[
  {
    "name": "1password",
    "title": "1Password",
    "version": "1.26.1",
    "release": "ga",
    "description": "Collect logs from 1Password with Elastic Agent.",
    "type": "integration",
    "download": "/epr/1password/1password-1.26.1.zip",
    "path": "/package/1password/1.26.1",
    "icons": [
      {
        "src": "/img/1password-logo-light-bg.svg",
        "path": "/package/1password/1.26.1/img/1password-logo-light-bg.svg",
        "title": "1Password",
        "size": "116x116",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "1password",
        "title": "1Password Events",
        "description": "Collect events from 1Password Events Reporting"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "credential_management"
    ],
    "signature_path": "/epr/1password/1password-1.26.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "1password.audit_events",
        "title": "Collect 1Password audit events"
      },
      {
        "type": "logs",
        "dataset": "1password.item_usages",
        "title": "Collect 1Password item usages events"
      },
      {
        "type": "logs",
        "dataset": "1password.signin_attempts",
        "title": "1Password sign-in attempt events"
      }
    ]
  },
  {
    "name": "aws",
    "title": "AWS",
    "version": "2.11.3",
    "release": "ga",
    "description": "Collect logs and metrics from Amazon Web Services (AWS) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/aws/aws-2.11.3.zip",
    "path": "/package/aws/2.11.3",
    "icons": [
      {
        "src": "/img/logo_aws.svg",
        "path": "/package/aws/2.11.3/img/logo_aws.svg",
        "title": "logo aws",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "billing",
        "title": "AWS Billing",
        "description": "Collect billing metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_billing.svg",
            "path": "/package/aws/2.11.3/img/logo_billing.svg",
            "title": "AWS Billing logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "billing"
        ]
      },
      {
        "name": "cloudtrail",
        "title": "AWS CloudTrail",
        "description": "Collect AWS CloudTrail logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_cloudtrail.svg",
            "path": "/package/aws/2.11.3/img/logo_cloudtrail.svg",
            "title": "AWS Cloudtrail logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "cloudtrail"
        ]
      },
      {
        "name": "cloudwatch",
        "title": "AWS CloudWatch",
        "description": "Use this integration to collect logs and metrics from Amazon CloudWatch with Elastic Agent, where no out of the box integration is available.",
        "icons": [
          {
            "src": "/img/logo_cloudwatch.svg",
            "path": "/package/aws/2.11.3/img/logo_cloudwatch.svg",
            "title": "AWS CloudWatch logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "monitoring"
        ],
        "data_streams": [
          "cloudwatch_logs",
          "cloudwatch_metrics"
        ]
      },
      {
        "name": "dynamodb",
        "title": "Amazon DynamoDB",
        "description": "Collect Amazon DynamoDB metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_dynamodb.svg",
            "path": "/package/aws/2.11.3/img/logo_dynamodb.svg",
            "title": "AWS DynamoDB logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "dynamodb"
        ]
      },
      {
        "name": "ebs",
        "title": "Amazon EBS",
        "description": "Collect Amazon Elastic Block Storage metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_ebs.svg",
            "path": "/package/aws/2.11.3/img/logo_ebs.svg",
            "title": "AWS EBS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "ebs"
        ]
      },
      {
        "name": "ec2",
        "title": "Amazon EC2",
        "description": "Collect logs and metrics for Amazon Elastic Compute Cloud service with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_ec2.svg",
            "path": "/package/aws/2.11.3/img/logo_ec2.svg",
            "title": "AWS EC2 logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "ec2_logs",
          "ec2_metrics"
        ]
      },
      {
        "name": "ecs",
        "title": "Amazon ECS",
        "description": "Collect metrics for Amazon Elastic Container Service with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_ecs.svg",
            "path": "/package/aws/2.11.3/img/logo_ecs.svg",
            "title": "AWS ECS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "containers"
        ],
        "data_streams": [
          "ecs_metrics"
        ]
      },
      {
        "name": "elb",
        "title": "AWS ELB",
        "description": "Collect logs and metrics for Amazon Elastic Load Balancing service with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_elb.svg",
            "path": "/package/aws/2.11.3/img/logo_elb.svg",
            "title": "AWS ELB logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "load_balancer"
        ],
        "data_streams": [
          "elb_logs",
          "elb_metrics"
        ]
      },
      {
        "name": "lambda",
        "title": "AWS Lambda",
        "description": "Collect Lambda metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_lambda.svg",
            "path": "/package/aws/2.11.3/img/logo_lambda.svg",
            "title": "AWS Lambda logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "lambda"
        ]
      },
      {
        "name": "natgateway",
        "title": "Amazon NAT Gateway",
        "description": "Collect Amazon NAT Gateways metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_natgateway.svg",
            "path": "/package/aws/2.11.3/img/logo_natgateway.svg",
            "title": "AWS NATGateway logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "network"
        ],
        "data_streams": [
          "natgateway"
        ]
      },
      {
        "name": "firewall",
        "title": "AWS Network Firewall",
        "description": "Collect AWS Network Firewall logs and metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_firewall.svg",
            "path": "/package/aws/2.11.3/img/logo_firewall.svg",
            "title": "AWS Network Firewall logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "firewall_security"
        ],
        "data_streams": [
          "firewall_logs",
          "firewall_metrics"
        ]
      },
      {
        "name": "rds",
        "title": "Amazon RDS",
        "description": "Collect Amazon Relational Database Service metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_rds.svg",
            "path": "/package/aws/2.11.3/img/logo_rds.svg",
            "title": "AWS RDS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "rds"
        ]
      },
      {
        "name": "s3",
        "title": "Amazon S3",
        "description": "Monitor Amazon S3 buckets by collecting access logs, storage & request metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_s3.svg",
            "path": "/package/aws/2.11.3/img/logo_s3.svg",
            "title": "AWS S3 logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "s3_daily_storage",
          "s3_request",
          "s3access"
        ]
      },
      {
        "name": "s3_storage_lens",
        "title": "Amazon S3 Storage Lens",
        "description": "Collect Amazon S3 Storage Lens metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_s3_storage_lens.svg",
            "path": "/package/aws/2.11.3/img/logo_s3_storage_lens.svg",
            "title": "AWS S3 storage lens logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "s3_storage_lens"
        ]
      },
      {
        "name": "sns",
        "title": "Amazon SNS",
        "description": "Collect Amazon SNS metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_sns.svg",
            "path": "/package/aws/2.11.3/img/logo_sns.svg",
            "title": "AWS SNS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "notification"
        ],
        "data_streams": [
          "sns"
        ]
      },
      {
        "name": "sqs",
        "title": "Amazon SQS",
        "description": "Collect Amazon SQS metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_sqs.svg",
            "path": "/package/aws/2.11.3/img/logo_sqs.svg",
            "title": "AWS SQS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "sqs"
        ]
      },
      {
        "name": "transitgateway",
        "title": "AWS Transit Gateway",
        "description": "Collect AWS Transit Gateways metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_transitgateway.svg",
            "path": "/package/aws/2.11.3/img/logo_transitgateway.svg",
            "title": "AWS Transit Gateway logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "transitgateway"
        ]
      },
      {
        "name": "usage",
        "title": "AWS Usage",
        "description": "Collect AWS usage metrics with Elastic Agent",
        "categories": [
          "observability"
        ],
        "data_streams": [
          "usage"
        ]
      },
      {
        "name": "vpcflow",
        "title": "Amazon VPC",
        "description": "Collect Amazon VPC flow logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_vpcflow.svg",
            "path": "/package/aws/2.11.3/img/logo_vpcflow.svg",
            "title": "AWS VPC logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "network"
        ],
        "data_streams": [
          "vpcflow"
        ]
      },
      {
        "name": "vpn",
        "title": "Amazon VPN",
        "description": "Collect VPN metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_vpn.svg",
            "path": "/package/aws/2.11.3/img/logo_vpn.svg",
            "title": "AWS VPN logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "network"
        ],
        "data_streams": [
          "vpn"
        ]
      },
      {
        "name": "waf",
        "title": "AWS WAF",
        "description": "Collect AWS WAF logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_waf.svg",
            "path": "/package/aws/2.11.3/img/logo_waf.svg",
            "title": "AWS VPC logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "web_application_firewall"
        ],
        "data_streams": [
          "waf"
        ]
      },
      {
        "name": "route53",
        "title": "AWS Route 53",
        "description": "Collect AWS Route53 logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_route53.svg",
            "path": "/package/aws/2.11.3/img/logo_route53.svg",
            "title": "AWS Route53 logo",
            "size": "32x40",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "dns_security"
        ],
        "data_streams": [
          "route53_public_logs",
          "route53_resolver_logs"
        ]
      },
      {
        "name": "cloudfront",
        "title": "Amazon CloudFront",
        "description": "Collect Amazon CloudFront logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_cloudfront.svg",
            "path": "/package/aws/2.11.3/img/logo_cloudfront.svg",
            "title": "AWS CloudFront logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "monitoring",
          "observability"
        ],
        "data_streams": [
          "cloudfront_logs"
        ]
      },
      {
        "name": "redshift",
        "title": "Amazon Redshift",
        "description": "Collect Amazon Redshift metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_redshift.svg",
            "path": "/package/aws/2.11.3/img/logo_redshift.svg",
            "title": "Amazon Redshift logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "redshift"
        ]
      },
      {
        "name": "kinesis",
        "title": "Amazon Kinesis Data Stream",
        "description": "Collect Amazon Kinesis Data Stream metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_kinesis.svg",
            "path": "/package/aws/2.11.3/img/logo_kinesis.svg",
            "title": "Amazon Kinesis logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "stream_processing"
        ],
        "data_streams": [
          "kinesis"
        ]
      },
      {
        "name": "securityhub",
        "title": "AWS Security Hub",
        "description": "Collect AWS Security Hub Logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_securityhub.svg",
            "path": "/package/aws/2.11.3/img/logo_securityhub.svg",
            "title": "AWS Security Hub logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "securityhub_findings",
          "securityhub_insights"
        ]
      },
      {
        "name": "inspector",
        "title": "AWS Inspector",
        "description": "Collect AWS Inspector Logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_inspector.svg",
            "path": "/package/aws/2.11.3/img/logo_inspector.svg",
            "title": "AWS Inspector logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "inspector"
        ]
      },
      {
        "name": "guardduty",
        "title": "Amazon GuardDuty",
        "description": "Collect Amazon GuardDuty logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_guardduty.svg",
            "path": "/package/aws/2.11.3/img/logo_guardduty.svg",
            "title": "Amazon GuardDuty logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "guardduty"
        ]
      },
      {
        "name": "apigateway",
        "title": "AWS API Gateway",
        "description": "Collect logs and metrics for AWS API Gateway with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_apigateway.svg",
            "path": "/package/aws/2.11.3/img/logo_apigateway.svg",
            "title": "AWS API Gateway logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "apigateway_metrics",
          "apigateway_logs"
        ]
      },
      {
        "name": "emr",
        "title": "Amazon EMR",
        "description": "Collect logs and metrics for Amazon EMR service with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_emr.svg",
            "path": "/package/aws/2.11.3/img/logo_emr.svg",
            "title": "AWS EMR logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "emr_metrics",
          "emr_logs"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "aws"
    ],
    "signature_path": "/epr/aws/aws-2.11.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "aws.apigateway_logs",
        "title": "AWS API Gateway logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.apigateway_metrics",
        "title": "AWS API Gateway metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.billing",
        "title": "AWS Billing Metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.cloudfront_logs",
        "title": "AWS CloudFront logs"
      },
      {
        "type": "logs",
        "dataset": "aws.cloudtrail",
        "title": "AWS CloudTrail Logs"
      },
      {
        "type": "logs",
        "dataset": "aws.cloudwatch_logs",
        "title": "AWS CloudWatch logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.cloudwatch_metrics",
        "title": "AWS CloudWatch metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.dynamodb",
        "title": "AWS DynamoDB metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.ebs",
        "title": "AWS EBS metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.ec2_logs",
        "title": "AWS EC2 logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.ec2_metrics",
        "title": "AWS EC2 metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.ecs_metrics",
        "title": "AWS ECS metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.elb_logs",
        "title": "AWS ELB logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.elb_metrics",
        "title": "AWS ELB metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.emr_logs",
        "title": "AWS EMR logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.emr_metrics",
        "title": "AWS EMR metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.firewall_logs",
        "title": "AWS Network Firewall logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.firewall_metrics",
        "title": "AWS Network Firewall metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.guardduty",
        "title": "Collect Amazon GuardDuty Findings logs from AWS"
      },
      {
        "type": "logs",
        "dataset": "aws.inspector",
        "title": "Collect AWS Inspector logs from AWS"
      },
      {
        "type": "metrics",
        "dataset": "aws.kinesis",
        "title": "AWS Kinesis Data Stream metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.lambda",
        "title": "AWS Lambda metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.natgateway",
        "title": "AWS NAT gateway metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.rds",
        "title": "AWS RDS metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.redshift",
        "title": "Amazon Redshift metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.route53_public_logs",
        "title": "AWS Route 53 Public Zone Logs"
      },
      {
        "type": "logs",
        "dataset": "aws.route53_resolver_logs",
        "title": "AWS Route 53 Resolver Query Logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.s3_daily_storage",
        "title": "AWS S3 daily storage metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.s3_request",
        "title": "AWS S3 request metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.s3_storage_lens",
        "title": "AWS S3 Storage Lens metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.s3access",
        "title": "AWS s3access logs"
      },
      {
        "type": "logs",
        "dataset": "aws.securityhub_findings",
        "title": "Collect AWS Security Hub Findings logs from AWS"
      },
      {
        "type": "logs",
        "dataset": "aws.securityhub_insights",
        "title": "Collect AWS Security Hub Insights logs from AWS"
      },
      {
        "type": "metrics",
        "dataset": "aws.sns",
        "title": "AWS SNS metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.sqs",
        "title": "AWS SQS metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.transitgateway",
        "title": "AWS Transit Gateway metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.usage",
        "title": "AWS usage metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.vpcflow",
        "title": "AWS vpcflow logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.vpn",
        "title": "AWS VPN metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.waf",
        "title": "AWS WAF logs"
      }
    ]
  },
  {
    "name": "awsfargate",
    "title": "AWS Fargate",
    "version": "0.4.0",
    "release": "beta",
    "description": "Collects metrics from containers and tasks running on Amazon ECS clusters with Elastic Agent.",
    "type": "integration",
    "download": "/epr/awsfargate/awsfargate-0.4.0.zip",
    "path": "/package/awsfargate/0.4.0",
    "icons": [
      {
        "src": "/img/logo_fargate.svg",
        "path": "/package/awsfargate/0.4.0/img/logo_fargate.svg",
        "title": "logo aws fargate",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "awsfargate",
        "title": "AWS Fargate metrics from Amazon ECS clusters",
        "description": "Collect metrics from instances running on Amazon ECS clusters"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-cloud-monitoring"
    },
    "categories": [
      "observability",
      "aws"
    ],
    "signature_path": "/epr/awsfargate/awsfargate-0.4.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "awsfargate.task_stats",
        "title": "AWS Fargate task_stats metrics"
      }
    ]
  },
  {
    "name": "ti_abusech",
    "title": "AbuseCH",
    "version": "1.25.0",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from URL Haus, Malware Bazaar, and Threat Fox feeds with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_abusech/ti_abusech-1.25.0.zip",
    "path": "/package/ti_abusech/1.25.0",
    "icons": [
      {
        "src": "/img/abusech2.svg",
        "path": "/package/ti_abusech/1.25.0/img/abusech2.svg",
        "title": "AbuseCH",
        "size": "512x512",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_abusech",
        "title": "AbuseCH API",
        "description": "Ingest threat intelligence indicators from URL Haus, Malware Bazaar, and Threat Fox feeds with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_abusech/ti_abusech-1.25.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_abusech.malware",
        "title": "AbuseCH Malware logs"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.malwarebazaar",
        "title": "AbuseCH MalwareBazaar logs"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.threatfox",
        "title": "AbuseCH Threat Fox logs"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.url",
        "title": "AbuseCH URL logs"
      }
    ]
  },
  {
    "name": "activemq",
    "title": "ActiveMQ",
    "version": "1.1.1",
    "release": "ga",
    "description": "Collect logs and metrics from ActiveMQ instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/activemq/activemq-1.1.1.zip",
    "path": "/package/activemq/1.1.1",
    "icons": [
      {
        "src": "/img/activemq.svg",
        "path": "/package/activemq/1.1.1/img/activemq.svg",
        "title": "activemq",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "activemq",
        "title": "ActiveMQ logs and metrics",
        "description": "This Elastic integration collects logs and metrics from ActiveMQ instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "message_queue",
      "observability"
    ],
    "signature_path": "/epr/activemq/activemq-1.1.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "activemq.audit",
        "title": "ActiveMQ audit logs"
      },
      {
        "type": "metrics",
        "dataset": "activemq.broker",
        "title": "ActiveMQ broker metrics"
      },
      {
        "type": "logs",
        "dataset": "activemq.log",
        "title": "ActiveMQ log logs"
      },
      {
        "type": "metrics",
        "dataset": "activemq.queue",
        "title": "ActiveMQ queue metrics"
      },
      {
        "type": "metrics",
        "dataset": "activemq.topic",
        "title": "ActiveMQ topic metrics"
      }
    ]
  },
  {
    "name": "airflow",
    "title": "Airflow",
    "version": "0.8.0",
    "release": "beta",
    "description": "Airflow Integration.",
    "type": "integration",
    "download": "/epr/airflow/airflow-0.8.0.zip",
    "path": "/package/airflow/0.8.0",
    "icons": [
      {
        "src": "/img/airflow.svg",
        "path": "/package/airflow/0.8.0/img/airflow.svg",
        "title": "Airflow logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "server",
