_daemonset",
          "state_deployment",
          "state_job",
          "state_namespace",
          "state_node",
          "state_persistentvolume",
          "state_persistentvolumeclaim",
          "state_pod",
          "state_replicaset",
          "state_resourcequota",
          "state_service",
          "state_statefulset",
          "state_storageclass"
        ]
      },
      {
        "name": "kube-apiserver",
        "title": "Kube-apiserver Metrics",
        "description": "Collect metrics from Kubernetes API Server with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "apiserver"
        ]
      },
      {
        "name": "kube-proxy",
        "title": "Kube-proxy Metrics",
        "description": "Collect metrics from Kubernetes Proxy server with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "proxy"
        ]
      },
      {
        "name": "kube-scheduler",
        "title": "Kube-scheduler Metrics",
        "description": "Collect metrics from Kubernetes Scheduler with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "scheduler"
        ]
      },
      {
        "name": "kube-controller-manager",
        "title": "Kube-controller-manager Metrics",
        "description": "Collect metrics from Kubernetes Controller Manager with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "controllermanager"
        ]
      },
      {
        "name": "events",
        "title": "Kubernetes Event Metrics",
        "description": "Collect events related metrics from Kubernetes API server with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "event"
        ]
      },
      {
        "name": "container-logs",
        "title": "Kubernetes Container Logs",
        "description": "Collect container related logs from Kubernetes clusters with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "container_logs"
        ]
      },
      {
        "name": "audit-logs",
        "title": "Kubernetes Audit Logs",
        "description": "Collect audit logs from Kubernetes nodes with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "audit_logs"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~9.1.10 || ~9.2.4 || ^9.3.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "observability",
      "containers",
      "kubernetes"
    ],
    "signature_path": "/epr/kubernetes/kubernetes-1.85.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "kubernetes.apiserver",
        "title": "Kubernetes API Server metrics"
      },
      {
        "type": "logs",
        "dataset": "kubernetes.audit_logs",
        "title": "Kubernetes audit logs"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.container",
        "title": "Kubernetes Container metrics"
      },
      {
        "type": "logs",
        "dataset": "kubernetes.container_logs",
        "title": "Kubernetes container logs"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.controllermanager",
        "title": "Kubernetes Controller Manager metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.event",
        "title": "Kubernetes Event metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.node",
        "title": "Kubernetes Node metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.pod",
        "title": "Kubernetes Pod metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.proxy",
        "title": "Kubernetes Proxy metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.scheduler",
        "title": "Kubernetes Scheduler metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_container",
        "title": "Kubernetes Container metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_cronjob",
        "title": "Kubernetes Cronjob metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_daemonset",
        "title": "Kubernetes Deamonset metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_deployment",
        "title": "Kubernetes Deployment metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_job",
        "title": "Kubernetes Job metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_namespace",
        "title": "Kubernetes Namespace metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_node",
        "title": "Kubernetes Node metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_persistentvolume",
        "title": "Kubernetes PersistentVolume metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_persistentvolumeclaim",
        "title": "Kubernetes PersistentVolumeClaim metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_pod",
        "title": "Kubernetes Pod metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_replicaset",
        "title": "Kubernetes state_replicaset metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_resourcequota",
        "title": "Kubernetes ResourceQuota metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_service",
        "title": "Kubernetes Service metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_statefulset",
        "title": "Kubernetes StatefulSet metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_storageclass",
        "title": "Kubernetes StorageClass metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.system",
        "title": "Kubernetes System metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.volume",
        "title": "Kubernetes Volume metrics"
      }
    ]
  },
  {
    "name": "kubernetes_otel",
    "title": "Kubernetes OpenTelemetry Assets",
    "version": "1.4.0",
    "release": "ga",
    "description": "Utilise the pre-built dashboard for OTel-native metrics and events collected from a Kubernetes cluster",
    "type": "content",
    "download": "/epr/kubernetes_otel/kubernetes_otel-1.4.0.zip",
    "path": "/package/kubernetes_otel/1.4.0",
    "icons": [
      {
        "src": "/img/kubernetes-otel-logo.svg",
        "path": "/package/kubernetes_otel/1.4.0/img/kubernetes-otel-logo.svg",
        "title": "Sample logo",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "kubernetes",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/kubernetes_otel/kubernetes_otel-1.4.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "kubeletstatsreceiver.otel"
        },
        {
          "name": "k8sobjectsreceiver.otel"
        },
        {
          "name": "k8seventsreceiver.otel"
        },
        {
          "name": "k8sclusterreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "lastpass",
    "title": "LastPass",
    "version": "1.21.0",
    "release": "ga",
    "description": "Collect logs from LastPass with Elastic Agent.",
    "type": "integration",
    "download": "/epr/lastpass/lastpass-1.21.0.zip",
    "path": "/package/lastpass/1.21.0",
    "icons": [
      {
        "src": "/img/lastpass-logo.svg",
        "path": "/package/lastpass/1.21.0/img/lastpass-logo.svg",
        "title": "LastPass Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "lastpass",
        "title": "LastPass",
        "description": "Collect logs from LastPass."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "credential_management"
    ],
    "signature_path": "/epr/lastpass/lastpass-1.21.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "lastpass.detailed_shared_folder",
        "title": "Collect Detailed Shared Folder logs from LastPass"
      },
      {
        "type": "logs",
        "dataset": "lastpass.event_report",
        "title": "Collect Event Report logs from LastPass"
      },
      {
        "type": "logs",
        "dataset": "lastpass.user",
        "title": "Collect User logs from LastPass"
      }
    ]
  },
  {
    "name": "lmd",
    "title": "Lateral Movement Detection",
    "version": "2.6.3",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "ML package to detect lateral movement based on file transfer activity and Windows RDP events.",
    "type": "integration",
    "download": "/epr/lmd/lmd-2.6.3.zip",
    "path": "/package/lmd/2.6.3",
    "icons": [
      {
        "src": "/img/icon-machine-learning.svg",
        "path": "/package/lmd/2.6.3/img/icon-machine-learning.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "platinum",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-applied-ml"
    },
    "categories": [
      "security",
      "advanced_analytics_ueba"
    ],
    "signature_path": "/epr/lmd/lmd-2.6.3.zip.sig"
  },
  {
    "name": "linux",
    "title": "Linux Metrics",
    "version": "1.1.0",
    "release": "ga",
    "description": "Collect metrics from Linux servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/linux/linux-1.1.0.zip",
    "path": "/package/linux/1.1.0",
    "policy_templates": [
      {
        "name": "system",
        "title": "Linux kernel metrics",
        "description": "Collect system metrics from Linux operating systems"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "os_system"
    ],
    "signature_path": "/epr/linux/linux-1.1.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "linux.conntrack",
        "title": "System conntrack metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.entropy",
        "title": "System entropy metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.iostat",
        "title": "Linux disk iostat metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.ksm",
        "title": "Kernel Samepage merging metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.memory",
        "title": "Linux-only memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.network_summary",
        "title": "System network_summary metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.pageinfo",
        "title": "System page info metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.raid",
        "title": "System raid metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.service",
        "title": "System service metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.socket",
        "title": "System socket metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.users",
        "title": "System users metrics"
      }
    ]
  },
  {
    "name": "problemchild",
    "title": "Living off the Land Attack Detection",
    "version": "2.4.6",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "ML solution package to detect Living off the Land (LotL) attacks in your environment. Requires a Platinum subscription.",
    "type": "integration",
    "download": "/epr/problemchild/problemchild-2.4.6.zip",
    "path": "/package/problemchild/2.4.6",
    "icons": [
      {
        "src": "/img/icon-machine-learning.svg",
        "path": "/package/problemchild/2.4.6/img/icon-machine-learning.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "platinum",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-applied-ml"
    },
    "categories": [
      "security",
      "advanced_analytics_ueba"
    ],
    "signature_path": "/epr/problemchild/problemchild-2.4.6.zip.sig"
  },
  {
    "name": "logstash",
    "title": "Logstash",
    "version": "2.10.1",
    "release": "ga",
    "description": "Collect logs and metrics from Logstash with Elastic Agent.",
    "type": "integration",
    "download": "/epr/logstash/logstash-2.10.1.zip",
    "path": "/package/logstash/2.10.1",
    "icons": [
      {
        "src": "/img/logo_logstash.svg",
        "path": "/package/logstash/2.10.1/img/logo_logstash.svg",
        "title": "logo logstash",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logstash",
        "title": "Logstash logs and metrics",
        "description": "Collect logs and metrics from Logstash instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/logstash"
    },
    "categories": [
      "observability",
      "elastic_stack"
    ],
    "signature_path": "/epr/logstash/logstash-2.10.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "logstash.health_report",
        "title": "Health Report"
      },
      {
        "type": "logs",
        "dataset": "logstash.log",
        "title": "Logstash logs"
      },
      {
        "type": "metrics",
        "dataset": "logstash.stack_monitoring.node",
        "title": "Logstash node metrics"
      },
      {
        "type": "metrics",
        "dataset": "logstash.node",
        "title": "Logstash Node Stats"
      },
      {
        "type": "metrics",
        "dataset": "logstash.stack_monitoring.node_stats",
        "title": "Logstash node_stats metrics"
      },
      {
        "type": "metrics",
        "dataset": "logstash.pipeline",
        "title": "Logstash pipeline"
      },
      {
        "type": "metrics",
        "dataset": "logstash.plugins",
        "title": "Logstash plugins"
      },
      {
        "type": "logs",
        "dataset": "logstash.slowlog",
        "title": "logstash slowlog logs"
      }
    ]
  },
  {
    "name": "lumos",
    "title": "Lumos",
    "version": "1.6.0",
    "release": "ga",
    "description": "An integration with Lumos to ship your Activity logs to your Elastic instance.",
    "type": "integration",
    "download": "/epr/lumos/lumos-1.6.0.zip",
    "path": "/package/lumos/1.6.0",
    "icons": [
      {
        "src": "/img/lumos-logo.svg",
        "path": "/package/lumos/1.6.0/img/lumos-logo.svg",
        "title": "Lumos logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "lumos",
        "title": "Lumos Activity Logs",
        "description": "Collect Activity Logs from Lumos"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/lumos/lumos-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "lumos.activity_logs",
        "title": "Lumos Activity Logs"
      }
    ]
  },
  {
    "name": "lyve_cloud",
    "title": "Lyve Cloud",
    "version": "1.17.0",
    "release": "ga",
    "description": "Collect S3 API audit log from Lyve Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/lyve_cloud/lyve_cloud-1.17.0.zip",
    "path": "/package/lyve_cloud/1.17.0",
    "icons": [
      {
        "src": "/img/LyveCloud-Logo.svg",
        "path": "/package/lyve_cloud/1.17.0/img/LyveCloud-Logo.svg",
        "title": "Seagate-Lyve-Cloud",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Seagate Lyve Cloud",
        "title": "Lyve Cloud logs",
        "description": "Collect logs from Lyve Cloud"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/lyve_cloud/lyve_cloud-1.17.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "lyve_cloud.audit",
        "title": "Lyve Cloud logs"
      }
    ]
  },
  {
    "name": "ti_misp",
    "title": "MISP",
    "version": "1.41.3",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from MISP platform with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_misp/ti_misp-1.41.3.zip",
    "path": "/package/ti_misp/1.41.3",
    "icons": [
      {
        "src": "/img/misp.svg",
        "path": "/package/ti_misp/1.41.3/img/misp.svg",
        "title": "MISP",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_misp",
        "title": "MISP",
        "description": "Ingest threat intelligence indicators from MISP platform with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_misp/ti_misp-1.41.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_misp.threat",
        "title": "MISP"
      },
      {
        "type": "logs",
        "dataset": "ti_misp.threat_attributes",
        "title": "MISP"
      }
    ]
  },
  {
    "name": "ti_maltiverse",
    "title": "Maltiverse",
    "version": "1.6.0",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from Maltiverse feeds with Elastic Agent",
    "type": "integration",
    "download": "/epr/ti_maltiverse/ti_maltiverse-1.6.0.zip",
    "path": "/package/ti_maltiverse/1.6.0",
    "icons": [
      {
        "src": "/img/logo-maltiverse.svg",
        "path": "/package/ti_maltiverse/1.6.0/img/logo-maltiverse.svg",
        "title": "Maltiverse",
        "size": "678x566",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_maltiverse",
        "title": "Maltiverse",
        "description": "Ingest threat intelligence indicators from Maltiverse feeds with Elastic Agent"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_maltiverse/ti_maltiverse-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_maltiverse.indicator",
        "title": "Maltiverse indicator"
      }
    ]
  },
  {
    "name": "ti_mandiant_advantage",
    "title": "Mandiant Advantage",
    "version": "1.10.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Threat Intelligence from products within the Mandiant Advantage platform.",
    "type": "integration",
    "download": "/epr/ti_mandiant_advantage/ti_mandiant_advantage-1.10.0.zip",
    "path": "/package/ti_mandiant_advantage/1.10.0",
    "icons": [
      {
        "src": "/img/mandiant-logo.svg",
        "path": "/package/ti_mandiant_advantage/1.10.0/img/mandiant-logo.svg",
        "title": "Mandiant logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_mandiant_advantage",
        "title": "Mandiant Advantage",
        "description": "Collect Threat Intelligence from products within the Mandiant Advantage platform."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "threat_intel",
      "security"
    ],
    "signature_path": "/epr/ti_mandiant_advantage/ti_mandiant_advantage-1.10.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_mandiant_advantage.threat_intelligence",
        "title": "Mandiant Threat Intelligence"
      }
    ]
  },
  {
    "name": "mattermost",
    "title": "Mattermost",
    "version": "2.5.0",
    "release": "ga",
    "description": "Collect logs from Mattermost with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mattermost/mattermost-2.5.0.zip",
    "path": "/package/mattermost/2.5.0",
    "icons": [
      {
        "src": "/img/mattermost-logo.svg",
        "path": "/package/mattermost/2.5.0/img/mattermost-logo.svg",
        "title": "Mattermost logo",
        "size": "537x535",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Mattermost Logs",
        "description": "Collect logs from Mattermost"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/mattermost/mattermost-2.5.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "mattermost.audit",
        "title": "Audit Logs"
      }
    ]
  },
  {
    "name": "memcached",
    "title": "Memcached",
    "version": "1.8.0",
    "release": "ga",
    "description": "Memcached Integration",
    "type": "integration",
    "download": "/epr/memcached/memcached-1.8.0.zip",
    "path": "/package/memcached/1.8.0",
    "icons": [
      {
        "src": "/img/logo_memcached.svg",
        "path": "/package/memcached/1.8.0/img/logo_memcached.svg",
        "title": "logo memcached",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "memcached",
        "title": "Memcached metrics",
        "description": "Collect metrics from Memcached instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/memcached/memcached-1.8.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "memcached.stats",
        "title": "Memcached stats metrics"
      }
    ]
  },
  {
    "name": "memcached_otel",
    "title": "Memcached OpenTelemetry assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Memcached Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/memcached_otel/memcached_otel-0.1.0.zip",
    "path": "/package/memcached_otel/0.1.0",
    "icons": [
      {
        "src": "/img/memcached_otel.svg",
        "path": "/package/memcached_otel/0.1.0/img/memcached_otel.svg",
        "title": "Memcached OpenTelemetry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/memcached_otel/memcached_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "memcachedreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "menlo",
    "title": "Menlo Security",
    "version": "1.7.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Menlo Security products with Elastic Agent",
    "type": "integration",
    "download": "/epr/menlo/menlo-1.7.1.zip",
    "path": "/package/menlo/1.7.1",
    "icons": [
      {
        "src": "/img/logo.png",
        "path": "/package/menlo/1.7.1/img/logo.png",
        "title": "Menlo Security logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "menlo",
        "title": "Menlo Security Logs",
        "description": "Collect Menlo Security logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "monitoring",
      "network",
      "observability",
      "security"
    ],
    "signature_path": "/epr/menlo/menlo-1.7.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "menlo.dlp",
        "title": "Collect Menlo DLP from Menlo Security API"
      },
      {
        "type": "logs",
        "dataset": "menlo.web",
        "title": "Collect Menlo Web from Menlo Security API"
      }
    ]
  },
  {
    "name": "microsoft",
    "title": "Microsoft",
    "version": "1.0.0",
    "release": "ga",
    "description": "This Elastic integration collects logs from Microsoft products",
    "type": "integration",
    "download": "/epr/microsoft/microsoft-1.0.0.zip",
    "path": "/package/microsoft/1.0.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/microsoft/1.0.0/img/logo.svg",
        "title": "Microsoft logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft",
        "title": "Microsoft",
        "description": "Collect logs from Microsoft products"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.15.0"
      }
    },
    "owner": {
      "github": "elastic/security-external-integrations"
    },
    "categories": [
      "network",
      "security",
      "azure"
    ],
    "signature_path": "/epr/microsoft/microsoft-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft.defender_atp",
        "title": "Microsoft Defender for Endpoint"
      },
      {
        "type": "logs",
        "dataset": "microsoft.dhcp",
        "title": "Microsoft DHCP logs"
      }
    ]
  },
  {
    "name": "microsoft_dhcp",
    "title": "Microsoft DHCP",
    "version": "1.27.0",
    "release": "ga",
    "description": "Collect logs from Microsoft DHCP with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_dhcp/microsoft_dhcp-1.27.0.zip",
    "path": "/package/microsoft_dhcp/1.27.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/microsoft_dhcp/1.27.0/img/logo.svg",
        "title": "Microsoft logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_dhcp",
        "title": "Microsoft DHCP",
        "description": "Collect Microsoft DHCP logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/microsoft_dhcp/microsoft_dhcp-1.27.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_dhcp.log",
        "title": "Microsoft DHCP Logs"
      }
    ]
  },
  {
    "name": "microsoft_dnsserver",
    "title": "Microsoft DNS Server",
    "version": "1.5.1",
    "release": "ga",
    "description": "Collect logs from Microsoft DNS Server with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_dnsserver/microsoft_dnsserver-1.5.1.zip",
    "path": "/package/microsoft_dnsserver/1.5.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/microsoft_dnsserver/1.5.1/img/logo.svg",
        "title": "Microsoft logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_dnsserver",
        "title": "Microsoft DNS Server",
        "description": "Collect Microsoft DNS Server (Audit and Analytical) logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/microsoft_dnsserver/microsoft_dnsserver-1.5.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_dnsserver.analytical",
        "title": "Collect DNS Server Analytical logs"
      },
      {
        "type": "logs",
        "dataset": "microsoft_dnsserver.audit",
        "title": "Collect DNS Server Audit logs"
      }
    ]
  },
  {
    "name": "m365_defender",
    "title": "Microsoft Defender XDR",
    "version": "5.13.0",
    "release": "ga",
    "description": "Collect logs from Microsoft Defender XDR with Elastic Agent.",
    "type": "integration",
    "download": "/epr/m365_defender/m365_defender-5.13.0.zip",
    "path": "/package/m365_defender/5.13.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/m365_defender/5.13.0/img/logo.svg",
        "title": "M365 logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "m365_defender",
        "title": "Microsoft Defender XDR Logs",
        "description": "Collect logs from Microsoft Defender XDR.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr",
      "vulnerability_workflow",
      "cloudsecurity_cdr"
    ],
    "signature_path": "/epr/m365_defender/m365_defender-5.13.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "m365_defender.alert",
        "title": "Collect Alert logs from Microsoft Defender XDR"
      },
      {
        "type": "logs",
        "dataset": "m365_defender.event",
        "title": "Collect Event logs from Microsoft Defender XDR."
      },
      {
        "type": "logs",
        "dataset": "m365_defender.incident",
        "title": "Collect Incident logs from Microsoft Defender XDR"
      },
      {
        "type": "logs",
        "dataset": "m365_defender.vulnerability",
        "title": "Collect Vulnerability logs from Microsoft Defender XDR."
      }
    ]
  },
  {
    "name": "microsoft_defender_cloud",
    "title": "Microsoft Defender for Cloud",
    "version": "3.4.0",
    "release": "ga",
    "description": "Collect logs from Microsoft Defender for Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_defender_cloud/microsoft_defender_cloud-3.4.0.zip",
    "path": "/package/microsoft_defender_cloud/3.4.0",
    "icons": [
      {
        "src": "/img/microsoft-defender-cloud-logo.svg",
        "path": "/package/microsoft_defender_cloud/3.4.0/img/microsoft-defender-cloud-logo.svg",
        "title": "Microsoft Defender for Cloud logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_defender_cloud",
        "title": "Microsoft Defender for Cloud Logs",
        "description": "Collect logs from Microsoft Defender for Cloud.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "cloudsecurity_cdr",
      "vulnerability_workflow",
      "misconfiguration_workflow"
    ],
    "signature_path": "/epr/microsoft_defender_cloud/microsoft_defender_cloud-3.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_defender_cloud.assessment",
        "title": "Collect Assessments from Microsoft Defender for Cloud"
      },
      {
        "type": "logs",
        "dataset": "microsoft_defender_cloud.event",
        "title": "Collect Event(Alert and Recommendation) logs from Microsoft Defender for Cloud."