        "title": "Airflow metrics",
        "description": "Collect metrics from Airflow instances",
        "data_streams": [
          "statsd"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/airflow/airflow-0.8.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "airflow.statsd",
        "title": "Airflow metrics"
      }
    ]
  },
  {
    "name": "akamai",
    "title": "Akamai",
    "version": "2.22.0",
    "release": "ga",
    "description": "Collect logs from Akamai with Elastic Agent.",
    "type": "integration",
    "download": "/epr/akamai/akamai-2.22.0.zip",
    "path": "/package/akamai/2.22.0",
    "icons": [
      {
        "src": "/img/akamai_logo.svg",
        "path": "/package/akamai/2.22.0/img/akamai_logo.svg",
        "title": "Akamai",
        "size": "409×167",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "akamai",
        "title": "Akamai logs",
        "description": "Collect SIEM logs from Akamai"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "cdn_security"
    ],
    "signature_path": "/epr/akamai/akamai-2.22.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "akamai.siem",
        "title": "Akamai SIEM Logs"
      }
    ]
  },
  {
    "name": "ti_otx",
    "title": "AlienVault OTX",
    "version": "1.23.2",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from AlienVault Open Threat Exchange (OTX) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_otx/ti_otx-1.23.2.zip",
    "path": "/package/ti_otx/1.23.2",
    "icons": [
      {
        "src": "/img/otx.svg",
        "path": "/package/ti_otx/1.23.2/img/otx.svg",
        "title": "Alienvault OTX",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_otx",
        "title": "Alienvault OTX",
        "description": "Ingest threat intelligence indicators from AlienVault Open Threat Exchange (OTX) with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.3"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_otx/ti_otx-1.23.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_otx.pulses_subscribed",
        "title": "Alienvault OTX Subcribed Pulses"
      },
      {
        "type": "logs",
        "dataset": "ti_otx.threat",
        "title": "Alienvault OTX logs"
      }
    ]
  },
  {
    "name": "awsfirehose",
    "title": "Amazon Data Firehose",
    "version": "1.0.0",
    "release": "ga",
    "description": "Stream logs from Amazon Data Firehose into Elastic Cloud.",
    "type": "integration",
    "download": "/epr/awsfirehose/awsfirehose-1.0.0.zip",
    "path": "/package/awsfirehose/1.0.0",
    "icons": [
      {
        "src": "/img/logo_firehose.svg",
        "path": "/package/awsfirehose/1.0.0/img/logo_firehose.svg",
        "title": "logo aws firehose",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "observability",
      "aws"
    ],
    "signature_path": "/epr/awsfirehose/awsfirehose-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "awsfirehose",
        "title": "Logs from Amazon Data Firehose"
      }
    ]
  },
  {
    "name": "amazon_security_lake",
    "title": "Amazon Security Lake",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect logs from Amazon Security Lake with Elastic Agent.",
    "type": "integration",
    "download": "/epr/amazon_security_lake/amazon_security_lake-1.0.1.zip",
    "path": "/package/amazon_security_lake/1.0.1",
    "icons": [
      {
        "src": "/img/amazon-security-lake-logo.svg",
        "path": "/package/amazon_security_lake/1.0.1/img/amazon-security-lake-logo.svg",
        "title": "Amazon Security Lake Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "amazon_security_lake",
        "title": "Amazon Security Lake logs",
        "description": "Collect logs from Amazon Security Lake instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "aws",
      "security"
    ],
    "signature_path": "/epr/amazon_security_lake/amazon_security_lake-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "amazon_security_lake.application_activity",
        "title": "Amazon Security Lake Application Activity Events"
      },
      {
        "type": "logs",
        "dataset": "amazon_security_lake.discovery",
        "title": "Amazon Security Lake Discovery Events"
      },
      {
        "type": "logs",
        "dataset": "amazon_security_lake.event",
        "title": "Collect Amazon Security Lake Events"
      },
      {
        "type": "logs",
        "dataset": "amazon_security_lake.findings",
        "title": "Amazon Security Lake Findings Events"
      },
      {
        "type": "logs",
        "dataset": "amazon_security_lake.iam",
        "title": "Amazon Security Lake Identity and Access Management Events"
      },
      {
        "type": "logs",
        "dataset": "amazon_security_lake.network_activity",
        "title": "Amazon Security Lake Network Activity Events"
      },
      {
        "type": "logs",
        "dataset": "amazon_security_lake.system_activity",
        "title": "Amazon Security Lake System Activity Events"
      }
    ]
  },
  {
    "name": "ti_anomali",
    "title": "Anomali",
    "version": "1.19.2",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from Anomali with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_anomali/ti_anomali-1.19.2.zip",
    "path": "/package/ti_anomali/1.19.2",
    "icons": [
      {
        "src": "/img/anomali.svg",
        "path": "/package/ti_anomali/1.19.2/img/anomali.svg",
        "title": "Anomali",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_anomali",
        "title": "Anomali",
        "description": "Ingest threat intelligence indicators from Anomali with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_anomali/ti_anomali-1.19.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_anomali.threatstream",
        "title": "Anomali Threatstream"
      }
    ]
  },
  {
    "name": "apache",
    "title": "Apache HTTP Server",
    "version": "1.20.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs and metrics from Apache servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/apache/apache-1.20.0.zip",
    "path": "/package/apache/1.20.0",
    "icons": [
      {
        "src": "/img/logo_apache.svg",
        "path": "/package/apache/1.20.0/img/logo_apache.svg",
        "title": "Apache Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "apache",
        "title": "Apache logs and metrics",
        "description": "Collect logs and metrics from Apache instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability"
    ],
    "signature_path": "/epr/apache/apache-1.20.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "apache.access",
        "title": "Apache access logs"
      },
      {
        "type": "logs",
        "dataset": "apache.error",
        "title": "Apache error logs"
      },
      {
        "type": "metrics",
        "dataset": "apache.status",
        "title": "Apache status metrics"
      }
    ]
  },
  {
    "name": "apache_spark",
    "title": "Apache Spark",
    "version": "1.1.0",
    "release": "ga",
    "description": "Collect metrics from Apache Spark with Elastic Agent.",
    "type": "integration",
    "download": "/epr/apache_spark/apache_spark-1.1.0.zip",
    "path": "/package/apache_spark/1.1.0",
    "icons": [
      {
        "src": "/img/apache_spark-logo.svg",
        "path": "/package/apache_spark/1.1.0/img/apache_spark-logo.svg",
        "title": "Apache Spark logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "apache_spark",
        "title": "Apache Spark metrics",
        "description": "Collect Apache Spark metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "analytics_engine"
    ],
    "signature_path": "/epr/apache_spark/apache_spark-1.1.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "apache_spark.application",
        "title": "Apache Spark application metrics"
      },
      {
        "type": "metrics",
        "dataset": "apache_spark.driver",
        "title": "Apache Spark driver metrics"
      },
      {
        "type": "metrics",
        "dataset": "apache_spark.executor",
        "title": "Apache Spark executor metrics"
      },
      {
        "type": "metrics",
        "dataset": "apache_spark.node",
        "title": "Apache Spark node metrics"
      }
    ]
  },
  {
    "name": "apache_tomcat",
    "title": "Apache Tomcat",
    "version": "1.3.3",
    "release": "ga",
    "description": "Collect and parse logs and metrics from Apache Tomcat servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/apache_tomcat/apache_tomcat-1.3.3.zip",
    "path": "/package/apache_tomcat/1.3.3",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/apache_tomcat/1.3.3/img/logo.svg",
        "title": "Apache Tomcat logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Apache Tomcat",
        "title": "Apache Tomcat",
        "description": "Collect Apache Tomcat metrics and logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability"
    ],
    "signature_path": "/epr/apache_tomcat/apache_tomcat-1.3.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "apache_tomcat.access",
        "title": "Apache Tomcat Access logs"
      },
      {
        "type": "metrics",
        "dataset": "apache_tomcat.cache",
        "title": "Apache Tomcat Cache metrics"
      },
      {
        "type": "logs",
        "dataset": "apache_tomcat.catalina",
        "title": "Apache Tomcat Catalina logs"
      },
      {
        "type": "metrics",
        "dataset": "apache_tomcat.connection_pool",
        "title": "Apache Tomcat Connection Pool metrics"
      },
      {
        "type": "logs",
        "dataset": "apache_tomcat.localhost",
        "title": "Apache Tomcat Localhost logs"
      },
      {
        "type": "metrics",
        "dataset": "apache_tomcat.memory",
        "title": "Apache Tomcat Memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "apache_tomcat.request",
        "title": "Apache Tomcat Request metrics"
      },
      {
        "type": "metrics",
        "dataset": "apache_tomcat.session",
        "title": "Apache Tomcat Session metrics"
      },
      {
        "type": "metrics",
        "dataset": "apache_tomcat.thread_pool",
        "title": "Apache Tomcat Thread Pool metrics"
      }
    ]
  },
  {
    "name": "netscout",
    "title": "Arbor Peakflow SP Logs (Deprecated)",
    "version": "0.22.1",
    "release": "beta",
    "description": "Deprecated. Netscout Arbor Peakflow SP is no longer supported.",
    "type": "integration",
    "download": "/epr/netscout/netscout-0.22.1.zip",
    "path": "/package/netscout/0.22.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/netscout/0.22.1/img/logo.svg",
        "title": "Arbor Peakflow SP logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sightline",
        "title": "Arbor Peakflow SP",
        "description": "Collect Arbor Peakflow SP logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      }
    },
    "owner": {
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/netscout/netscout-0.22.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "netscout.sightline",
        "title": "Arbor Peakflow SP logs"
      }
    ]
  },
  {
    "name": "arista_ngfw",
    "title": "Arista NG Firewall",
    "version": "1.6.2",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs and metrics from Arista NG Firewall.",
    "type": "integration",
    "download": "/epr/arista_ngfw/arista_ngfw-1.6.2.zip",
    "path": "/package/arista_ngfw/1.6.2",
    "icons": [
      {
        "src": "/img/arista-logo.svg",
        "path": "/package/arista_ngfw/1.6.2/img/arista-logo.svg",
        "title": "Arista logo",
        "size": "400x76",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "log",
        "title": "Arista NG Firewall logs",
        "description": "Collect logs from Arista NG Firewall instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "network_security",
      "firewall_security",
      "ids_ips",
      "security"
    ],
    "signature_path": "/epr/arista_ngfw/arista_ngfw-1.6.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "arista_ngfw.log",
        "title": "Firewall Event"
      }
    ]
  },
  {
    "name": "atlassian_bitbucket",
    "title": "Atlassian Bitbucket",
    "version": "1.22.2",
    "release": "ga",
    "description": "Collect logs from Atlassian Bitbucket with Elastic Agent.",
    "type": "integration",
    "download": "/epr/atlassian_bitbucket/atlassian_bitbucket-1.22.2.zip",
    "path": "/package/atlassian_bitbucket/1.22.2",
    "icons": [
      {
        "src": "/img/bitbucket-logo.svg",
        "path": "/package/atlassian_bitbucket/1.22.2/img/bitbucket-logo.svg",
        "title": "Bitbucket Logo",
        "size": "625x564",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "audit",
        "title": "Audit Logs",
        "description": "Collect audit logs from Atlassian Bitbucket with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/atlassian_bitbucket/atlassian_bitbucket-1.22.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "atlassian_bitbucket.audit",
        "title": "Bitbucket Audit Logs"
      }
    ]
  },
  {
    "name": "atlassian_confluence",
    "title": "Atlassian Confluence",
    "version": "1.23.2",
    "release": "ga",
    "description": "Collect logs from Atlassian Confluence with Elastic Agent.",
    "type": "integration",
    "download": "/epr/atlassian_confluence/atlassian_confluence-1.23.2.zip",
    "path": "/package/atlassian_confluence/1.23.2",
    "icons": [
      {
        "src": "/img/confluence-logo.svg",
        "path": "/package/atlassian_confluence/1.23.2/img/confluence-logo.svg",
        "title": "Confluence Logo",
        "size": "400x400",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "audit",
        "title": "Audit Logs",
        "description": "Collect audit logs from Atlassian Confluence with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/atlassian_confluence/atlassian_confluence-1.23.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "atlassian_confluence.audit",
        "title": "Confluence Audit Logs"
      }
    ]
  },
  {
    "name": "atlassian_jira",
    "title": "Atlassian Jira",
    "version": "1.23.2",
    "release": "ga",
    "description": "Collect logs from Atlassian Jira with Elastic Agent.",
    "type": "integration",
    "download": "/epr/atlassian_jira/atlassian_jira-1.23.2.zip",
    "path": "/package/atlassian_jira/1.23.2",
    "icons": [
      {
        "src": "/img/jira-software-logo.svg",
        "path": "/package/atlassian_jira/1.23.2/img/jira-software-logo.svg",
        "title": "Jira Software Logo",
        "size": "590x625",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "audit",
        "title": "Audit Logs",
        "description": "Collect audit logs from Atlassian Jira with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/atlassian_jira/atlassian_jira-1.23.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "atlassian_jira.audit",
        "title": "Jira Audit Logs"
      }
    ]
  },
  {
    "name": "auditd",
    "title": "Auditd Logs",
    "version": "3.22.2",
    "release": "ga",
    "description": "Collect logs from Linux audit daemon with Elastic Agent.",
    "type": "integration",
    "download": "/epr/auditd/auditd-3.22.2.zip",
    "path": "/package/auditd/3.22.2",
    "icons": [
      {
        "src": "/img/linux.svg",
        "path": "/package/auditd/3.22.2/img/linux.svg",
        "title": "linux",
        "size": "299x354",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "auditd",
        "title": "Auditd logs",
        "description": "Collect logs from Auditd instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "security",
      "auditd"
    ],
    "signature_path": "/epr/auditd/auditd-3.22.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "auditd.log",
        "title": "Auditd logs"
      }
    ]
  },
  {
    "name": "auditd_manager",
    "title": "Auditd Manager",
    "version": "1.16.4",
    "release": "ga",
    "description": "The Auditd Manager Integration receives audit events from the Linux Audit Framework that is a part of the Linux kernel.",
    "type": "integration",
    "download": "/epr/auditd_manager/auditd_manager-1.16.4.zip",
    "path": "/package/auditd_manager/1.16.4",
    "icons": [
      {
        "src": "/img/linux.svg",
        "path": "/package/auditd_manager/1.16.4/img/linux.svg",
        "title": "linux",
        "size": "299x354",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "auditd",
        "title": "Auditd",
        "description": "Collect auditd events"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "security",
      "auditd"
    ],
    "signature_path": "/epr/auditd_manager/auditd_manager-1.16.4.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "auditd_manager.auditd",
        "title": "Auditd Manager"
      }
    ]
  },
  {
    "name": "auth0",
    "title": "Auth0",
    "version": "1.14.2",
    "release": "ga",
    "description": "Collect logs from Auth0 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/auth0/auth0-1.14.2.zip",
    "path": "/package/auth0/1.14.2",
    "icons": [
      {
        "src": "/img/auth0-logo.svg",
        "path": "/package/auth0/1.14.2/img/auth0-logo.svg",
        "title": "Auth0 logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "auth0_events",
        "title": "Auth0 log stream events via Webhooks",
        "description": "Collect Auth0 log streams events via Webhooks."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/auth0/auth0-1.14.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "auth0.logs",
        "title": "Auth0 logs via Webhooks"
      }
    ]
  },
  {
    "name": "azure_app_service",
    "title": "Azure App Service",
    "version": "0.2.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs and metrics from Azure App Service with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_app_service/azure_app_service-0.2.1.zip",
    "path": "/package/azure_app_service/0.2.1",
    "icons": [
      {
        "src": "/img/app-service-logo.svg",
        "path": "/package/azure_app_service/0.2.1/img/app-service-logo.svg",
        "title": "App Service Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "app_service_logs",
        "title": "Azure App Service logs",
        "description": "Azure App Service logs integration",
        "data_streams": [
          "app_service_logs"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "cloud"
    ],
    "signature_path": "/epr/azure_app_service/azure_app_service-0.2.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_app_service.app_service_logs",
        "title": "Collect App Service logs from Azure"
      }
    ]
  },
  {
    "name": "azure_application_insights",
    "title": "Azure Application Insights Metrics Overview",
    "version": "1.2.3",
    "release": "ga",
    "description": "Collect application insights metrics from Azure Monitor with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_application_insights/azure_application_insights-1.2.3.zip",
    "path": "/package/azure_application_insights/1.2.3",
    "icons": [
      {
        "src": "/img/app_insights.png",
        "path": "/package/azure_application_insights/1.2.3/img/app_insights.png",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "app_insights",
        "title": "Azure Application Insights Metrics",
        "description": "Collect application insights metrics from Azure Monitor with Elastic Agent.",
        "icons": [
          {
            "src": "/img//app_insights.png",
            "path": "/package/azure_application_insights/1.2.3/img/app_insights.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "app_insights"
        ]
      },
      {
        "name": "app_state",
        "title": "Azure Application State Insights Metrics",
        "description": "Collect application state related metrics from Azure Monitor with Elastic Agent.",
        "icons": [
          {
            "src": "/img/application_insights_blue.png",
            "path": "/package/azure_application_insights/1.2.3/img/application_insights_blue.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "app_state"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-cloud-monitoring"
    },
    "categories": [
      "azure",
      "observability"
    ],
    "signature_path": "/epr/azure_application_insights/azure_application_insights-1.2.3.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "azure.app_insights",
        "title": "Azure Application Insights"
      },
      {
        "type": "metrics",
        "dataset": "azure.app_state",
        "title": "Azure Application State"
      }
    ]
  },
  {
    "name": "azure_billing",
    "title": "Azure Billing Metrics",
    "version": "1.4.2",
    "release": "ga",
    "description": "Collect billing metrics with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_billing/azure_billing-1.4.2.zip",
    "path": "/package/azure_billing/1.4.2",
    "icons": [
      {
        "src": "/img/billing.png",
        "path": "/package/azure_billing/1.4.2/img/billing.png",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "billing",
        "title": "Azure Billing Metrics",
        "description": "Collect billing information with Elastic Agent.",
        "icons": [
          {
            "src": "/img//billing.png",
            "path": "/package/azure_billing/1.4.2/img/billing.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "billing"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "azure"
    ],
    "signature_path": "/epr/azure_billing/azure_billing-1.4.2.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "azure.billing",
        "title": "Azure Billing Metrics"
      }
    ]
  },
  {
    "name": "azure_frontdoor",
    "title": "Azure Frontdoor",
    "version": "1.6.1",
    "release": "ga",
    "description": "This Elastic integration collects logs from Azure Frontdoor.",
    "type": "integration",
    "download": "/epr/azure_frontdoor/azure_frontdoor-1.6.1.zip",
    "path": "/package/azure_frontdoor/1.6.1",
    "icons": [
      {
        "src": "/img/front-door.svg",
        "path": "/package/azure_frontdoor/1.6.1/img/front-door.svg",
        "title": "Frontdoor logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure_frontdoor",
        "title": "Azure Frontdoor logs",
        "description": "Collect sample logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.6.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "azure",
      "network",
      "security",
      "web"
    ],
    "signature_path": "/epr/azure_frontdoor/azure_frontdoor-1.6.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_frontdoor.access",
        "title": "FrontDoor Access"
      },
      {
        "type": "logs",
        "dataset": "azure_frontdoor.waf",
        "title": "FrontDoor WAF"
      }
    ]
  },
  {
    "name": "azure_functions",
    "title": "Azure Functions",
    "version": "0.3.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Get metrics and logs from Azure Functions",
    "type": "integration",
    "download": "/epr/azure_functions/azure_functions-0.3.1.zip",
    "path": "/package/azure_functions/0.3.1",
    "icons": [
      {
        "src": "/img/azure-functions-icon.svg",
        "path": "/package/azure_functions/0.3.1/img/azure-functions-icon.svg",
        "title": "Azure Functions logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure_functions",
        "title": "Azure Functions logs and metrics",
        "description": "Azure Functions logs and metrics with Elastic Agent.",
        "categories": [
          "azure",
          "cloud"
        ],
        "data_streams": [
          "functionapplogs",
          "metrics"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "cloud"
    ],
    "signature_path": "/epr/azure_functions/azure_functions-0.3.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_functions.functionapplogs",
        "title": "Collect Azure Functions logs"
      },
      {
        "type": "metrics",
        "dataset": "azure.function",
        "title": "Azure Functions App Metrics"
      }
    ]
  },
  {
    "name": "azure",
    "title": "Azure Logs",
    "version": "1.8.3",
    "release": "ga",
    "description": "This Elastic integration collects logs from Azure",
    "type": "integration",
    "download": "/epr/azure/azure-1.8.3.zip",
    "path": "/package/azure/1.8.3",
    "icons": [
      {
        "src": "/img/azure_logs_logo.png",
        "path": "/package/azure/1.8.3/img/azure_logs_logo.png",
        "title": "logo azure",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "eventhub",
        "title": "Azure Event Hub Input",
        "description": "Azure Event Hub input integration",
        "icons": [
          {
            "src": "/img/eventhub.png",
            "path": "/package/azure/1.8.3/img/eventhub.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "stream_processing"
        ],
        "data_streams": [
          "eventhub"
        ]
      },
      {
        "name": "adlogs",
        "title": "Azure Active Directory",
        "description": "Azure Directory logs integration",
        "icons": [
          {
            "src": "/img/active_directory_logo.png",
            "path": "/package/azure/1.8.3/img/active_directory_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "auditlogs",
          "signinlogs",
          "identity_protection",
          "provisioning"
        ]
      },
      {
        "name": "platformlogs",
        "title": "Azure platform logs",
        "description": "Azure platform logs integration",
        "icons": [
          {
            "src": "/img/platformlogs_logo.png",
            "path": "/package/azure/1.8.3/img/platformlogs_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "platformlogs"
        ]
      },
      {
        "name": "activitylogs",
        "title": "Azure Activity Logs",
        "description": "Azure Activity Logs integration",
        "icons": [
          {
            "src": "/img/platformlogs_logo.png",
            "path": "/package/azure/1.8.3/img/platformlogs_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "activitylogs"
        ]
      },
      {
        "name": "springcloudlogs",
        "title": "Azure Spring Apps logs",
        "description": "Azure Spring Apps logs integration",
        "icons": [
          {
            "src": "/img/spring_logs.svg",
            "path": "/package/azure/1.8.3/img/spring_logs.svg",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "springcloudlogs"
        ]
      },
      {
        "name": "firewall_logs",
        "title": "Azure Firewall logs",
        "description": "Azure firewall logs integration",
        "icons": [
          {
            "src": "/img/firewall_logo.svg",
            "path": "/package/azure/1.8.3/img/firewall_logo.svg",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "firewall_security"
        ],
        "data_streams": [
          "firewall_logs"
        ]
      },
      {
        "name": "application_gateway",
        "title": "Azure Application Gateway",
        "description": "Collect Azure Application Gateway logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/application_gateway_logo.svg",
            "path": "/package/azure/1.8.3/img/application_gateway_logo.svg",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "application_gateway"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "azure",
      "observability"
    ],
    "signature_path": "/epr/azure/azure-1.8.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure.activitylogs",
        "title": "Azure Activity Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.application_gateway",
        "title": "Azure Application Gateway logs"
      },
      {
        "type": "logs",
        "dataset": "azure.auditlogs",
        "title": "Azure Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.eventhub",
        "title": "Azure Event Hub Input"
      },
      {
        "type": "logs",
        "dataset": "azure.firewall_logs",
        "title": "Collect Network rule logs from Azure Firewall"
      },
      {
        "type": "logs",
        "dataset": "azure.identity_protection",
        "title": "Azure AD Identity Protection Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.platformlogs",
        "title": "Azure Platform Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.provisioning",
        "title": "Azure AD Provisioning Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.signinlogs",
        "title": "Azure Signin Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.springcloudlogs",
        "title": "Azure Spring Apps Logs"
      }
    ]
  },
  {
    "name": "azure_metrics",
    "title": "Azure Resource Metrics",
    "version": "1.3.0",
    "release": "ga",
    "description": "Collect metrics from Azure resources with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_metrics/azure_metrics-1.3.0.zip",
    "path": "/package/azure_metrics/1.3.0",
    "icons": [
      {
        "src": "/img/azure_metrics_logo.png",
        "path": "/package/azure_metrics/1.3.0/img/azure_metrics_logo.png",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "monitor",
        "title": "Azure Monitor Metrics",
        "description": "Collect metrics from Azure Monitor with Elastic Agent.",
        "icons": [
          {
            "src": "/img/monitor_logo.png",
            "path": "/package/azure_metrics/1.3.0/img/monitor_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "monitor"
        ]
      },
      {
        "name": "compute_vm",
        "title": "Azure Virtual Machines Metrics",
        "description": "Collect metrics from Azure Virtual Machines with Elastic Agent.",
        "icons": [
          {
            "src": "/img/compute_vm_logo.png",
            "path": "/package/azure_metrics/1.3.0/img/compute_vm_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "compute_vm"
        ]
      },
      {
        "name": "compute_vm_scaleset",
        "title": "Azure Virtual Machines Scaleset Metrics",
        "description": "Collect metrics from Azure Virtual Machine Scalesets with Elastic Agent.",
        "icons": [
          {
            "src": "/img/compute_vm_scaleset_logo.png",
            "path": "/package/azure_metrics/1.3.0/img/compute_vm_scaleset_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "compute_vm_scaleset"
        ]
      },
      {
        "name": "container_registry",
        "title": "Azure Container Registry Metrics",
        "description": "Collect metrics from Azure Container Registry with Elastic Agent.",
        "icons": [
          {
            "src": "/img/container_registry_logo.png",
            "path": "/package/azure_metrics/1.3.0/img/container_registry_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "containers"
        ],
        "data_streams": [
          "container_registry"
        ]
      },
      {
        "name": "container_instance",
        "title": "Azure Container Instance Metrics",
        "description": "Collect metrics from Azure Container Instances with Elastic Agent.",
        "icons": [
          {
            "src": "/img/container_instance_logo.png",
            "path": "/package/azure_metrics/1.3.0/img/container_instance_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "containers"
        ],
        "data_streams": [
          "container_instance"
        ]
      },
      {
        "name": "container_service",
        "title": "Azure Container Service Metrics",
        "description": "Collect metrics from Azure Container Service with Elastic Agent.",
        "icons": [
          {
            "src": "/img/container_service_logo.png",
            "path": "/package/azure_metrics/1.3.0/img/container_service_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "containers"
        ],
        "data_streams": [
          "container_service"
        ]
      },
      {
        "name": "database_account",
        "title": "Azure Database Account Metrics",
        "description": "Collect metrics from Azure Database accounts with Elastic Agent.",
        "icons": [
          {
            "src": "/img/database_account_logo.png",
            "path": "/package/azure_metrics/1.3.0/img/database_account_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "datastore"
        ],
        "data_streams": [
          "database_account"
        ]
      },
      {
        "name": "storage_account",
        "title": "Azure Storage Account Metrics",
        "description": "Collect metrics from Azure Storage accounts with Elastic Agent.",
        "icons": [
          {
            "src": "/img/storage_account_logo.png",
            "path": "/package/azure_metrics/1.3.0/img/storage_account_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "storage_account"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2"
      }
    },
    "owner": {
      "github": "elastic/obs-cloud-monitoring"
    },
    "categories": [
      "observability",
      "azure"
    ],
    "signature_path": "/epr/azure_metrics/azure_metrics-1.3.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "azure.compute_vm",
        "title": "Compute VM"
      },
      {
        "type": "metrics",
        "dataset": "azure.compute_vm_scaleset",
        "title": "Compute VM Scaleset"
      },
      {
        "type": "metrics",
        "dataset": "azure.container_instance",
        "title": "Container Instance"
      },
      {
        "type": "metrics",
        "dataset": "azure.container_registry",
        "title": "Container Registry"
      },
      {
        "type": "metrics",
        "dataset": "azure.container_service",
        "title": "Container Service"
      },
      {
        "type": "metrics",
        "dataset": "azure.database_account",
        "title": "Database Account"
      },
      {
        "type": "metrics",
        "dataset": "azure.monitor",
        "title": "Monitor"
      },
      {
        "type": "metrics",
        "dataset": "azure.storage_account",
        "title": "Storage Account"
      }
    ]
  },
  {
    "name": "barracuda_cloudgen_firewall",
    "title": "Barracuda CloudGen Firewall Logs",
    "version": "1.11.0",
    "release": "ga",
    "description": "Collect logs from Barracuda CloudGen Firewall devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/barracuda_cloudgen_firewall/barracuda_cloudgen_firewall-1.11.0.zip",
    "path": "/package/barracuda_cloudgen_firewall/1.11.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/barracuda_cloudgen_firewall/1.11.0/img/logo.svg",
        "title": "Barracuda logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "barracuda_cloudgen_firewall",
        "title": "Barracuda CloudGen Firewall Logs",
        "description": "Receive firewall activity, threat logs, and information related to network, version, and location of managed firewall units."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.5.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security",
      "firewall_security"
    ],
    "signature_path": "/epr/barracuda_cloudgen_firewall/barracuda_cloudgen_firewall-1.11.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "barracuda_cloudgen_firewall.log",
        "title": "Barracuda CloudGen Firewall Logs"
      }
    ]
  },
  {
    "name": "barracuda",
    "title": "Barracuda Web Application Firewall",
    "version": "1.13.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Barracuda Web Application Firewall with Elastic Agent.",
    "type": "integration",
    "download": "/epr/barracuda/barracuda-1.13.0.zip",
    "path": "/package/barracuda/1.13.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/barracuda/1.13.0/img/logo.svg",
        "title": "Barracuda logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "barracuda",
        "title": "Barracuda Web Application Firewall logs",
        "description": "Collect logs from Barracuda Web Application Firewall instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.4.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security",
      "web_application_firewall"
    ],
    "signature_path": "/epr/barracuda/barracuda-1.13.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "barracuda.waf",
        "title": "Barracuda WAF Logs"
      }
    ]
  },
  {
    "name": "beat",
    "title": "Beat",
    "version": "1.0.1",
    "release": "ga",
    "description": "Beat Integration",
    "type": "integration",
    "download": "/epr/beat/beat-1.0.1.zip",
    "path": "/package/beat/1.0.1",
    "icons": [
      {
        "src": "/img/logo_beat.svg",
        "path": "/package/beat/1.0.1/img/logo_beat.svg",
        "title": "logo beat",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/stack-monitoring"
    },
    "signature_path": "/epr/beat/beat-1.0.1.zip.sig"
  },
  {
    "name": "bitdefender",
    "title": "BitDefender",
    "version": "1.11.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Ingest BitDefender GravityZone logs and data",
    "type": "integration",
    "download": "/epr/bitdefender/bitdefender-1.11.0.zip",
    "path": "/package/bitdefender/1.11.0",
    "icons": [
      {
        "src": "/img/bitdefender_gravityzone.svg",
        "path": "/package/bitdefender/1.11.0/img/bitdefender_gravityzone.svg",
        "title": "BitDefender GravityZone",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "bitdefender_gravityzone",
        "title": "BitDefender GravityZone",
        "description": "Collect push notification events and related data from BitDefender GravityZone"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.5.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/bitdefender/bitdefender-1.11.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "bitdefender.push_configuration",
        "title": "BitDefender GravityZone Push Notification Configuration"
      },
      {
        "type": "logs",
        "dataset": "bitdefender.push_notifications",
        "title": "BitDefender GravityZone Push Notifications"
      },
      {
        "type": "logs",
        "dataset": "bitdefender.push_statistics",
        "title": "BitDefender GravityZone Push Notification Statistics"
      }
    ]
  },
  {
    "name": "bitwarden",
    "title": "Bitwarden",
    "version": "1.10.2",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Bitwarden with Elastic Agent.",
    "type": "integration",
    "download": "/epr/bitwarden/bitwarden-1.10.2.zip",
    "path": "/package/bitwarden/1.10.2",
    "icons": [
      {
        "src": "/img/bitwarden-logo.svg",
        "path": "/package/bitwarden/1.10.2/img/bitwarden-logo.svg",
        "title": "Bitwarden logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "bitwarden",
        "title": "Bitwarden logs",
        "description": "Collect Bitwarden logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.4.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "credential_management"
    ],
    "signature_path": "/epr/bitwarden/bitwarden-1.10.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "bitwarden.collection",
        "title": "Collect Collection logs from Bitwarden"
      },
      {
        "type": "logs",
        "dataset": "bitwarden.event",
        "title": "Collect Event logs from Bitwarden"
      },
      {
        "type": "logs",
        "dataset": "bitwarden.group",
        "title": "Collect Group logs from Bitwarden"
      },
      {
        "type": "logs",
        "dataset": "bitwarden.member",
        "title": "Collect Member logs from Bitwarden"
      },
      {
        "type": "logs",
        "dataset": "bitwarden.policy",
        "title": "Collect Policy logs from Bitwarden"
      }
    ]
  },
  {
    "name": "bluecoat",
    "title": "Blue Coat Director Logs (Deprecated)",
    "version": "0.18.1",
    "release": "beta",
    "description": "Deprecated. Director is no longer supported.",
    "type": "integration",
    "download": "/epr/bluecoat/bluecoat-0.18.1.zip",
    "path": "/package/bluecoat/0.18.1",
    "policy_templates": [
      {
        "name": "director",
        "title": "Blue Coat Director",
        "description": "Collect Blue Coat Director logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.14.1 || ^8.8.0"
      }
    },
    "owner": {
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "proxy_security"
    ],
    "signature_path": "/epr/bluecoat/bluecoat-0.18.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "bluecoat.director",
        "title": "Blue Coat Director logs"
      }
    ]
  },
  {
    "name": "box_events",
    "title": "Box Events",
    "version": "2.5.1",
    "release": "ga",
    "description": "Collect logs from Box with Elastic Agent",
    "type": "integration",
    "download": "/epr/box_events/box_events-2.5.1.zip",
    "path": "/package/box_events/2.5.1",
    "icons": [
      {
        "src": "/img/box.svg",
        "path": "/package/box_events/2.5.1/img/box.svg",
        "title": "Box Blue Logo",
        "size": "60x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "box_events",
        "title": "Box Events",
        "description": "Collect Events from BOX"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/box_events/box_events-2.5.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "box_events.events",
        "title": "List user and enterprise events"
      }
    ]
  },
  {
    "name": "hid_bravura_monitor",
    "title": "Bravura Monitor",
    "version": "1.21.0",
    "release": "ga",
    "description": "Collect logs from Bravura Security Fabric with Elastic Agent.",
    "type": "integration",
    "download": "/epr/hid_bravura_monitor/hid_bravura_monitor-1.21.0.zip",
    "path": "/package/hid_bravura_monitor/1.21.0",
    "icons": [
      {
        "src": "/img/logo_hid_bravura_monitor.svg",
        "path": "/package/hid_bravura_monitor/1.21.0/img/logo_hid_bravura_monitor.svg",
        "title": "logo Bravura Monitor",
        "size": "50x50",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "hid_bravura_monitor",
        "title": "Bravura Monitor logs",
        "description": "Collect logs from Bravura Security Fabric instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/hid_bravura_monitor/hid_bravura_monitor-1.21.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "hid_bravura_monitor.log",
        "title": "Bravura Monitor"
      },
      {
        "type": "logs",
        "dataset": "hid_bravura_monitor.winlog",
        "title": "Bravura Security Fabric logs"
      }
    ]
  },
  {
    "name": "cassandra",
    "title": "Cassandra",
    "version": "1.11.1",
    "release": "ga",
    "description": "This Elastic integration collects logs and metrics from cassandra.",
    "type": "integration",
    "download": "/epr/cassandra/cassandra-1.11.1.zip",
    "path": "/package/cassandra/1.11.1",
    "icons": [
      {
        "src": "/img/cassandra.svg",
        "path": "/package/cassandra/1.11.1/img/cassandra.svg",
        "title": "cassandra",
        "size": "279x187",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cassandra",
        "title": "Cassandra logs and metrics",
        "description": "Collect logs and metrics from Cassandra"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/cassandra/cassandra-1.11.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cassandra.log",
        "title": "Cassandra System Logs"
      },
      {
        "type": "metrics",
        "dataset": "cassandra.metrics",
        "title": "Metrics"
      }
    ]
  },
  {
    "name": "ceph",
    "title": "Ceph",
    "version": "1.3.1",
    "release": "ga",
    "description": "This Elastic integration collects metrics from Ceph instance.",
    "type": "integration",
    "download": "/epr/ceph/ceph-1.3.1.zip",
    "path": "/package/ceph/1.3.1",
    "icons": [
      {
        "src": "/img/ceph-logo.svg",
        "path": "/package/ceph/1.3.1/img/ceph-logo.svg",
        "title": "Ceph logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Ceph",
        "title": "Ceph metrics",
        "description": "Collect Ceph metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "os_system"
    ],
    "signature_path": "/epr/ceph/ceph-1.3.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ceph.cluster_disk",
        "title": "Cluster Disk metrics"
      },
      {
        "type": "logs",
        "dataset": "ceph.cluster_health",
        "title": "Cluster Health metrics"
      },
      {
        "type": "logs",
        "dataset": "ceph.cluster_status",
        "title": "Cluster Status metrics"
      },
      {
        "type": "logs",
        "dataset": "ceph.osd_performance",
        "title": "OSD Performance metrics"
      },
      {
        "type": "logs",
        "dataset": "ceph.osd_pool_stats",
        "title": "OSD Pool Stats"
      },
      {
        "type": "logs",
        "dataset": "ceph.osd_tree",
        "title": "OSD Tree metrics"
      },
      {
        "type": "logs",
        "dataset": "ceph.pool_disk",
        "title": "Pool Disk metrics"
      }
    ]
  },
  {
    "name": "checkpoint",
    "title": "Check Point",
    "version": "1.45.5",
    "release": "ga",
    "description": "Collect logs from Check Point with Elastic Agent.",
    "type": "integration",
    "download": "/epr/checkpoint/checkpoint-1.45.5.zip",
    "path": "/package/checkpoint/1.45.5",
    "icons": [
      {
        "src": "/img/checkpoint-logo.svg",
        "path": "/package/checkpoint/1.45.5/img/checkpoint-logo.svg",
        "title": "Check Point",
        "size": "761x341",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "checkpoint",
        "title": "Check Point logs",
        "description": "Collect logs from Check Point instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "firewall_security"
    ],