      }
    ]
  },
  {
    "name": "microsoft_defender_endpoint",
    "title": "Microsoft Defender for Endpoint",
    "version": "4.6.0",
    "release": "ga",
    "description": "Collect logs from Microsoft Defender for Endpoint with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_defender_endpoint/microsoft_defender_endpoint-4.6.0.zip",
    "path": "/package/microsoft_defender_endpoint/4.6.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/microsoft_defender_endpoint/4.6.0/img/logo.svg",
        "title": "Microsoft Defender for Endpoint logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_defender_endpoint",
        "title": "Microsoft Defender for Endpoint",
        "description": "Collect logs from Microsoft Defender for Endpoint",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.3 || ^9.1.2"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr",
      "siem",
      "vulnerability_workflow",
      "cloudsecurity_cdr"
    ],
    "signature_path": "/epr/microsoft_defender_endpoint/microsoft_defender_endpoint-4.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_defender_endpoint.log",
        "title": "Microsoft Defender for Endpoint logs"
      },
      {
        "type": "logs",
        "dataset": "microsoft_defender_endpoint.machine",
        "title": "Collect Microsoft Defender for Endpoint machine logs from API"
      },
      {
        "type": "logs",
        "dataset": "microsoft_defender_endpoint.machine_action",
        "title": "Collect Microsoft Defender for Endpoint machine action logs from API"
      },
      {
        "type": "logs",
        "dataset": "microsoft_defender_endpoint.vulnerability",
        "title": "Collect Microsoft Defender for Endpoint vulnerability and affected machine logs from API"
      }
    ]
  },
  {
    "name": "entityanalytics_entra_id",
    "title": "Microsoft Entra ID Entity Analytics",
    "version": "1.9.1",
    "release": "ga",
    "description": "Collect identities from Microsoft Entra ID (formerly Azure Active Directory) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/entityanalytics_entra_id/entityanalytics_entra_id-1.9.1.zip",
    "path": "/package/entityanalytics_entra_id/1.9.1",
    "icons": [
      {
        "src": "/img/logo-azure.svg",
        "path": "/package/entityanalytics_entra_id/1.9.1/img/logo-azure.svg",
        "title": "Azure logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "entity",
        "title": "Identities",
        "description": "Collect identities."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "azure",
      "cloud",
      "security"
    ],
    "signature_path": "/epr/entityanalytics_entra_id/entityanalytics_entra_id-1.9.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "entityanalytics_entra_id.device",
        "title": "Microsoft Entra ID Entity Analytics Device Events"
      },
      {
        "type": "logs",
        "dataset": "entityanalytics_entra_id.entity",
        "title": "Identities"
      },
      {
        "type": "logs",
        "dataset": "entityanalytics_entra_id.user",
        "title": "Microsoft Entra ID Entity Analytics User Events"
      }
    ]
  },
  {
    "name": "microsoft_exchange_online_message_trace",
    "title": "Microsoft Exchange Online Message Trace",
    "version": "2.0.4",
    "release": "ga",
    "description": "Microsoft Exchange Online Message Trace Integration",
    "type": "integration",
    "download": "/epr/microsoft_exchange_online_message_trace/microsoft_exchange_online_message_trace-2.0.4.zip",
    "path": "/package/microsoft_exchange_online_message_trace/2.0.4",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/microsoft_exchange_online_message_trace/2.0.4/img/logo.svg",
        "title": "Microsoft Exchange Online Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_exchange_online_message_trace",
        "title": "Microsoft Exchange Online Message Trace",
        "description": "Microsoft Exchange Online Message Trace logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/microsoft_exchange_online_message_trace/microsoft_exchange_online_message_trace-2.0.4.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_exchange_online_message_trace.log",
        "title": "Microsoft Exchange Online Message Trace logs"
      }
    ]
  },
  {
    "name": "microsoft_exchange_server",
    "title": "Microsoft Exchange Server",
    "version": "1.5.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Microsoft Exchange Server with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_exchange_server/microsoft_exchange_server-1.5.1.zip",
    "path": "/package/microsoft_exchange_server/1.5.1",
    "icons": [
      {
        "src": "/img/exchange.svg",
        "path": "/package/microsoft_exchange_server/1.5.1/img/exchange.svg",
        "title": "Exchange Server logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_exchange_server",
        "title": "Microsoft Exchange Server",
        "description": "Microsoft Exchange Server Logs",
        "data_streams": [
          "smtp",
          "httpproxy",
          "messagetracking",
          "imap4_pop3"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/microsoft_exchange_server/microsoft_exchange_server-1.5.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_exchange_server.httpproxy",
        "title": "Exchange HTTPProxy"
      },
      {
        "type": "logs",
        "dataset": "microsoft_exchange_server.imap4_pop3",
        "title": "Exchange Server IMAP4 POP3"
      },
      {
        "type": "logs",
        "dataset": "microsoft_exchange_server.messagetracking",
        "title": "Exchange Messagetracking"
      },
      {
        "type": "logs",
        "dataset": "microsoft_exchange_server.smtp",
        "title": "Exchange SMTP"
      }
    ]
  },
  {
    "name": "azure_ai_foundry",
    "title": "Microsoft Foundry",
    "version": "0.9.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collects Microsoft Foundry logs and metrics",
    "type": "integration",
    "download": "/epr/azure_ai_foundry/azure_ai_foundry-0.9.1.zip",
    "path": "/package/azure_ai_foundry/0.9.1",
    "icons": [
      {
        "src": "/img/microsoft_foundry.jpeg",
        "path": "/package/azure_ai_foundry/0.9.1/img/microsoft_foundry.jpeg",
        "title": "Microsoft Foundry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure_ai_foundry",
        "title": "Collects Microsoft Foundry logs and metrics",
        "description": "Microsoft Foundry metrics with Elastic Agent.",
        "categories": [
          "azure",
          "cloud"
        ],
        "data_streams": [
          "logs",
          "metrics"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "cloud",
      "observability",
      "security"
    ],
    "signature_path": "/epr/azure_ai_foundry/azure_ai_foundry-0.9.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_ai_foundry.logs",
        "title": "Collect Microsoft Foundry logs"
      },
      {
        "type": "metrics",
        "dataset": "azure.ai_foundry",
        "title": "Collect Microsoft Foundry metrics"
      }
    ]
  },
  {
    "name": "microsoft_intune",
    "title": "Microsoft Intune",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from Microsoft Intune with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_intune/microsoft_intune-0.1.0.zip",
    "path": "/package/microsoft_intune/0.1.0",
    "icons": [
      {
        "src": "/img/microsoft-intune-logo.svg",
        "path": "/package/microsoft_intune/0.1.0/img/microsoft-intune-logo.svg",
        "title": "Microsoft Intune logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_intune",
        "title": "Microsoft Intune Logs",
        "description": "Collect logs from Microsoft Intune."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "azure"
    ],
    "signature_path": "/epr/microsoft_intune/microsoft_intune-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_intune.audit",
        "title": "Audit"
      },
      {
        "type": "logs",
        "dataset": "microsoft_intune.managed_device",
        "title": "Managed Device"
      }
    ]
  },
  {
    "name": "o365",
    "title": "Microsoft Office 365",
    "version": "3.8.0",
    "release": "ga",
    "description": "Collect logs from Microsoft Office 365 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/o365/o365-3.8.0.zip",
    "path": "/package/o365/3.8.0",
    "icons": [
      {
        "src": "/img/logo-integrations-microsoft-365.svg",
        "path": "/package/o365/3.8.0/img/logo-integrations-microsoft-365.svg",
        "title": "Microsoft Office 365",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "o365",
        "title": "Office 365 logs",
        "description": "Collect logs from Office 365",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security",
      "iam",
      "observability"
    ],
    "signature_path": "/epr/o365/o365-3.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "o365.audit",
        "title": "Microsoft Office 365 audit logs"
      }
    ]
  },
  {
    "name": "o365_metrics",
    "title": "Microsoft Office 365 Metrics",
    "version": "1.1.1",
    "release": "ga",
    "description": "Collect metrics from Microsoft Office 365 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/o365_metrics/o365_metrics-1.1.1.zip",
    "path": "/package/o365_metrics/1.1.1",
    "icons": [
      {
        "src": "/img/logo-integrations-microsoft-365.svg",
        "path": "/package/o365_metrics/1.1.1/img/logo-integrations-microsoft-365.svg",
        "title": "Microsoft Office 365 Metrics",
        "size": "216x216",
        "type": "image/svg+xml"
      },
      {
        "src": "/img/dashboard-teams-user-activity-user-detail.png",
        "path": "/package/o365_metrics/1.1.1/img/dashboard-teams-user-activity-user-detail.png",
        "title": "Microsoft Teams User Activity User Detail Dashboard",
        "size": "2660x1030",
        "type": "image/png"
      },
      {
        "src": "/img/dashboard-viva-engage-group-activity-group-detail.png",
        "path": "/package/o365_metrics/1.1.1/img/dashboard-viva-engage-group-activity-group-detail.png",
        "title": "Viva Engage Groups Activity Group Detail Dashboard",
        "size": "2660x1030",
        "type": "image/png"
      },
      {
        "src": "/img/dashboard-onedrive-usage-account-detail.png",
        "path": "/package/o365_metrics/1.1.1/img/dashboard-onedrive-usage-account-detail.png",
        "title": "OneDrive Usage Account Detail Dashboard",
        "size": "2660x1030",
        "type": "image/png"
      },
      {
        "src": "/img/dashboard-m365-group-activity-group-detail.png",
        "path": "/package/o365_metrics/1.1.1/img/dashboard-m365-group-activity-group-detail.png",
        "title": "Microsoft 365 Groups Activity Group Detail Dashboard",
        "size": "2660x1030",
        "type": "image/png"
      }
    ],
    "policy_templates": [
      {
        "name": "o365",
        "title": "Office 365 metrics",
        "description": "Collect metrics from Office 365"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "security"
    ],
    "signature_path": "/epr/o365_metrics/o365_metrics-1.1.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "o365_metrics.active_users_services_user_counts",
        "title": "Microsoft 365 Active Users Services User Counts"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.app_registrations",
        "title": "Application Registrations"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.entra_agent",
        "title": "Microsoft 365 Entra Agent"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.entra_alerts",
        "title": "Microsoft 365 Entra Alerts"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.entra_features",
        "title": "Microsoft 365 Entra Features"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.entra_id_users",
        "title": "Entra ID users"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.groups_activity_group_detail",
        "title": "Microsoft 365 Groups Activity Group Detail"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.mailbox_usage_detail",
        "title": "Microsoft 365 Mailbox Usage Detail"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.mailbox_usage_quota_status",
        "title": "Microsoft 365 Mailbox Quota Status"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.onedrive_usage_account_counts",
        "title": "Microsoft 365 One Drive Usage Account Counts"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.onedrive_usage_account_detail",
        "title": "Microsoft 365 OneDrive Usage Account Detail"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.onedrive_usage_file_counts",
        "title": "Microsoft 365 One Drive Usage File Counts"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.onedrive_usage_storage",
        "title": "Microsoft 365 One Drive Usage Storage"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.outlook_activity",
        "title": "Microsoft 365 Outlook Activity"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.outlook_app_usage_version_counts",
        "title": "Microsoft 365 Outlook App Usage Version Counts"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.service_health",
        "title": "Microsoft 365 Service Health metrics"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.sharepoint_site_usage_detail",
        "title": "Microsoft 365 Sharepoint Site Usage Detail"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.sharepoint_site_usage_storage",
        "title": "Microsoft 365 Sharepoint Site Usage Storage"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.subscriptions",
        "title": "Microsoft 365 Subscriptions metrics"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.teams_call_quality",
        "title": "Microsoft 365 Teams Call Quality"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.teams_device_usage_user_counts",
        "title": "Microsoft 365 Teams Device Usage User Counts"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.teams_user_activity_user_counts",
        "title": "Microsoft 365 Teams User Activity User Counts"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.teams_user_activity_user_detail",
        "title": "Microsoft 365 Teams User Activity User Detail"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.tenant_settings",
        "title": "Tenant settings"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.viva_engage_device_usage_user_counts",
        "title": "Microsoft 365 Viva Engage Device Usage"
      },
      {
        "type": "metrics",
        "dataset": "o365_metrics.viva_engage_groups_activity_group_detail",
        "title": "Microsoft 365 Viva Engage Groups Activity"
      }
    ]
  },
  {
    "name": "microsoft_sqlserver",
    "title": "Microsoft SQL Server",
    "version": "2.16.0",
    "release": "ga",
    "description": "Collect events from Microsoft SQL Server with Elastic Agent",
    "type": "integration",
    "download": "/epr/microsoft_sqlserver/microsoft_sqlserver-2.16.0.zip",
    "path": "/package/microsoft_sqlserver/2.16.0",
    "icons": [
      {
        "src": "/img/microsoft-sql-server-logo.svg",
        "path": "/package/microsoft_sqlserver/2.16.0/img/microsoft-sql-server-logo.svg",
        "title": "Microsoft SQL Server",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "audit_logs",
        "title": "Microsoft SQL Server logs and metrics",
        "description": "Collect logs and metrics from Microsoft SQL Server"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "database_security",
      "security",
      "observability"
    ],
    "signature_path": "/epr/microsoft_sqlserver/microsoft_sqlserver-2.16.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_sqlserver.audit",
        "title": "SQL Server audit events"
      },
      {
        "type": "metrics",
        "dataset": "microsoft_sqlserver.availability_groups",
        "title": "Microsoft SQL Server Always On Availability Groups metrics"
      },
      {
        "type": "logs",
        "dataset": "microsoft_sqlserver.log",
        "title": "Microsoft SQL Server error logs"
      },
      {
        "type": "metrics",
        "dataset": "microsoft_sqlserver.performance",
        "title": "Microsoft SQL Server performance metrics"
      },
      {
        "type": "metrics",
        "dataset": "microsoft_sqlserver.transaction_log",
        "title": "Microsoft SQL Server transaction_log metrics"
      }
    ]
  },
  {
    "name": "microsoft_sqlserver_otel",
    "title": "Microsoft SQL Server Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Microsoft SQL Server Assets",
    "type": "content",
    "download": "/epr/microsoft_sqlserver_otel/microsoft_sqlserver_otel-0.1.0.zip",
    "path": "/package/microsoft_sqlserver_otel/0.1.0",
    "icons": [
      {
        "src": "/img/microsoft-sql-server-otel-logo.svg",
        "path": "/package/microsoft_sqlserver_otel/0.1.0/img/microsoft-sql-server-otel-logo.svg",
        "title": "Microsoft SQL Server",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "opentelemetry",
      "observability"
    ],
    "signature_path": "/epr/microsoft_sqlserver_otel/microsoft_sqlserver_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "sqlserverreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "microsoft_sentinel",
    "title": "Microsoft Sentinel",
    "version": "1.3.1",
    "release": "ga",
    "description": "Collect logs from Microsoft Sentinel with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_sentinel/microsoft_sentinel-1.3.1.zip",
    "path": "/package/microsoft_sentinel/1.3.1",
    "icons": [
      {
        "src": "/img/microsoft-sentinel-logo.svg",
        "path": "/package/microsoft_sentinel/1.3.1/img/microsoft-sentinel-logo.svg",
        "title": "Microsoft Sentinel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_sentinel",
        "title": "Microsoft Sentinel Logs",
        "description": "Collect logs from Microsoft Sentinel.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "azure",
      "security",
      "siem"
    ],
    "signature_path": "/epr/microsoft_sentinel/microsoft_sentinel-1.3.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_sentinel.alert",
        "title": "Microsoft Sentinel Alert logs"
      },
      {
        "type": "logs",
        "dataset": "microsoft_sentinel.event",
        "title": "Collect Events from Microsoft Sentinel."
      },
      {
        "type": "logs",
        "dataset": "microsoft_sentinel.incident",
        "title": "Microsoft Sentinel Incident logs"
      }
    ]
  },
  {
    "name": "mimecast",
    "title": "Mimecast",
    "version": "3.3.1",
    "release": "ga",
    "description": "Collect logs from Mimecast with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mimecast/mimecast-3.3.1.zip",
    "path": "/package/mimecast/3.3.1",
    "icons": [
      {
        "src": "/img/mimecast.svg",
        "path": "/package/mimecast/3.3.1/img/mimecast.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mimecast",
        "title": "Mimecast",
        "description": "Collect logs from the Mimecast API with Elastic Agent.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/mimecast/mimecast-3.3.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "mimecast.archive_search_logs",
        "title": "Archive Search Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.audit_events",
        "title": "Audit Events Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.cloud_integrated_logs",
        "title": "Cloud Integrated Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.dlp_logs",
        "title": "DLP Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.message_release_logs",
        "title": "Mimecast Message Release"
      },
      {
        "type": "logs",
        "dataset": "mimecast.siem_logs",
        "title": "SIEM Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.threat_intel_malware_customer",
        "title": "Threat Intel Feed - Malware Customer"
      },
      {
        "type": "logs",
        "dataset": "mimecast.threat_intel_malware_grid",
        "title": "Threat Intel Feed - Malware Grid"
      },
      {
        "type": "logs",
        "dataset": "mimecast.ttp_ap_logs",
        "title": "TTP Attachment Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.ttp_ip_logs",
        "title": "TTP Impersonation Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.ttp_url_logs",
        "title": "TTP URL Logs"
      }
    ]
  },
  {
    "name": "miniflux",
    "title": "Miniflux RSS reader",
    "version": "1.0.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect RSS feed content from the Miniflux API with Elastic Agent.",
    "type": "integration",
    "download": "/epr/miniflux/miniflux-1.0.1.zip",
    "path": "/package/miniflux/1.0.1",
    "icons": [
      {
        "src": "/img/miniflux-logo.svg",
        "path": "/package/miniflux/1.0.1/img/miniflux-logo.svg",
        "title": "Miniflux logo",
        "size": "32x32",
        "type": "image/svg+xml"
      },
      {
        "src": "/img/miniflux-overview-dashboard.png",
        "path": "/package/miniflux/1.0.1/img/miniflux-overview-dashboard.png",
        "title": "GitHub user overview",
        "size": "600x600",
        "type": "image/png"
      }
    ],
    "policy_templates": [
      {
        "name": "miniflux",
        "title": "Miniflux data",
        "description": "Collect Miniflux data."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.4 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "observability",
      "web"
    ],
    "signature_path": "/epr/miniflux/miniflux-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "miniflux.feed_entry",
        "title": "Collect Miniflux data from Miniflux API."
      }
    ]
  },
  {
    "name": "modsecurity",
    "title": "ModSecurity Audit",
    "version": "1.23.1",
    "release": "ga",
    "description": "Collect logs from ModSecurity with Elastic Agent",
    "type": "integration",
    "download": "/epr/modsecurity/modsecurity-1.23.1.zip",
    "path": "/package/modsecurity/1.23.1",
    "icons": [
      {
        "src": "/img/modsec.svg",
        "path": "/package/modsecurity/1.23.1/img/modsec.svg",
        "title": "ModSecurity",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "modsec",
        "title": "ModSecurity audit logs",
        "description": "Collect modsecurity audit logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "web_application_firewall"
    ],
    "signature_path": "/epr/modsecurity/modsecurity-1.23.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "modsecurity.auditlog",
        "title": "Modsecurity Audit Log"
      }
    ]
  },
  {
    "name": "mongodb",
    "title": "MongoDB",
    "version": "1.24.0",
    "release": "ga",
    "description": "Collect logs and metrics from MongoDB instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mongodb/mongodb-1.24.0.zip",
    "path": "/package/mongodb/1.24.0",
    "icons": [
      {
        "src": "/img/logo_mongodb.svg",
        "path": "/package/mongodb/1.24.0/img/logo_mongodb.svg",
        "title": "logo mongodb",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mongodb",
        "title": "MongoDB logs and metrics",
        "description": "Collect logs and metrics from MongoDB instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/mongodb/mongodb-1.24.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "mongodb.collstats",
        "title": "MongoDB collstats metrics"
      },
      {
        "type": "metrics",
        "dataset": "mongodb.dbstats",
        "title": "MongoDB dbstats metrics"
      },
      {
        "type": "logs",
        "dataset": "mongodb.log",
        "title": "mongodb log logs"
      },
      {
        "type": "metrics",
        "dataset": "mongodb.metrics",
        "title": "MongoDB metrics"
      },
      {
        "type": "metrics",
        "dataset": "mongodb.replstatus",
        "title": "MongoDB replstatus metrics"
      },
      {
        "type": "metrics",
        "dataset": "mongodb.status",
        "title": "MongoDB status metrics"
      }
    ]
  },
  {
    "name": "mongodb_atlas",
    "title": "MongoDB Atlas",
    "version": "1.1.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "This Elastic integration collects logs and metrics from MongoDB Atlas instance.",
    "type": "integration",
    "download": "/epr/mongodb_atlas/mongodb_atlas-1.1.0.zip",
    "path": "/package/mongodb_atlas/1.1.0",
    "icons": [
      {
        "src": "/img/mongodb_atlas-logo.svg",
        "path": "/package/mongodb_atlas/1.1.0/img/mongodb_atlas-logo.svg",
        "title": "MongoDB Atlas logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mongodb_atlas",
        "title": "MongoDB Atlas logs and metrics",
        "description": "Collect MongoDB Atlas logs and metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "cloud",
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/mongodb_atlas/mongodb_atlas-1.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "mongodb_atlas.alert",
        "title": "Collect Alert logs from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.disk",
        "title": "Collect Disk metrics from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.hardware",
        "title": "Collect Hardware metrics from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.mongod_audit",
        "title": "Collect Mongod Audit logs from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.mongod_database",
        "title": "Collect Mongod Database logs from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.organization",
        "title": "Collect Organization logs from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.process",
        "title": "Collect Process metrics from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.project",
        "title": "Collect Project logs from MongoDB Atlas"
      }
    ]
  },
  {
    "name": "mongodb_otel",
    "title": "MongoDB OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "MongoDB Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/mongodb_otel/mongodb_otel-0.1.0.zip",
    "path": "/package/mongodb_otel/0.1.0",
    "icons": [
      {
        "src": "/img/mongodb_otel_logo.svg",
        "path": "/package/mongodb_otel/0.1.0/img/mongodb_otel_logo.svg",
        "title": "MongoDB OTel",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "opentelemetry"
    ],
    "signature_path": "/epr/mongodb_otel/mongodb_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "mongodbreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "mysql",
    "title": "MySQL",
    "version": "1.29.2",
    "release": "ga",
    "description": "Collect logs and metrics from MySQL servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mysql/mysql-1.29.2.zip",
    "path": "/package/mysql/1.29.2",
    "icons": [
      {
        "src": "/img/logo_mysql.svg",
        "path": "/package/mysql/1.29.2/img/logo_mysql.svg",
        "title": "logo mysql",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mysql",
        "title": "MySQL logs and metrics",
        "description": "Collect logs and metrics from MySQL instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/mysql/mysql-1.29.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "mysql.error",
        "title": "MySQL error logs"
      },
      {
        "type": "metrics",
        "dataset": "mysql.galera_status",
        "title": "MySQL galera_status metrics"
      },
      {
        "type": "metrics",
        "dataset": "mysql.performance",
        "title": "MySQL performance metrics"
      },
      {
        "type": "metrics",
        "dataset": "mysql.replica_status",
        "title": "Collect replica status metrics from mysql"
      },
      {
        "type": "logs",
        "dataset": "mysql.slowlog",
        "title": "MySQL slowlog logs"
      },
      {
        "type": "metrics",
        "dataset": "mysql.status",
        "title": "MySQL status metrics"
      }
    ]
  },
  {
    "name": "mysql_enterprise",
    "title": "MySQL Enterprise",
    "version": "1.17.0",
    "release": "ga",
    "description": "Collect audit logs from MySQL Enterprise with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mysql_enterprise/mysql_enterprise-1.17.0.zip",
    "path": "/package/mysql_enterprise/1.17.0",
    "icons": [
      {
        "src": "/img/logo_mysql.svg",
        "path": "/package/mysql_enterprise/1.17.0/img/logo_mysql.svg",
        "title": "MySQL",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mysql_enterprise",
        "title": "MySQL Enterprise audit logs",
        "description": "Collect MySQL Enterprise audit logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "security",
      "datastore"
    ],
    "signature_path": "/epr/mysql_enterprise/mysql_enterprise-1.17.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "mysql_enterprise.audit",
        "title": "MySQL Enterprise Audit Log"
      }
    ]
  },
  {
    "name": "mysql_otel",
    "title": "MySQL OpenTelemetry Assets",
    "version": "0.4.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "MySQL Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/mysql_otel/mysql_otel-0.4.0.zip",
    "path": "/package/mysql_otel/0.4.0",
    "icons": [
      {
        "src": "/img/logo_mysql_otel.svg",
        "path": "/package/mysql_otel/0.4.0/img/logo_mysql_otel.svg",
        "title": "Logo MySQL OTEL",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/mysql_otel/mysql_otel-0.4.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "mysqlreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "mysql_input_otel",
    "title": "MySQL OpenTelemetry Input Package",
    "version": "0.2.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect MySQL metrics and logs using OpenTelemetry Collector",
    "type": "input",
    "download": "/epr/mysql_input_otel/mysql_input_otel-0.2.1.zip",
    "path": "/package/mysql_input_otel/0.2.1",
    "icons": [
      {
        "src": "/img/logo_mysql_otel.svg",
        "path": "/package/mysql_input_otel/0.2.1/img/logo_mysql_otel.svg",
        "title": "MySQL logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mysqlreceiver",
        "title": "MySQL Metrics and Logs (OpenTelemetry)",
        "description": "Collect MySQL metrics and logs (query samples, top queries) using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/mysql_input_otel/mysql_input_otel-0.2.1.zip.sig"
  },
  {
    "name": "nats",
    "title": "NATS",
    "version": "1.12.0",
    "release": "ga",
    "description": "Collect logs and metrics from NATS servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/nats/nats-1.12.0.zip",
    "path": "/package/nats/1.12.0",
    "icons": [
      {
        "src": "/img/nats.svg",
        "path": "/package/nats/1.12.0/img/nats.svg",
        "title": "NATS Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nats",
        "title": "NATS Logs and Metrics",
        "description": "Collect logs and metrics from NATS instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "message_queue",
      "stream_processing"
    ],
    "signature_path": "/epr/nats/nats-1.12.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "nats.connection",
        "title": "NATS connection metrics"
      },
      {
        "type": "metrics",
        "dataset": "nats.connections",
        "title": "NATS connections metrics"
      },
      {
        "type": "logs",
        "dataset": "nats.log",
        "title": "NATS logs"
      },
      {
        "type": "metrics",
        "dataset": "nats.route",
        "title": "NATS route metrics"
      },
      {
        "type": "metrics",
        "dataset": "nats.routes",
        "title": "NATS routes metrics"
      },
      {
        "type": "metrics",
        "dataset": "nats.stats",
        "title": "NATS stats metrics"
      },
      {
        "type": "metrics",
        "dataset": "nats.subscriptions",
        "title": "NATS subscriptions metrics"
      }
    ]
  },
  {
    "name": "nginx_otel",
    "title": "NGINX OpenTelemetry Assets",
    "version": "0.3.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "NGINX Assets from OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/nginx_otel/nginx_otel-0.3.0.zip",
    "path": "/package/nginx_otel/0.3.0",
    "icons": [
      {
        "src": "/img/nginx_otel_logo.svg",
        "path": "/package/nginx_otel/0.3.0/img/nginx_otel_logo.svg",
        "title": "NGINX logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "web",
      "opentelemetry"
    ],
    "signature_path": "/epr/nginx_otel/nginx_otel-0.3.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "nginxreceiver.otel"
        },
        {
          "name": "nginx.access.otel"
        },
        {
          "name": "nginx.error.otel"
        }
      ]
    }
  },
  {
    "name": "nginx_otel_input",
    "title": "NGINX OpenTelemetry Input Package",
    "version": "0.2.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "NGINX OpenTelemetry Input Package",
    "type": "input",
    "download": "/epr/nginx_otel_input/nginx_otel_input-0.2.0.zip",
    "path": "/package/nginx_otel_input/0.2.0",
    "icons": [
      {
        "src": "/img/nginx_otellogo.svg",
        "path": "/package/nginx_otel_input/0.2.0/img/nginx_otellogo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nginxreceiver",
        "title": "NGINX OpenTelemetry Input",
        "description": "Collect NGINX metrics using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/nginx_otel_input/nginx_otel_input-0.2.0.zip.sig"
  },
  {
    "name": "nvidia_gpu",
    "title": "NVIDIA GPU Monitoring",
    "version": "0.4.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Monitor NVIDIA GPUs via NVIDIA Data Center GPU Manager",
    "type": "integration",
    "download": "/epr/nvidia_gpu/nvidia_gpu-0.4.1.zip",
    "path": "/package/nvidia_gpu/0.4.1",
    "icons": [
      {
        "src": "/img/nvidia_logo.svg",
        "path": "/package/nvidia_gpu/0.4.1/img/nvidia_logo.svg",
        "title": "NVIDIA Logo",
        "size": "351×259",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nvidia_gpu",
        "title": "NVIDIA GPU Metrics",
        "description": "Monitor NVIDIA GPUs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "cloud",
      "observability",
      "custom",
      "kubernetes",
      "os_system"
    ],
    "signature_path": "/epr/nvidia_gpu/nvidia_gpu-0.4.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "nvidia_gpu.stats",
        "title": "Collect GPU Statistics"
      }
    ]
  },
  {
    "name": "nvidia_gpu_otel",
    "title": "NVIDIA GPU OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "NVIDIA GPU Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/nvidia_gpu_otel/nvidia_gpu_otel-0.1.0.zip",
    "path": "/package/nvidia_gpu_otel/0.1.0",
    "icons": [
      {
        "src": "/img/nvidia_gpu_otel.svg",
        "path": "/package/nvidia_gpu_otel/0.1.0/img/nvidia_gpu_otel.svg",
        "title": "NVIDIA GPU OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "cloud",
      "observability",
      "opentelemetry",
      "os_system"
    ],
    "signature_path": "/epr/nvidia_gpu_otel/nvidia_gpu_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "nvidia_gpu.otel"
        }
      ]
    }
  },
  {
    "name": "nagios_xi",
    "title": "Nagios XI",
    "version": "1.8.0",
    "release": "ga",
    "description": "Collect Logs and Metrics from Nagios XI with Elastic Agent.",
    "type": "integration",
    "download": "/epr/nagios_xi/nagios_xi-1.8.0.zip",
    "path": "/package/nagios_xi/1.8.0",
    "icons": [
      {
        "src": "/img/nagios_xi-logo.svg",
        "path": "/package/nagios_xi/1.8.0/img/nagios_xi-logo.svg",
        "title": "Nagios XI logo",
        "size": "512x512",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nagios",
        "title": "Nagios XI logs and metrics",
        "description": "Collect Nagios XI logs and metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "monitoring"
    ],
    "signature_path": "/epr/nagios_xi/nagios_xi-1.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "nagios_xi.events",
        "title": "Events"
      },
      {
        "type": "logs",
        "dataset": "nagios_xi.host",
        "title": "Host"
      },
      {
        "type": "logs",
        "dataset": "nagios_xi.service",
        "title": "Service"
      }
    ]
  },
  {
    "name": "neon_cyber",
    "title": "Neon Cyber",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "The Neon Cyber integration for the Elastic Stack",
    "type": "integration",
    "download": "/epr/neon_cyber/neon_cyber-0.1.0.zip",
    "path": "/package/neon_cyber/0.1.0",
    "icons": [
      {
        "src": "/img/neoncyber-logo.svg",
        "path": "/package/neon_cyber/0.1.0/img/neoncyber-logo.svg",
        "title": "Neon Cyber logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "neon_cyber",
        "title": "Neon Cyber",
        "description": "Collect workforce logs from the Neon Cyber API",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/neon_cyber/neon_cyber-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "neon_cyber.detections",
        "title": "Neon Cyber Detections"
      },
      {
        "type": "logs",
        "dataset": "neon_cyber.events",
        "title": "Neon Cyber Events"
      }
    ]
  },
  {
    "name": "netflow",
    "title": "NetFlow Records",
    "version": "2.25.0",
    "release": "ga",
    "description": "Collect flow records from NetFlow and IPFIX exporters with Elastic Agent.",
    "type": "integration",
    "download": "/epr/netflow/netflow-2.25.0.zip",
    "path": "/package/netflow/2.25.0",
    "policy_templates": [
      {
        "name": "netflow",
        "title": "NetFlow logs",
        "description": "Collect Netflow logs from networks via UDP"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/netflow/netflow-2.25.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "netflow.log",
        "title": "NetFlow logs"
      }
    ]
  },
  {
    "name": "netskope",
    "title": "Netskope",
    "version": "3.1.4",
    "release": "ga",
    "description": "Collect logs from Netskope with Elastic Agent.",
    "type": "integration",
    "download": "/epr/netskope/netskope-3.1.4.zip",
    "path": "/package/netskope/3.1.4",
    "icons": [
      {
        "src": "/img/netskope-logo.svg",
        "path": "/package/netskope/3.1.4/img/netskope-logo.svg",
        "title": "Netskope logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "netskope",
        "title": "Netskope logs",
        "description": "Collect Netskope logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.9 || ^9.1.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/netskope/netskope-3.1.4.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "netskope.alerts",
        "title": "Alerts"
      },
      {
        "type": "logs",
        "dataset": "netskope.alerts_events_v2",
        "title": "Alerts V2 and Events V2"
      },
      {
        "type": "logs",
        "dataset": "netskope.alerts_v2",
        "title": "Alerts V2"
      },
      {
        "type": "logs",
        "dataset": "netskope.events",
        "title": "Events"
      },
      {
        "type": "logs",
        "dataset": "netskope.events_v2",
        "title": "Events V2"
      },
      {
        "type": "logs",
        "dataset": "netskope.transaction",
        "title": "Transaction Events"
      }
    ]
  },
  {
    "name": "beaconing",
    "title": "Network Beaconing Identification",
    "version": "1.5.3",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Package to identify beaconing activity in your network events.",
    "type": "integration",
    "download": "/epr/beaconing/beaconing-1.5.3.zip",
    "path": "/package/beaconing/1.5.3",
    "icons": [
      {
        "src": "/img/icon-machine-learning.svg",
        "path": "/package/beaconing/1.5.3/img/icon-machine-learning.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "platinum",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-applied-ml"
    },
    "categories": [
      "security",
      "advanced_analytics_ueba",
      "network_security"
    ],
    "signature_path": "/epr/beaconing/beaconing-1.5.3.zip.sig"
  },
  {
    "name": "network_traffic",
    "title": "Network Packet Capture",
    "version": "1.34.2",
    "release": "ga",
    "description": "Capture and analyze network traffic from a host with Elastic Agent.",
    "type": "integration",
    "download": "/epr/network_traffic/network_traffic-1.34.2.zip",
    "path": "/package/network_traffic/1.34.2",
    "policy_templates": [
      {
        "name": "network",
        "title": "Network Packet Capture",
        "description": "Capture network traffic"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/network_traffic/network_traffic-1.34.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "network_traffic.amqp",
        "title": "AMQP"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.cassandra",
        "title": "Cassandra"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.dhcpv4",
        "title": "DHCP"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.dns",
        "title": "DNS"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.flow",
        "title": "Flows"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.http",
        "title": "HTTP"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.icmp",
        "title": "ICMP"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.memcached",
        "title": "Memcached"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.mongodb",
        "title": "MongoDB"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.mysql",
        "title": "MySQL"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.nfs",
        "title": "NFS"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.pgsql",
        "title": "PostgreSQL"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.redis",
        "title": "Redis"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.sip",
        "title": "SIP"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.thrift",
        "title": "Thrift"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.tls",
        "title": "TLS"
      }
    ]
  },
  {
    "name": "nextron_thor_apt_scanner",
    "title": "Nextron Thor APT Scanner",
    "version": "0.0.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Integration for Nextron Thor APT Scanner",
    "type": "integration",
    "download": "/epr/nextron_thor_apt_scanner/nextron_thor_apt_scanner-0.0.1.zip",
    "path": "/package/nextron_thor_apt_scanner/0.0.1",
    "icons": [
      {
        "src": "/img/thor-logo.svg",
        "path": "/package/nextron_thor_apt_scanner/0.0.1/img/thor-logo.svg",
        "title": "Thor logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nextron_thor_apt_scanner",
        "title": "Thor Cloud Log Forwarding",
        "description": "Collect Thor Cloud logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/nextron_thor_apt_scanner/nextron_thor_apt_scanner-0.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "nextron_thor_apt_scanner.thor_forwarding",
        "title": "Thor Forwarding"
      }
    ]
  },
  {
    "name": "nginx",
    "title": "Nginx",
    "version": "3.0.0",
    "release": "ga",
    "description": "Collect logs and metrics from Nginx HTTP servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/nginx/nginx-3.0.0.zip",
    "path": "/package/nginx/3.0.0",
    "icons": [
      {
        "src": "/img/logo_nginx.svg",
        "path": "/package/nginx/3.0.0/img/logo_nginx.svg",
        "title": "logo nginx",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nginx",
        "title": "Nginx logs and metrics",
        "description": "Collect logs and metrics from Nginx instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability"
    ],
    "signature_path": "/epr/nginx/nginx-3.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "nginx.access",
        "title": "Nginx access logs"
      },
      {
        "type": "logs",
        "dataset": "nginx.error",
        "title": "Nginx error logs"
      },
      {
        "type": "metrics",
        "dataset": "nginx.stubstatus",
        "title": "Nginx stubstatus metrics"
      }
    ]
  },
  {
    "name": "nginx_ingress_controller",
    "title": "Nginx Ingress Controller Logs",
    "version": "1.14.0",
    "release": "ga",
    "description": "Collect Nginx Ingress Controller logs.",
    "type": "integration",
    "download": "/epr/nginx_ingress_controller/nginx_ingress_controller-1.14.0.zip",
    "path": "/package/nginx_ingress_controller/1.14.0",
    "icons": [
      {
        "src": "/img/logo_nginx.svg",
        "path": "/package/nginx_ingress_controller/1.14.0/img/logo_nginx.svg",
        "title": "Nginx logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nginx_ingress_controller",
        "title": "Nginx Ingress Controller logs",
        "description": "Collect logs from Nginx Ingress Controller instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "observability",
      "containers",
      "kubernetes"
    ],
    "signature_path": "/epr/nginx_ingress_controller/nginx_ingress_controller-1.14.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "nginx_ingress_controller.access",
        "title": "Nginx Ingress Controller access logs"
      },
      {
        "type": "logs",
        "dataset": "nginx_ingress_controller.error",
        "title": "Nginx Ingress Controller error logs"
      }
    ]
  },
  {
    "name": "nginx_ingress_controller_otel",
    "title": "Nginx Ingress Controller OpenTelemetry Logs",
    "version": "0.2.2",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Nginx Ingress Controller logs using the OpenTelemetry collector.",
    "type": "content",
    "download": "/epr/nginx_ingress_controller_otel/nginx_ingress_controller_otel-0.2.2.zip",
    "path": "/package/nginx_ingress_controller_otel/0.2.2",
    "icons": [
      {
        "src": "/img/logo_nginx.svg",
        "path": "/package/nginx_ingress_controller_otel/0.2.2/img/logo_nginx.svg",
        "title": "logo nginx",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "containers",
      "kubernetes",
      "opentelemetry"
    ],
    "signature_path": "/epr/nginx_ingress_controller_otel/nginx_ingress_controller_otel-0.2.2.zip.sig"
  },
  {
    "name": "nozomi_networks",
    "title": "Nozomi Networks",
    "version": "0.2.1",
    "release": "beta",
    "description": "Collect logs from Nozomi Networks with Elastic Agent.",
    "type": "integration",
    "download": "/epr/nozomi_networks/nozomi_networks-0.2.1.zip",
    "path": "/package/nozomi_networks/0.2.1",
    "icons": [
      {
        "src": "/img/nozomi_networks-logo.svg",
        "path": "/package/nozomi_networks/0.2.1/img/nozomi_networks-logo.svg",
        "title": "Nozomi Networks logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nozomi_networks",
        "title": "Nozomi Networks",
        "description": "Collect logs from Nozomi Networks.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/nozomi_networks/nozomi_networks-0.2.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "nozomi_networks.alert",
        "title": "Collect Alert logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.asset",
        "title": "Collect Asset logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.audit",
        "title": "Collect Audit logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.health",
        "title": "Collect Health logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.node",
        "title": "Collect Node logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.node_cve",
        "title": "Collect Node CVE logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.session",
        "title": "Collect Session logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.variable",
        "title": "Collect Variable logs from Nozomi Networks"
      }
    ]
  },
  {
    "name": "okta",
    "title": "Okta",
    "version": "3.14.1",
    "release": "ga",
    "description": "Collect and parse event logs from Okta API with Elastic Agent.",
    "type": "integration",
    "download": "/epr/okta/okta-3.14.1.zip",
    "path": "/package/okta/3.14.1",
    "icons": [
      {
        "src": "/img/okta-logo.svg",
        "path": "/package/okta/3.14.1/img/okta-logo.svg",
        "title": "Okta",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "okta",
        "title": "Okta logs",
        "description": "Collect logs from Okta",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.8 || ^9.2.2"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/okta/okta-3.14.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "okta.system",
        "title": "Okta system logs"
      }
    ]
  },
  {
    "name": "entityanalytics_okta",
    "title": "Okta Entity Analytics",
    "version": "3.0.0",
    "release": "ga",
    "description": "Collect Identities from Okta with Elastic Agent.",
    "type": "integration",
    "download": "/epr/entityanalytics_okta/entityanalytics_okta-3.0.0.zip",
    "path": "/package/entityanalytics_okta/3.0.0",
    "icons": [
      {
        "src": "/img/okta-logo.svg",
        "path": "/package/entityanalytics_okta/3.0.0/img/okta-logo.svg",
        "title": "Okta Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      },
      {
        "src": "/img/okta-logo-dark.svg",
        "path": "/package/entityanalytics_okta/3.0.0/img/okta-logo-dark.svg",
        "title": "Okta Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "entity",
        "title": "Identities",
        "description": "Collect identities."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~9.2.6 || ^9.3.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/entityanalytics_okta/entityanalytics_okta-3.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "entityanalytics_okta.device",
        "title": "Collect Devices Identities logs from Okta"
      },
      {
        "type": "logs",
        "dataset": "entityanalytics_okta.entity",
        "title": "Collect User Identities logs from Okta"
      },
      {
        "type": "logs",
        "dataset": "entityanalytics_okta.user",
        "title": "Collect User Identities logs from Okta"
      }
    ]
  },
  {
    "name": "openai",
    "title": "OpenAI",
    "version": "1.2.1",
    "release": "ga",
    "description": "Collect OpenAI usage metrics with Elastic Agent.\n",
    "type": "integration",
    "download": "/epr/openai/openai-1.2.1.zip",
    "path": "/package/openai/1.2.1",
    "icons": [
      {
        "src": "/img/openai-logo.svg",
        "path": "/package/openai/1.2.1/img/openai-logo.svg",
        "title": "OpenAI logo",
        "size": "512x138",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "openai",
        "title": "OpenAI API usage",
        "description": "Collect OpenAI API usage events."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "monitoring"
    ],
    "signature_path": "/epr/openai/openai-1.2.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "openai.audio_speeches",
        "title": "Audio speeches usage"
      },
      {
        "type": "logs",
        "dataset": "openai.audio_transcriptions",
        "title": "Audio transcriptions usage"
      },
      {
        "type": "logs",
        "dataset": "openai.code_interpreter_sessions",
        "title": "Code interpreter sessions usage"
      },
      {
        "type": "logs",
        "dataset": "openai.completions",
        "title": "Completions usage"
      },
      {
        "type": "logs",
        "dataset": "openai.embeddings",
        "title": "Embeddings usage"
      },
      {
        "type": "logs",
        "dataset": "openai.images",
        "title": "Images usage"
      },
      {
        "type": "logs",
        "dataset": "openai.moderations",
        "title": "Moderations usage"
      },
      {
        "type": "logs",
        "dataset": "openai.vector_stores",
        "title": "Vector stores usage"
      }
    ]
  },
  {
    "name": "ti_opencti",
    "title": "OpenCTI",
    "version": "2.13.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Ingest threat intelligence indicators from OpenCTI with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_opencti/ti_opencti-2.13.0.zip",
    "path": "/package/ti_opencti/2.13.0",
    "icons": [
      {
        "src": "/img/opencti-logo.svg",
        "path": "/package/ti_opencti/2.13.0/img/opencti-logo.svg",
        "title": "OpenCTI logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "opencti",
        "title": "OpenCTI",
        "description": "Collect OpenCTI data."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_opencti/ti_opencti-2.13.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_opencti.indicator",
        "title": "Indicator"
      }
    ]
  },
  {
    "name": "opencanary",
    "title": "OpenCanary",
    "version": "1.0.0",
    "release": "ga",
    "description": "This integration collects and parses logs from OpenCanary honeypots.",
    "type": "integration",
    "download": "/epr/opencanary/opencanary-1.0.0.zip",
    "path": "/package/opencanary/1.0.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/opencanary/1.0.0/img/logo.svg",
        "title": "OpenCanary Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "events",
        "title": "OpenCanary Events",
        "description": "Collect OpenCanary events from logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/opencanary/opencanary-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "opencanary.events",
        "title": "OpenCanary HoneyPot Events"
      }
    ]
  },
  {
    "name": "otel_collector_internal_telemetry",
    "title": "OpenTelemetry Collector Internal Telemetry",
    "version": "1.1.0",
    "release": "ga",
    "source": {
      "license": "Apache-2.0"
    },
    "description": "This package contains dashboards that visualize the internal telemetry from the OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/otel_collector_internal_telemetry/otel_collector_internal_telemetry-1.1.0.zip",
    "path": "/package/otel_collector_internal_telemetry/1.1.0",
    "icons": [
      {
        "src": "/img/opentelemetry-logo.svg",
        "path": "/package/otel_collector_internal_telemetry/1.1.0/img/opentelemetry-logo.svg",
        "title": "OpenTelemetry logo",
        "size": "100x100",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ingest-otel-data"
    },
    "categories": [
      "monitoring",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/otel_collector_internal_telemetry/otel_collector_internal_telemetry-1.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "collectortelemetry.otel"
        }
      ]
    }
  },
  {
    "name": "oracle",
    "title": "Oracle",
    "version": "1.31.1",
    "release": "ga",
    "description": "Collect Oracle Audit Log, Performance metrics, Tablespace metrics, Sysmetrics metrics, System statistics metrics, memory metrics from Oracle database.",
    "type": "integration",
    "download": "/epr/oracle/oracle-1.31.1.zip",
    "path": "/package/oracle/1.31.1",
    "icons": [
      {
        "src": "/img/oracle_logo.svg",
        "path": "/package/oracle/1.31.1/img/oracle_logo.svg",
        "title": "Oracle",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "oracle",
        "title": "Oracle Audit Logs",
        "description": "Collect Oracle Audit logs, Performance metrics, Tablespace metrics, Sysmetrics integration, System statistics, memory metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "database_security",
      "security"
    ],
    "signature_path": "/epr/oracle/oracle-1.31.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "oracle.database_audit",
        "title": "Oracle Audit Log"
      },
      {
        "type": "metrics",
        "dataset": "oracle.memory",
        "title": "Memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "oracle.performance",
        "title": "Oracle performance metrics"
      },
      {
        "type": "metrics",
        "dataset": "oracle.sysmetric",
        "title": "Sysmetric related metrics."
      },
      {
        "type": "metrics",
        "dataset": "oracle.system_statistics",
        "title": "System Statistics"
      },
      {
        "type": "metrics",
        "dataset": "oracle.tablespace",
        "title": "Oracle tablespace metrics"
      }
    ]
  },
  {
    "name": "oracle_otel",
    "title": "Oracle OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Oracle Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/oracle_otel/oracle_otel-0.1.0.zip",
    "path": "/package/oracle_otel/0.1.0",
    "icons": [
      {
        "src": "/img/oracle_logo_otel.svg",
        "path": "/package/oracle_otel/0.1.0/img/oracle_logo_otel.svg",
        "title": "Oracle logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "message_queue",
      "opentelemetry"
    ],
    "signature_path": "/epr/oracle_otel/oracle_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "oracledbreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "oracle_weblogic",
    "title": "Oracle WebLogic",
    "version": "1.9.1",
    "release": "ga",
    "description": "Collect logs and metrics from Oracle WebLogic with Elastic Agent.",
    "type": "integration",
    "download": "/epr/oracle_weblogic/oracle_weblogic-1.9.1.zip",
    "path": "/package/oracle_weblogic/1.9.1",
    "icons": [
      {
        "src": "/img/oracle_weblogic-logo.svg",
        "path": "/package/oracle_weblogic/1.9.1/img/oracle_weblogic-logo.svg",
        "title": "Oracle WebLogic logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "oracle_weblogic",
        "title": "Oracle WebLogic metrics",
        "description": "Collect Oracle WebLogic metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability"
    ],
    "signature_path": "/epr/oracle_weblogic/oracle_weblogic-1.9.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "oracle_weblogic.access",
        "title": "Access logs"
      },
      {
        "type": "logs",
        "dataset": "oracle_weblogic.admin_server",
        "title": "Admin Server logs"
      },
      {
        "type": "metrics",
        "dataset": "oracle_weblogic.deployed_application",
        "title": "Collect Oracle WebLogic Deployed Application metrics"
      },
      {
        "type": "logs",
        "dataset": "oracle_weblogic.domain",
        "title": "Domain logs"
      },
      {
        "type": "logs",
        "dataset": "oracle_weblogic.managed_server",
        "title": "Managed Server logs"
      },
      {
        "type": "metrics",
        "dataset": "oracle_weblogic.threadpool",
        "title": "Collect Oracle WebLogic ThreadPool metrics"
      }
    ]
  },
  {
    "name": "osquery",
    "title": "Osquery Logs",
    "version": "1.24.1",
    "release": "ga",
    "description": "Collect logs from Osquery with Elastic Agent.",
    "type": "integration",
    "download": "/epr/osquery/osquery-1.24.1.zip",
    "path": "/package/osquery/1.24.1",
    "icons": [
      {
        "src": "/img/logo_osquery.svg",
        "path": "/package/osquery/1.24.1/img/logo_osquery.svg",
        "title": "logo osquery",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "osquery",
        "title": "Osquery logs",
        "description": "Collect logs from Osquery instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/osquery/osquery-1.24.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "osquery.result",
        "title": "Osquery result logs"
      }
    ]
  },
  {
    "name": "osquery_manager",
    "title": "Osquery Manager",
    "version": "1.28.0",
    "release": "ga",
    "description": "Deploy Osquery with Elastic Agent, then run and schedule queries in Kibana",
    "type": "integration",
    "download": "/epr/osquery_manager/osquery_manager-1.28.0.zip",
    "path": "/package/osquery_manager/1.28.0",
    "icons": [
      {
        "src": "/img/logo_osquery.svg",
        "path": "/package/osquery_manager/1.28.0/img/logo_osquery.svg",
        "title": "logo osquery",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "osquery_manager",
        "title": "Osquery Manager",
        "description": "Send interactive or scheduled queries to the osquery instances executed by the elastic-agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      },
      "elastic": {
        "subscription": "",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-defend-workflows"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/osquery_manager/osquery_manager-1.28.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "osquery_manager.action.responses",
        "title": "Osquery Manager queries"
      },
      {
        "type": "logs",
        "dataset": "osquery_manager.result",
        "title": "Osquery Manager queries"
      }
    ]
  },
  {
    "name": "php_fpm",
    "title": "PHP-FPM",
    "version": "1.6.0",
    "release": "ga",
    "description": "This Elastic integration collects metrics from PHP-FPM.",
    "type": "integration",
    "download": "/epr/php_fpm/php_fpm-1.6.0.zip",
    "path": "/package/php_fpm/1.6.0",
    "icons": [
      {
        "src": "/img/php_fpm-logo.svg",
        "path": "/package/php_fpm/1.6.0/img/php_fpm-logo.svg",
        "title": "PHP-FPM logo",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "PHP-FPM",
        "title": "PHP-FPM metrics",
        "description": "Collect PHP-FPM metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "process_manager"
    ],
    "signature_path": "/epr/php_fpm/php_fpm-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "php_fpm.pool",
        "title": "Pool metrics"
      },
      {
        "type": "logs",
        "dataset": "php_fpm.process",
        "title": "Process metrics"
      }
    ]
  },
  {
    "name": "panw_cortex_xdr",
    "title": "Palo Alto Cortex XDR",
    "version": "2.5.2",
    "release": "ga",
    "description": "Collect logs from Palo Alto Cortex XDR with Elastic Agent.",
    "type": "integration",
    "download": "/epr/panw_cortex_xdr/panw_cortex_xdr-2.5.2.zip",
    "path": "/package/panw_cortex_xdr/2.5.2",
    "icons": [
      {
        "src": "/img/icon-cortex.svg",
        "path": "/package/panw_cortex_xdr/2.5.2/img/icon-cortex.svg",
        "title": "Palo Alto",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "xdr",
        "title": "Palo Alto Cortex XDR API",
        "description": "Collect logs from Palo Alto Cortex XDR API",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/panw_cortex_xdr/panw_cortex_xdr-2.5.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "panw_cortex_xdr.alerts",
        "title": "Palo Alto Cortex XDR Alerts API"
      },
      {
        "type": "logs",
        "dataset": "panw_cortex_xdr.event",
        "title": "Event"
      },
      {
        "type": "logs",
        "dataset": "panw_cortex_xdr.incidents",
        "title": "Palo Alto Cortex XDR Incidents API"
      }
    ]
  },
  {
    "name": "panw_metrics",
    "title": "Palo Alto Networks Metrics",
    "version": "0.2.0",
    "release": "beta",
    "description": "Collect metrics from Palo Alto Networks with Elastic Agent.",
    "type": "integration",
    "download": "/epr/panw_metrics/panw_metrics-0.2.0.zip",
    "path": "/package/panw_metrics/0.2.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/panw_metrics/0.2.0/img/logo.svg",
        "title": "PANW logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "panw_metrics",
        "title": "Palo Alto Networks metrics",
        "description": "Collects metrics from Palo Alto Networks with Elastic Agent"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.2 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "network",
      "security",
      "observability"
    ],
    "signature_path": "/epr/panw_metrics/panw_metrics-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "panw_metrics.interfaces",
        "title": "Palo Alto Networks Interfaces metrics"
      },
      {
        "type": "metrics",
        "dataset": "panw_metrics.routing",
        "title": "Palo Alto Networks Routing metrics"
      },
      {
        "type": "metrics",
        "dataset": "panw_metrics.system",
        "title": "Palo Alto Networks System metrics"
      },
      {
        "type": "metrics",
        "dataset": "panw_metrics.vpn",
        "title": "Palo Alto Networks VPN metrics"
      }
    ]
  },
  {
    "name": "panw",
    "title": "Palo Alto Next-Gen Firewall",
    "version": "5.5.0",
    "release": "ga",
    "description": "Collect logs from Palo Alto next-gen firewalls with Elastic Agent.",
    "type": "integration",
    "download": "/epr/panw/panw-5.5.0.zip",
    "path": "/package/panw/5.5.0",
    "icons": [
      {
        "src": "/img/logo-integrations-paloalto-networks.svg",
        "path": "/package/panw/5.5.0/img/logo-integrations-paloalto-networks.svg",
        "title": "Palo Alto Networks",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "panw",
        "title": "Palo Alto Networks PAN-OS firewall logs",
        "description": "Collect logs from Palo Alto Networks PAN-OS firewall."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/panw/panw-5.5.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "panw.panos",
        "title": "Palo Alto Networks PAN-OS firewall logs"
      }
    ]
  },
  {
    "name": "prisma_access",
    "title": "Palo Alto Prisma Access",
    "version": "1.7.1",
    "release": "ga",
    "description": "Collect logs from Palo Alto Prisma Access with Elastic Agent.",
    "type": "integration",
    "download": "/epr/prisma_access/prisma_access-1.7.1.zip",
    "path": "/package/prisma_access/1.7.1",
    "icons": [
      {
        "src": "/img/prisma-access-logo.svg",
        "path": "/package/prisma_access/1.7.1/img/prisma-access-logo.svg",
        "title": "Palo Alto Prisma Access logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "prisma_access",
        "title": "Palo Alto Prisma Access logs",
        "description": "Collect Palo Alto Prisma Access logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/prisma_access/prisma_access-1.7.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "prisma_access.event",
        "title": "Collect Events from Palo Alto Prisma Access"
      }
    ]
  },
  {
    "name": "prisma_cloud",
    "title": "Palo Alto Prisma Cloud",
    "version": "4.1.0",
    "release": "ga",
    "description": "Collect logs from Prisma Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/prisma_cloud/prisma_cloud-4.1.0.zip",
    "path": "/package/prisma_cloud/4.1.0",
    "icons": [
      {
        "src": "/img/prisma_cloud-logo.svg",
        "path": "/package/prisma_cloud/4.1.0/img/prisma_cloud-logo.svg",
        "title": "Prisma Cloud logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sample",
        "title": "Sample logs",
        "description": "Collect sample logs",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.8 || ~9.1.8 || ~9.2.2 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "cloudsecurity_cdr",
      "misconfiguration_workflow",
      "vulnerability_workflow"
    ],
    "signature_path": "/epr/prisma_cloud/prisma_cloud-4.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "prisma_cloud.alert",
        "title": "Collect Alert logs from Prisma Cloud Security Posture Management."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.audit",
        "title": "Collect Audit logs from Prisma Cloud Security Posture Management."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.host",
        "title": "Collect Host logs from Prisma Cloud Workload Protection."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.host_profile",
        "title": "Collect Host Profile logs from Prisma Cloud Workload Protection."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.incident_audit",
        "title": "Collect Incident Audit logs from Prisma Cloud Workload Protection."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.misconfiguration",
        "title": "Collect Misconfiguration logs from Prisma Cloud."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.vulnerability",
        "title": "Collect Vulnerability logs from Prisma Cloud."