    "signature_path": "/epr/checkpoint/checkpoint-1.45.5.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "checkpoint.firewall",
        "title": "Check Point firewall logs"
      }
    ]
  },
  {
    "name": "cisco_asa",
    "title": "Cisco ASA",
    "version": "2.45.0",
    "release": "ga",
    "description": "Collect logs from Cisco ASA with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_asa/cisco_asa-2.45.0.zip",
    "path": "/package/cisco_asa/2.45.0",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_asa/2.45.0/img/cisco.svg",
        "title": "cisco",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_asa",
        "title": "Cisco ASA logs",
        "description": "Collect logs from Cisco ASA instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "firewall_security"
    ],
    "signature_path": "/epr/cisco_asa/cisco_asa-2.45.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_asa.log",
        "title": "Cisco ASA logs"
      }
    ]
  },
  {
    "name": "cisco_aironet",
    "title": "Cisco Aironet",
    "version": "1.20.0",
    "release": "ga",
    "description": "Integration for Cisco Aironet WLC Logs",
    "type": "integration",
    "download": "/epr/cisco_aironet/cisco_aironet-1.20.0.zip",
    "path": "/package/cisco_aironet/1.20.0",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_aironet/1.20.0/img/cisco.svg",
        "title": "Cisco",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_aironet",
        "title": "Cisco Aironet logs",
        "description": "Collect logs from Cisco Aironet instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/cisco_aironet/cisco_aironet-1.20.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_aironet.log",
        "title": "Cisco Aironet logs"
      }
    ]
  },
  {
    "name": "cisco_duo",
    "title": "Cisco Duo",
    "version": "1.21.1",
    "release": "ga",
    "description": "Collect logs from Cisco Duo with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_duo/cisco_duo-1.21.1.zip",
    "path": "/package/cisco_duo/1.21.1",
    "icons": [
      {
        "src": "/img/cisco_duo-logo.svg",
        "path": "/package/cisco_duo/1.21.1/img/cisco_duo-logo.svg",
        "title": "Cisco Duo logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_duo",
        "title": "Cisco Duo logs",
        "description": "Collect Cisco Duo logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/cisco_duo/cisco_duo-1.21.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_duo.admin",
        "title": "Cisco Duo administrator logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.auth",
        "title": "Cisco Duo authentication logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.offline_enrollment",
        "title": "Cisco Duo offline enrollment logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.summary",
        "title": "Cisco Duo summary logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.telephony",
        "title": "Cisco Duo telephony logs"
      }
    ]
  },
  {
    "name": "cisco_ftd",
    "title": "Cisco FTD",
    "version": "3.13.3",
    "release": "ga",
    "description": "Collect logs from Cisco FTD with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_ftd/cisco_ftd-3.13.3.zip",
    "path": "/package/cisco_ftd/3.13.3",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_ftd/3.13.3/img/cisco.svg",
        "title": "cisco",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_ftd",
        "title": "Cisco FTD logs",
        "description": "Collect logs from Cisco FTD instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "firewall_security"
    ],
    "signature_path": "/epr/cisco_ftd/cisco_ftd-3.13.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_ftd.log",
        "title": "Cisco FTD logs"
      }
    ]
  },
  {
    "name": "cisco_ios",
    "title": "Cisco IOS",
    "version": "1.35.3",
    "release": "ga",
    "description": "Collect logs from Cisco IOS with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_ios/cisco_ios-1.35.3.zip",
    "path": "/package/cisco_ios/1.35.3",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_ios/1.35.3/img/cisco.svg",
        "title": "cisco",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_ios",
        "title": "Cisco IOS logs",
        "description": "Collect logs from Cisco IOS instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/cisco_ios/cisco_ios-1.35.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_ios.log",
        "title": "Cisco IOS logs"
      }
    ]
  },
  {
    "name": "cisco_ise",
    "title": "Cisco ISE",
    "version": "1.32.3",
    "release": "ga",
    "description": "Collect logs from Cisco ISE with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_ise/cisco_ise-1.32.3.zip",
    "path": "/package/cisco_ise/1.32.3",
    "icons": [
      {
        "src": "/img/cisco-ise-logo.svg",
        "path": "/package/cisco_ise/1.32.3/img/cisco-ise-logo.svg",
        "title": "Cisco ISE logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Cisco ISE",
        "title": "Cisco_ISE logs",
        "description": "Collect Cisco ISE logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "iam"
    ],
    "signature_path": "/epr/cisco_ise/cisco_ise-1.32.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_ise.log",
        "title": "Cisco ISE logs"
      }
    ]
  },
  {
    "name": "cisco_meraki",
    "title": "Cisco Meraki",
    "version": "1.20.3",
    "release": "ga",
    "description": "Collect logs from Cisco Meraki with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_meraki/cisco_meraki-1.20.3.zip",
    "path": "/package/cisco_meraki/1.20.3",
    "icons": [
      {
        "src": "/img/cisco-logo.svg",
        "path": "/package/cisco_meraki/1.20.3/img/cisco-logo.svg",
        "title": "Cisco logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_meraki",
        "title": "Cisco Meraki logs or events",
        "description": "Collect logs or events from Cisco Meraki"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.17.0 || ^8.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/cisco_meraki/cisco_meraki-1.20.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_meraki.events",
        "title": "Cisco Meraki webhook events"
      },
      {
        "type": "logs",
        "dataset": "cisco_meraki.log",
        "title": "Cisco Meraki logs (via Syslog)"
      }
    ]
  },
  {
    "name": "cisco_nexus",
    "title": "Cisco Nexus",
    "version": "1.6.0",
    "release": "ga",
    "description": "Collect logs from Cisco Nexus with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_nexus/cisco_nexus-1.6.0.zip",
    "path": "/package/cisco_nexus/1.6.0",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_nexus/1.6.0/img/cisco.svg",
        "title": "cisco",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_nexus",
        "title": "Cisco Nexus logs",
        "description": "Collect logs from Cisco Nexus instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/cisco_nexus/cisco_nexus-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_nexus.log",
        "title": "Collect logs from Cisco Nexus"
      }
    ]
  },
  {
    "name": "cisco_secure_email_gateway",
    "title": "Cisco Secure Email Gateway",
    "version": "1.29.1",
    "release": "ga",
    "description": "Collect logs from Cisco Secure Email Gateway with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_secure_email_gateway/cisco_secure_email_gateway-1.29.1.zip",
    "path": "/package/cisco_secure_email_gateway/1.29.1",
    "icons": [
      {
        "src": "/img/cisco-logo.svg",
        "path": "/package/cisco_secure_email_gateway/1.29.1/img/cisco-logo.svg",
        "title": "Cisco logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Cisco Secure Email Gateway",
        "title": "Cisco Secure Email Gateway logs",
        "description": "Collect Cisco Secure Email Gateway logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "email_security"
    ],
    "signature_path": "/epr/cisco_secure_email_gateway/cisco_secure_email_gateway-1.29.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_secure_email_gateway.log",
        "title": "Cisco Secure Email Gateway logs"
      }
    ]
  },
  {
    "name": "cisco_secure_endpoint",
    "title": "Cisco Secure Endpoint",
    "version": "2.24.2",
    "release": "ga",
    "description": "Collect logs from Cisco Secure Endpoint (AMP) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_secure_endpoint/cisco_secure_endpoint-2.24.2.zip",
    "path": "/package/cisco_secure_endpoint/2.24.2",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_secure_endpoint/2.24.2/img/cisco.svg",
        "title": "cisco",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_secure_endpoint",
        "title": "Cisco Secure Endpoint logs",
        "description": "Collect logs from Cisco Secure Endpoint"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/cisco_secure_endpoint/cisco_secure_endpoint-2.24.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_secure_endpoint.event",
        "title": "Cisco Secure Endpoint logs"
      }
    ]
  },
  {
    "name": "cisco_umbrella",
    "title": "Cisco Umbrella",
    "version": "1.21.2",
    "release": "ga",
    "description": "Collect logs from Cisco Umbrella with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_umbrella/cisco_umbrella-1.21.2.zip",
    "path": "/package/cisco_umbrella/1.21.2",
    "icons": [
      {
        "src": "/img/cisco.svg",
        "path": "/package/cisco_umbrella/1.21.2/img/cisco.svg",
        "title": "cisco",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_umbrella",
        "title": "Cisco Umbrella logs",
        "description": "Collect logs from Cisco Umbrella instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.4.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security",
      "dns_security"
    ],
    "signature_path": "/epr/cisco_umbrella/cisco_umbrella-1.21.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_umbrella.log",
        "title": "Cisco Umbrella logs"
      }
    ]
  },
  {
    "name": "citrix_adc",
    "title": "Citrix ADC",
    "version": "1.3.1",
    "release": "ga",
    "description": "This Elastic integration collects metrics from Citrix ADC product.",
    "type": "integration",
    "download": "/epr/citrix_adc/citrix_adc-1.3.1.zip",
    "path": "/package/citrix_adc/1.3.1",
    "icons": [
      {
        "src": "/img/citrix_adc-logo.svg",
        "path": "/package/citrix_adc/1.3.1/img/citrix_adc-logo.svg",
        "title": "Citrix ADC logo",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Citrix ADC",
        "title": "Citrix ADC metrics",
        "description": "Collect Citrix ADC metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "network"
    ],
    "signature_path": "/epr/citrix_adc/citrix_adc-1.3.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "citrix_adc.interface",
        "title": "Interface metrics"
      },
      {
        "type": "logs",
        "dataset": "citrix_adc.lbvserver",
        "title": "Load Balancing Virtual Server metrics"
      },
      {
        "type": "logs",
        "dataset": "citrix_adc.service",
        "title": "Citrix ADC Service metrics"
      },
      {
        "type": "logs",
        "dataset": "citrix_adc.system",
        "title": "System metrics"
      },
      {
        "type": "logs",
        "dataset": "citrix_adc.vpn",
        "title": "VPN metrics"
      }
    ]
  },
  {
    "name": "citrix_waf",
    "title": "Citrix Web App Firewall",
    "version": "1.20.0",
    "release": "ga",
    "description": "Ingest events from Citrix Systems Web App Firewall.",
    "type": "integration",
    "download": "/epr/citrix_waf/citrix_waf-1.20.0.zip",
    "path": "/package/citrix_waf/1.20.0",
    "icons": [
      {
        "src": "/img/Citrix_Systems_logo.svg",
        "path": "/package/citrix_waf/1.20.0/img/Citrix_Systems_logo.svg",
        "title": "Citrix Systems",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "citrix_waf",
        "title": "Citrix Web App Firewall logs",
        "description": "Collect logs from Citrix Web App Firewall instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "web_application_firewall"
    ],
    "signature_path": "/epr/citrix_waf/citrix_waf-1.20.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "citrix_waf.log",
        "title": "Citrix WAF logs"
      }
    ]
  },
  {
    "name": "cloudflare",
    "title": "Cloudflare",
    "version": "2.23.1",
    "release": "ga",
    "description": "Collect logs from Cloudflare with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cloudflare/cloudflare-2.23.1.zip",
    "path": "/package/cloudflare/2.23.1",
    "icons": [
      {
        "src": "/img/cf-logo-v.svg",
        "path": "/package/cloudflare/2.23.1/img/cf-logo-v.svg",
        "title": "Cloudflare",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cloudflare",
        "title": "Cloudflare logs",
        "description": "Collect logs from Cloudflare"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "cdn_security"
    ],
    "signature_path": "/epr/cloudflare/cloudflare-2.23.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cloudflare.audit",
        "title": "Cloudflare Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "cloudflare.logpull",
        "title": "Cloudflare Logpull"
      }
    ]
  },
  {
    "name": "cloudflare_logpush",
    "title": "Cloudflare Logpush",
    "version": "1.17.4",
    "release": "ga",
    "description": "Collect and parse logs from Cloudflare API with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cloudflare_logpush/cloudflare_logpush-1.17.4.zip",
    "path": "/package/cloudflare_logpush/1.17.4",
    "icons": [
      {
        "src": "/img/cloudflare-logo.svg",
        "path": "/package/cloudflare_logpush/1.17.4/img/cloudflare-logo.svg",
        "title": "Cloudflare Logpush logo",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cloudflare",
        "title": "Cloudflare Logpush logs",
        "description": "Collect logs from Cloudflare."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "cdn_security"
    ],
    "signature_path": "/epr/cloudflare_logpush/cloudflare_logpush-1.17.4.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.access_request",
        "title": "Collect Access Request logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.audit",
        "title": "Collect Audit logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.casb",
        "title": "Collect CASB Findings logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.device_posture",
        "title": "Collect Device Posture Results logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.dns",
        "title": "Collect DNS logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.dns_firewall",
        "title": "Collect DNS Firewall logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.firewall_event",
        "title": "Collect Firewall Event logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.gateway_dns",
        "title": "Collect Gateway DNS logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.gateway_http",
        "title": "Collect Gateway HTTP logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.gateway_network",
        "title": "Collect Gateway Network logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.http_request",
        "title": "Collect HTTP Request logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.magic_ids",
        "title": "Collect Magic IDS logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.nel_report",
        "title": "Collect NEL Report logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.network_analytics",
        "title": "Collect Network Analytics logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.network_session",
        "title": "Collect Zero Trust Network Session logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.sinkhole_http",
        "title": "Collect Sinkhole HTTP logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.spectrum_event",
        "title": "Collect Spectrum Event logs from Cloudflare"
      },
      {
        "type": "logs",
        "dataset": "cloudflare_logpush.workers_trace",
        "title": "Collect Workers Trace Event logs from Cloudflare"
      }
    ]
  },
  {
    "name": "cockroachdb",
    "title": "CockroachDB Metrics",
    "version": "1.8.1",
    "release": "ga",
    "description": "Collect metrics from CockroachDB servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cockroachdb/cockroachdb-1.8.1.zip",
    "path": "/package/cockroachdb/1.8.1",
    "icons": [
      {
        "src": "/img/cockroachdb.png",
        "path": "/package/cockroachdb/1.8.1/img/cockroachdb.png",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "status",
        "title": "CockroachDB",
        "description": "CockroachDB metrics Integration",
        "icons": [
          {
            "src": "/img/cockroachdb.png",
            "path": "/package/cockroachdb/1.8.1/img/cockroachdb.png",
            "title": "logo cockroachdb",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "status"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore"
    ],
    "signature_path": "/epr/cockroachdb/cockroachdb-1.8.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "cockroachdb.status",
        "title": "Status"
      }
    ]
  },
  {
    "name": "ti_cif3",
    "title": "Collective Intelligence Framework v3",
    "version": "1.10.2",
    "release": "ga",
    "description": "Ingest threat indicators from a Collective Intelligence Framework v3 instance with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_cif3/ti_cif3-1.10.2.zip",
    "path": "/package/ti_cif3/1.10.2",
    "icons": [
      {
        "src": "/img/csg_logo_big.svg",
        "path": "/package/ti_cif3/1.10.2/img/csg_logo_big.svg",
        "title": "csirtgadgets logo",
        "size": "1047x748",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_cif3",
        "title": "Collective Intelligence Framework v3",
        "description": "Ingest threat indicators from a Collective Intelligence Framework v3 instance with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_cif3/ti_cif3-1.10.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_cif3.feed",
        "title": "CIFv3 Feed"
      }
    ]
  },
  {
    "name": "cef",
    "title": "Common Event Format (CEF)",
    "version": "2.21.0",
    "release": "ga",
    "description": "Collect logs from CEF Logs with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cef/cef-2.21.0.zip",
    "path": "/package/cef/2.21.0",
    "policy_templates": [
      {
        "name": "cef",
        "title": "CEF logs",
        "description": "Collect logs from CEF instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.6.1 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-deployment-and-devices"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/cef/cef-2.21.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cef.log",
        "title": "CEF log logs"
      }
    ]
  },
  {
    "name": "containerd",
    "title": "Containerd",
    "version": "0.2.3",
    "release": "beta",
    "description": "Collect metrics from containerd containers.",
    "type": "integration",
    "download": "/epr/containerd/containerd-0.2.3.zip",
    "path": "/package/containerd/0.2.3",
    "icons": [
      {
        "src": "/img/containerd-logo.svg",
        "path": "/package/containerd/0.2.3/img/containerd-logo.svg",
        "title": "logo containerd",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "containerd",
        "title": "Containerd Metrics",
        "description": "Collect metrics from Containerd API with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.4.0"
      }
    },
    "owner": {
      "github": "elastic/obs-cloudnative-monitoring"
    },
    "categories": [
      "observability",
      "containers"
    ],
    "signature_path": "/epr/containerd/containerd-0.2.3.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "containerd.blkio",
        "title": "Containerd blkio metrics"
      },
      {
        "type": "metrics",
        "dataset": "containerd.cpu",
        "title": "Containerd cpu metrics"
      },
      {
        "type": "metrics",
        "dataset": "containerd.memory",
        "title": "Containerd memory metrics"
      }
    ]
  },
  {
    "name": "coredns",
    "title": "CoreDNS",
    "version": "0.7.0",
    "release": "beta",
    "description": "Collect logs from CoreDNS instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/coredns/coredns-0.7.0.zip",
    "path": "/package/coredns/0.7.0",
    "icons": [
      {
        "src": "/img/coredns-logo.svg",
        "path": "/package/coredns/0.7.0/img/coredns-logo.svg",
        "title": "CoreDNS logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "coredns",
        "title": "CoreDNS",
        "description": "Collect logs from CoreDNS instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/coredns/coredns-0.7.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "coredns.log",
        "title": "CoreDNS logs"
      }
    ]
  },
  {
    "name": "couchdb",
    "title": "CouchDB",
    "version": "1.2.0",
    "release": "ga",
    "description": "Collect metrics from CouchDB with Elastic Agent.",
    "type": "integration",
    "download": "/epr/couchdb/couchdb-1.2.0.zip",
    "path": "/package/couchdb/1.2.0",
    "icons": [
      {
        "src": "/img/couchdb.svg",
        "path": "/package/couchdb/1.2.0/img/couchdb.svg",
        "title": "CouchDB",
        "size": "289x293",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "couchdb",
        "title": "CouchDB metrics",
        "description": "Collect CouchDB metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/couchdb/couchdb-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "couchdb.server",
        "title": "Server"
      }
    ]
  },
  {
    "name": "couchbase",
    "title": "Couchbase",
    "version": "1.6.0",
    "release": "ga",
    "description": "Collect metrics from Couchbase databases with Elastic Agent.",
    "type": "integration",
    "download": "/epr/couchbase/couchbase-1.6.0.zip",
    "path": "/package/couchbase/1.6.0",
    "icons": [
      {
        "src": "/img/couchbase-logo.svg",
        "path": "/package/couchbase/1.6.0/img/couchbase-logo.svg",
        "title": "Couchbase logo",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "couchbase",
        "title": "Couchbase metrics",
        "description": "Collect Couchbase metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/couchbase/couchbase-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "couchbase.bucket",
        "title": "Couchbase bucket metrics"
      },
      {
        "type": "metrics",
        "dataset": "couchbase.cache",
        "title": "Couchbase Sync Gateway Cache metrics."