      }
    ]
  },
  {
    "name": "verifier_otel",
    "title": "Permission Verifier",
    "version": "0.0.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Verify identity federation based integration permissions and report results to Elasticsearch using the Verifier receiver of the OTel Collector.",
    "type": "input",
    "download": "/epr/verifier_otel/verifier_otel-0.0.1.zip",
    "path": "/package/verifier_otel/0.0.1",
    "icons": [
      {
        "src": "/img/verifier-logo.svg",
        "path": "/package/verifier_otel/0.0.1/img/verifier-logo.svg",
        "title": "Verifier logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "verifierreceiver",
        "title": "Permission Verifier",
        "description": "Verify identity federation based integration permissions and report status.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/cloud-services"
    },
    "categories": [
      "monitoring",
      "security",
      "opentelemetry",
      "cloud"
    ],
    "signature_path": "/epr/verifier_otel/verifier_otel-0.0.1.zip.sig"
  },
  {
    "name": "ping_federate",
    "title": "PingFederate",
    "version": "1.2.0",
    "release": "ga",
    "description": "Collect logs from PingFederate with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ping_federate/ping_federate-1.2.0.zip",
    "path": "/package/ping_federate/1.2.0",
    "icons": [
      {
        "src": "/img/ping_federate-logo.svg",
        "path": "/package/ping_federate/1.2.0/img/ping_federate-logo.svg",
        "title": "PingFederate logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ping_federate",
        "title": "PingFederate logs",
        "description": "Collect PingFederate logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "authentication",
      "iam"
    ],
    "signature_path": "/epr/ping_federate/ping_federate-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ping_federate.admin",
        "title": "Admin logs"
      },
      {
        "type": "logs",
        "dataset": "ping_federate.audit",
        "title": "Audit logs"
      }
    ]
  },
  {
    "name": "ping_one",
    "title": "PingOne",
    "version": "1.23.0",
    "release": "ga",
    "description": "Collect logs from PingOne with Elastic-Agent.",
    "type": "integration",
    "download": "/epr/ping_one/ping_one-1.23.0.zip",
    "path": "/package/ping_one/1.23.0",
    "icons": [
      {
        "src": "/img/ping-one-logo.svg",
        "path": "/package/ping_one/1.23.0/img/ping-one-logo.svg",
        "title": "PingOne logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ping_one",
        "title": "PingOne",
        "description": "Collect logs from PingOne.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/ping_one/ping_one-1.23.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ping_one.audit",
        "title": "Collect Audit logs from PingOne"
      }
    ]
  },
  {
    "name": "platform_observability",
    "title": "Platform Observability",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect stack component logs with Elastic Agent",
    "type": "integration",
    "download": "/epr/platform_observability/platform_observability-0.1.0.zip",
    "path": "/package/platform_observability/0.1.0",
    "icons": [
      {
        "src": "/img/logo_kibana.svg",
        "path": "/package/platform_observability/0.1.0/img/logo_kibana.svg",
        "title": "logo kibana",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "platform_observability_kibana_logs",
        "title": "Kibana logs",
        "description": "Collect logs from Kibana"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/stack-monitoring"
    },
    "categories": [
      "elastic_stack",
      "monitoring",
      "observability"
    ],
    "signature_path": "/epr/platform_observability/platform_observability-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "platform_observability.kibana_audit",
        "title": "Platform Observability Kibana audit logs"
      },
      {
        "type": "logs",
        "dataset": "platform_observability.kibana_log",
        "title": "Platform Observability Kibana logs"
      }
    ]
  },
  {
    "name": "pps",
    "title": "Pleasant Password Server",
    "version": "1.2.1",
    "release": "ga",
    "source": {
      "license": "Apache-2.0"
    },
    "description": "Integration for Pleasant Password Server Syslog Messages",
    "type": "integration",
    "download": "/epr/pps/pps-1.2.1.zip",
    "path": "/package/pps/1.2.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/pps/1.2.1/img/logo.svg",
        "title": "PPS logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Pleasant Password Server",
        "title": "Pleasant Password Server logs",
        "description": "Collect Pleasant Password Server logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "productivity",
      "security"
    ],
    "signature_path": "/epr/pps/pps-1.2.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "pps.log",
        "title": "Pleasant Password Server logs"
      }
    ]
  },
  {
    "name": "postgresql",
    "title": "PostgreSQL",
    "version": "1.32.1",
    "release": "ga",
    "description": "Collect logs and metrics from PostgreSQL servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/postgresql/postgresql-1.32.1.zip",
    "path": "/package/postgresql/1.32.1",
    "icons": [
      {
        "src": "/img/logo_postgres.svg",
        "path": "/package/postgresql/1.32.1/img/logo_postgres.svg",
        "title": "logo postgres",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "postgresql",
        "title": "PostgreSQL logs and metrics",
        "description": "Collect logs and metrics from PostgreSQL instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/postgresql/postgresql-1.32.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "postgresql.activity",
        "title": "PostgreSQL activity metrics"
      },
      {
        "type": "metrics",
        "dataset": "postgresql.bgwriter",
        "title": "PostgreSQL bgwriter metrics"
      },
      {
        "type": "metrics",
        "dataset": "postgresql.database",
        "title": "PostgreSQL database metrics"
      },
      {
        "type": "logs",
        "dataset": "postgresql.log",
        "title": "PostgreSQL logs"
      },
      {
        "type": "metrics",
        "dataset": "postgresql.statement",
        "title": "PostgreSQL statement metrics"
      }
    ]
  },
  {
    "name": "postgresql_otel",
    "title": "PostgreSQL OpenTelemetry Assets",
    "version": "0.3.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "PostgreSQL Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/postgresql_otel/postgresql_otel-0.3.0.zip",
    "path": "/package/postgresql_otel/0.3.0",
    "icons": [
      {
        "src": "/img/postgresql_otel_logo.svg",
        "path": "/package/postgresql_otel/0.3.0/img/postgresql_otel_logo.svg",
        "title": "OTel PostgreSQL",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "opentelemetry"
    ],
    "signature_path": "/epr/postgresql_otel/postgresql_otel-0.3.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "postgresqlreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "security_detection_engine",
    "title": "Prebuilt Security Detection Rules",
    "version": "9.3.8",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Prebuilt detection rules for Elastic Security",
    "type": "integration",
    "download": "/epr/security_detection_engine/security_detection_engine-9.3.8.zip",
    "path": "/package/security_detection_engine/9.3.8",
    "icons": [
      {
        "src": "/img/security-logo-color-64px.svg",
        "path": "/package/security_detection_engine/9.3.8/img/security-logo-color-64px.svg",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/protections"
    },
    "categories": [
      "security",
      "siem"
    ],
    "signature_path": "/epr/security_detection_engine/security_detection_engine-9.3.8.zip.sig"
  },
  {
    "name": "pad",
    "title": "Privileged Access Detection",
    "version": "1.1.2",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "ML package to detect anomalous privileged access activity in Windows, Linux and Okta logs",
    "type": "integration",
    "download": "/epr/pad/pad-1.1.2.zip",
    "path": "/package/pad/1.1.2",
    "icons": [
      {
        "src": "/img/icon-machine-learning.svg",
        "path": "/package/pad/1.1.2/img/icon-machine-learning.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "platinum",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-applied-ml"
    },
    "categories": [
      "security",
      "advanced_analytics_ueba"
    ],
    "signature_path": "/epr/pad/pad-1.1.2.zip.sig"
  },
  {
    "name": "profilingmetrics_otel",
    "title": "Profilingmetrics OpenTelemetry Assets",
    "version": "0.0.5",
    "release": "beta",
    "source": {
      "license": "Apache-2.0"
    },
    "description": "Create metrics from profiling data.",
    "type": "content",
    "download": "/epr/profilingmetrics_otel/profilingmetrics_otel-0.0.5.zip",
    "path": "/package/profilingmetrics_otel/0.0.5",
    "icons": [
      {
        "src": "/img/profiler-logo-color-48px.svg",
        "path": "/package/profilingmetrics_otel/0.0.5/img/profiler-logo-color-48px.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ingest-otel-data"
    },
    "categories": [
      "custom",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/profilingmetrics_otel/profilingmetrics_otel-0.0.5.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "profilingmetricsconnector.otel"
        }
      ]
    }
  },
  {
    "name": "prometheus",
    "title": "Prometheus",
    "version": "1.24.2",
    "release": "ga",
    "description": "Collect metrics from Prometheus servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/prometheus/prometheus-1.24.2.zip",
    "path": "/package/prometheus/1.24.2",
    "icons": [
      {
        "src": "/img/logo_prometheus.svg",
        "path": "/package/prometheus/1.24.2/img/logo_prometheus.svg",
        "title": "logo prometheus",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "prometheus",
        "title": "Prometheus metrics",
        "description": "Collect metrics from Prometheus instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "monitoring",
      "containers"
    ],
    "signature_path": "/epr/prometheus/prometheus-1.24.2.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "prometheus.collector",
        "title": "Prometheus collector metrics"
      },
      {
        "type": "metrics",
        "dataset": "prometheus.query",
        "title": "Prometheus query metrics"
      },
      {
        "type": "metrics",
        "dataset": "prometheus.remote_write",
        "title": "Prometheus remote_write metrics"
      }
    ]
  },
  {
    "name": "prometheus_input",
    "title": "Prometheus Input",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collects metrics from Prometheus exporter.",
    "type": "input",
    "download": "/epr/prometheus_input/prometheus_input-1.0.0.zip",
    "path": "/package/prometheus_input/1.0.0",
    "icons": [
      {
        "src": "/img/logo_prometheus.svg",
        "path": "/package/prometheus_input/1.0.0/img/logo_prometheus.svg",
        "title": "logo prometheus",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "prometheus",
        "title": "Prometheus Metrics",
        "description": "Collects Prometheus Metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "monitoring",
      "containers",
      "custom",
      "observability"
    ],
    "signature_path": "/epr/prometheus_input/prometheus_input-1.0.0.zip.sig"
  },
  {
    "name": "prometheus_input_otel_raw",
    "title": "Prometheus OTel Scrape (Bring Your Own Config)",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Scrape Prometheus metrics endpoints using the OpenTelemetry Collector Prometheus receiver with raw scrape configuration",
    "type": "input",
    "download": "/epr/prometheus_input_otel_raw/prometheus_input_otel_raw-0.1.0.zip",
    "path": "/package/prometheus_input_otel_raw/0.1.0",
    "icons": [
      {
        "src": "/img/logo_prometheus_otel.svg",
        "path": "/package/prometheus_input_otel_raw/0.1.0/img/logo_prometheus_otel.svg",
        "title": "Prometheus OpenTelemetry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "prometheusreceiver",
        "title": "Prometheus Metrics (Raw Config)",
        "description": "Paste your existing Prometheus scrape configuration directly"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "monitoring",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/prometheus_input_otel_raw/prometheus_input_otel_raw-0.1.0.zip.sig"
  },
  {
    "name": "prometheus_input_otel",
    "title": "Prometheus OTel Scrape (Guided)",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Scrape Prometheus metrics endpoints using the OpenTelemetry Collector Prometheus receiver with guided configuration",
    "type": "input",
    "download": "/epr/prometheus_input_otel/prometheus_input_otel-0.1.0.zip",
    "path": "/package/prometheus_input_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_prometheus_otel.svg",
        "path": "/package/prometheus_input_otel/0.1.0/img/logo_prometheus_otel.svg",
        "title": "Prometheus OpenTelemetry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "prometheusreceiver",
        "title": "Prometheus Metrics",
        "description": "Scrape metrics from Prometheus-compatible endpoints using guided configuration fields"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "monitoring",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/prometheus_input_otel/prometheus_input_otel-0.1.0.zip.sig"
  },
  {
    "name": "proofpoint_365totalprotection",
    "title": "Proofpoint 365 Total Protection",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "The Proofpoint 365 Total Protection integration for Elastic collects detailed email security and delivery logs via a REST API. It provides security teams with centralized visibility into email traffic, threat activity, and message disposition directly in Elastic.",
    "type": "integration",
    "download": "/epr/proofpoint_365totalprotection/proofpoint_365totalprotection-0.1.0.zip",
    "path": "/package/proofpoint_365totalprotection/0.1.0",
    "icons": [
      {
        "src": "/img/proofpoint_365totalprotection-logo.svg",
        "path": "/package/proofpoint_365totalprotection/0.1.0/img/proofpoint_365totalprotection-logo.svg",
        "title": "Proofpoint 365 Total Protection logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Proofpoint 365 Total Protection logs",
        "description": "Collect email logs for Proofpoint 365 Total Protection"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/proofpoint_365totalprotection/proofpoint_365totalprotection-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proofpoint_365totalprotection.email",
        "title": "Email logs"
      }
    ]
  },
  {
    "name": "proofpoint_essentials",
    "title": "Proofpoint Essentials",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from Proofpoint Essentials with Elastic Agent.",
    "type": "integration",
    "download": "/epr/proofpoint_essentials/proofpoint_essentials-0.1.0.zip",
    "path": "/package/proofpoint_essentials/0.1.0",
    "icons": [
      {
        "src": "/img/proofpoint-logo.svg",
        "path": "/package/proofpoint_essentials/0.1.0/img/proofpoint-logo.svg",
        "title": "Proofpoint logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "proofpoint_essentials",
        "title": "Proofpoint Essentials logs",
        "description": "Collect Proofpoint Essentials logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/proofpoint_essentials/proofpoint_essentials-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proofpoint_essentials.clicks_blocked",
        "title": "Proofpoint Essentials Clicks Blocked Events"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_essentials.clicks_permitted",
        "title": "Proofpoint Essentials Clicks Permitted Events"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_essentials.message_blocked",
        "title": "Proofpoint Essentials Messages Blocked Events"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_essentials.message_delivered",
        "title": "Proofpoint Essentials Messages Delivered Events"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_essentials.threat",
        "title": "Threat"
      }
    ]
  },
  {
    "name": "proofpoint_itm",
    "title": "Proofpoint ITM",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect logs from Proofpoint ITM using Elastic Agent.",
    "type": "integration",
    "download": "/epr/proofpoint_itm/proofpoint_itm-1.0.1.zip",
    "path": "/package/proofpoint_itm/1.0.1",
    "icons": [
      {
        "src": "/img/proofpoint_itm-logo.svg",
        "path": "/package/proofpoint_itm/1.0.1/img/proofpoint_itm-logo.svg",
        "title": "Proofpoint ITM logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "proofpoint_itm",
        "title": "Proofpoint ITM Logs",
        "description": "Collect Proofpoint ITM logs",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/proofpoint_itm/proofpoint_itm-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proofpoint_itm.report",
        "title": "Collect Reports from Proofpoint ITM"
      }
    ]
  },
  {
    "name": "proofpoint_on_demand",
    "title": "Proofpoint On Demand",
    "version": "1.9.0",
    "release": "ga",
    "description": "Collect logs from Proofpoint On Demand with Elastic Agent.",
    "type": "integration",
    "download": "/epr/proofpoint_on_demand/proofpoint_on_demand-1.9.0.zip",
    "path": "/package/proofpoint_on_demand/1.9.0",
    "icons": [
      {
        "src": "/img/proofpoint_on_demand-logo.svg",
        "path": "/package/proofpoint_on_demand/1.9.0/img/proofpoint_on_demand-logo.svg",
        "title": "Proofpoint On Demand Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "proofpoint_on_demand",
        "title": "Proofpoint On Demand logs",
        "description": "Collect Proofpoint On Demand logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/proofpoint_on_demand/proofpoint_on_demand-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proofpoint_on_demand.audit",
        "title": "Proofpoint On Demand Audit logs"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_on_demand.mail",
        "title": "Proofpoint On Demand Mail logs"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_on_demand.message",
        "title": "Proofpoint On Demand Message logs"
      }
    ]
  },
  {
    "name": "proofpoint_tap",
    "title": "Proofpoint TAP",
    "version": "1.29.1",
    "release": "ga",
    "description": "Collect logs from Proofpoint TAP with Elastic Agent.",
    "type": "integration",
    "download": "/epr/proofpoint_tap/proofpoint_tap-1.29.1.zip",
    "path": "/package/proofpoint_tap/1.29.1",
    "icons": [
      {
        "src": "/img/proofpoint_tap-logo.svg",
        "path": "/package/proofpoint_tap/1.29.1/img/proofpoint_tap-logo.svg",
        "title": "Proofpoint TAP logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Proofpoint TAP",
        "title": "Proofpoint_TAP logs",
        "description": "Collect proofpoint_tap logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/proofpoint_tap/proofpoint_tap-1.29.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proofpoint_tap.clicks_blocked",
        "title": "Clicks Blocked"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_tap.clicks_permitted",
        "title": "Clicks Permitted"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_tap.message_blocked",
        "title": "Message Blocked"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_tap.message_delivered",
        "title": "Message Delivered"
      }
    ]
  },
  {
    "name": "pulse_connect_secure",
    "title": "Pulse Connect Secure",
    "version": "2.6.1",
    "release": "ga",
    "description": "Collect logs from Pulse Connect Secure with Elastic Agent.",
    "type": "integration",
    "download": "/epr/pulse_connect_secure/pulse_connect_secure-2.6.1.zip",
    "path": "/package/pulse_connect_secure/2.6.1",
    "icons": [
      {
        "src": "/img/pulse_connect_secure.svg",
        "path": "/package/pulse_connect_secure/2.6.1/img/pulse_connect_secure.svg",
        "title": "pulse_connect_secure",
        "size": "300x70",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "pulse_connect_secure",
        "title": "Pulse Connect Secure logs",
        "description": "Collect logs from Pulse Connect Secure instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "vpn_security",
      "security"
    ],
    "signature_path": "/epr/pulse_connect_secure/pulse_connect_secure-2.6.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "pulse_connect_secure.log",
        "title": "Pulse Connect Secure"
      }
    ]
  },
  {
    "name": "qnap_nas",
    "title": "QNAP NAS",
    "version": "1.25.2",
    "release": "ga",
    "description": "Collect logs from QNAP NAS devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/qnap_nas/qnap_nas-1.25.2.zip",
    "path": "/package/qnap_nas/1.25.2",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/qnap_nas/1.25.2/img/logo.svg",
        "title": "QNAP logo",
        "size": "643x121",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "qnap",
        "title": "QNAP NAS Event & Access logs",
        "description": "Collect logs from QNAP NAS"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/qnap_nas/qnap_nas-1.25.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "qnap_nas.log",
        "title": "QNAP NAS logs"
      }
    ]
  },
  {
    "name": "qualys_gav",
    "title": "Qualys Global AssetView",
    "version": "0.7.2",
    "release": "beta",
    "description": "Collect logs from Qualys Global AssetView with Elastic Agent.",
    "type": "integration",
    "download": "/epr/qualys_gav/qualys_gav-0.7.2.zip",
    "path": "/package/qualys_gav/0.7.2",
    "icons": [
      {
        "src": "/img/qualys_gav-logo.svg",
        "path": "/package/qualys_gav/0.7.2/img/qualys_gav-logo.svg",
        "title": "Qualys Global AssetView logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "qualys_gav",
        "title": "Qualys Global AssetView",
        "description": "Collect logs from Qualys Global AssetView.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.11 || ^9.2.5"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/qualys_gav/qualys_gav-0.7.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "qualys_gav.asset",
        "title": "Collect Assets from Qualys Global AssetView."
      }
    ]
  },
  {
    "name": "qualys_vmdr",
    "title": "Qualys VMDR",
    "version": "6.18.0",
    "release": "ga",
    "description": "Collect data from Qualys VMDR platform with Elastic Agent.",
    "type": "integration",
    "download": "/epr/qualys_vmdr/qualys_vmdr-6.18.0.zip",
    "path": "/package/qualys_vmdr/6.18.0",
    "icons": [
      {
        "src": "/img/qualys-vmdr-logo.svg",
        "path": "/package/qualys_vmdr/6.18.0/img/qualys-vmdr-logo.svg",
        "title": "Qualys VMDR logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "qualys_vmdr",
        "title": "Qualys VMDR data",
        "description": "Collect Qualys VMDR data.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.11 || ^9.2.5"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management",
      "vulnerability_workflow",
      "cloudsecurity_cdr"
    ],
    "signature_path": "/epr/qualys_vmdr/qualys_vmdr-6.18.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "qualys_vmdr.asset_host_detection",
        "title": "Collect Asset Host Detection data from Qualys VMDR platform."
      },
      {
        "type": "logs",
        "dataset": "qualys_vmdr.knowledge_base",
        "title": "Collect Knowledge Base data from Qualys VMDR platform."
      },
      {
        "type": "logs",
        "dataset": "qualys_vmdr.user_activity",
        "title": "Collect User Activity Log data from Qualys VMDR platform."
      }
    ]
  },
  {
    "name": "qualys_was",
    "title": "Qualys Web Application Scanning (WAS)",
    "version": "0.3.1",
    "release": "beta",
    "description": "Collect data from Qualys Web Application Scanning platform with Elastic Agent or Agentless",
    "type": "integration",
    "download": "/epr/qualys_was/qualys_was-0.3.1.zip",
    "path": "/package/qualys_was/0.3.1",
    "policy_templates": [
      {
        "name": "qualys_was",
        "title": "Qualys WAS data",
        "description": "Collect Qualys WAS data.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management"
    ],
    "signature_path": "/epr/qualys_was/qualys_was-0.3.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "qualys_was.vulnerability",
        "title": "Collects Web Application Vulnerabilty Findings from Qualys WAS platform."
      }
    ]
  },
  {
    "name": "otel_rum_dashboards",
    "title": "RUM OpenTelemetry Assets",
    "version": "0.0.2",
    "release": "beta",
    "description": "RUM status metrics from OpenTelemetry JS SDKs",
    "type": "content",
    "download": "/epr/otel_rum_dashboards/otel_rum_dashboards-0.0.2.zip",
    "path": "/package/otel_rum_dashboards/0.0.2",
    "icons": [
      {
        "src": "/img/otel-rum.svg",
        "path": "/package/otel_rum_dashboards/0.0.2/img/otel-rum.svg",
        "title": "OpenTelemetry RUM",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/apm-agent-rum"
    },
    "categories": [
      "observability",
      "web",
      "opentelemetry"
    ],
    "signature_path": "/epr/otel_rum_dashboards/otel_rum_dashboards-0.0.2.zip.sig"
  },
  {
    "name": "rabbitmq",
    "title": "RabbitMQ Logs and Metrics",
    "version": "1.22.0",
    "release": "ga",
    "description": "Collect and parse logs from RabbitMQ servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/rabbitmq/rabbitmq-1.22.0.zip",
    "path": "/package/rabbitmq/1.22.0",
    "icons": [
      {
        "src": "/img/logo_rabbitmq.svg",
        "path": "/package/rabbitmq/1.22.0/img/logo_rabbitmq.svg",
        "title": "RabbitMQ Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "rabbitmq",
        "title": "RabbitMQ logs and metrics",
        "description": "Collect logs and metrics from RabbitMQ instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "message_queue",
      "observability"
    ],
    "signature_path": "/epr/rabbitmq/rabbitmq-1.22.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "rabbitmq.connection",
        "title": "RabbitMQ connection metrics"
      },
      {
        "type": "metrics",
        "dataset": "rabbitmq.exchange",
        "title": "RabbitMQ exchange metrics"
      },
      {
        "type": "logs",
        "dataset": "rabbitmq.log",
        "title": "RabbitMQ application logs"
      },
      {
        "type": "metrics",
        "dataset": "rabbitmq.node",
        "title": "RabbitMQ node metrics"
      },
      {
        "type": "metrics",
        "dataset": "rabbitmq.queue",
        "title": "RabbitMQ queue metrics"
      }
    ]
  },
  {
    "name": "rabbitmq_otel",
    "title": "RabbitMQ OpenTelemetry assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "RabbitMQ Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/rabbitmq_otel/rabbitmq_otel-0.1.0.zip",
    "path": "/package/rabbitmq_otel/0.1.0",
    "icons": [
      {
        "src": "/img/rabbitmq_otel.svg",
        "path": "/package/rabbitmq_otel/0.1.0/img/rabbitmq_otel.svg",
        "title": "RabbitMQ Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "message_queue",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/rabbitmq_otel/rabbitmq_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "rabbitmqreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "radware",
    "title": "Radware DefensePro Logs (Deprecated)",
    "version": "0.20.1",
    "release": "beta",
    "description": "Deprecated. Radware DefensePro Logs is no longer supported.",
    "type": "integration",
    "download": "/epr/radware/radware-0.20.1.zip",
    "path": "/package/radware/0.20.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/radware/0.20.1/img/logo.svg",
        "title": "Radware DefensePro logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "defensepro",
        "title": "Radware DefensePro",
        "description": "Collect Radware DefensePro logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/radware/radware-0.20.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "radware.defensepro",
        "title": "Radware DefensePro logs"
      }
    ]
  },
  {
    "name": "rapid7_insightvm",
    "title": "Rapid7 InsightVM",
    "version": "2.8.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Rapid7 InsightVM with Elastic Agent.",
    "type": "integration",
    "download": "/epr/rapid7_insightvm/rapid7_insightvm-2.8.0.zip",
    "path": "/package/rapid7_insightvm/2.8.0",
    "icons": [
      {
        "src": "/img/rapid7-insightvm-logo.svg",
        "path": "/package/rapid7_insightvm/2.8.0/img/rapid7-insightvm-logo.svg",
        "title": "Rapid7 InsightVM",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "rapid7_insightvm",
        "title": "Rapid7 InsightVM logs",
        "description": "Collect Rapid7 InsightVM logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management",
      "vulnerability_workflow",
      "cloudsecurity_cdr"
    ],
    "signature_path": "/epr/rapid7_insightvm/rapid7_insightvm-2.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "rapid7_insightvm.asset",
        "title": "Collect Asset logs from Rapid7 InsightVM (Deprecated)"
      },
      {
        "type": "logs",
        "dataset": "rapid7_insightvm.asset_vulnerability",
        "title": "Asset Vulnerability Event"
      },
      {
        "type": "logs",
        "dataset": "rapid7_insightvm.vulnerability",
        "title": "Collect Vulnerability logs from Rapid7 InsightVM"
      }
    ]
  },
  {
    "name": "ti_rapid7_threat_command",
    "title": "Rapid7 Threat Command",
    "version": "2.7.1",
    "release": "ga",
    "description": "Collect threat intelligence from Threat Command API with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_rapid7_threat_command/ti_rapid7_threat_command-2.7.1.zip",
    "path": "/package/ti_rapid7_threat_command/2.7.1",
    "icons": [
      {
        "src": "/img/ti_rapid7_threat_command-logo.svg",
        "path": "/package/ti_rapid7_threat_command/2.7.1/img/ti_rapid7_threat_command-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_rapid7_threat_command",
        "title": "Rapid7 Threat Command",
        "description": "Collect Threat Intel data from Rapid7 Threat Command."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel",
      "vulnerability_management"
    ],
    "signature_path": "/epr/ti_rapid7_threat_command/ti_rapid7_threat_command-2.7.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_rapid7_threat_command.alert",
        "title": "Rapid7 Threat Command Alerts"
      },
      {
        "type": "logs",
        "dataset": "ti_rapid7_threat_command.ioc",
        "title": "Rapid7 Threat Command IOCs"
      },
      {
        "type": "logs",
        "dataset": "ti_rapid7_threat_command.vulnerability",
        "title": "Rapid7 Threat Command Vulnerability"
      }
    ]
  },
  {
    "name": "ti_recordedfuture",
    "title": "Recorded Future",
    "version": "2.4.2",
    "release": "ga",
    "description": "Ingest threat intelligence and alert data from Recorded Future with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_recordedfuture/ti_recordedfuture-2.4.2.zip",
    "path": "/package/ti_recordedfuture/2.4.2",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/ti_recordedfuture/2.4.2/img/logo.svg",
        "title": "Recorded Future",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_recordedfuture",
        "title": "Recorded Future",
        "description": "Ingest threat intelligence and alert data from Recorded Future with Elastic Agent.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_recordedfuture/ti_recordedfuture-2.4.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_recordedfuture.playbook_alert",
        "title": "Playbook Alert"
      },
      {
        "type": "logs",
        "dataset": "ti_recordedfuture.threat",
        "title": "Recorded Future"
      },
      {
        "type": "logs",
        "dataset": "ti_recordedfuture.triggered_alert",
        "title": "Triggered Alert"
      }
    ]
  },
  {
    "name": "redis",
    "title": "Redis",
    "version": "1.20.0",
    "release": "ga",
    "description": "Collect logs and metrics from Redis servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/redis/redis-1.20.0.zip",
    "path": "/package/redis/1.20.0",
    "icons": [
      {
        "src": "/img/logo_redis.svg",
        "path": "/package/redis/1.20.0/img/logo_redis.svg",
        "title": "logo redis",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "redis",
        "title": "Redis logs and metrics",
        "description": "Collect logs and metrics from Redis instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/redis/redis-1.20.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "redis.info",
        "title": "Redis info metrics"
      },
      {
        "type": "metrics",
        "dataset": "redis.key",
        "title": "Redis key metrics"
      },
      {
        "type": "metrics",
        "dataset": "redis.keyspace",
        "title": "Redis keyspace metrics"
      },
      {
        "type": "logs",
        "dataset": "redis.log",
        "title": "Redis application logs"
      },
      {
        "type": "logs",
        "dataset": "redis.slowlog",
        "title": "Redis slow logs"
      }
    ]
  },
  {
    "name": "redisenterprise",
    "title": "Redis Enterprise",
    "version": "0.12.0",
    "release": "beta",
    "description": "Collect metrics from Redis Enterprise Cluster",
    "type": "integration",
    "download": "/epr/redisenterprise/redisenterprise-0.12.0.zip",
    "path": "/package/redisenterprise/0.12.0",
    "icons": [
      {
        "src": "/img/logo_redis.svg",
        "path": "/package/redisenterprise/0.12.0/img/logo_redis.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "redisenterprise",
        "title": "Redis Enterprise metrics",
        "description": "Collect metrics from Redis Enterprise Cluster"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/redisenterprise/redisenterprise-0.12.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "redisenterprise.node",
        "title": "node"
      },
      {
        "type": "metrics",
        "dataset": "redisenterprise.proxy",
        "title": "proxy"
      }
    ]
  },
  {
    "name": "redisenterprise_otel",
    "title": "Redis Enterprise OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Redis Enterprise Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/redisenterprise_otel/redisenterprise_otel-0.1.0.zip",
    "path": "/package/redisenterprise_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_redis.svg",
        "path": "/package/redisenterprise_otel/0.1.0/img/logo_redis.svg",
        "title": "Redis Enterprise logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/redisenterprise_otel/redisenterprise_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "redisenterprise.otel"
        }
      ]
    }
  },
  {
    "name": "redis_otel",
    "title": "Redis OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Redis Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/redis_otel/redis_otel-0.1.0.zip",
    "path": "/package/redis_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_redis.svg",
        "path": "/package/redis_otel/0.1.0/img/logo_redis.svg",
        "title": "redis logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/redis_otel/redis_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "redisreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "redis_input_otel",
    "title": "Redis OpenTelemetry Input Package",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Redis OpenTelemetry Input Package",
    "type": "input",
    "download": "/epr/redis_input_otel/redis_input_otel-0.1.0.zip",
    "path": "/package/redis_input_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_redis_otel.svg",
        "path": "/package/redis_input_otel/0.1.0/img/logo_redis_otel.svg",
        "title": "Redis logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "redisreceiver",
        "title": "Redis OpenTelemetry Input",
        "description": "Collect Redis metrics using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/redis_input_otel/redis_input_otel-0.1.0.zip.sig"
  },
  {
    "name": "rubrik",
    "title": "Rubrik RSC Metrics",
    "version": "0.9.3",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Metrics from Rubrik RSC with Elastic Agent.",
    "type": "integration",
    "download": "/epr/rubrik/rubrik-0.9.3.zip",
    "path": "/package/rubrik/0.9.3",
    "icons": [
      {
        "src": "/img/rubrik-logo.svg",
        "path": "/package/rubrik/0.9.3/img/rubrik-logo.svg",
        "title": "Rubrik logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "rubrik",
        "title": "Rubrik Security Cloud Metrics",
        "description": "Collect metrics from Rubrik Security Cloud"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/rubrik/rubrik-0.9.3.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "rubrik.drives",
        "title": "Rubrik Node Drives Metrics"
      },
      {
        "type": "metrics",
        "dataset": "rubrik.filesets",
        "title": "Rubrik Fileset Metrics"
      },
      {
        "type": "metrics",
        "dataset": "rubrik.global_cluster_performance",
        "title": "Rubrik Cluster Performance Metrics"
      },
      {
        "type": "metrics",
        "dataset": "rubrik.managed_volumes",
        "title": "Rubrik Managed Volume Metrics"
      },
      {
        "type": "metrics",
        "dataset": "rubrik.monitoring_jobs",
        "title": "Rubrik Monitoring Jobs Metrics"
      },
      {
        "type": "metrics",
        "dataset": "rubrik.mssql_databases",
        "title": "Rubrik Backups MSSQL Databases Metrics"
      },
      {
        "type": "metrics",
        "dataset": "rubrik.node_statistics",
        "title": "Rubrik Cluster Node Statistics"
      },
      {
        "type": "metrics",
        "dataset": "rubrik.physical_hosts",
        "title": "Rubrik Backups Physical Hosts Metrics"
      },
      {
        "type": "metrics",
        "dataset": "rubrik.sla_domains",
        "title": "Rubrik SLA Domains Metrics"
      },
      {
        "type": "metrics",
        "dataset": "rubrik.tasks",
        "title": "Rubrik Reports Tasks by SLA Domain Metrics"
      },
      {
        "type": "metrics",
        "dataset": "rubrik.unmanaged_objects",
        "title": "Rubrik Storage Unmanaged Objects Metrics"
      },
      {
        "type": "metrics",
        "dataset": "rubrik.virtual_machines",
        "title": "Rubrik Backups Virtual Machines Metrics"
      }
    ]
  },
  {
    "name": "sql",
    "title": "SQL Input",
    "version": "1.1.0",
    "release": "ga",
    "description": "Collects Metrics by querying SQL Databases",
    "type": "input",
    "download": "/epr/sql/sql-1.1.0.zip",
    "path": "/package/sql/1.1.0",
    "icons": [
      {
        "src": "/img/sql-server-icon.svg",
        "path": "/package/sql/1.1.0/img/sql-server-icon.svg",
        "title": "SQL logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sql",
        "title": "SQL Metrics",
        "description": "Collects Metrics by querying SQL Databases"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "custom",
      "observability"
    ],
    "signature_path": "/epr/sql/sql-1.1.0.zip.sig"
  },
  {
    "name": "sql_server_input_otel",
    "title": "SQL Server OpenTelemetry Input Package",
    "version": "0.1.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect SQL Server metrics and logs using OpenTelemetry Collector",
    "type": "input",
    "download": "/epr/sql_server_input_otel/sql_server_input_otel-0.1.1.zip",
    "path": "/package/sql_server_input_otel/0.1.1",
    "icons": [
      {
        "src": "/img/sql_server_otellogo.svg",
        "path": "/package/sql_server_input_otel/0.1.1/img/sql_server_otellogo.svg",
        "title": "SQL Server logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sqlserverreceiver",
        "title": "SQL Server Metrics and Logs (OpenTelemetry)",
        "description": "Collect SQL Server metrics and logs using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/sql_server_input_otel/sql_server_input_otel-0.1.1.zip.sig"
  },
  {
    "name": "stan",
    "title": "STAN",
    "version": "1.11.0",
    "release": "ga",
    "description": "Collect logs and metrics from STAN servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/stan/stan-1.11.0.zip",
    "path": "/package/stan/1.11.0",
    "icons": [
      {
        "src": "/img/stan.svg",
        "path": "/package/stan/1.11.0/img/stan.svg",
        "title": "STAN Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "stan",
        "title": "STAN Logs and Metrics",
        "description": "Collect logs and metrics from STAN instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/stan/stan-1.11.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "stan.channels",
        "title": "Stan channels metrics"
      },
      {
        "type": "logs",
        "dataset": "stan.log",
        "title": "STAN logs"
      },
      {
        "type": "metrics",
        "dataset": "stan.stats",
        "title": "Stan stats metrics"
      },
      {
        "type": "metrics",
        "dataset": "stan.subscriptions",
        "title": "Stan subscriptions metrics"
      }
    ]
  },
  {
    "name": "sailpoint_identity_sc",
    "title": "Sailpoint Identity Security Cloud",
    "version": "1.2.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Sailpoint identity security cloud provides enterprise identity governance and security capabilities. The integration allows users to extract audit information from their identity security cloud tenant using the ISC's AuditEvent API.",
    "type": "integration",
    "download": "/epr/sailpoint_identity_sc/sailpoint_identity_sc-1.2.0.zip",
    "path": "/package/sailpoint_identity_sc/1.2.0",
    "icons": [
      {
        "src": "/img/sics.svg",
        "path": "/package/sailpoint_identity_sc/1.2.0/img/sics.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sailpoint_identity_sc",
        "title": "Sailpoint identity security cloud events",
        "description": "Collect events from Sailpoint identity security cloud event reporting."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/sailpoint_identity_sc/sailpoint_identity_sc-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sailpoint_identity_sc.events",
        "title": "Events"
      }
    ]
  },
  {
    "name": "salesforce",
    "title": "Salesforce",
    "version": "1.7.1",
    "release": "ga",
    "description": "Collect logs from Salesforce instances using the Elastic Agent. This integration enables monitoring and analysis of various Salesforce logs, including Login, Logout, Setup Audit Trail, and Apex execution logs. Gain insights into user activity, security events, and application performance.\n",
    "type": "integration",
    "download": "/epr/salesforce/salesforce-1.7.1.zip",
    "path": "/package/salesforce/1.7.1",
    "icons": [
      {
        "src": "/img/salesforce.svg",
        "path": "/package/salesforce/1.7.1/img/salesforce.svg",
        "title": "Salesforce",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "salesforce",
        "title": "Salesforce Logs",
        "description": "Collect logs from Salesforce instances using the Elastic Agent. This policy template configures the necessary inputs and settings to ingest Salesforce Login, Logout, SetupAuditTrail, and Apex logs into Elastic."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "crm"
    ],
    "signature_path": "/epr/salesforce/salesforce-1.7.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "salesforce.apex",
        "title": "Salesforce Apex logs"
      },
      {
        "type": "logs",
        "dataset": "salesforce.login",
        "title": "Salesforce login logs"
      },
      {
        "type": "logs",
        "dataset": "salesforce.logout",
        "title": "Salesforce logout logs"
      },
      {
        "type": "logs",
        "dataset": "salesforce.setupaudittrail",
        "title": "Salesforce SetupAuditTrail logs"
      }
    ]
  },
  {
    "name": "security_ai_prompts",
    "title": "Security AI Prompts",
    "version": "1.0.13",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Prompts used by Security AI features, including the Security Assistant, and Attack discovery",
    "type": "content",
    "download": "/epr/security_ai_prompts/security_ai_prompts-1.0.13.zip",
    "path": "/package/security_ai_prompts/1.0.13",
    "icons": [
      {
        "src": "/img/security-logo-color-64px.svg",
        "path": "/package/security_ai_prompts/1.0.13/img/security-logo-color-64px.svg",
        "title": "Security logo",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-generative-ai"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/security_ai_prompts/security_ai_prompts-1.0.13.zip.sig"
  },
  {
    "name": "cloud_security_posture",
    "title": "Security Posture Management",
    "version": "3.3.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Identify & remediate configuration risks in your Cloud infrastructure",
    "type": "integration",
    "download": "/epr/cloud_security_posture/cloud_security_posture-3.3.0.zip",
    "path": "/package/cloud_security_posture/3.3.0",
    "icons": [
      {
        "src": "/img/logo_cloud_security_posture.svg",
        "path": "/package/cloud_security_posture/3.3.0/img/logo_cloud_security_posture.svg",
        "title": "Cloud Security Posture logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kspm",
        "title": "Kubernetes Security Posture Management (KSPM)",
        "description": "Identify & remediate configuration risks in Kubernetes",
        "icons": [
          {
            "src": "/img/logo_kspm.svg",
            "path": "/package/cloud_security_posture/3.3.0/img/logo_kspm.svg",
            "title": "KSPM logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "containers",
          "kubernetes",
          "security",
          "aws",
          "misconfiguration_workflow"
        ],
        "data_streams": [
          "findings"
        ]
      },
      {
        "name": "cspm",
        "title": "Cloud Security Posture Management (CSPM)",
        "description": "Identify & remediate configuration risks in the Cloud services you leverage",
        "icons": [
          {
            "src": "/img/logo_cspm.svg",
            "path": "/package/cloud_security_posture/3.3.0/img/logo_cspm.svg",
            "title": "CSPM logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloud",
          "aws",
          "google_cloud",
          "misconfiguration_workflow"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true,
            "is_default": true
          }
        },
        "data_streams": [
          "findings"
        ]
      },
      {
        "name": "vuln_mgmt",
        "title": "Cloud Native Vulnerability Management (CNVM)",
        "description": "Scan for cloud workload vulnerabilities",
        "icons": [
          {
            "src": "/img/logo_vuln_mgmt.svg",
            "path": "/package/cloud_security_posture/3.3.0/img/logo_vuln_mgmt.svg",
            "title": "Vulnerability Management logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloud",
          "vulnerability_workflow"
        ],
        "data_streams": [
          "vulnerabilities"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/cloud-services"
    },
    "categories": [
      "security",
      "cloudsecurity_cdr",
      "misconfiguration_workflow",
      "vulnerability_workflow",
      "containers",
      "observability",
      "google_cloud",
      "aws",
      "cloud"
    ],
    "signature_path": "/epr/cloud_security_posture/cloud_security_posture-3.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cloud_security_posture.findings",
        "title": "Cloud Security Posture Findings"
      },
      {
        "type": "logs",
        "dataset": "cloud_security_posture.vulnerabilities",
        "title": "Cloud Vulnerabilities"
      }
    ]
  },
  {
    "name": "sentinel_one",
    "title": "SentinelOne",
    "version": "2.6.0",
    "release": "ga",
    "description": "Collect logs from SentinelOne with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sentinel_one/sentinel_one-2.6.0.zip",
    "path": "/package/sentinel_one/2.6.0",
    "icons": [
      {
        "src": "/img/sentinel-one-logo.svg",
        "path": "/package/sentinel_one/2.6.0/img/sentinel-one-logo.svg",
        "title": "SentinelOne Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sentinel_one",
        "title": "SentinelOne",
        "description": "Collect logs from SentinelOne.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.13 || ^9.2.7 || ^9.3.2"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/sentinel_one/sentinel_one-2.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sentinel_one.activity",
        "title": "Collect activity logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.agent",
        "title": "Collect agent logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.alert",
        "title": "Collect alert logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.application",
        "title": "Collect application logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.application_risk",
        "title": "Collect application risk logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.group",
        "title": "Collect group logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.threat",
        "title": "Collect threat logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.threat_event",
        "title": "Collect threat event logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.unified_alert",
        "title": "Collect unified alert logs from SentinelOne"
      }
    ]
  },
  {
    "name": "sentinel_one_cloud_funnel",
    "title": "SentinelOne Cloud Funnel",
    "version": "1.13.1",
    "release": "ga",
    "description": "Collect logs from SentinelOne Cloud Funnel with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sentinel_one_cloud_funnel/sentinel_one_cloud_funnel-1.13.1.zip",
    "path": "/package/sentinel_one_cloud_funnel/1.13.1",
    "icons": [
      {
        "src": "/img/sentinel-one-cloud-funnel-logo.svg",
        "path": "/package/sentinel_one_cloud_funnel/1.13.1/img/sentinel-one-cloud-funnel-logo.svg",
        "title": "SentinelOne Cloud Funnel Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "SentinelOne Cloud Funnel",
        "title": "SentinelOne Cloud Funnel logs",
        "description": "Collect logs using AWS S3 or AWS SQS."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/sentinel_one_cloud_funnel/sentinel_one_cloud_funnel-1.13.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.command_script",
        "title": "SentinelOne Cloud Funnel command_script Events"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.cross_process",
        "title": "SentinelOne Cloud Funnel cross_process Events"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.dns",
        "title": "SentinelOne Cloud Funnel dns Events"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.event",
        "title": "Collect Event logs from SentinelOne Cloud Funnel."