      },
      {
        "type": "metrics",
        "dataset": "couchbase.cbl_replication",
        "title": "Couchbase Sync Gateway CBL Replications metrics"
      },
      {
        "type": "metrics",
        "dataset": "couchbase.cluster",
        "title": "Couchbase cluster metrics"
      },
      {
        "type": "metrics",
        "dataset": "couchbase.database_stats",
        "title": "Couchbase Sync Gateway Database Stats metrics."
      },
      {
        "type": "metrics",
        "dataset": "couchbase.miscellaneous",
        "title": "Couchbase Sync Gateway Delta Sync, Import, Security and GSI views metrics."
      },
      {
        "type": "logs",
        "dataset": "couchbase.node",
        "title": "Node metrics"
      },
      {
        "type": "metrics",
        "dataset": "couchbase.query_index",
        "title": "Query Index metrics"
      },
      {
        "type": "metrics",
        "dataset": "couchbase.resource",
        "title": "Couchbase Sync Gateway Resource Utilization metrics."
      },
      {
        "type": "metrics",
        "dataset": "couchbase.xdcr",
        "title": "Couchbase XDCR Metrics"
      }
    ]
  },
  {
    "name": "cribl",
    "title": "Cribl",
    "version": "0.1.2",
    "release": "beta",
    "description": "Stream logs from Cribl into Elastic.",
    "type": "integration",
    "download": "/epr/cribl/cribl-0.1.2.zip",
    "path": "/package/cribl/0.1.2",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/cribl/0.1.2/img/logo.svg",
        "title": "Cribl logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom"
    ],
    "signature_path": "/epr/cribl/cribl-0.1.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cribl",
        "title": "Logs"
      }
    ]
  },
  {
    "name": "crowdstrike",
    "title": "CrowdStrike",
    "version": "1.29.0",
    "release": "ga",
    "description": "Collect logs from Crowdstrike with Elastic Agent.",
    "type": "integration",
    "download": "/epr/crowdstrike/crowdstrike-1.29.0.zip",
    "path": "/package/crowdstrike/1.29.0",
    "icons": [
      {
        "src": "/img/logo-integrations-crowdstrike.svg",
        "path": "/package/crowdstrike/1.29.0/img/logo-integrations-crowdstrike.svg",
        "title": "CrowdStrike",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "crowdstrike",
        "title": "CrowdStrike",
        "description": "Collect logs from CrowdStrike Falcon and FDR"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/crowdstrike/crowdstrike-1.29.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "crowdstrike.falcon",
        "title": "Crowdstrike falcon logs"
      },
      {
        "type": "logs",
        "dataset": "crowdstrike.fdr",
        "title": "Falcon Data Replicator"
      }
    ]
  },
  {
    "name": "ti_crowdstrike",
    "title": "CrowdStrike Falcon Intelligence",
    "version": "0.4.1",
    "release": "beta",
    "description": "Collect logs from CrowdStrike Falcon Intelligence with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_crowdstrike/ti_crowdstrike-0.4.1.zip",
    "path": "/package/ti_crowdstrike/0.4.1",
    "icons": [
      {
        "src": "/img/crowdstrike_falcon_intelligence-logo.svg",
        "path": "/package/ti_crowdstrike/0.4.1/img/crowdstrike_falcon_intelligence-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_crowdstrike",
        "title": "CrowdStrike Falcon Intelligence logs",
        "description": "Collect CrowdStrike Falcon Intelligence logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_crowdstrike/ti_crowdstrike-0.4.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_crowdstrike.intel",
        "title": "Collect Intel logs from CrowdStrike Falcon Intelligence."
      },
      {
        "type": "logs",
        "dataset": "ti_crowdstrike.ioc",
        "title": "Collect IOC logs from CrowdStrike Falcon Intelligence."
      }
    ]
  },
  {
    "name": "httpjson",
    "title": "Custom API",
    "version": "1.19.0",
    "release": "ga",
    "description": "Collect custom events from an API endpoint with Elastic agent",
    "type": "integration",
    "download": "/epr/httpjson/httpjson-1.19.0.zip",
    "path": "/package/httpjson/1.19.0",
    "policy_templates": [
      {
        "name": "generic",
        "title": "Custom API Input",
        "description": "Collect custom data from REST API's"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom"
    ],
    "signature_path": "/epr/httpjson/httpjson-1.19.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "httpjson.generic",
        "title": "Custom API Input"
      }
    ]
  },
  {
    "name": "cel",
    "title": "Custom API using Common Expression Language",
    "version": "1.8.0",
    "release": "ga",
    "description": "Collect custom events from an API with Elastic agent",
    "type": "input",
    "download": "/epr/cel/cel-1.8.0.zip",
    "path": "/package/cel/1.8.0",
    "policy_templates": [
      {
        "name": "cel",
        "title": "CEL Custom API Input",
        "description": "Collect custom data from HTTP and file-system APIs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom"
    ],
    "signature_path": "/epr/cel/cel-1.8.0.zip.sig"
  },
  {
    "name": "aws_logs",
    "title": "Custom AWS Logs",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collect raw logs from AWS S3 or CloudWatch with Elastic Agent.",
    "type": "integration",
    "download": "/epr/aws_logs/aws_logs-1.0.0.zip",
    "path": "/package/aws_logs/1.0.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/aws_logs/1.0.0/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "aws_logs",
        "title": "Custom AWS Logs",
        "description": "Collect raw logs from AWS S3 or CloudWatch with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "observability",
      "custom",
      "aws"
    ],
    "signature_path": "/epr/aws_logs/aws_logs-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "aws_logs.generic",
        "title": "Custom logs from AWS"
      }
    ]
  },
  {
    "name": "azure_blob_storage",
    "title": "Custom Azure Blob Storage Input",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect JSON data from configured Azure Blob Storage Container with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_blob_storage/azure_blob_storage-1.0.1.zip",
    "path": "/package/azure_blob_storage/1.0.1",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/azure_blob_storage/1.0.1/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure-blob-storage",
        "title": "Custom Azure Blob Storage Input",
        "description": "Collect JSON data from configured Azure Blob Storage Container with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "cloud"
    ],
    "signature_path": "/epr/azure_blob_storage/azure_blob_storage-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_blob_storage.generic",
        "title": "Custom Azure Blob Storage Input"
      }
    ]
  },
  {
    "name": "google_cloud_storage",
    "title": "Custom GCS (Google Cloud Storage) Input",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect JSON data from configured GCS Bucket with Elastic Agent.",
    "type": "integration",
    "download": "/epr/google_cloud_storage/google_cloud_storage-1.0.1.zip",
    "path": "/package/google_cloud_storage/1.0.1",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/google_cloud_storage/1.0.1/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "gcs",
        "title": "Custom GCS (Google Cloud Storage) Input",
        "description": "Collect JSON data from configured GCS Bucket with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "cloud"
    ],
    "signature_path": "/epr/google_cloud_storage/google_cloud_storage-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "google_cloud_storage.generic",
        "title": "Custom GCS (Google Cloud Storage) Input"
      }
    ]
  },
  {
    "name": "gcp_pubsub",
    "title": "Custom Google Pub/Sub Logs",
    "version": "1.12.1",
    "release": "ga",
    "description": "Collect Logs from Google Pub/Sub topics",
    "type": "integration",
    "download": "/epr/gcp_pubsub/gcp_pubsub-1.12.1.zip",
    "path": "/package/gcp_pubsub/1.12.1",
    "icons": [
      {
        "src": "/img/logo_gcp.svg",
        "path": "/package/gcp_pubsub/1.12.1/img/logo_gcp.svg",
        "title": "logo gcp",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "gcp",
        "title": "Custom Google Pub/Sub Logs",
        "description": "Collect Logs from Google Pub/Sub topics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.16.0 || ^8.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "observability",
      "google_cloud",
      "custom"
    ],
    "signature_path": "/epr/gcp_pubsub/gcp_pubsub-1.12.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "gcp_pubsub.generic",
        "title": "Custom Google Pub/Sub Logs"
      }
    ]
  },
  {
    "name": "http_endpoint",
    "title": "Custom HTTP Endpoint Logs",
    "version": "1.14.1",
    "release": "ga",
    "description": "Collect JSON data from listening HTTP port with Elastic Agent.",
    "type": "integration",
    "download": "/epr/http_endpoint/http_endpoint-1.14.1.zip",
    "path": "/package/http_endpoint/1.14.1",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/http_endpoint/1.14.1/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "http_endpoint",
        "title": "Custom HTTP Endpoint Logs",
        "description": "Collect JSON data from listening HTTP port with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.16.0 || ^8.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "observability"
    ],
    "signature_path": "/epr/http_endpoint/http_endpoint-1.14.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "http_endpoint.generic",
        "title": "Custom HTTP Endpoint Logs"
      }
    ]
  },
  {
    "name": "journald",
    "title": "Custom Journald logs",
    "version": "1.2.1",
    "release": "ga",
    "description": "Collect logs from journald with Elastic Agent.",
    "type": "input",
    "download": "/epr/journald/journald-1.2.1.zip",
    "path": "/package/journald/1.2.1",
    "icons": [
      {
        "src": "/img/systemd-logo.svg",
        "path": "/package/journald/1.2.1/img/systemd-logo.svg",
        "title": "systemd logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Journald logs",
        "description": "Collect journald logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "observability",
      "custom"
    ],
    "signature_path": "/epr/journald/journald-1.2.1.zip.sig"
  },
  {
    "name": "kafka_log",
    "title": "Custom Kafka Logs",
    "version": "1.5.1",
    "release": "ga",
    "description": "Collect data from kafka topic with Elastic Agent.",
    "type": "integration",
    "download": "/epr/kafka_log/kafka_log-1.5.1.zip",
    "path": "/package/kafka_log/1.5.1",
    "icons": [
      {
        "src": "/img/logo_kafka.svg",
        "path": "/package/kafka_log/1.5.1/img/logo_kafka.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kafka_log",
        "title": "Custom Kafka Logs",
        "description": "Collect data from kafka topic with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.16.0 || ^8.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "custom"
    ],
    "signature_path": "/epr/kafka_log/kafka_log-1.5.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "kafka_log.generic",
        "title": "Custom Kafka Logs"
      }
    ]
  },
  {
    "name": "log",
    "title": "Custom Logs (Deprecated)",
    "version": "2.4.4",
    "release": "ga",
    "description": "Collect custom logs with Elastic Agent.",
    "type": "input",
    "download": "/epr/log/log-2.4.4.zip",
    "path": "/package/log/2.4.4",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/log/2.4.4/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Custom log file",
        "description": "Collect your custom log files."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0|| ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "custom",
      "custom_logs"
    ],
    "signature_path": "/epr/log/log-2.4.4.zip.sig"
  },
  {
    "name": "tcp",
    "title": "Custom TCP Logs",
    "version": "1.21.0",
    "release": "ga",
    "description": "Collect raw TCP data from listening TCP port with Elastic Agent.",
    "type": "integration",
    "download": "/epr/tcp/tcp-1.21.0.zip",
    "path": "/package/tcp/1.21.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/tcp/1.21.0/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tcp",
        "title": "Custom TCP Logs",
        "description": "Collect raw TCP data from listening TCP port with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.2.1 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-deployment-and-devices"
    },
    "categories": [
      "custom",
      "custom_logs"
    ],
    "signature_path": "/epr/tcp/tcp-1.21.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tcp.generic",
        "title": "Custom TCP Logs"
      }
    ]
  },
  {
    "name": "udp",
    "title": "Custom UDP Logs",
    "version": "1.19.1",
    "release": "ga",
    "description": "Collect raw UDP data from listening UDP port with Elastic Agent.",
    "type": "integration",
    "download": "/epr/udp/udp-1.19.1.zip",
    "path": "/package/udp/1.19.1",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/udp/1.19.1/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "udp",
        "title": "Custom UDP Logs",
        "description": "Collect raw UDP data from listening UDP port with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.2.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-deployment-and-devices"
    },
    "categories": [
      "custom",
      "custom_logs"
    ],
    "signature_path": "/epr/udp/udp-1.19.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "udp.generic",
        "title": "Custom UDP Logs"
      }
    ]
  },
  {
    "name": "winlog",
    "title": "Custom Windows Event Logs",
    "version": "2.6.0",
    "release": "ga",
    "description": "Collect and parse logs from any Windows event log channel with Elastic Agent.",
    "type": "input",
    "download": "/epr/winlog/winlog-2.6.0.zip",
    "path": "/package/winlog/2.6.0",
    "icons": [
      {
        "src": "/img/logo_windows.svg",
        "path": "/package/winlog/2.6.0/img/logo_windows.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "winlogs",
        "title": "Custom Windows event logs",
        "description": "Collect your custom Windows event logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "custom",
      "os_system",
      "security",
      "observability"
    ],
    "signature_path": "/epr/winlog/winlog-2.6.0.zip.sig"
  },
  {
    "name": "cyberarkpas",
    "title": "CyberArk Privileged Access Security",
    "version": "2.20.0",
    "release": "ga",
    "description": "Collect logs from CyberArk Privileged Access Security with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cyberarkpas/cyberarkpas-2.20.0.zip",
    "path": "/package/cyberarkpas/2.20.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/cyberarkpas/2.20.0/img/logo.svg",
        "title": "CyberArk logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cyberarkpas",
        "title": "CyberArk Privileged Access Security audit logs",
        "description": "Collect logs from Vault instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/cyberarkpas/cyberarkpas-2.20.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cyberarkpas.audit",
        "title": "CyberArk PAS audit logs"
      }
    ]
  },
  {
    "name": "cyberark_pta",
    "title": "Cyberark Privileged Threat Analytics",
    "version": "1.9.0",
    "release": "ga",
    "description": "Collect security logs from Cyberark PTA integration.",
    "type": "integration",
    "download": "/epr/cyberark_pta/cyberark_pta-1.9.0.zip",
    "path": "/package/cyberark_pta/1.9.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/cyberark_pta/1.9.0/img/logo.svg",
        "title": "CyberArk logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cyberark_pta",
        "title": "CyberArk Privileged Threat Analytics logs",
        "description": "Collect logs from syslog"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.17.0 || ^8.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/cyberark_pta/cyberark_pta-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cyberark_pta.events",
        "title": "CyberArk PTA logs"
      }
    ]
  },
  {
    "name": "ti_cybersixgill",
    "title": "Cybersixgill",
    "version": "1.25.1",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from Cybersixgill with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_cybersixgill/ti_cybersixgill-1.25.1.zip",
    "path": "/package/ti_cybersixgill/1.25.1",
    "icons": [
      {
        "src": "/img/cybersixgill.svg",
        "path": "/package/ti_cybersixgill/1.25.1/img/cybersixgill.svg",
        "title": "Cybersixgill",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cybersixgill",
        "title": "Cybersixgill Threat Intel",
        "description": "Ingest threat intelligence indicators from Cybersixgill with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_cybersixgill/ti_cybersixgill-1.25.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_cybersixgill.threat",
        "title": "Cybersixgill Darkfeed Logs"
      }
    ]
  },
  {
    "name": "cylance",
    "title": "CylanceProtect Logs",
    "version": "0.19.3",
    "release": "beta",
    "description": "Collect logs from CylanceProtect devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cylance/cylance-0.19.3.zip",
    "path": "/package/cylance/0.19.3",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/cylance/0.19.3/img/logo.svg",
        "title": "CylanceProtect logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "protect",
        "title": "CylanceProtect",
        "description": "Collect CylanceProtect logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.14.1 || ^8.0.0"
      }
    },
    "owner": {
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/cylance/cylance-0.19.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cylance.protect",
        "title": "CylanceProtect logs"
      }
    ]
  },
  {
    "name": "darktrace",
    "title": "Darktrace",
    "version": "1.14.1",
    "release": "ga",
    "description": "Collect logs from Darktrace with Elastic Agent.",
    "type": "integration",
    "download": "/epr/darktrace/darktrace-1.14.1.zip",
    "path": "/package/darktrace/1.14.1",
    "icons": [
      {
        "src": "/img/darktrace-logo.svg",
        "path": "/package/darktrace/1.14.1/img/darktrace-logo.svg",
        "title": "Darktrace Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "darktrace",
        "title": "Darktrace logs",
        "description": "Collect logs from Darktrace."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network_security"
    ],
    "signature_path": "/epr/darktrace/darktrace-1.14.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "darktrace.ai_analyst_alert",
        "title": "Collect AI Analyst Alert logs from Darktrace"
      },
      {
        "type": "logs",
        "dataset": "darktrace.model_breach_alert",
        "title": "Collect Model Breach Alert logs from Darktrace"
      },
      {
        "type": "logs",
        "dataset": "darktrace.system_status_alert",
        "title": "Collect System Status Alert logs from Darktrace"
      }
    ]
  },
  {
    "name": "ded",
    "title": "Data Exfiltration Detection",
    "version": "2.4.2",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "ML package to detect data exfiltration in your network and file data.",
    "type": "integration",
    "download": "/epr/ded/ded-2.4.2.zip",
    "path": "/package/ded/2.4.2",
    "icons": [
      {
        "src": "/img/ded_Icon.svg",
        "path": "/package/ded/2.4.2/img/ded_Icon.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "platinum",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-applied-ml"
    },
    "categories": [
      "security",
      "network",
      "advanced_analytics_ueba"
    ],
    "signature_path": "/epr/ded/ded-2.4.2.zip.sig"
  },
  {
    "name": "cloud_defend",
    "title": "Defend for Containers (BETA)",
    "version": "1.4.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Elastic Defend for Containers (BETA) provides cloud-native runtime protections for containerized environments.",
    "type": "integration",
    "download": "/epr/cloud_defend/cloud_defend-1.4.0.zip",
    "path": "/package/cloud_defend/1.4.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/cloud_defend/1.4.0/img/logo.svg",
        "title": "Defend for containers logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cloud_defend",
        "title": "Defend for Containers",
        "description": "Collects cloud defend alerts and metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.3.0"
      },
      "elastic": {
        "subscription": "enterprise",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "containers",
      "kubernetes",
      "observability",
      "security"
    ],
    "signature_path": "/epr/cloud_defend/cloud_defend-1.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cloud_defend.alerts",
        "title": "alerts"
      },
      {
        "type": "logs",
        "dataset": "cloud_defend.file",
        "title": "File telemetry"
      },
      {
        "type": "metrics",
        "dataset": "cloud_defend.heartbeat",
        "title": "Cloud Defend Liveness Heartbeat"
      },
      {