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.file",
        "title": "SentinelOne Cloud Funnel File Events"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.indicators",
        "title": "SentinelOne Cloud Funnel Indicator Events"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.ip",
        "title": "SentinelOne Cloud Funnel IP Events"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.login",
        "title": "SentinelOne Cloud Funnel Logins Events"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.module",
        "title": "SentinelOne Cloud Funnel Module Events"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.process",
        "title": "SentinelOne Cloud Funnel Process Events"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.registry",
        "title": "SentinelOne Cloud Funnel Registry Events"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.scheduled_task",
        "title": "SentinelOne Cloud Funnel Scheduled Task Events"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.threat_intelligence_indicators",
        "title": "SentinelOne Cloud Funnel Threat Intelligence Indicator Events"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.url",
        "title": "SentinelOne Cloud Funnel URL Events"
      }
    ]
  },
  {
    "name": "servicenow",
    "title": "ServiceNow",
    "version": "2.0.0",
    "release": "ga",
    "description": "Collect logs from ServiceNow with Elastic Agent.",
    "type": "integration",
    "download": "/epr/servicenow/servicenow-2.0.0.zip",
    "path": "/package/servicenow/2.0.0",
    "icons": [
      {
        "src": "/img/servicenow-logo.svg",
        "path": "/package/servicenow/2.0.0/img/servicenow-logo.svg",
        "title": "ServiceNow Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "servicenow",
        "title": "ServiceNow logs",
        "description": "Collect ServiceNow logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/servicenow/servicenow-2.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "servicenow.event",
        "title": "Event"
      }
    ]
  },
  {
    "name": "httpcheck_otel",
    "title": "Simple HTTP Check",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Perform HTTP checks using the HTTP Check receiver of the OTel Collector.",
    "type": "input",
    "download": "/epr/httpcheck_otel/httpcheck_otel-0.1.0.zip",
    "path": "/package/httpcheck_otel/0.1.0",
    "icons": [
      {
        "src": "/img/http-logo.svg",
        "path": "/package/httpcheck_otel/0.1.0/img/http-logo.svg",
        "title": "HTTP logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "httpcheckreceiver",
        "title": "HTTP Check",
        "description": "Perform HTTP checks and collect its results."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "monitoring",
      "network",
      "opentelemetry",
      "web"
    ],
    "signature_path": "/epr/httpcheck_otel/httpcheck_otel-0.1.0.zip.sig"
  },
  {
    "name": "slack",
    "title": "Slack Logs",
    "version": "1.27.0",
    "release": "ga",
    "description": "Slack Logs Integration",
    "type": "integration",
    "download": "/epr/slack/slack-1.27.0.zip",
    "path": "/package/slack/1.27.0",
    "icons": [
      {
        "src": "/img/slack.svg",
        "path": "/package/slack/1.27.0/img/slack.svg",
        "title": "Slack logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "slack",
        "title": "Slack logs",
        "description": "Collect logs from Slack",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "productivity",
      "security"
    ],
    "signature_path": "/epr/slack/slack-1.27.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "slack.audit",
        "title": "Slack Audit Logs"
      }
    ]
  },
  {
    "name": "snort",
    "title": "Snort",
    "version": "1.21.1",
    "release": "ga",
    "description": "Collect logs from Snort with Elastic Agent.",
    "type": "integration",
    "download": "/epr/snort/snort-1.21.1.zip",
    "path": "/package/snort/1.21.1",
    "icons": [
      {
        "src": "/img/snort.svg",
        "path": "/package/snort/1.21.1/img/snort.svg",
        "title": "snort",
        "size": "120x60",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "snort",
        "title": "Snort logs",
        "description": "Collect logs from Snort instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "ids_ips",
      "security",
      "network_security"
    ],
    "signature_path": "/epr/snort/snort-1.21.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "snort.log",
        "title": "Snort"
      }
    ]
  },
  {
    "name": "snyk",
    "title": "Snyk",
    "version": "3.4.1",
    "release": "ga",
    "description": "Collect logs from Snyk with Elastic Agent.",
    "type": "integration",
    "download": "/epr/snyk/snyk-3.4.1.zip",
    "path": "/package/snyk/3.4.1",
    "icons": [
      {
        "src": "/img/snyk-logo.svg",
        "path": "/package/snyk/3.4.1/img/snyk-logo.svg",
        "title": "Snyk logo",
        "size": "382x625",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "snyk",
        "title": "Snyk Events",
        "description": "Collect data from Snyk API",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "cloudsecurity_cdr",
      "vulnerability_management"
    ],
    "signature_path": "/epr/snyk/snyk-3.4.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "snyk.audit_logs",
        "title": "Collect Snyk Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "snyk.issues",
        "title": "Collect Snyk Issues Data"
      }
    ]
  },
  {
    "name": "sonicwall_firewall",
    "title": "SonicWall Firewall",
    "version": "1.22.0",
    "release": "ga",
    "description": "Integration for SonicWall firewall logs",
    "type": "integration",
    "download": "/epr/sonicwall_firewall/sonicwall_firewall-1.22.0.zip",
    "path": "/package/sonicwall_firewall/1.22.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/sonicwall_firewall/1.22.0/img/logo.svg",
        "title": "SonicWall logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sample",
        "title": "Sample logs",
        "description": "Collect sample logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "firewall_security",
      "network_security"
    ],
    "signature_path": "/epr/sonicwall_firewall/sonicwall_firewall-1.22.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sonicwall_firewall.log",
        "title": "SonicWall Firewall logs"
      }
    ]
  },
  {
    "name": "sophos",
    "title": "Sophos",
    "version": "3.17.0",
    "release": "ga",
    "description": "Collect logs from Sophos with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sophos/sophos-3.17.0.zip",
    "path": "/package/sophos/3.17.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/sophos/3.17.0/img/logo.svg",
        "title": "Sophos logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sophos",
        "title": "Sophos logs",
        "description": "Collect Sophos logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "firewall_security"
    ],
    "signature_path": "/epr/sophos/sophos-3.17.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sophos.utm",
        "title": "Sophos UTM logs"
      },
      {
        "type": "logs",
        "dataset": "sophos.xg",
        "title": "Sophos XG logs"
      }
    ]
  },
  {
    "name": "sophos_central",
    "title": "Sophos Central",
    "version": "1.21.0",
    "release": "ga",
    "description": "This Elastic integration collects logs from Sophos Central with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sophos_central/sophos_central-1.21.0.zip",
    "path": "/package/sophos_central/1.21.0",
    "icons": [
      {
        "src": "/img/sophos_central_logo.svg",
        "path": "/package/sophos_central/1.21.0/img/sophos_central_logo.svg",
        "title": "Sophos Central logo",
        "size": "108x18",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sophos_central",
        "title": "Sophos Central logs",
        "description": "Collect logs using HTTP JSON."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/sophos_central/sophos_central-1.21.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sophos_central.alert",
        "title": "Collect Sophos Central SIEM Alert logs"
      },
      {
        "type": "logs",
        "dataset": "sophos_central.event",
        "title": "Collect Sophos Central SIEM Events logs"
      }
    ]
  },
  {
    "name": "splunk",
    "title": "Splunk",
    "version": "1.0.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Splunk with Elastic Agent.",
    "type": "integration",
    "download": "/epr/splunk/splunk-1.0.1.zip",
    "path": "/package/splunk/1.0.1",
    "icons": [
      {
        "src": "/img/splunk-logo.svg",
        "path": "/package/splunk/1.0.1/img/splunk-logo.svg",
        "title": "Splunk Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "splunk",
        "title": "Splunk logs",
        "description": "Collect Splunk logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "siem"
    ],
    "signature_path": "/epr/splunk/splunk-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "splunk.alert",
        "title": "Alert"
      },
      {
        "type": "logs",
        "dataset": "splunk.search",
        "title": "Alert"
      }
    ]
  },
  {
    "name": "spring_boot",
    "title": "Spring Boot",
    "version": "1.9.1",
    "release": "ga",
    "description": "This Elastic integration collects logs and metrics from Spring Boot integration.",
    "type": "integration",
    "download": "/epr/spring_boot/spring_boot-1.9.1.zip",
    "path": "/package/spring_boot/1.9.1",
    "icons": [
      {
        "src": "/img/spring_boot-logo.svg",
        "path": "/package/spring_boot/1.9.1/img/spring_boot-logo.svg",
        "title": "Spring Boot logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "spring_boot",
        "title": "Spring Boot metrics",
        "description": "Collect Spring Boot metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "java_observability"
    ],
    "signature_path": "/epr/spring_boot/spring_boot-1.9.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "spring_boot.audit_events",
        "title": "Audit Events"
      },
      {
        "type": "metrics",
        "dataset": "spring_boot.gc",
        "title": "Garbage Collector (GC) Metrics"
      },
      {
        "type": "logs",
        "dataset": "spring_boot.http_trace",
        "title": "HTTP Trace Metrics"
      },
      {
        "type": "metrics",
        "dataset": "spring_boot.memory",
        "title": "Memory Metrics"
      },
      {
        "type": "metrics",
        "dataset": "spring_boot.threading",
        "title": "Threading Metrics"
      }
    ]
  },
  {
    "name": "spycloud",
    "title": "SpyCloud Enterprise Protection",
    "version": "1.6.0",
    "release": "ga",
    "description": "Collect data from SpyCloud Enterprise Protection with Elastic Agent.",
    "type": "integration",
    "download": "/epr/spycloud/spycloud-1.6.0.zip",
    "path": "/package/spycloud/1.6.0",
    "icons": [
      {
        "src": "/img/spycloud-logo.svg",
        "path": "/package/spycloud/1.6.0/img/spycloud-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "SpyCloud Enterprise Protection",
        "title": "SpyCloud Enterprise Protection logs",
        "description": "Collect SpyCloud Enterprise Protection logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/spycloud/spycloud-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "spycloud.breach_catalog",
        "title": "Collect Breach Catalog logs from SpyCloud Enterprise Protection."
      },
      {
        "type": "logs",
        "dataset": "spycloud.breach_record",
        "title": "Collect Breach Record logs from SpyCloud Enterprise Protection."
      },
      {
        "type": "logs",
        "dataset": "spycloud.compass",
        "title": "Collect Compass logs from SpyCloud Enterprise Protection."
      }
    ]
  },
  {
    "name": "squid",
    "title": "Squid Proxy",
    "version": "1.5.0",
    "release": "ga",
    "description": "Collect and parse logs from Squid devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/squid/squid-1.5.0.zip",
    "path": "/package/squid/1.5.0",
    "icons": [
      {
        "src": "/img/squid-logo.png",
        "path": "/package/squid/1.5.0/img/squid-logo.png",
        "title": "Squid Logo",
        "size": "160x160",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "log",
        "title": "Squid",
        "description": "Collect Squid logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "observability",
      "network",
      "security",
      "proxy_security",
      "web"
    ],
    "signature_path": "/epr/squid/squid-1.5.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "squid.log",
        "title": "Squid logs"
      }
    ]
  },
  {
    "name": "statsd_input",
    "title": "StatsD Input",
    "version": "1.0.0",
    "release": "ga",
    "description": "StatsD Input Package",
    "type": "input",
    "download": "/epr/statsd_input/statsd_input-1.0.0.zip",
    "path": "/package/statsd_input/1.0.0",
    "icons": [
      {
        "src": "/img/statsd.svg",
        "path": "/package/statsd_input/1.0.0/img/statsd.svg",
        "title": "statsd",
        "size": "266x266",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "statsd",
        "title": "StatsD Metrics",
        "description": "Collect metrics from StatsD instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "custom"
    ],
    "signature_path": "/epr/statsd_input/statsd_input-1.0.0.zip.sig"
  },
  {
    "name": "statsd_input_otel",
    "title": "StatsD OpenTelemetry Input Package",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "StatsD OpenTelemetry Input Package",
    "type": "input",
    "download": "/epr/statsd_input_otel/statsd_input_otel-0.1.0.zip",
    "path": "/package/statsd_input_otel/0.1.0",
    "icons": [
      {
        "src": "/img/statsd_otellogo.svg",
        "path": "/package/statsd_input_otel/0.1.0/img/statsd_otellogo.svg",
        "title": "StatsD OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "statsdreceiver",
        "title": "StatsD OpenTelemetry Input",
        "description": "Collect StatsD metrics using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~9.2.6 || ^9.3.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "observability",
      "opentelemetry",
      "custom"
    ],
    "signature_path": "/epr/statsd_input_otel/statsd_input_otel-0.1.0.zip.sig"
  },
  {
    "name": "stormshield",
    "title": "StormShield SNS",
    "version": "1.5.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Stormshield SNS integration.",
    "type": "integration",
    "download": "/epr/stormshield/stormshield-1.5.1.zip",
    "path": "/package/stormshield/1.5.1",
    "icons": [
      {
        "src": "/img/stormshield_logo.png",
        "path": "/package/stormshield/1.5.1/img/stormshield_logo.png",
        "title": "Stormshield logo",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "stormshield_sns",
        "title": "Stormshield SNS logs",
        "description": "Collect logs from Stormshield SNS instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.4 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "firewall_security",
      "network_security"
    ],
    "signature_path": "/epr/stormshield/stormshield-1.5.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "stormshield.log",
        "title": "StormShield SNS logs"
      }
    ]
  },
  {
    "name": "ti_strider",
    "title": "Strider Shield",
    "version": "0.0.1",
    "release": "beta",
    "description": "Ingest threat intelligence indicators from Strider Shield with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_strider/ti_strider-0.0.1.zip",
    "path": "/package/ti_strider/0.0.1",
    "icons": [
      {
        "src": "/img/strider.svg",
        "path": "/package/ti_strider/0.0.1/img/strider.svg",
        "title": "Strider",
        "size": "600x600",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_strider",
        "title": "Strider Shield",
        "description": "Ingest threat intelligence indicators from Strider Shield with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/ti_strider/ti_strider-0.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_strider.indicator",
        "title": "Collect Indicators from Strider Shield"
      }
    ]
  },
  {
    "name": "sublime_security",
    "title": "Sublime Security",
    "version": "1.11.2",
    "release": "ga",
    "description": "Collect logs from Sublime Security with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sublime_security/sublime_security-1.11.2.zip",
    "path": "/package/sublime_security/1.11.2",
    "icons": [
      {
        "src": "/img/sublime_security.svg",
        "path": "/package/sublime_security/1.11.2/img/sublime_security.svg",
        "title": "Sublime Security logo",
        "size": "32x32",
        "type": "image/svg+xml"
      },
      {
        "src": "/img/sublime_security-dark.svg",
        "path": "/package/sublime_security/1.11.2/img/sublime_security-dark.svg",
        "title": "Sublime Security dark logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sublime_security",
        "title": "Sublime Security logs",
        "description": "Collect Sublime Security logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/sublime_security/sublime_security-1.11.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sublime_security.audit",
        "title": "Sublime Security Audit logs"
      },
      {
        "type": "logs",
        "dataset": "sublime_security.email_message",
        "title": "Sublime Security Email Message logs"
      },
      {
        "type": "logs",
        "dataset": "sublime_security.message_event",
        "title": "Sublime Security Message Event logs"
      }
    ]
  },
  {
    "name": "suricata",
    "title": "Suricata",
    "version": "2.27.0",
    "release": "ga",
    "description": "Collect logs from Suricata with Elastic Agent.",
    "type": "integration",
    "download": "/epr/suricata/suricata-2.27.0.zip",
    "path": "/package/suricata/2.27.0",
    "icons": [
      {
        "src": "/img/suricata.svg",
        "path": "/package/suricata/2.27.0/img/suricata.svg",
        "title": "suricata",
        "size": "309x309",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "suricata",
        "title": "Suricata logs",
        "description": "Collect logs from Suricata instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "ids_ips",
      "network_security"
    ],
    "signature_path": "/epr/suricata/suricata-2.27.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "suricata.eve",
        "title": "Suricata eve logs"
      }
    ]
  },
  {
    "name": "swimlane",
    "title": "Swimlane Turbine",
    "version": "0.4.2",
    "release": "beta",
    "description": "Collect Swimlane Turbine Audit logs with Elastic Agent",
    "type": "integration",
    "download": "/epr/swimlane/swimlane-0.4.2.zip",
    "path": "/package/swimlane/0.4.2",
    "icons": [
      {
        "src": "/img/swimlane.png",
        "path": "/package/swimlane/0.4.2/img/swimlane.png",
        "title": "Sample logo",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "swimlane",
        "title": "Swimlane Turbine Container Logs",
        "description": "Collect Swimlane Turbine API related logs from Kubernetes clusters and via API endpoint"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.4 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/swimlane/swimlane-0.4.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "swimlane.audit_logs",
        "title": "Swimlane Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "swimlane.api",
        "title": "Swimlane API logs"
      },
      {
        "type": "logs",
        "dataset": "swimlane.tenant",
        "title": "Swimlane Tenant API logs"
      },
      {
        "type": "logs",
        "dataset": "turbine.api",
        "title": "Swimlane Turbine API logs"
      }
    ]
  },
  {
    "name": "symantec_edr_cloud",
    "title": "Symantec EDR Cloud (Deprecated)",
    "version": "1.8.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Deprecated. Use the Symantec Endpoint Security package instead.",
    "type": "integration",
    "download": "/epr/symantec_edr_cloud/symantec_edr_cloud-1.8.1.zip",
    "path": "/package/symantec_edr_cloud/1.8.1",
    "icons": [
      {
        "src": "/img/symantec-logo.svg",
        "path": "/package/symantec_edr_cloud/1.8.1/img/symantec-logo.svg",
        "title": "Symantec Logo",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "symantec_edr_cloud",
        "title": "Symantec EDR Cloud logs",
        "description": "Collect Symantec EDR Cloud logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/symantec_edr_cloud/symantec_edr_cloud-1.8.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "symantec_edr_cloud.incident",
        "title": "Collect Incident logs from Symantec EDR Cloud"
      }
    ]
  },
  {
    "name": "symantec_endpoint",
    "title": "Symantec Endpoint Protection",
    "version": "2.20.0",
    "release": "ga",
    "description": "Collect logs from Symantec Endpoint Protection with Elastic Agent.",
    "type": "integration",
    "download": "/epr/symantec_endpoint/symantec_endpoint-2.20.0.zip",
    "path": "/package/symantec_endpoint/2.20.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/symantec_endpoint/2.20.0/img/logo.svg",
        "title": "Symantec",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "symantec",
        "title": "Symantec Endpoint Protection logs",
        "description": "Collect Symantec Endpoint Protection logs from file or over syslog."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/symantec_endpoint/symantec_endpoint-2.20.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "symantec_endpoint.log",
        "title": "Symantec Endpoint Protection (SEP) Logs"
      }
    ]
  },
  {
    "name": "symantec_endpoint_security",
    "title": "Symantec Endpoint Security",
    "version": "1.14.2",
    "release": "ga",
    "description": "Collect logs from Symantec Endpoint Security with Elastic Agent.",
    "type": "integration",
    "download": "/epr/symantec_endpoint_security/symantec_endpoint_security-1.14.2.zip",
    "path": "/package/symantec_endpoint_security/1.14.2",
    "icons": [
      {
        "src": "/img/symantec-logo.svg",
        "path": "/package/symantec_endpoint_security/1.14.2/img/symantec-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Symantec Endpoint Security",
        "title": "Symantec Endpoint Security logs",
        "description": "Collect logs using AWS S3, AWS SQS or Azure Blob Storage."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/symantec_endpoint_security/symantec_endpoint_security-1.14.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "symantec_endpoint_security.event",
        "title": "Symantec Endpoint Security Event"
      },
      {
        "type": "logs",
        "dataset": "symantec_endpoint_security.incident",
        "title": "Collect Incident logs from Symantec Endpoint Security"
      }
    ]
  },
  {
    "name": "sysdig",
    "title": "Sysdig",
    "version": "2.3.0",
    "release": "ga",
    "description": "Collect logs from Sysdig using Elastic Agent.",
    "type": "integration",
    "download": "/epr/sysdig/sysdig-2.3.0.zip",
    "path": "/package/sysdig/2.3.0",
    "icons": [
      {
        "src": "/img/sysdig-logo-badge.svg",
        "path": "/package/sysdig/2.3.0/img/sysdig-logo-badge.svg",
        "title": "Sysdig logo",
        "size": "88x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sysdig",
        "title": "Sysdig logs",
        "description": "Collect logs from Sysdig using Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "containers",
      "kubernetes",
      "monitoring",
      "observability",
      "security"
    ],
    "signature_path": "/epr/sysdig/sysdig-2.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sysdig.alerts",
        "title": "Sysdig"
      },
      {
        "type": "logs",
        "dataset": "sysdig.cspm",
        "title": "CSPM Compliance Results"
      },
      {
        "type": "logs",
        "dataset": "sysdig.event",
        "title": "Security Event"
      },
      {
        "type": "logs",
        "dataset": "sysdig.vulnerability",
        "title": "Vulnerability"
      }
    ]
  },
  {
    "name": "syslog_router",
    "title": "Syslog Router",
    "version": "1.0.1",
    "release": "ga",
    "description": "Route syslog events to integrations with Elastic Agent.",
    "type": "integration",
    "download": "/epr/syslog_router/syslog_router-1.0.1.zip",
    "path": "/package/syslog_router/1.0.1",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/syslog_router/1.0.1/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "syslog_router",
        "title": "Collect syslog events",
        "description": "Collect syslog events"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "custom"
    ],
    "signature_path": "/epr/syslog_router/syslog_router-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "syslog_router.log",
        "title": "Route logs to Elastic integrations."
      }
    ]
  },
  {
    "name": "sysmon_linux",
    "title": "Sysmon for Linux",
    "version": "1.9.0",
    "release": "ga",
    "description": "Collect Sysmon Linux logs with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sysmon_linux/sysmon_linux-1.9.0.zip",
    "path": "/package/sysmon_linux/1.9.0",
    "icons": [
      {
        "src": "/img/sysmon-linux.svg",
        "path": "/package/sysmon_linux/1.9.0/img/sysmon-linux.svg",
        "title": "sysmon-linux",
        "size": "1000x1000",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sysmon_linux",
        "title": "Sysmon for Linux logs",
        "description": "Collect Sysmon for Linux logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "os_system",
      "security"
    ],
    "signature_path": "/epr/sysmon_linux/sysmon_linux-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sysmon_linux.log",
        "title": "Sysmon for Linux logs"
      }
    ]
  },
  {
    "name": "system",
    "title": "System",
    "version": "2.16.1",
    "release": "ga",
    "description": "Collect system logs and metrics from your servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/system/system-2.16.1.zip",
    "path": "/package/system/2.16.1",
    "icons": [
      {
        "src": "/img/system.svg",
        "path": "/package/system/2.16.1/img/system.svg",
        "title": "system",
        "size": "1000x1000",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "system",
        "title": "System logs and metrics",
        "description": "Collect logs and metrics from System instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "os_system",
      "monitoring",
      "observability"
    ],
    "signature_path": "/epr/system/system-2.16.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "system.application",
        "title": "Windows Application Events"
      },
      {
        "type": "logs",
        "dataset": "system.auth",
        "title": "System auth logs"
      },
      {
        "type": "metrics",
        "dataset": "system.core",
        "title": "System core metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.cpu",
        "title": "System cpu metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.diskio",
        "title": "System diskio metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.filesystem",
        "title": "System filesystem metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.fsstat",
        "title": "System fsstat metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.load",
        "title": "System load metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.memory",
        "title": "System memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.network",
        "title": "System network metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.ntp",
        "title": "Network Time Protocol metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.process",
        "title": "System process metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.process.summary",
        "title": "System process_summary metrics"
      },
      {
        "type": "logs",
        "dataset": "system.security",
        "title": "Security logs"
      },
      {
        "type": "metrics",
        "dataset": "system.socket_summary",
        "title": "System socket_summary metrics"
      },
      {
        "type": "logs",
        "dataset": "system.syslog",
        "title": "System syslog logs"
      },
      {
        "type": "logs",
        "dataset": "system.system",
        "title": "Windows System Events"
      },
      {
        "type": "metrics",
        "dataset": "system.uptime",
        "title": "System uptime metrics"
      }
    ]
  },
  {
    "name": "system_audit",
    "title": "System Audit",
    "version": "1.11.0",
    "release": "ga",
    "description": "Collect various logs & metrics from System Audit modules with Elastic Agent.",
    "type": "integration",
    "download": "/epr/system_audit/system_audit-1.11.0.zip",
    "path": "/package/system_audit/1.11.0",
    "policy_templates": [
      {
        "name": "system_audit",
        "title": "System Audit",
        "description": "Collect various logs & metrics from System Audit modules with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "custom",
      "os_system"
    ],
    "signature_path": "/epr/system_audit/system_audit-1.11.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "system_audit.package",
        "title": "System Audit - [Package]"
      }
    ]
  },
  {
    "name": "system_otel",
    "title": "System OpenTelemetry Assets",
    "version": "0.2.7",
    "release": "beta",
    "description": "Dashboards for the OpenTelemetry data collected with the `hostmetrics` receiver.",
    "type": "content",
    "download": "/epr/system_otel/system_otel-0.2.7.zip",
    "path": "/package/system_otel/0.2.7",
    "icons": [
      {
        "src": "/img/system-otel.svg",
        "path": "/package/system_otel/0.2.7/img/system-otel.svg",
        "title": "System OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ingest-otel-data"
    },
    "categories": [
      "os_system",
      "monitoring",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/system_otel/system_otel-0.2.7.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "hostmetricsreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "tychon",
    "title": "TYCHON Agentless",
    "version": "1.1.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect complete master endpoint datasets including vulnerability and STIG to comply with DISA endpoint requirements and C2C without adding services to your endpoints.",
    "type": "integration",
    "download": "/epr/tychon/tychon-1.1.0.zip",
    "path": "/package/tychon/1.1.0",
    "icons": [
      {
        "src": "/img/TychonLogo.svg",
        "path": "/package/tychon/1.1.0/img/TychonLogo.svg",
        "title": "TYCHON",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tychon",
        "title": "Tychon",
        "description": "Tychon"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "config_management",
      "vulnerability_management"
    ],
    "signature_path": "/epr/tychon/tychon-1.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tychon.arp",
        "title": "Endpoint Arp Table Information"
      },
      {
        "type": "logs",
        "dataset": "tychon.browser",
        "title": "Endpoint Browser Configurations"
      },
      {
        "type": "logs",
        "dataset": "tychon.ciphers",
        "title": "Certificate Ciphers"
      },
      {
        "type": "logs",
        "dataset": "tychon.cmrs",
        "title": "DISA Continuous Monitoring and Risk Scoring Data"
      },
      {
        "type": "logs",
        "dataset": "tychon.coams",
        "title": "Endpoint Operational Attributes (Requires DATT)"
      },
      {
        "type": "logs",
        "dataset": "tychon.cpu",
        "title": "Endpoint CPU Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.cve",
        "title": "Vulnerabilites"
      },
      {
        "type": "logs",
        "dataset": "tychon.epp",
        "title": "Endpoint Protection Platform Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.exposedservice",
        "title": "Endpoint Exposed Services"
      },
      {
        "type": "logs",
        "dataset": "tychon.externaldevicecontrol",
        "title": "Endpoint External Device Control"
      },
      {
        "type": "logs",
        "dataset": "tychon.features",
        "title": "Features Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.harddrive",
        "title": "Endpoint Harddrive Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.hardware",
        "title": "Hardware Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.host",
        "title": "Host Operating System Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.networkadapter",
        "title": "Network Adapters"
      },
      {
        "type": "logs",
        "dataset": "tychon.softwareinventory",
        "title": "Endpoint Software Inventory Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.stig",
        "title": "Endpoint STIG Results"
      },
      {
        "type": "logs",
        "dataset": "tychon.systemcerts",
        "title": "System Certificates"
      },
      {
        "type": "logs",
        "dataset": "tychon.volume",
        "title": "Endpoint Volumes Info"
      }
    ]
  },
  {
    "name": "tanium",
    "title": "Tanium",
    "version": "1.17.0",
    "release": "ga",
    "description": "This Elastic integration collects logs from Tanium with Elastic Agent.",
    "type": "integration",
    "download": "/epr/tanium/tanium-1.17.0.zip",
    "path": "/package/tanium/1.17.0",
    "icons": [
      {
        "src": "/img/tanium-logo.svg",
        "path": "/package/tanium/1.17.0/img/tanium-logo.svg",
        "title": "Sample logo",
        "size": "224x224",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Tanium",
        "title": "Tanium logs",
        "description": "Collect logs using TCP, HTTP endpoint, and AWS S3 or AWS SQS."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/tanium/tanium-1.17.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tanium.action_history",
        "title": "Collect Action History logs from Tanium."
      },
      {
        "type": "logs",
        "dataset": "tanium.client_status",
        "title": "Client Status"
      },
      {
        "type": "logs",
        "dataset": "tanium.discover",
        "title": "Collect Tanium Discover logs from Tanium"
      },
      {
        "type": "logs",
        "dataset": "tanium.endpoint_config",
        "title": "Collect Endpoint Config logs from Tanium"
      },
      {
        "type": "logs",
        "dataset": "tanium.reporting",
        "title": "Reporting"
      },
      {
        "type": "logs",
        "dataset": "tanium.threat_response",
        "title": "Collect Threat Response logs from Tanium."
      }
    ]
  },
  {
    "name": "teleport",
    "title": "Teleport",
    "version": "1.6.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Teleport with Elastic Agent.",
    "type": "integration",
    "download": "/epr/teleport/teleport-1.6.0.zip",
    "path": "/package/teleport/1.6.0",
    "icons": [
      {
        "src": "/img/teleport-logo.svg",
        "path": "/package/teleport/1.6.0/img/teleport-logo.svg",
        "title": "Teleport logo",
        "size": "512x512",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "teleport",
        "title": "Teleport",
        "description": "Collect audit logs from Teleport with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "monitoring",
      "network",
      "security"
    ],
    "signature_path": "/epr/teleport/teleport-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "teleport.audit",
        "title": "Teleport audit logs"
      }
    ]
  },
  {
    "name": "tenable_ot_security",
    "title": "Tenable OT Security",
    "version": "2.0.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Tenable OT Security",
    "type": "integration",
    "download": "/epr/tenable_ot_security/tenable_ot_security-2.0.0.zip",
    "path": "/package/tenable_ot_security/2.0.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/tenable_ot_security/2.0.0/img/logo.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tenable_ot_security_cloud",
        "title": "Tenable OT Security Cloud Events",
        "description": "Collect events from Tenable OT Security Cloud event reporting."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.1 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/tenable_ot_security/tenable_ot_security-2.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tenable_ot_security.assets",
        "title": "Assets"
      },
      {
        "type": "logs",
        "dataset": "tenable_ot_security.events",
        "title": "Events"
      },
      {
        "type": "logs",
        "dataset": "tenable_ot_security.system_log",
        "title": "System Log"
      }
    ]
  },
  {
    "name": "tenable_sc",
    "title": "Tenable Security Center",
    "version": "2.2.0",
    "release": "ga",
    "description": "Collect data from Tenable Security Center with Elastic Agent.\n",
    "type": "integration",
    "download": "/epr/tenable_sc/tenable_sc-2.2.0.zip",
    "path": "/package/tenable_sc/2.2.0",
    "icons": [
      {
        "src": "/img/tenable_sc-logo.svg",
        "path": "/package/tenable_sc/2.2.0/img/tenable_sc-logo.svg",
        "title": "Tenable Security Center logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tenable_sc",
        "title": "Tenable Security Center data",
        "description": "Collect Tenable Security Center data.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management"
    ],
    "signature_path": "/epr/tenable_sc/tenable_sc-2.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tenable_sc.asset",
        "title": "Tenable Security Center asset data"
      },
      {
        "type": "logs",
        "dataset": "tenable_sc.plugin",
        "title": "Tenable Security Center plugin data"
      },
      {
        "type": "logs",
        "dataset": "tenable_sc.vulnerability",
        "title": "Tenable Security Center vulnerability data"
      }
    ]
  },
  {
    "name": "tenable_io",
    "title": "Tenable Vulnerability Management",
    "version": "4.10.0",
    "release": "ga",
    "description": "Collect logs from Tenable Vulnerability Management with Elastic Agent.",
    "type": "integration",
    "download": "/epr/tenable_io/tenable_io-4.10.0.zip",
    "path": "/package/tenable_io/4.10.0",
    "icons": [
      {
        "src": "/img/tenable_io-logo.svg",
        "path": "/package/tenable_io/4.10.0/img/tenable_io-logo.svg",
        "title": "Tenable Vulnerability Management logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tenable_io",
        "title": "Tenable Vulnerability Management",
        "description": "Collect logs from Tenable Vulnerability Management.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management",
      "vulnerability_workflow",
      "cloudsecurity_cdr"
    ],
    "signature_path": "/epr/tenable_io/tenable_io-4.10.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tenable_io.asset",
        "title": "Collect Asset data from Tenable Vulnerability Management"
      },
      {
        "type": "logs",
        "dataset": "tenable_io.audit",
        "title": "Collect Audit logs from Tenable Vulnerability Management"
      },
      {
        "type": "logs",
        "dataset": "tenable_io.plugin",
        "title": "Collect Plugin logs from Tenable Vulnerability Management"
      },
      {
        "type": "logs",
        "dataset": "tenable_io.scan",
        "title": "Collect Scan logs from Tenable Vulnerability Management"
      },
      {
        "type": "logs",
        "dataset": "tenable_io.vulnerability",
        "title": "Collect Vulnerability logs from Tenable Vulnerability Management"
      }
    ]
  },
  {
    "name": "tencent_cloud",
    "title": "Tencent Cloud",
    "version": "0.2.0",
    "release": "beta",
    "description": "从腾讯云的 COS 中采集审计日志",
    "type": "integration",
    "download": "/epr/tencent_cloud/tencent_cloud-0.2.0.zip",
    "path": "/package/tencent_cloud/0.2.0",
    "icons": [
      {
        "src": "/img/logo.png",
        "path": "/package/tencent_cloud/0.2.0/img/logo.png",
        "title": "tencent_cloud Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Tencent cloud",
        "title": "Tencent cloud audit log",
        "description": "从腾讯云的 COS 中采集审计日志"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam",
      "cloud"
    ],
    "signature_path": "/epr/tencent_cloud/tencent_cloud-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tencent_cloud.audit",
        "title": "Tencent Cloud Audit Logs"
      }
    ]
  },
  {
    "name": "ti_util",
    "title": "Threat Intelligence Utilities",
    "version": "1.7.1",
    "release": "ga",
    "description": "Prebuilt Threat Intelligence dashboard for Elastic Security",
    "type": "integration",
    "download": "/epr/ti_util/ti_util-1.7.1.zip",
    "path": "/package/ti_util/1.7.1",
    "icons": [
      {
        "src": "/img/security-logo-color-64px.svg",
        "path": "/package/ti_util/1.7.1/img/security-logo-color-64px.svg",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_util/ti_util-1.7.1.zip.sig"
  },
  {
    "name": "threat_map",
    "title": "Threat Map",
    "version": "1.1.0",
    "release": "ga",
    "description": "The Threat Map integration includes a dashboard for analyzing network traffic data.",
    "type": "integration",
    "download": "/epr/threat_map/threat_map-1.1.0.zip",
    "path": "/package/threat_map/1.1.0",
    "icons": [
      {
        "src": "/img/sample-logo.svg",
        "path": "/package/threat_map/1.1.0/img/sample-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "security"
    ],
    "signature_path": "/epr/threat_map/threat_map-1.1.0.zip.sig"
  },
  {
    "name": "ti_threatconnect",
    "title": "ThreatConnect",
    "version": "2.0.0",
    "release": "ga",
    "description": "Collects Indicators from ThreatConnect using the Elastic Agent and saves them as logs inside Elastic",
    "type": "integration",
    "download": "/epr/ti_threatconnect/ti_threatconnect-2.0.0.zip",
    "path": "/package/ti_threatconnect/2.0.0",
    "icons": [
      {
        "src": "/img/threat-connect-logo.svg",
        "path": "/package/ti_threatconnect/2.0.0/img/threat-connect-logo.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "threatconnect",
        "title": "ThreatConnect Indicators",
        "description": "Collect ThreatConnect indicators."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_threatconnect/ti_threatconnect-2.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_threatconnect.indicator",
        "title": "Collect Indicators from ThreatConnect."
      }
    ]
  },
  {
    "name": "ti_threatq",
    "title": "ThreatQuotient",
    "version": "1.37.1",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from ThreatQuotient with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_threatq/ti_threatq-1.37.1.zip",
    "path": "/package/ti_threatq/1.37.1",
    "icons": [
      {
        "src": "/img/threatq.svg",
        "path": "/package/ti_threatq/1.37.1/img/threatq.svg",
        "title": "ThreatQuotient",
        "size": "600x600",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_threatq",
        "title": "ThreatQuotient",
        "description": "Ingest threat intelligence indicators from ThreatQuotient with Elastic Agent.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_threatq/ti_threatq-1.37.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_threatq.threat",
        "title": "ThreatQ"
      }
    ]
  },
  {
    "name": "thycotic_ss",
    "title": "Thycotic Secret Server",
    "version": "1.12.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Thycotic Secret Server logs",
    "type": "integration",
    "download": "/epr/thycotic_ss/thycotic_ss-1.12.1.zip",
    "path": "/package/thycotic_ss/1.12.1",
    "icons": [
      {
        "src": "/img/thycotic.svg",
        "path": "/package/thycotic_ss/1.12.1/img/thycotic.svg",
        "title": "Thycotic Logo",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Secret Server",
        "description": "Collect Thycotic Secret Server logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "credential_management"
    ],
    "signature_path": "/epr/thycotic_ss/thycotic_ss-1.12.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "thycotic_ss.logs",
        "title": "Thycotic Secret Server Logs"
      }
    ]
  },
  {
    "name": "tines",
    "title": "Tines",
    "version": "1.16.0",
    "release": "ga",
    "description": "Tines Logs & Time Saved Reports",
    "type": "integration",
    "download": "/epr/tines/tines-1.16.0.zip",
    "path": "/package/tines/1.16.0",
    "icons": [
      {
        "src": "/img/tines-purple-logo.png",
        "path": "/package/tines/1.16.0/img/tines-purple-logo.png",
        "title": "Tines",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tines_api",
        "title": "Tines API",
        "description": "Collect events from the Tines API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "security"
    ],
    "signature_path": "/epr/tines/tines-1.16.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tines.audit_logs",
        "title": "Tines Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "tines.time_saved",
        "title": "Tines Time Saved Reports"
      }
    ]
  },
  {
    "name": "tomcat",
    "title": "Tomcat NetWitness Logs (Deprecated)",
    "version": "1.14.0",
    "release": "ga",
    "description": "Collect and parse logs from Apache Tomcat servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/tomcat/tomcat-1.14.0.zip",
    "path": "/package/tomcat/1.14.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/tomcat/1.14.0/img/logo.svg",
        "title": "Apache Tomcat logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "log",
        "title": "Apache Tomcat",
        "description": "Collect Apache Tomcat logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability"
    ],
    "signature_path": "/epr/tomcat/tomcat-1.14.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tomcat.log",
        "title": "Apache Tomcat logs"
      }
    ]
  },
  {
    "name": "traefik",
    "title": "Traefik",
    "version": "2.7.0",
    "release": "ga",
    "description": "Collect logs from Traefik servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/traefik/traefik-2.7.0.zip",
    "path": "/package/traefik/2.7.0",
    "icons": [
      {
        "src": "/img/traefik.svg",
        "path": "/package/traefik/2.7.0/img/traefik.svg",
        "title": "traefik",
        "size": "259x296",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "traefik",
        "title": "Traefik logs",
        "description": "Collect logs from Traefik instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/traefik/traefik-2.7.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "traefik.access",
        "title": "Traefik access logs"
      },
      {
        "type": "metrics",
        "dataset": "traefik.health",
        "title": "Traefik health metrics"
      }
    ]
  },
  {
    "name": "traefik_otel",
    "title": "Traefik OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Traefik Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/traefik_otel/traefik_otel-0.1.0.zip",
    "path": "/package/traefik_otel/0.1.0",
    "icons": [
      {
        "src": "/img/traefik_otel.svg",
        "path": "/package/traefik_otel/0.1.0/img/traefik_otel.svg",
        "title": "Traefik OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "opentelemetry",
      "observability",
      "web",
      "load_balancer",
      "network"
    ],
    "signature_path": "/epr/traefik_otel/traefik_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "traefik.otel"
        }
      ]
    }
  },
  {
    "name": "trellix_edr_cloud",
    "title": "Trellix EDR Cloud",
    "version": "1.9.0",
    "release": "ga",
    "description": "Collect logs from Trellix EDR Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/trellix_edr_cloud/trellix_edr_cloud-1.9.0.zip",
    "path": "/package/trellix_edr_cloud/1.9.0",
    "icons": [
      {
        "src": "/img/trellix-logo.svg",
        "path": "/package/trellix_edr_cloud/1.9.0/img/trellix-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Trellix EDR",
        "title": "Trellix EDR logs",
        "description": "Collect logs using AWS S3 or AWS SQS."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "security"
    ],
    "signature_path": "/epr/trellix_edr_cloud/trellix_edr_cloud-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "trellix_edr_cloud.event",
        "title": "Collect Event logs from Trellix EDR Cloud."
      }
    ]
  },
  {
    "name": "trellix_epo_cloud",
    "title": "Trellix ePO Cloud",
    "version": "1.15.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Trellix ePO Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/trellix_epo_cloud/trellix_epo_cloud-1.15.0.zip",
    "path": "/package/trellix_epo_cloud/1.15.0",
    "icons": [
      {
        "src": "/img/trellix-logo.svg",
        "path": "/package/trellix_epo_cloud/1.15.0/img/trellix-logo.svg",
        "title": "Trellix logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "trellix_epo_cloud",
        "title": "Trellix ePO Cloud logs",
        "description": "Collect Trellix ePO Cloud logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/trellix_epo_cloud/trellix_epo_cloud-1.15.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "trellix_epo_cloud.device",
        "title": "Collect Device logs from Trellix ePO Cloud."
      },
      {
        "type": "logs",
        "dataset": "trellix_epo_cloud.event",
        "title": "Collect Event logs from Trellix ePO Cloud."
      },
      {
        "type": "logs",
        "dataset": "trellix_epo_cloud.group",
        "title": "Collect Group logs from Trellix ePO Cloud."
      }
    ]
  },
  {
    "name": "trendmicro",
    "title": "TrendAI Deep Security",
    "version": "2.8.2",
    "release": "ga",
    "description": "Collect logs from TrendAI Deep Security with Elastic Agent.",
    "type": "integration",
    "download": "/epr/trendmicro/trendmicro-2.8.2.zip",
    "path": "/package/trendmicro/2.8.2",
    "icons": [
      {
        "src": "/img/trend-micro-logo.svg",
        "path": "/package/trendmicro/2.8.2/img/trend-micro-logo.svg",
        "title": "Trendmicro logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "trendmicro",
        "title": "TrendAI Deep Security logs",
        "description": "Collect Deep Security logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "edr_xdr",
      "security",
      "siem"
    ],
    "signature_path": "/epr/trendmicro/trendmicro-2.8.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "trendmicro.deep_security",
        "title": "Collect logs from TrendAI Deep Security"
      }
    ]
  },
  {
    "name": "trend_micro_vision_one",
    "title": "TrendAI Vision One",
    "version": "2.11.0",
    "release": "ga",
    "description": "Collect logs from TrendAI Vision One with Elastic Agent.",
    "type": "integration",
    "download": "/epr/trend_micro_vision_one/trend_micro_vision_one-2.11.0.zip",
    "path": "/package/trend_micro_vision_one/2.11.0",
    "icons": [
      {
        "src": "/img/trendai-vision-one-logo.svg",
        "path": "/package/trend_micro_vision_one/2.11.0/img/trendai-vision-one-logo.svg",
        "title": "TrendAI Vision One Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "trend_micro_vision_one",
        "title": "TrendAI Vision One",
        "description": "Collect logs from TrendAI Vision One.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr",
      "siem",
      "network",
      "network_security"
    ],
    "signature_path": "/epr/trend_micro_vision_one/trend_micro_vision_one-2.11.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.alert",
        "title": "Collect alert logs from TrendAI Vision One"
      },
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.audit",
        "title": "Collect audit logs from TrendAI Vision One"
      },
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.detection",
        "title": "Collect detection logs from TrendAI Vision One"
      },
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.endpoint_activity",
        "title": "Collect endpoint activity logs from TrendAI Vision One"
      },
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.network_activity",
        "title": "Collect network activity logs from TrendAI Vision One"
      },
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.telemetry",
        "title": "Collect telemetry data from the Datalake Pipeline API"
      }
    ]
  },
  {
    "name": "profiler_agent",
    "title": "Universal Profiling Agent",
    "version": "8.17.3",
    "release": "ga",
    "description": "Fleet-wide, whole-system, continuous profiling with zero instrumentation.",
    "type": "integration",
    "download": "/epr/profiler_agent/profiler_agent-8.17.3.zip",
    "path": "/package/profiler_agent/8.17.3",
    "icons": [
      {
        "src": "/img/profiler-logo-color-48px.svg",
        "path": "/package/profiler_agent/8.17.3/img/profiler-logo-color-48px.svg",
        "size": "48x46",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "universal_profiling_agent",
        "title": "Universal Profiling Agent Integration",
        "description": "Interact with the Universal Profiling Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ingest-otel-data"
    },
    "categories": [
      "elastic_stack",
      "monitoring"
    ],
    "signature_path": "/epr/profiler_agent/profiler_agent-8.17.3.zip.sig"
  },
  {
    "name": "profiler_collector",
    "title": "Universal Profiling Collector",
    "version": "8.17.3",
    "release": "ga",
    "description": "Fleet-wide, whole-system, continuous profiling with zero instrumentation.",
    "type": "integration",
    "download": "/epr/profiler_collector/profiler_collector-8.17.3.zip",
    "path": "/package/profiler_collector/8.17.3",
    "icons": [
      {
        "src": "/img/profiler-logo-color-48px.svg",
        "path": "/package/profiler_collector/8.17.3/img/profiler-logo-color-48px.svg",
        "title": "Universal Profiling Logo",
        "size": "48x46",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "universal_profiling_collector",
        "title": "Universal Profiling Collection Service",
        "description": "Interact with Universal Profiling."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/obs-ds-intake-services"
    },
    "categories": [
      "elastic_stack",
      "monitoring"
    ],
    "signature_path": "/epr/profiler_collector/profiler_collector-8.17.3.zip.sig"
  },
  {
    "name": "profiler_symbolizer",
    "title": "Universal Profiling Symbolizer",
    "version": "8.17.3",
    "release": "ga",
    "description": "Fleet-wide, whole-system, continuous profiling with zero instrumentation.",
    "type": "integration",
    "download": "/epr/profiler_symbolizer/profiler_symbolizer-8.17.3.zip",
    "path": "/package/profiler_symbolizer/8.17.3",
    "icons": [
      {
        "src": "/img/profiler-logo-color-48px.svg",
        "path": "/package/profiler_symbolizer/8.17.3/img/profiler-logo-color-48px.svg",
        "title": "Universal Profiling Logo",
        "size": "48x46",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "universal_profiling_symbolizer",
        "title": "Universal Profiling Symbolization Service",
        "description": "Interact with Universal Profiling."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/obs-ds-intake-services"
    },
    "categories": [
      "elastic_stack",
      "monitoring"
    ],
    "signature_path": "/epr/profiler_symbolizer/profiler_symbolizer-8.17.3.zip.sig"
  },
  {
    "name": "carbon_black_cloud",
    "title": "VMware Carbon Black Cloud",
    "version": "4.2.0",
    "release": "ga",
    "description": "Collect logs from VMWare Carbon Black Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/carbon_black_cloud/carbon_black_cloud-4.2.0.zip",
    "path": "/package/carbon_black_cloud/4.2.0",
    "icons": [
      {
        "src": "/img/carbon_black_cloud-logo.svg",
        "path": "/package/carbon_black_cloud/4.2.0/img/carbon_black_cloud-logo.svg",
        "title": "Carbon Black Cloud logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "carbon_black_cloud",
        "title": "Carbon Black Cloud",
        "description": "Collect Logs from Carbon Black Cloud.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/carbon_black_cloud/carbon_black_cloud-4.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.alert_v7",
        "title": "Alert V7"
      },
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.asset_vulnerability_summary",
        "title": "Asset Vulnerability Summary"
      },
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.audit",
        "title": "Audit"
      },
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.endpoint_event",
        "title": "Endpoint Event"
      },
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.watchlist_hit",
        "title": "Watchlist Hit"
      }
    ]
  },
  {
    "name": "carbonblack_edr",
    "title": "VMware Carbon Black EDR",
    "version": "1.21.0",
    "release": "ga",
    "description": "Collect logs from VMware Carbon Black EDR with Elastic Agent.",
    "type": "integration",
    "download": "/epr/carbonblack_edr/carbonblack_edr-1.21.0.zip",
    "path": "/package/carbonblack_edr/1.21.0",
    "icons": [
      {
        "src": "/img/carbon-black-logo.svg",
        "path": "/package/carbonblack_edr/1.21.0/img/carbon-black-logo.svg",
        "title": "VMWare Carbon Black",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "log",
        "title": "Carbon Black EDR logs",
        "description": "Collect logs from Carbon Black EDR"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/carbonblack_edr/carbonblack_edr-1.21.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "carbonblack_edr.log",
        "title": "Carbon Black EDR logs"
      }
    ]
  },
  {
    "name": "vsphere",
    "title": "VMware vSphere",
    "version": "1.23.1",
    "release": "ga",
    "description": "This Elastic integration collects metrics and logs from vSphere/vCenter servers",
    "type": "integration",
    "download": "/epr/vsphere/vsphere-1.23.1.zip",
    "path": "/package/vsphere/1.23.1",
    "icons": [
      {
        "src": "/img/vmware.svg",
        "path": "/package/vsphere/1.23.1/img/vmware.svg",
        "title": "VMware logo",
        "size": "512×83",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "vsphere",
        "title": "vSphere logs and metrics",
        "description": "vSphere logs and metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "virtualization",
      "cloud"
    ],
    "signature_path": "/epr/vsphere/vsphere-1.23.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "vsphere.cluster",
        "title": "vSphere cluster metrics"
      },
      {
        "type": "metrics",
        "dataset": "vsphere.datastore",
        "title": "vSphere datastore metrics"
      },
      {
        "type": "metrics",
        "dataset": "vsphere.datastorecluster",
        "title": "vSphere DatastoreCluster metrics"
      },
      {
        "type": "metrics",
        "dataset": "vsphere.host",
        "title": "vSphere host metrics"
      },
      {
        "type": "logs",
        "dataset": "vsphere.log",
        "title": "vSphere Logs"
      },
      {
        "type": "metrics",
        "dataset": "vsphere.network",
        "title": "vSphere network metrics"
      },
      {
        "type": "metrics",
        "dataset": "vsphere.resourcepool",
        "title": "vSphere resourcepool metrics"
      },
      {
        "type": "metrics",
        "dataset": "vsphere.virtualmachine",
        "title": "vSphere virtual machine metrics"
      }
    ]
  },
  {
    "name": "vsphere_otel",
    "title": "VMware vSphere OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "VMware vSphere Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/vsphere_otel/vsphere_otel-0.1.0.zip",
    "path": "/package/vsphere_otel/0.1.0",
    "icons": [
      {
        "src": "/img/vs.svg",
        "path": "/package/vsphere_otel/0.1.0/img/vs.svg",
        "title": "Vsphere logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "opentelemetry",
      "virtualization"
    ],
    "signature_path": "/epr/vsphere_otel/vsphere_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "vcenterreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "varonis",
    "title": "Varonis",
    "version": "1.0.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Varonis syslog alerts using TCP/UDP input.",
    "type": "integration",
    "download": "/epr/varonis/varonis-1.0.0.zip",
    "path": "/package/varonis/1.0.0",
    "icons": [
      {
        "src": "/img/sample-logo.svg",
        "path": "/package/varonis/1.0.0/img/sample-logo.svg",
        "title": "Sample logo",
        "size": "832x101",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "varonis",
        "title": "Varonis",
        "description": "Collect Varonis syslog alerts using TCP/UDP input."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/varonis/varonis-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "varonis.logs",
        "title": "Varonis"
      }
    ]
  },
  {
    "name": "vectra_detect",
    "title": "Vectra Detect",
    "version": "1.14.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Vectra Detect with Elastic Agent.",
    "type": "integration",
    "download": "/epr/vectra_detect/vectra_detect-1.14.0.zip",
    "path": "/package/vectra_detect/1.14.0",
    "icons": [
      {
        "src": "/img/vectra-logo.svg",
        "path": "/package/vectra_detect/1.14.0/img/vectra-logo.svg",
        "title": "Vectra Detect",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "vectra_detect",
        "title": "Vectra Detect logs",
        "description": "Collect logs from Vectra Detect instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network_security"
    ],
    "signature_path": "/epr/vectra_detect/vectra_detect-1.14.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "vectra_detect.log",
        "title": "Collect logs from Vectra Detect"
      }
    ]
  },
  {
    "name": "vectra_rux",
    "title": "Vectra RUX",
    "version": "0.3.3",
    "release": "beta",
    "description": "Collect logs from Vectra RUX with Elastic Agent.",