        "type": "metrics",
        "dataset": "cloud_defend.metrics",
        "title": "Cloud defend metrics"
      },
      {
        "type": "logs",
        "dataset": "cloud_defend.process",
        "title": "Process telemetry"
      }
    ]
  },
  {
    "name": "docker",
    "title": "Docker",
    "version": "2.12.1",
    "release": "ga",
    "description": "Collect metrics and logs from Docker instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/docker/docker-2.12.1.zip",
    "path": "/package/docker/2.12.1",
    "icons": [
      {
        "src": "/img/logo_docker.svg",
        "path": "/package/docker/2.12.1/img/logo_docker.svg",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "docker",
        "title": "Docker logs and metrics",
        "description": "Collect logs and metrics from Docker instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-cloudnative-monitoring"
    },
    "categories": [
      "observability",
      "containers"
    ],
    "signature_path": "/epr/docker/docker-2.12.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "docker.container",
        "title": "Docker container metrics"
      },
      {
        "type": "logs",
        "dataset": "docker.container_logs",
        "title": "Docker container logs"
      },
      {
        "type": "metrics",
        "dataset": "docker.cpu",
        "title": "Docker cpu metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.diskio",
        "title": "Docker diskio metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.event",
        "title": "Docker event metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.healthcheck",
        "title": "Docker healthcheck metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.image",
        "title": "Docker image metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.info",
        "title": "Docker info metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.memory",
        "title": "Docker memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.network",
        "title": "Docker network metrics"
      }
    ]
  },
  {
    "name": "dga",
    "title": "Domain Generation Algorithm Detection",
    "version": "2.3.7",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "ML solution package to detect domain generation algorithm (DGA) activity in your network data.",
    "type": "integration",
    "download": "/epr/dga/dga-2.3.7.zip",
    "path": "/package/dga/2.3.7",
    "icons": [
      {
        "src": "/img/icon-machine-learning.svg",
        "path": "/package/dga/2.3.7/img/icon-machine-learning.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "platinum"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-applied-ml"
    },
    "categories": [
      "security",
      "network_security",
      "advanced_analytics_ueba"
    ],
    "signature_path": "/epr/dga/dga-2.3.7.zip.sig"
  },
  {
    "name": "ti_eclecticiq",
    "title": "EclecticIQ",
    "version": "0.2.0",
    "release": "beta",
    "description": "Ingest threat intelligence from EclecticIQ with Elastic Agent",
    "type": "integration",
    "download": "/epr/ti_eclecticiq/ti_eclecticiq-0.2.0.zip",
    "path": "/package/ti_eclecticiq/0.2.0",
    "icons": [
      {
        "src": "/img/logo_RGB.svg",
        "path": "/package/ti_eclecticiq/0.2.0/img/logo_RGB.svg",
        "title": "EIQ logo",
        "size": "133x43",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_eclecticiq",
        "title": "EclecticIQ",
        "description": "Collect data provided by EclecticIQ IC outgoing feeds."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_eclecticiq/ti_eclecticiq-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_eclecticiq.threat",
        "title": "Poll Outgoing feed"
      }
    ]
  },
  {
    "name": "apm",
    "title": "Elastic APM",
    "version": "8.4.2",
    "release": "ga",
    "description": "Monitor, detect, and diagnose complex application performance issues.",
    "type": "integration",
    "download": "/epr/apm/apm-8.4.2.zip",
    "path": "/package/apm/8.4.2",
    "icons": [
      {
        "src": "/img/logo_apm.svg",
        "path": "/package/apm/8.4.2/img/logo_apm.svg",
        "title": "APM Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "apmserver",
        "title": "Elastic APM Integration",
        "description": "Elastic APM Integration"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.4.0"
      }
    },
    "owner": {
      "github": "elastic/apm-server"
    },
    "categories": [
      "elastic_stack",
      "monitoring"
    ],
    "signature_path": "/epr/apm/apm-8.4.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "apm.app",
        "title": "APM application logs"
      },
      {
        "type": "metrics",
        "dataset": "apm.app",
        "title": "APM application metrics"
      },
      {
        "type": "logs",
        "dataset": "apm.error",
        "title": "APM errors"
      },
      {
        "type": "metrics",
        "dataset": "apm.internal",
        "title": "APM internal metrics"
      },
      {
        "type": "metrics",
        "dataset": "apm.profiling",
        "title": "APM profiles"
      },
      {
        "type": "traces",
        "dataset": "apm.rum",
        "title": "APM RUM traces"
      },
      {
        "type": "traces",
        "dataset": "apm.sampled",
        "title": "APM tail-sampled traces"
      },
      {
        "type": "traces",
        "dataset": "apm",
        "title": "APM traces"
      }
    ]
  },
  {
    "name": "elastic_agent",
    "title": "Elastic Agent",
    "version": "1.17.0",
    "release": "ga",
    "description": "Collect logs and metrics from Elastic Agents.",
    "type": "integration",
    "download": "/epr/elastic_agent/elastic_agent-1.17.0.zip",
    "path": "/package/elastic_agent/1.17.0",
    "icons": [
      {
        "src": "/img/logo_elastic_agent.svg",
        "path": "/package/elastic_agent/1.17.0/img/logo_elastic_agent.svg",
        "title": "logo Elastic Agent",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      }
    },
    "owner": {
      "github": "elastic/elastic-agent"
    },
    "categories": [
      "elastic_stack"
    ],
    "signature_path": "/epr/elastic_agent/elastic_agent-1.17.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "elastic_agent.apm_server",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.apm_server",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.auditbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.auditbeat",
        "title": "Elastic Agent Auditbeat Metrics"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.cloud_defend",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.cloudbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.cloudbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.elastic_agent",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.endpoint_security",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.endpoint_security",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.filebeat_input",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.filebeat_input",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.filebeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.filebeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.fleet_server",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.fleet_server",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.heartbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.heartbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.metricbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.metricbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.osquerybeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.osquerybeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.packetbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.packetbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.pf_elastic_collector",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.pf_elastic_symbolizer",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.pf_host_agent",
        "title": "Elastic Agent"
      }
    ]
  },
  {
    "name": "endpoint",
    "title": "Elastic Defend",
    "version": "8.11.1",
    "release": "ga",
    "description": "Protect your hosts and cloud workloads with threat prevention, detection, and deep security data visibility.",
    "type": "integration",
    "download": "/epr/endpoint/endpoint-8.11.1.zip",
    "path": "/package/endpoint/8.11.1",
    "icons": [
      {
        "src": "/img/security-logo-color-64px.svg",
        "path": "/package/endpoint/8.11.1/img/security-logo-color-64px.svg",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "endpoint",
        "title": "Endpoint Security Integration",
        "description": "Interact with the endpoint."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-defend-workflows"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/endpoint/endpoint-8.11.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "endpoint.action.responses",
        "title": "Endpoint Action Responses"
      },
      {
        "type": "logs",
        "dataset": "endpoint.actions",
        "title": "Endpoint Actions"
      },
      {
        "type": "logs",
        "dataset": "endpoint.alerts",
        "title": "Endpoint Alerts"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.api",
        "title": "Endpoint API Events"
      },
      {
        "type": "logs",
        "dataset": "endpoint.diagnostic.collection",
        "title": "Endpoint Alert Collection"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.file",
        "title": "Endpoint File Events"
      },
      {
        "type": "logs",
        "dataset": "endpoint.heartbeat",
        "title": "Endpoint Heartbeat"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.library",
        "title": "Endpoint Library and Driver Events"
      },
      {
        "type": "metrics",
        "dataset": "endpoint.metadata",
        "title": "Endpoint Metadata"
      },
      {
        "type": "metrics",
        "dataset": "endpoint.metrics",
        "title": "Endpoint Metrics"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.network",
        "title": "Endpoint Network Events"
      },
      {
        "type": "metrics",
        "dataset": "endpoint.policy",
        "title": "Endpoint Policy Response"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.process",
        "title": "Endpoint Process Events"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.registry",
        "title": "Endpoint Registry Events"
      },
      {
        "type": "logs",
        "dataset": "endpoint.events.security",
        "title": "Endpoint Security Events"
      }
    ]
  },
  {
    "name": "elastic_package_registry",
    "title": "Elastic Package Registry",
    "version": "0.3.1",
    "release": "beta",
    "description": "Collect metrics from a Elastic Package Registry instance",
    "type": "integration",
    "download": "/epr/elastic_package_registry/elastic_package_registry-0.3.1.zip",
    "path": "/package/elastic_package_registry/0.3.1",
    "icons": [
      {
        "src": "/img/elastic_package_registry-logo.svg",
        "path": "/package/elastic_package_registry/0.3.1/img/elastic_package_registry-logo.svg",
        "title": "Elastic Package Registry logo",
        "size": "256x256",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "elastic_package_registry",
        "title": "Elastic Package Registry metrics",
        "description": "Collect metrics from Elastic Package Registry instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.0.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "elastic_stack"
    ],
    "signature_path": "/epr/elastic_package_registry/elastic_package_registry-0.3.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "elastic_package_registry.metrics",
        "title": "Prometheus Metrics"
      }
    ]
  },
  {
    "name": "synthetics",
    "title": "Elastic Synthetics",
    "version": "1.3.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Internal Elastic integration for providing access to private locations.",
    "type": "integration",
    "download": "/epr/synthetics/synthetics-1.3.0.zip",
    "path": "/package/synthetics/1.3.0",
    "icons": [
      {
        "src": "/img/uptime-logo-color-64px.svg",
        "path": "/package/synthetics/1.3.0/img/uptime-logo-color-64px.svg",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "synthetics",
        "title": "Elastic Synthetics",
        "description": "Perform synthetic health checks on network endpoints."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "uptime"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ux-management-team"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/synthetics/synthetics-1.3.0.zip.sig",
    "data_streams": [
      {
        "type": "synthetics",
        "dataset": "browser",
        "title": "synthetic monitor check"
      },
      {
        "type": "synthetics",
        "dataset": "browser.network",
        "title": "synthetic monitor check"
      },
      {
        "type": "synthetics",
        "dataset": "browser.screenshot",
        "title": "synthetic monitor check"
      },
      {
        "type": "synthetics",
        "dataset": "http",
        "title": "synthetic monitor check"
      },
      {
        "type": "synthetics",
        "dataset": "icmp",
        "title": "synthetic monitor check"
      },
      {
        "type": "synthetics",
        "dataset": "tcp",
        "title": "synthetic monitor check"
      }
    ]
  },
  {
    "name": "synthetics_dashboards",
    "title": "Elastic Synthetics Dashboards",
    "version": "1.0.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Explore Elastic Synthetics metrics with these dashboards.",
    "type": "integration",
    "download": "/epr/synthetics_dashboards/synthetics_dashboards-1.0.1.zip",
    "path": "/package/synthetics_dashboards/1.0.1",
    "icons": [
      {
        "src": "/img/uptime-logo-color-64px.svg",
        "path": "/package/synthetics_dashboards/1.0.1/img/uptime-logo-color-64px.svg",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "uptime"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ux-infra_services-team"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/synthetics_dashboards/synthetics_dashboards-1.0.1.zip.sig"
  },
  {
    "name": "elasticsearch",
    "title": "Elasticsearch",
    "version": "1.20.2",
    "release": "ga",
    "description": "Elasticsearch Integration",
    "type": "integration",
    "download": "/epr/elasticsearch/elasticsearch-1.20.2.zip",
    "path": "/package/elasticsearch/1.20.2",
    "icons": [
      {
        "src": "/img/logo_elasticsearch.svg",
        "path": "/package/elasticsearch/1.20.2/img/logo_elasticsearch.svg",
        "title": "logo elasticsearch",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "elasticsearch",
        "title": "Elasticsearch logs and metrics",
        "description": "Collect logs and metrics from Elasticsearch instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/stack-monitoring"
    },
    "categories": [
      "elastic_stack",
      "datastore"
    ],
    "signature_path": "/epr/elasticsearch/elasticsearch-1.20.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "elasticsearch.audit",
        "title": "Elasticsearch audit logs"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.ccr",
        "title": "Elasticsearch ccr metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.cluster_stats",
        "title": "Elasticsearch cluster_stats metrics"
      },
      {
        "type": "logs",
        "dataset": "elasticsearch.deprecation",
        "title": "Elasticsearch deprecation logs"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.enrich",
        "title": "Elasticsearch enrich metrics"
      },
      {
        "type": "logs",
        "dataset": "elasticsearch.gc",
        "title": "Elasticsearch gc logs"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.index",
        "title": "Elasticsearch index metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.index_recovery",
        "title": "Elasticsearch index_recovery metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.index_summary",
        "title": "Elasticsearch index_summary metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.ingest_pipeline",
        "title": "Elasticsearch ingest metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.ml_job",
        "title": "Elasticsearch ml_job metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.node",
        "title": "Elasticsearch node metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.node_stats",
        "title": "Elasticsearch node_stats metrics"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.pending_tasks",
        "title": "Elasticsearch pending_tasks metrics"
      },
      {
        "type": "logs",
        "dataset": "elasticsearch.server",
        "title": "Elasticsearch server logs"
      },
      {
        "type": "metrics",
        "dataset": "elasticsearch.stack_monitoring.shard",
        "title": "Elasticsearch shard metrics"
      },
      {
        "type": "logs",
        "dataset": "elasticsearch.slowlog",
        "title": "Elasticsearch slowlog logs"
      }
    ]
  },
  {
    "name": "enterprisesearch",
    "title": "Enterprise Search",
    "version": "1.0.1",
    "release": "ga",
    "description": "Enterprise Search Integration",
    "type": "integration",
    "download": "/epr/enterprisesearch/enterprisesearch-1.0.1.zip",
    "path": "/package/enterprisesearch/1.0.1",
    "icons": [
      {
        "src": "/img/logo_entsearch.svg",
        "path": "/package/enterprisesearch/1.0.1/img/logo_entsearch.svg",
        "title": "logo enterprisesearch",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "enterprisesearch",
        "title": "Enterprise Search metrics",
        "description": "Collect metrics from Enterprise Search instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/infra-monitoring-ui"
    },
    "signature_path": "/epr/enterprisesearch/enterprisesearch-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "enterprisesearch.stack_monitoring.health",
        "title": "Enterprise Search health metrics"
      },
      {
        "type": "metrics",
        "dataset": "enterprisesearch.stack_monitoring.stats",
        "title": "Enterprise Search stats metrics"
      }
    ]
  },
  {
    "name": "f5_bigip",
    "title": "F5 BIG-IP",
    "version": "1.13.2",
    "release": "ga",
    "description": "Collect logs from F5 BIG-IP with Elastic Agent.",
    "type": "integration",
    "download": "/epr/f5_bigip/f5_bigip-1.13.2.zip",
    "path": "/package/f5_bigip/1.13.2",
    "icons": [
      {
        "src": "/img/f5-bigip-logo.svg",
        "path": "/package/f5_bigip/1.13.2/img/f5-bigip-logo.svg",
        "title": "F5 BIG-IP logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "F5 BIG-IP",
        "title": "F5 BIG-IP logs",
        "description": "Collect F5 BIG-IP logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.17.0 || ^8.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/f5_bigip/f5_bigip-1.13.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "f5_bigip.log",
        "title": "Collect logs from F5 BIG-IP"
      }
    ]
  },
  {
    "name": "fim",
    "title": "File Integrity Monitoring",
    "version": "1.16.0",
    "release": "ga",
    "description": "The File Integrity Monitoring integration reports filesystem changes in real time.",
    "type": "integration",
    "download": "/epr/fim/fim-1.16.0.zip",
    "path": "/package/fim/1.16.0",
    "icons": [
      {
        "src": "/img/sample-logo.svg",
        "path": "/package/fim/1.16.0/img/sample-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fim",
        "title": "File Integrity Monitoring",
        "description": "Collect filesystem events"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/fim/fim-1.16.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fim.event",
        "title": "Filesystem events"
      }
    ]
  },
  {
    "name": "fireeye",
    "title": "FireEye Network Security",
    "version": "1.22.0",
    "release": "ga",
    "description": "Collect logs from FireEye NX with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fireeye/fireeye-1.22.0.zip",
    "path": "/package/fireeye/1.22.0",
    "icons": [
      {
        "src": "/img/FireEye-logo.svg",
        "path": "/package/fireeye/1.22.0/img/FireEye-logo.svg",
        "title": "Fireeye logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fireeye",
        "title": "Fireeye NX logs",
        "description": "Collect Fireeye NX logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.16.0 || ^8.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/fireeye/fireeye-1.22.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fireeye.nx",
        "title": "Fireeye NX"
      }
    ]
  },
  {
    "name": "fleet_server",
    "title": "Fleet Server",
    "version": "1.3.1",
    "release": "ga",
    "description": "Centrally manage Elastic Agents with the Fleet Server integration.",
    "type": "integration",
    "download": "/epr/fleet_server/fleet_server-1.3.1.zip",
    "path": "/package/fleet_server/1.3.1",
    "icons": [
      {
        "src": "/img/logo_fleet_server.svg",
        "path": "/package/fleet_server/1.3.1/img/logo_fleet_server.svg",
        "title": "logo Fleet Server",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fleet_server",
        "title": "Fleet Server",
        "description": "Fleet Server setup"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "github": "elastic/elastic-agent-control-plane"
    },
    "categories": [
      "elastic_stack"
    ],
    "signature_path": "/epr/fleet_server/fleet_server-1.3.1.zip.sig"
  },
  {
    "name": "forcepoint_web",
    "title": "Forcepoint Web Security",
    "version": "1.8.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Forcepoint Web Security",
    "type": "integration",
    "download": "/epr/forcepoint_web/forcepoint_web-1.8.0.zip",
    "path": "/package/forcepoint_web/1.8.0",
    "icons": [
      {
        "src": "/img/forcepoint.svg",
        "path": "/package/forcepoint_web/1.8.0/img/forcepoint.svg",
        "title": "Forcepoint",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Secret Server",
        "description": "Collect Forcepoint Web Security logs from syslog or file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.5.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/forcepoint_web/forcepoint_web-1.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "forcepoint_web.logs",
        "title": "Forcepoint Web Security Logs"
      }
    ]
  },
  {
    "name": "forgerock",
    "title": "ForgeRock",
    "version": "1.14.1",
    "release": "ga",
    "description": "Collect audit logs from ForgeRock with Elastic Agent.",
    "type": "integration",
    "download": "/epr/forgerock/forgerock-1.14.1.zip",
    "path": "/package/forgerock/1.14.1",
    "icons": [
      {
        "src": "/img/forgerock-icon.svg",
        "path": "/package/forgerock/1.14.1/img/forgerock-icon.svg",
        "title": "ForgeRock Identity Platform",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "forgerock",
        "title": "Collect ForgeRock logs via API",
        "description": "Collecting ForgeRock logs via API with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/forgerock/forgerock-1.14.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "forgerock.am_access",
        "title": "AM-Access audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.am_activity",
        "title": "AM-Activity audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.am_authentication",
        "title": "AM-Authentication audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.am_config",
        "title": "AM-Config audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.am_core",
        "title": "AM-Core debug logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.idm_access",
        "title": "IDM-Access audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.idm_activity",
        "title": "IDM-Activity audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.idm_authentication",
        "title": "IDM-Authentication audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.idm_config",
        "title": "IDM-Config audit logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.idm_core",
        "title": "IDM-Core debug logs"
      },
      {
        "type": "logs",
        "dataset": "forgerock.idm_sync",
        "title": "IDM-Sync audit logs"
      }
    ]
  },
  {
    "name": "fortinet",
    "title": "Fortinet",
    "version": "1.9.0",
    "release": "ga",
    "description": "Deprecated. Collect logs from Fortinet instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fortinet/fortinet-1.9.0.zip",
    "path": "/package/fortinet/1.9.0",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet/1.9.0/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet",
        "title": "Fortinet logs",
        "description": "Collect logs from Fortinet instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.14.1 || ^8.0.0"
      }
    },
    "owner": {
      "github": "elastic/security-external-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/fortinet/fortinet-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet.clientendpoint",
        "title": "Fortinet FortiClient Endpoint Security logs"
      },
      {
        "type": "logs",
        "dataset": "fortinet.firewall",
        "title": "Fortinet firewall logs"
      },
      {
        "type": "logs",
        "dataset": "fortinet.fortimail",
        "title": "Fortinet FortiMail logs"
      },
      {
        "type": "logs",
        "dataset": "fortinet.fortimanager",
        "title": "Fortinet Manager/Analyzer logs"
      }
    ]
  },
  {
    "name": "fortinet_forticlient",
    "title": "Fortinet FortiClient Logs (Deprecated)",
    "version": "1.12.1",
    "release": "ga",
    "description": "Deprecated. Fortinet FortiClient Logs is no longer supported.",
    "type": "integration",
    "download": "/epr/fortinet_forticlient/fortinet_forticlient-1.12.1.zip",
    "path": "/package/fortinet_forticlient/1.12.1",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet_forticlient/1.12.1/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet",
        "title": "Fortinet FortiClient logs",
        "description": "Collect logs from Fortinet FortiClient instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/fortinet_forticlient/fortinet_forticlient-1.12.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet_forticlient.log",
        "title": "Fortinet FortiClient Endpoint Security logs"
      }
    ]
  },
  {
    "name": "fortinet_fortiedr",
    "title": "Fortinet FortiEDR Logs",
    "version": "1.21.0",
    "release": "ga",
    "description": "Collect logs from Fortinet FortiEDR instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fortinet_fortiedr/fortinet_fortiedr-1.21.0.zip",
    "path": "/package/fortinet_fortiedr/1.21.0",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet_fortiedr/1.21.0/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet",
        "title": "Fortinet FortiEDR logs",
        "description": "Collect logs from Fortinet FortiEDR instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/fortinet_fortiedr/fortinet_fortiedr-1.21.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet_fortiedr.log",
        "title": "Fortinet FortiEDR Endpoint Detection and Response logs"
      }
    ]
  },
  {
    "name": "fortinet_fortigate",
    "title": "Fortinet FortiGate Firewall Logs",
    "version": "1.36.5",
    "release": "ga",
    "description": "Collect logs from Fortinet FortiGate firewalls with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fortinet_fortigate/fortinet_fortigate-1.36.5.zip",
    "path": "/package/fortinet_fortigate/1.36.5",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet_fortigate/1.36.5/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet_fortigate",
        "title": "Fortinet FortiGate logs",
        "description": "Collect logs from Fortinet FortiGate instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "firewall_security"
    ],
    "signature_path": "/epr/fortinet_fortigate/fortinet_fortigate-1.36.5.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet_fortigate.log",
        "title": "Fortinet FortiGate logs"
      }
    ]
  },
  {
    "name": "fortinet_fortimail",
    "title": "Fortinet FortiMail",
    "version": "2.19.0",
    "release": "ga",
    "description": "Collect logs from Fortinet FortiMail instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fortinet_fortimail/fortinet_fortimail-2.19.0.zip",
    "path": "/package/fortinet_fortimail/2.19.0",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet_fortimail/2.19.0/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet_fortimail",
        "title": "Fortinet FortiMail logs",
        "description": "Collect logs from Fortinet FortiMail instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/fortinet_fortimail/fortinet_fortimail-2.19.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet_fortimail.log",
        "title": "Collect logs from Fortinet FortiMail"
      }
    ]
  },
  {
    "name": "fortinet_fortimanager",
    "title": "Fortinet FortiManager Logs",
    "version": "2.18.0",
    "release": "ga",
    "description": "Collect logs from Fortinet FortiManager instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fortinet_fortimanager/fortinet_fortimanager-2.18.0.zip",
    "path": "/package/fortinet_fortimanager/2.18.0",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet_fortimanager/2.18.0/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet_fortimanager",
        "title": "Fortinet FortiManager logs",
        "description": "Collect logs from Fortinet FortiManager instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "firewall_security"
    ],
    "signature_path": "/epr/fortinet_fortimanager/fortinet_fortimanager-2.18.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet_fortimanager.log",
        "title": "Collect logs from Fortinet FortiManager"
      }
    ]
  },
  {
    "name": "gcp_metrics",
    "title": "GCP Metrics Input",
    "version": "0.1.0",
    "release": "beta",
    "description": "GCP Metrics Input",
    "type": "input",
    "download": "/epr/gcp_metrics/gcp_metrics-0.1.0.zip",
    "path": "/package/gcp_metrics/0.1.0",
    "icons": [
      {
        "src": "/img/logo_gcp.svg",
        "path": "/package/gcp_metrics/0.1.0/img/logo_gcp.svg",
        "title": "logo gcp",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "gcp_metrics",
        "title": "GCP Metrics",
        "description": "GCP Metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.5.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-cloud-monitoring"
    },
    "categories": [
      "cloud",
      "google_cloud"
    ],
    "signature_path": "/epr/gcp_metrics/gcp_metrics-0.1.0.zip.sig"
  },
  {
    "name": "github",
    "title": "GitHub",
    "version": "1.27.3",
    "release": "ga",
    "description": "Collect logs from GitHub with Elastic Agent.",
    "type": "integration",
    "download": "/epr/github/github-1.27.3.zip",
    "path": "/package/github/1.27.3",
    "icons": [
      {
        "src": "/img/github.svg",
        "path": "/package/github/1.27.3/img/github.svg",
        "title": "GitHub",
        "size": "1024x1024",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "github",
        "title": "GitHub logs",
        "description": "Collect logs from GitHub"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/github/github-1.27.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "github.audit",
        "title": "GitHub Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "github.code_scanning",
        "title": "GHAS Code Scanning"
      },
      {
        "type": "logs",
        "dataset": "github.dependabot",
        "title": "GHAS Dependabot"
      },
      {
        "type": "logs",
        "dataset": "github.issues",
        "title": "Github Issue"
      },
      {
        "type": "logs",
        "dataset": "github.secret_scanning",
        "title": "GHAS Secret Scanning"
      }
    ]
  },
  {
    "name": "goflow2",
    "title": "GoFlow2 logs",
    "version": "0.7.0",
    "release": "beta",
    "description": "Collect logs from goflow2 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/goflow2/goflow2-0.7.0.zip",
    "path": "/package/goflow2/0.7.0",
    "icons": [
      {
        "src": "/img/goflow2-logo.svg",
        "path": "/package/goflow2/0.7.0/img/goflow2-logo.svg",
        "title": "goflow2 logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "goflow2",
        "title": "goflow2 logs",
        "description": "Collect logs generated with goflow2"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network"
    ],
    "signature_path": "/epr/goflow2/goflow2-0.7.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "goflow2.sflow",
        "title": "Goflow2 sFlow"
      }
    ]
  },
  {
    "name": "golang",
    "title": "Golang",
    "version": "1.3.1",
    "release": "ga",
    "description": "This Elastic integration collects metrics from Golang applications.",
    "type": "integration",
    "download": "/epr/golang/golang-1.3.1.zip",
    "path": "/package/golang/1.3.1",
    "icons": [
      {
        "src": "/img/golang-logo.svg",
        "path": "/package/golang/1.3.1/img/golang-logo.svg",
        "title": "golang logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Golang",
        "title": "Golang metrics",
        "description": "Collect Golang metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/golang/golang-1.3.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "golang.expvar",
        "title": "Golang expvar metrics"
      },
      {
        "type": "logs",
        "dataset": "golang.heap",
        "title": "Golang Heap metrics"
      }
    ]
  },
  {
    "name": "gcp",
    "title": "Google Cloud Platform",
    "version": "2.31.2",
    "release": "ga",
    "description": "Collect logs and metrics from Google Cloud Platform with Elastic Agent.",
    "type": "integration",
    "download": "/epr/gcp/gcp-2.31.2.zip",
    "path": "/package/gcp/2.31.2",
    "icons": [
      {
        "src": "/img/logo_gcp.svg",
        "path": "/package/gcp/2.31.2/img/logo_gcp.svg",
        "title": "logo gcp",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "audit",
        "title": "Google Cloud Platform (GCP) Audit logs",
        "description": "Collect audit logs from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "security"
        ],
        "data_streams": [
          "audit"
        ]
      },
      {
        "name": "firewall",
        "title": "Google Cloud Platform (GCP) Firewall logs",
        "description": "Collect firewall logs from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "security",
          "firewall_security"
        ],
        "data_streams": [
          "firewall"
        ]
      },
      {
        "name": "vpcflow",
        "title": "Google Cloud Platform (GCP) VPC Flow logs",
        "description": "Collect vpcflow logs from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "security"
        ],
        "data_streams": [
          "vpcflow"
        ]
      },
      {
        "name": "dns",
        "title": "Google Cloud Platform (GCP) DNS logs",
        "description": "Collect DNS logs from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "security",
          "dns_security"
        ],
        "data_streams": [
          "dns"
        ]
      },
      {
        "name": "billing",
        "title": "Google Cloud Platform (GCP) Billing metrics",
        "description": "Collect billing metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "observability"
        ],
        "data_streams": [
          "billing"
        ]
      },
      {
        "name": "compute",
        "title": "Google Cloud Platform (GCP) Compute metrics",
        "description": "Collect compute metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "observability"
        ],
        "data_streams": [
          "compute"
        ]
      },
      {
        "name": "firestore",
        "title": "Google Cloud Platform (GCP) Firestore metrics",
        "description": "Collect firestore metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "datastore",
          "observability"
        ],
        "data_streams": [
          "firestore"
        ]
      },
      {
        "name": "loadbalancing",
        "title": "Google Cloud Platform (GCP) Load Balancing metrics",
        "description": "Collect Load Balancing metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "security"
        ],
        "data_streams": [
          "loadbalancing_metrics",
          "loadbalancing_logs"
        ]
      },
      {
        "name": "storage",
        "title": "Google Cloud Platform (GCP) Storage metrics",
        "description": "Collect storage metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "datastore",
          "observability"
        ],
        "data_streams": [
          "storage"
        ]
      },
      {
        "name": "gke",
        "title": "Google Cloud Platform (GCP) GKE metrics",
        "description": "Collect gke metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "containers",
          "observability"
        ],
        "data_streams": [
          "gke"
        ]
      },
      {
        "name": "dataproc",
        "title": "Google Cloud Platform (GCP) Dataproc metrics",
        "description": "Collect dataproc metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "observability"
        ],
        "data_streams": [
          "dataproc"
        ]
      },
      {
        "name": "pubsub",
        "title": "Google Cloud Platform (GCP) PubSub metrics",
        "description": "Collect pubsub metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "message_queue",
          "observability"
        ],
        "data_streams": [
          "pubsub"
        ]
      },
      {
        "name": "redis",
        "title": "Google Cloud Platform (GCP) Redis metrics",
        "description": "Collect Redis metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "categories": [
          "datastore",
          "observability"
        ],
        "data_streams": [
          "redis"
        ]
      },
      {
        "name": "cloudrun",
        "title": "Google Cloud Platform (GCP) Cloud Run metrics",
        "description": "Collect Cloud Run metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "data_streams": [
          "cloudrun_metrics"
        ]
      },
      {
        "name": "cloudsql",
        "title": "Google Cloud Platform (GCP) CloudSQL metrics",
        "description": "Collect CloudSQL metrics from Google Cloud Platform (GCP) with Elastic Agent",
        "data_streams": [
          "cloudsql_mysql",
          "cloudsql_postgresql",
          "cloudsql_sqlserver"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-cloud-monitoring"
    },
    "categories": [
      "google_cloud"
    ],
    "signature_path": "/epr/gcp/gcp-2.31.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "gcp.audit",
        "title": "Google Cloud Platform (GCP) audit logs"
      },
      {
        "type": "metrics",
        "dataset": "gcp.billing",
        "title": "GCP Billing Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.cloudrun_metrics",
        "title": "GCP Cloud Run Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.cloudsql_mysql",
        "title": "GCP CloudSQL MySQL Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.cloudsql_postgresql",
        "title": "GCP CloudSQL PostgreSQL Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.cloudsql_sqlserver",
        "title": "GCP CloudSQL SQL Server Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.compute",
        "title": "GCP Compute Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.dataproc",
        "title": "GCP Dataproc Metrics"
      },
      {
        "type": "logs",
        "dataset": "gcp.dns",
        "title": "Google Cloud Platform (GCP) DNS logs"
      },
      {
        "type": "metrics",
        "dataset": "gcp.firestore",
        "title": "GCP Firestore Metrics"
      },
      {
        "type": "logs",
        "dataset": "gcp.firewall",
        "title": "Google Cloud Platform (GCP) firewall logs"
      },
      {
        "type": "metrics",
        "dataset": "gcp.gke",
        "title": "GCP GKE Metrics"
      },
      {
        "type": "logs",
        "dataset": "gcp.loadbalancing_logs",
        "title": "Google Cloud Platform (GCP) Load Balancing logs"
      },
      {
        "type": "metrics",
        "dataset": "gcp.loadbalancing_metrics",
        "title": "GCP Load Balancing Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.pubsub",
        "title": "GCP PubSub Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.redis",
        "title": "GCP Redis Metrics"
      },
      {
        "type": "metrics",
        "dataset": "gcp.storage",
        "title": "GCP Storage Metrics"
      },
      {
        "type": "logs",
        "dataset": "gcp.vpcflow",
        "title": "Google Cloud Platform (GCP) vpcflow logs"
      }
    ]
  },
  {
    "name": "santa",
    "title": "Google Santa",
    "version": "3.17.0",
    "release": "ga",
    "description": "Collect logs from Google Santa with Elastic Agent.",
    "type": "integration",
    "download": "/epr/santa/santa-3.17.0.zip",
    "path": "/package/santa/3.17.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/santa/3.17.0/img/icon.svg",
        "title": "Google Santa",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "santa",
        "title": "Google Santa logs",
        "description": "Collect logs from Google Santa instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/santa/santa-3.17.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "santa.log",
        "title": "Google Santa log logs"
      }
    ]
  },
  {
    "name": "google_scc",
    "title": "Google Security Command Center",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect logs from Google Security Command Center with Elastic Agent.",
    "type": "integration",
    "download": "/epr/google_scc/google_scc-1.0.1.zip",
    "path": "/package/google_scc/1.0.1",
    "icons": [
      {
        "src": "/img/google-scc-logo.svg",
        "path": "/package/google_scc/1.0.1/img/google-scc-logo.svg",
        "title": "Google SCC logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "google_scc",
        "title": "Google SCC logs",
        "description": "Collect logs from Google SCC."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "google_cloud",
      "security"
    ],
    "signature_path": "/epr/google_scc/google_scc-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "google_scc.asset",
        "title": "Collect Asset logs from Google Security Command Center."