    "type": "integration",
    "download": "/epr/vectra_rux/vectra_rux-0.3.3.zip",
    "path": "/package/vectra_rux/0.3.3",
    "icons": [
      {
        "src": "/img/vectra_rux-logo.svg",
        "path": "/package/vectra_rux/0.3.3/img/vectra_rux-logo.svg",
        "title": "Vectra RUX logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "vectra_rux",
        "title": "Vectra RUX",
        "description": "Collect logs from Vectra RUX.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr",
      "siem"
    ],
    "signature_path": "/epr/vectra_rux/vectra_rux-0.3.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "vectra_rux.audit",
        "title": "Collect Audit logs from Vectra RUX"
      },
      {
        "type": "logs",
        "dataset": "vectra_rux.detection_event",
        "title": "Collect Detection Event logs from Vectra RUX"
      },
      {
        "type": "logs",
        "dataset": "vectra_rux.entity_event",
        "title": "Collect Entity Event logs from Vectra RUX"
      },
      {
        "type": "logs",
        "dataset": "vectra_rux.health",
        "title": "Collect Health logs from Vectra RUX"
      },
      {
        "type": "logs",
        "dataset": "vectra_rux.lockdown",
        "title": "Collect Lockdown logs from Vectra RUX"
      }
    ]
  },
  {
    "name": "watchguard_firebox",
    "title": "WatchGuard Firebox",
    "version": "1.6.3",
    "release": "ga",
    "description": "Collect logs from WatchGuard Firebox with Elastic Agent.",
    "type": "integration",
    "download": "/epr/watchguard_firebox/watchguard_firebox-1.6.3.zip",
    "path": "/package/watchguard_firebox/1.6.3",
    "icons": [
      {
        "src": "/img/watchguard-logo.svg",
        "path": "/package/watchguard_firebox/1.6.3/img/watchguard-logo.svg",
        "title": "WatchGuard Firebox logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "watchguard_firebox",
        "title": "WatchGuard Firebox logs",
        "description": "Collect WatchGuard Firebox logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "firewall_security",
      "siem"
    ],
    "signature_path": "/epr/watchguard_firebox/watchguard_firebox-1.6.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "watchguard_firebox.log",
        "title": "WatchGuard Firebox logs"
      }
    ]
  },
  {
    "name": "websphere_application_server",
    "title": "WebSphere Application Server",
    "version": "1.6.1",
    "release": "ga",
    "description": "Collects metrics from IBM WebSphere Application Server with Elastic Agent.",
    "type": "integration",
    "download": "/epr/websphere_application_server/websphere_application_server-1.6.1.zip",
    "path": "/package/websphere_application_server/1.6.1",
    "icons": [
      {
        "src": "/img/websphere_application_server-logo.svg",
        "path": "/package/websphere_application_server/1.6.1/img/websphere_application_server-logo.svg",
        "title": "WebSphere Application Server logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "websphere_application_server",
        "title": "WebSphere Application Server metrics",
        "description": "Collect WebSphere Application Server metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "websphere",
      "observability"
    ],
    "signature_path": "/epr/websphere_application_server/websphere_application_server-1.6.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "websphere_application_server.jdbc",
        "title": "JDBC metrics"
      },
      {
        "type": "metrics",
        "dataset": "websphere_application_server.servlet",
        "title": "Servlet metrics"
      },
      {
        "type": "metrics",
        "dataset": "websphere_application_server.session_manager",
        "title": "Session Manager metrics"
      },
      {
        "type": "metrics",
        "dataset": "websphere_application_server.threadpool",
        "title": "ThreadPool metrics"
      }
    ]
  },
  {
    "name": "windows",
    "title": "Windows",
    "version": "3.8.1",
    "release": "ga",
    "description": "Collect logs and metrics from Windows OS and services with Elastic Agent.",
    "type": "integration",
    "download": "/epr/windows/windows-3.8.1.zip",
    "path": "/package/windows/3.8.1",
    "icons": [
      {
        "src": "/img/logo_windows.svg",
        "path": "/package/windows/3.8.1/img/logo_windows.svg",
        "title": "logo windows",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "windows",
        "title": "Windows logs and metrics",
        "description": "Collect logs and metrics from Windows instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "os_system",
      "security",
      "observability"
    ],
    "signature_path": "/epr/windows/windows-3.8.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "windows.applocker_exe_and_dll",
        "title": "Windows AppLocker/EXE and DLL logs"
      },
      {
        "type": "logs",
        "dataset": "windows.applocker_msi_and_script",
        "title": "Windows AppLocker/MSI and Script logs"
      },
      {
        "type": "logs",
        "dataset": "windows.applocker_packaged_app_deployment",
        "title": "Windows AppLocker/Packaged app-Deployment logs"
      },
      {
        "type": "logs",
        "dataset": "windows.applocker_packaged_app_execution",
        "title": "Windows AppLocker/Packaged app-Execution logs"
      },
      {
        "type": "logs",
        "dataset": "windows.forwarded",
        "title": "Windows forwarded events"
      },
      {
        "type": "metrics",
        "dataset": "windows.perfmon",
        "title": "Windows perfmon metrics"
      },
      {
        "type": "logs",
        "dataset": "windows.powershell",
        "title": "Windows Powershell logs"
      },
      {
        "type": "logs",
        "dataset": "windows.powershell_operational",
        "title": "Windows Powershell/Operational logs"
      },
      {
        "type": "metrics",
        "dataset": "windows.service",
        "title": "Windows service metrics"
      },
      {
        "type": "logs",
        "dataset": "windows.sysmon_operational",
        "title": "Windows Sysmon/Operational events"
      },
      {
        "type": "logs",
        "dataset": "windows.windows_defender",
        "title": "Windows Defender logs"
      }
    ]
  },
  {
    "name": "withsecure_elements",
    "title": "WithSecure Elements",
    "version": "0.2.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Ingest WithSecure Elements incidents and security events data",
    "type": "integration",
    "download": "/epr/withsecure_elements/withsecure_elements-0.2.0.zip",
    "path": "/package/withsecure_elements/0.2.0",
    "icons": [
      {
        "src": "/img/withsecure_elements.svg",
        "path": "/package/withsecure_elements/0.2.0/img/withsecure_elements.svg",
        "title": "WithSecure Elements",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "withsecure_elements",
        "title": "WithSecure Elements",
        "description": "Collect incidents and security events data from WithSecure Elements API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/withsecure_elements/withsecure_elements-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "withsecure_elements.incidents",
        "title": "WithSecure Elements Incidents (BCDs)"
      },
      {
        "type": "logs",
        "dataset": "withsecure_elements.security_events",
        "title": "WithSecure Elements Security Events"
      }
    ]
  },
  {
    "name": "wiz",
    "title": "Wiz",
    "version": "4.2.0",
    "release": "ga",
    "description": "Collect logs from Wiz with Elastic Agent.",
    "type": "integration",
    "download": "/epr/wiz/wiz-4.2.0.zip",
    "path": "/package/wiz/4.2.0",
    "icons": [
      {
        "src": "/img/wiz-logo.svg",
        "path": "/package/wiz/4.2.0/img/wiz-logo.svg",
        "title": "Wiz logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "wiz",
        "title": "Wiz logs",
        "description": "Collect Wiz logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "cloudsecurity_cdr",
      "vulnerability_workflow",
      "misconfiguration_workflow",
      "cloud",
      "siem"
    ],
    "signature_path": "/epr/wiz/wiz-4.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "wiz.audit",
        "title": "Collect Audit logs from Wiz."
      },
      {
        "type": "logs",
        "dataset": "wiz.cloud_configuration_finding",
        "title": "Collet Cloud Configuration Finding logs from Wiz."
      },
      {
        "type": "logs",
        "dataset": "wiz.cloud_configuration_finding_full_posture",
        "title": "Collect full Cloud Configuration Finding posture from Wiz."
      },
      {
        "type": "logs",
        "dataset": "wiz.defend",
        "title": "Collect Detection events from Wiz Defend."
      },
      {
        "type": "logs",
        "dataset": "wiz.issue",
        "title": "Collect Issue logs from Wiz."
      },
      {
        "type": "logs",
        "dataset": "wiz.vulnerability",
        "title": "Collect Vulnerability logs from Wiz."
      }
    ]
  },
  {
    "name": "zeek",
    "title": "Zeek",
    "version": "5.0.0",
    "release": "ga",
    "description": "Collect logs from Zeek with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zeek/zeek-5.0.0.zip",
    "path": "/package/zeek/5.0.0",
    "icons": [
      {
        "src": "/img/zeek.svg",
        "path": "/package/zeek/5.0.0/img/zeek.svg",
        "title": "zeek",
        "size": "214x203",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zeek",
        "title": "Zeek logs",
        "description": "Collect logs from Zeek instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.12.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/zeek/zeek-5.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zeek.capture_loss",
        "title": "Zeek capture_loss logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.connection",
        "title": "Zeek connection logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.dce_rpc",
        "title": "Zeek dce_rpc logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.dhcp",
        "title": "Zeek dhcp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.dnp3",
        "title": "Zeek dnp3 logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.dns",
        "title": "Zeek dns logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.dpd",
        "title": "Zeek dpd logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.files",
        "title": "Zeek files logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.ftp",
        "title": "Zeek ftp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.http",
        "title": "Zeek http logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.intel",
        "title": "Zeek intel logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.irc",
        "title": "Zeek irc logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.kerberos",
        "title": "Zeek kerberos logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.known_certs",
        "title": "Zeek Known Certs logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.known_hosts",
        "title": "Zeek Known Hosts logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.known_services",
        "title": "Zeek Known Services logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.modbus",
        "title": "Zeek modbus logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.mysql",
        "title": "Zeek mysql logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.notice",
        "title": "Zeek notice logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.ntlm",
        "title": "Zeek ntlm logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.ntp",
        "title": "Zeek ntp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.ocsp",
        "title": "Zeek ocsp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.pe",
        "title": "Zeek pe logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.radius",
        "title": "Zeek radius logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.rdp",
        "title": "Zeek rdp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.rfb",
        "title": "Zeek rfb logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.signature",
        "title": "Zeek signature logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.sip",
        "title": "Zeek sip logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.smb_cmd",
        "title": "Zeek smb_cmd logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.smb_files",
        "title": "Zeek smb_files logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.smb_mapping",
        "title": "Zeek smb_mapping logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.smtp",
        "title": "Zeek smtp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.snmp",
        "title": "Zeek snmp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.socks",
        "title": "Zeek socks logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.software",
        "title": "Zeek software logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.ssh",
        "title": "Zeek ssh logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.ssl",
        "title": "Zeek ssl logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.stats",
        "title": "Zeek stats logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.syslog",
        "title": "Zeek syslog logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.traceroute",
        "title": "Zeek traceroute logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.tunnel",
        "title": "Zeek tunnel logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.weird",
        "title": "Zeek weird logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.x509",
        "title": "Zeek x509 logs"
      }
    ]
  },
  {
    "name": "zeronetworks",
    "title": "Zero Networks",
    "version": "1.19.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Zero Networks Logs integration",
    "type": "integration",
    "download": "/epr/zeronetworks/zeronetworks-1.19.0.zip",
    "path": "/package/zeronetworks/1.19.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/zeronetworks/1.19.0/img/logo.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zeronetworks",
        "title": "Zero Networks Logs",
        "description": "Collect logs from Zero Networks"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "siem",
      "network_security"
    ],
    "signature_path": "/epr/zeronetworks/zeronetworks-1.19.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zeronetworks.audit",
        "title": "Zero Networks Audit Logs"
      }
    ]
  },
  {
    "name": "zerofox",
    "title": "ZeroFox",
    "version": "1.29.0",
    "release": "ga",
    "description": "Collect logs from ZeroFox with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zerofox/zerofox-1.29.0.zip",
    "path": "/package/zerofox/1.29.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/zerofox/1.29.0/img/logo.svg",
        "title": "logo ZeroFox",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zerofox",
        "title": "ZeroFox Alerts",
        "description": "Collect alert from the ZeroFox API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "siem",
      "threat_intel"
    ],
    "signature_path": "/epr/zerofox/zerofox-1.29.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zerofox.alerts",
        "title": "Alerts"
      }
    ]
  },
  {
    "name": "zookeeper",
    "title": "ZooKeeper Metrics",
    "version": "1.14.0",
    "release": "ga",
    "description": "Collect metrics from ZooKeeper service with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zookeeper/zookeeper-1.14.0.zip",
    "path": "/package/zookeeper/1.14.0",
    "icons": [
      {
        "src": "/img/zookeeper.svg",
        "path": "/package/zookeeper/1.14.0/img/zookeeper.svg",
        "title": "zookeeper",
        "size": "754x754",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zookeeper",
        "title": "ZooKeeper metrics",
        "description": "Collect metrics from ZooKeeper instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/zookeeper/zookeeper-1.14.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "zookeeper.connection",
        "title": "ZooKeeper connection metrics"
      },
      {
        "type": "metrics",
        "dataset": "zookeeper.mntr",
        "title": "ZooKeeper mntr metrics"
      },
      {
        "type": "metrics",
        "dataset": "zookeeper.server",
        "title": "ZooKeeper server metrics"
      }
    ]
  },
  {
    "name": "zookeeper_otel",
    "title": "Zookeeper OTel Assets",
    "version": "0.1.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Zookeeper OTel Assets",
    "type": "content",
    "download": "/epr/zookeeper_otel/zookeeper_otel-0.1.1.zip",
    "path": "/package/zookeeper_otel/0.1.1",
    "icons": [
      {
        "src": "/img/zookeeper-logo.svg",
        "path": "/package/zookeeper_otel/0.1.1/img/zookeeper-logo.svg",
        "title": "Zookeeper OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/zookeeper_otel/zookeeper_otel-0.1.1.zip.sig"
  },
  {
    "name": "zoom",
    "title": "Zoom",
    "version": "1.23.0",
    "release": "ga",
    "description": "Collect logs from Zoom with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zoom/zoom-1.23.0.zip",
    "path": "/package/zoom/1.23.0",
    "icons": [
      {
        "src": "/img/zoom_blue.svg",
        "path": "/package/zoom/1.23.0/img/zoom_blue.svg",
        "title": "Zoom",
        "size": "516x240",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zoom",
        "title": "Zoom logs",
        "description": "Collect logs from Zoom instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/zoom/zoom-1.23.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zoom.webhook",
        "title": "Zoom webhook logs"
      }
    ]
  },
  {
    "name": "zscaler_zia",
    "title": "Zscaler Internet Access",
    "version": "3.17.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Zscaler Internet Access (ZIA) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zscaler_zia/zscaler_zia-3.17.1.zip",
    "path": "/package/zscaler_zia/3.17.1",
    "icons": [
      {
        "src": "/img/zscaler-logo.svg",
        "path": "/package/zscaler_zia/3.17.1/img/zscaler-logo.svg",
        "title": "Zscaler logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zscaler_zia",
        "title": "Zscaler Internet Access logs",
        "description": "Collect Zscaler Internet Access logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "siem"
    ],
    "signature_path": "/epr/zscaler_zia/zscaler_zia-3.17.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zscaler_zia.alerts",
        "title": "Alerts"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.audit",
        "title": "Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.dns",
        "title": "DNS logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.endpoint_dlp",
        "title": "Endpoint DLP Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.firewall",
        "title": "Firewall Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.sandbox_report",
        "title": "Sandbox Report Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.tunnel",
        "title": "Tunnel Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.web",
        "title": "Web Logs"
      }
    ]
  },
  {
    "name": "zscaler_zpa",
    "title": "Zscaler Private Access",
    "version": "1.23.3",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Zscaler Private Access (ZPA) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zscaler_zpa/zscaler_zpa-1.23.3.zip",
    "path": "/package/zscaler_zpa/1.23.3",
    "icons": [
      {
        "src": "/img/zscaler-logo.svg",
        "path": "/package/zscaler_zpa/1.23.3/img/zscaler-logo.svg",
        "title": "Zscaler logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zscaler_zpa",
        "title": "Zscaler Private Access logs",
        "description": "Collect Zscaler Private Access logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "vpn_security",
      "siem"
    ],
    "signature_path": "/epr/zscaler_zpa/zscaler_zpa-1.23.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zscaler_zpa.app_connector_status",
        "title": "App Connector Status Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zpa.audit",
        "title": "Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zpa.browser_access",
        "title": "Browser Access Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zpa.user_activity",
        "title": "User Activity Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zpa.user_status",
        "title": "User Status Logs"
      }
    ]
  },
  {
    "name": "ti_abusech",
    "title": "abuse.ch",
    "version": "3.6.0",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from URL Haus, Malware Bazaar, and Threat Fox feeds with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_abusech/ti_abusech-3.6.0.zip",
    "path": "/package/ti_abusech/3.6.0",
    "icons": [
      {
        "src": "/img/abusech2.svg",
        "path": "/package/ti_abusech/3.6.0/img/abusech2.svg",
        "title": "abuse.ch",
        "size": "512x512",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_abusech",
        "title": "abuse.ch API",
        "description": "Ingest threat intelligence indicators from URL Haus, Malware Bazaar, and Threat Fox feeds with Elastic Agent.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_abusech/ti_abusech-3.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_abusech.ja3_fingerprints",
        "title": "JA3 Fingerprints"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.malware",
        "title": "Malware payloads"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.malwarebazaar",
        "title": "MalwareBazaar payloads"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.sslblacklist",
        "title": "SSL Blacklisted Certificates"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.threatfox",
        "title": "ThreatFox threat indicators"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.url",
        "title": "Malware URLs"
      }
    ]
  },
  {
    "name": "authentik",
    "title": "authentik",
    "version": "1.8.0",
    "release": "ga",
    "description": "Collect logs from authentik with Elastic Agent.",
    "type": "integration",
    "download": "/epr/authentik/authentik-1.8.0.zip",
    "path": "/package/authentik/1.8.0",
    "icons": [
      {
        "src": "/img/authentik-logo.svg",
        "path": "/package/authentik/1.8.0/img/authentik-logo.svg",
        "title": "authentik logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "authentik",
        "title": "authentik logs",
        "description": "Collect authentik logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/authentik/authentik-1.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "authentik.event",
        "title": "authentik event logs"
      },
      {
        "type": "logs",
        "dataset": "authentik.group",
        "title": "authentik group logs"
      },
      {
        "type": "logs",
        "dataset": "authentik.user",
        "title": "authentik user logs"
      }
    ]
  },
  {
    "name": "blacklens",
    "title": "blacklens.io",
    "version": "1.0.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from blacklens.io with Elastic Agent",
    "type": "integration",
    "download": "/epr/blacklens/blacklens-1.0.1.zip",
    "path": "/package/blacklens/1.0.1",
    "icons": [
      {
        "src": "/img/blacklens-logo.svg",
        "path": "/package/blacklens/1.0.1/img/blacklens-logo.svg",
        "title": "blacklens.io Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "blacklens",
        "title": "blacklens.io logs",
        "description": "Collect blacklens.io logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management"
    ],
    "signature_path": "/epr/blacklens/blacklens-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "blacklens.alerts",
        "title": "Collect blacklens.io Alerts"
      }
    ]
  },
  {
    "name": "etcd",
    "title": "etcd",
    "version": "1.4.1",
    "release": "ga",
    "description": "Collect metrics from etcd instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/etcd/etcd-1.4.1.zip",
    "path": "/package/etcd/1.4.1",
    "icons": [
      {
        "src": "/img/etcd.svg",
        "path": "/package/etcd/1.4.1/img/etcd.svg",
        "title": "etcd logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "etcd",
        "title": "etcd metrics",
        "description": "Collect metrics from etcd instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/etcd/etcd-1.4.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "etcd.leader",
        "title": "etcd leader metrics"
      },
      {
        "type": "metrics",
        "dataset": "etcd.metrics",
        "title": "etcd v3 metrics"
      },
      {
        "type": "metrics",
        "dataset": "etcd.self",
        "title": "etcd self metrics"
      },
      {
        "type": "metrics",
        "dataset": "etcd.store",
        "title": "etcd store metrics"
      }
    ]
  },
  {
    "name": "etcd_otel",
    "title": "etcd OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "etcd Assets from OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/etcd_otel/etcd_otel-0.1.0.zip",
    "path": "/package/etcd_otel/0.1.0",
    "icons": [
      {
        "src": "/img/etcd_otel.svg",
        "path": "/package/etcd_otel/0.1.0/img/etcd_otel.svg",
        "title": "etcd OpenTelemetry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "opentelemetry"
    ],
    "signature_path": "/epr/etcd_otel/etcd_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "etcd.otel"
        }
      ]
    }
  },
  {
    "name": "macos",
    "title": "macOS Security Events",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collect logs from macOS with Elastic Agent.",
    "type": "integration",
    "download": "/epr/macos/macos-1.0.0.zip",
    "path": "/package/macos/1.0.0",
    "icons": [
      {
        "src": "/img/macos-logo.svg",
        "path": "/package/macos/1.0.0/img/macos-logo.svg",
        "title": "macOS Security Events logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "macos",
        "title": "macOS Security Events",
        "description": "Collect logs from macOS Security Events."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/macos/macos-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "macos.advanced_monitoring",
        "title": "Advanced Monitoring"
      },
      {
        "type": "logs",
        "dataset": "macos.authentication",
        "title": "Authentication"
      },
      {
        "type": "logs",
        "dataset": "macos.file_read_write",
        "title": "File Read/Write"
      },
      {
        "type": "logs",
        "dataset": "macos.network_activity",
        "title": "Network Activity"
      },
      {
        "type": "logs",
        "dataset": "macos.process_execution_monitoring",
        "title": "Process Execution Monitoring"
      },
      {
        "type": "logs",
        "dataset": "macos.system_change",
        "title": "System Changes"
      },
      {
        "type": "logs",
        "dataset": "macos.user_and_account_management",
        "title": "User and Account Management"
      }
    ]
  },
  {
    "name": "pfsense",
    "title": "pfSense",
    "version": "1.25.2",
    "release": "ga",
    "description": "Collect logs from pfSense and OPNsense with Elastic Agent.",
    "type": "integration",
    "download": "/epr/pfsense/pfsense-1.25.2.zip",
    "path": "/package/pfsense/1.25.2",
    "icons": [
      {
        "src": "/img/pfsense.svg",
        "path": "/package/pfsense/1.25.2/img/pfsense.svg",
        "title": "pfsense",
        "size": "512x143",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "pfsense",
        "title": "pfSense logs",
        "description": "Collect logs from pfSense systems"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "firewall_security",
      "network_security"
    ],
    "signature_path": "/epr/pfsense/pfsense-1.25.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "pfsense.log",
        "title": "pfSense log logs"
      }
    ]
  }
]