      },
      {
        "type": "logs",
        "dataset": "google_scc.audit",
        "title": "Collect Audit logs from Google Security Command Center."
      },
      {
        "type": "logs",
        "dataset": "google_scc.finding",
        "title": "Collect Finding logs from Google Security Command Center."
      },
      {
        "type": "logs",
        "dataset": "google_scc.source",
        "title": "Collect Source logs from Google Security Command Center."
      }
    ]
  },
  {
    "name": "google_workspace",
    "title": "Google Workspace",
    "version": "2.19.2",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Google Workspace with Elastic Agent.",
    "type": "integration",
    "download": "/epr/google_workspace/google_workspace-2.19.2.zip",
    "path": "/package/google_workspace/2.19.2",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/google_workspace/2.19.2/img/logo.svg",
        "title": "logo Google",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "google_workspace",
        "title": "Google Workspace logs",
        "description": "Collect logs from Google Workspace APIs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/google_workspace/google_workspace-2.19.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "google_workspace.access_transparency",
        "title": "Access Transparency logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.admin",
        "title": "Admin logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.alert",
        "title": "Collect Alert logs from Google Workspace"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.context_aware_access",
        "title": "Context Aware Access logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.device",
        "title": "Device logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.drive",
        "title": "Drive logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.gcp",
        "title": "GCP logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.group_enterprise",
        "title": "Group Enterprise logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.groups",
        "title": "Groups logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.login",
        "title": "Login logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.rules",
        "title": "Rules logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.saml",
        "title": "SAML logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.token",
        "title": "Token logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.user_accounts",
        "title": "User accounts logs"
      }
    ]
  },
  {
    "name": "haproxy",
    "title": "HAProxy",
    "version": "1.11.1",
    "release": "ga",
    "description": "Collect logs and metrics from HAProxy servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/haproxy/haproxy-1.11.1.zip",
    "path": "/package/haproxy/1.11.1",
    "icons": [
      {
        "src": "/img/logo_haproxy.svg",
        "path": "/package/haproxy/1.11.1/img/logo_haproxy.svg",
        "title": "logo HAProxy",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "haproxy",
        "title": "HAProxy logs and metrics",
        "description": "Collect logs and metrics from HAProxy instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "load_balancer",
      "observability"
    ],
    "signature_path": "/epr/haproxy/haproxy-1.11.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "haproxy.info",
        "title": "HAProxy info metrics"
      },
      {
        "type": "logs",
        "dataset": "haproxy.log",
        "title": "HAProxy logs"
      },
      {
        "type": "metrics",
        "dataset": "haproxy.stat",
        "title": "HAProxy stat metrics"
      }
    ]
  },
  {
    "name": "hadoop",
    "title": "Hadoop",
    "version": "1.6.0",
    "release": "ga",
    "description": "Collect metrics from Apache Hadoop with Elastic Agent.",
    "type": "integration",
    "download": "/epr/hadoop/hadoop-1.6.0.zip",
    "path": "/package/hadoop/1.6.0",
    "icons": [
      {
        "src": "/img/hadoop-logo.svg",
        "path": "/package/hadoop/1.6.0/img/hadoop-logo.svg",
        "title": "Hadoop logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "hadoop_metrics",
        "title": "Hadoop Metrics",
        "description": "Collect hadoop metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability",
      "big_data"
    ],
    "signature_path": "/epr/hadoop/hadoop-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "hadoop.application",
        "title": "Application metrics"
      },
      {
        "type": "metrics",
        "dataset": "hadoop.cluster",
        "title": "Cluster metrics"
      },
      {
        "type": "metrics",
        "dataset": "hadoop.datanode",
        "title": "DataNode metrics"
      },
      {
        "type": "metrics",
        "dataset": "hadoop.namenode",
        "title": "NameNode Metrics"
      },
      {
        "type": "metrics",
        "dataset": "hadoop.node_manager",
        "title": "Node Manager metrics"
      }
    ]
  },
  {
    "name": "hashicorp_vault",
    "title": "Hashicorp Vault",
    "version": "1.22.2",
    "release": "ga",
    "description": "Collect logs and metrics from Hashicorp Vault with Elastic Agent.",
    "type": "integration",
    "download": "/epr/hashicorp_vault/hashicorp_vault-1.22.2.zip",
    "path": "/package/hashicorp_vault/1.22.2",
    "icons": [
      {
        "src": "/img/Vault_VerticalLogo_Color_RGB.svg",
        "path": "/package/hashicorp_vault/1.22.2/img/Vault_VerticalLogo_Color_RGB.svg",
        "title": "Vault Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "hashicorp_vault",
        "title": "Hashicorp Vault",
        "description": "Collect logs and monitor Hashicorp Vault."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-deployment-and-devices"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/hashicorp_vault/hashicorp_vault-1.22.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "hashicorp_vault.audit",
        "title": "Hashicorp Vault Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "hashicorp_vault.log",
        "title": "Hashicorp Vault Operational Logs"
      },
      {
        "type": "metrics",
        "dataset": "hashicorp_vault.metrics",
        "title": "Hashicorp Vault Metrics"
      }
    ]
  },
  {
    "name": "ibmmq",
    "title": "IBM MQ",
    "version": "1.2.5",
    "release": "ga",
    "description": "Collect logs and metrics from IBM MQ with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ibmmq/ibmmq-1.2.5.zip",
    "path": "/package/ibmmq/1.2.5",
    "icons": [
      {
        "src": "/img/ibmmq.svg",
        "path": "/package/ibmmq/1.2.5/img/ibmmq.svg",
        "title": "ibmmq",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ibmmq",
        "title": "IBM MQ logs and metrics",
        "description": "Collect logs and metrics from IBM MQ instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "message_queue",
      "observability"
    ],
    "signature_path": "/epr/ibmmq/ibmmq-1.2.5.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ibmmq.errorlog",
        "title": "IBM MQ Error logs"
      },
      {
        "type": "metrics",
        "dataset": "ibmmq.qmgr",
        "title": "IBM MQ Queue Manager performance metrics"
      }
    ]
  },
  {
    "name": "iis",
    "title": "IIS",
    "version": "1.19.0",
    "release": "ga",
    "description": "Collect logs and metrics from Internet Information Services (IIS) servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/iis/iis-1.19.0.zip",
    "path": "/package/iis/1.19.0",
    "icons": [
      {
        "src": "/img/iis.svg",
        "path": "/package/iis/1.19.0/img/iis.svg",
        "title": "iis",
        "size": "100x100",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "iis",
        "title": "IIS logs and metrics",
        "description": "Collect logs and metrics from IIS instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability"
    ],
    "signature_path": "/epr/iis/iis-1.19.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "iis.access",
        "title": "IIS access logs"
      },
      {
        "type": "metrics",
        "dataset": "iis.application_pool",
        "title": "IIS application_pool metrics"
      },
      {
        "type": "logs",
        "dataset": "iis.error",
        "title": "IIS error logs"
      },
      {
        "type": "metrics",
        "dataset": "iis.webserver",
        "title": "IIS web server metrics"
      },
      {
        "type": "metrics",
        "dataset": "iis.website",
        "title": "IIS website metrics"
      }
    ]
  },
  {
    "name": "imperva",
    "title": "Imperva",
    "version": "1.10.0",
    "release": "ga",
    "description": "Collect logs from Imperva devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/imperva/imperva-1.10.0.zip",
    "path": "/package/imperva/1.10.0",
    "icons": [
      {
        "src": "/img/imperva-logo.svg",
        "path": "/package/imperva/1.10.0/img/imperva-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "securesphere",
        "title": "Imperva SecureSphere",
        "description": "Collect Imperva SecureSphere logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/imperva/imperva-1.10.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "imperva.securesphere",
        "title": "Collect logs from Imperva SecureSphere"
      }
    ]
  },
  {
    "name": "imperva_cloud_waf",
    "title": "Imperva Cloud WAF",
    "version": "0.2.0",
    "release": "beta",
    "description": "Collect logs from Imperva Cloud WAF with Elastic Agent.",
    "type": "integration",
    "download": "/epr/imperva_cloud_waf/imperva_cloud_waf-0.2.0.zip",
    "path": "/package/imperva_cloud_waf/0.2.0",
    "icons": [
      {
        "src": "/img/imperva-logo.svg",
        "path": "/package/imperva_cloud_waf/0.2.0/img/imperva-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "imperva_cloud_waf",
        "title": "Imperva Cloud WAF logs",
        "description": "Collect logs from Imperva Cloud WAF instance."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/imperva_cloud_waf/imperva_cloud_waf-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "imperva_cloud_waf.event",
        "title": "Collect Imperva Cloud WAF Events"
      }
    ]
  },
  {
    "name": "influxdb",
    "title": "InfluxDb",
    "version": "0.8.0",
    "release": "beta",
    "description": "Collect metrics from Influxdb database",
    "type": "integration",
    "download": "/epr/influxdb/influxdb-0.8.0.zip",
    "path": "/package/influxdb/0.8.0",
    "icons": [
      {
        "src": "/img/influxdb-logo.svg",
        "path": "/package/influxdb/0.8.0/img/influxdb-logo.svg",
        "title": "Influxdb logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "influxdb",
        "title": "InfluxDb Status",
        "description": "Collect InfluxDb status metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/influxdb/influxdb-0.8.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "influxdb.advstatus",
        "title": "InfluxDB database advanced status metrics"
      },
      {
        "type": "metrics",
        "dataset": "influxdb.status",
        "title": "InfluxDB database status metrics"
      }
    ]
  },
  {
    "name": "infoblox_bloxone_ddi",
    "title": "Infoblox BloxOne DDI",
    "version": "1.15.0",
    "release": "ga",
    "description": "Collect logs from Infoblox BloxOne DDI with Elastic Agent.",
    "type": "integration",
    "download": "/epr/infoblox_bloxone_ddi/infoblox_bloxone_ddi-1.15.0.zip",
    "path": "/package/infoblox_bloxone_ddi/1.15.0",
    "icons": [
      {
        "src": "/img/infoblox-bloxone-ddi-logo.svg",
        "path": "/package/infoblox_bloxone_ddi/1.15.0/img/infoblox-bloxone-ddi-logo.svg",
        "title": "Infoblox BloxOne DDI logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "infoblox_bloxone_ddi",
        "title": "Infoblox BloxOne DDI",
        "description": "Collect logs from Infoblox BloxOne DDI."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "dns_security"
    ],
    "signature_path": "/epr/infoblox_bloxone_ddi/infoblox_bloxone_ddi-1.15.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "infoblox_bloxone_ddi.dhcp_lease",
        "title": "Collect DHCP Lease logs from Infoblox BloxOne DDI"
      },
      {
        "type": "logs",
        "dataset": "infoblox_bloxone_ddi.dns_config",
        "title": "Collect DNS Config logs from Infoblox BloxOne DDI"
      },
      {
        "type": "logs",
        "dataset": "infoblox_bloxone_ddi.dns_data",
        "title": "Collect DNS Data logs from Infoblox BloxOne DDI"
      }
    ]
  },
  {
    "name": "infoblox_nios",
    "title": "Infoblox NIOS",
    "version": "1.22.0",
    "release": "ga",
    "description": "Collect logs from Infoblox NIOS with Elastic Agent.",
    "type": "integration",
    "download": "/epr/infoblox_nios/infoblox_nios-1.22.0.zip",
    "path": "/package/infoblox_nios/1.22.0",
    "icons": [
      {
        "src": "/img/infoblox-logo.svg",
        "path": "/package/infoblox_nios/1.22.0/img/infoblox-logo.svg",
        "title": "Infoblox NIOS logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Infoblox NIOS",
        "title": "Infoblox NIOS logs",
        "description": "Collect Infoblox NIOS logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "dns_security"
    ],
    "signature_path": "/epr/infoblox_nios/infoblox_nios-1.22.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "infoblox_nios.log",
        "title": "Infoblox NIOS logs"
      }
    ]
  },
  {
    "name": "iptables",
    "title": "Iptables",
    "version": "1.23.0",
    "release": "ga",
    "description": "Collect logs from Iptables with Elastic Agent.",
    "type": "integration",
    "download": "/epr/iptables/iptables-1.23.0.zip",
    "path": "/package/iptables/1.23.0",
    "icons": [
      {
        "src": "/img/linux.svg",
        "path": "/package/iptables/1.23.0/img/linux.svg",
        "title": "linux",
        "size": "299x354",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "iptables",
        "title": "Iptables logs",
        "description": "Collect logs from iptables instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/iptables/iptables-1.23.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "iptables.log",
        "title": "Iptables log logs"
      }
    ]
  },
  {
    "name": "istio",
    "title": "Istio",
    "version": "0.8.0",
    "release": "beta",
    "description": "Collect logs and metrics from the service mesh Istio with Elastic Agent.",
    "type": "integration",
    "download": "/epr/istio/istio-0.8.0.zip",
    "path": "/package/istio/0.8.0",
    "icons": [
      {
        "src": "/img/logo_istio.svg",
        "path": "/package/istio/0.8.0/img/logo_istio.svg",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "istio",
        "title": "Istio logs and metrics",
        "description": "Collect access logs and metrics from Istio service mesh.",
        "data_streams": [
          "access_logs",
          "proxy_metrics",
          "istiod_metrics"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "observability",
      "network",
      "containers",
      "kubernetes"
    ],
    "signature_path": "/epr/istio/istio-0.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "istio.access_logs",
        "title": "Istio access logs"
      },
      {
        "type": "metrics",
        "dataset": "istio.istiod_metrics",
        "title": "Istiod Metrics"
      },
      {
        "type": "metrics",
        "dataset": "istio.proxy_metrics",
        "title": "Istio Proxy Metrics"
      }
    ]
  },
  {
    "name": "jamf_compliance_reporter",
    "title": "Jamf Compliance Reporter",
    "version": "1.12.0",
    "release": "ga",
    "description": "Collect logs from Jamf Compliance Reporter with Elastic Agent.",
    "type": "integration",
    "download": "/epr/jamf_compliance_reporter/jamf_compliance_reporter-1.12.0.zip",
    "path": "/package/jamf_compliance_reporter/1.12.0",
    "icons": [
      {
        "src": "/img/jamf-compliance-reporter-logo.svg",
        "path": "/package/jamf_compliance_reporter/1.12.0/img/jamf-compliance-reporter-logo.svg",
        "title": "Jamf Compliance Reporter Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Jamf Compliance Reporter",
        "title": "Jamf Compliance Reporter logs",
        "description": "Collect Jamf Compliance Reporter logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/jamf_compliance_reporter/jamf_compliance_reporter-1.12.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "jamf_compliance_reporter.log",
        "title": "Jamf Compliance Reporter logs"
      }
    ]
  },
  {
    "name": "jolokia",
    "title": "Jolokia Input",
    "version": "0.4.0",
    "release": "beta",
    "description": "Collects Metrics from Jolokia Agents",
    "type": "input",
    "download": "/epr/jolokia/jolokia-0.4.0.zip",
    "path": "/package/jolokia/0.4.0",
    "icons": [
      {
        "src": "/img/jolokia_logo.svg",
        "path": "/package/jolokia/0.4.0/img/jolokia_logo.svg",
        "title": "Jolokia logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "jolokia",
        "title": "Jolokia Metrics",
        "description": "Collect Jolokia metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/jolokia/jolokia-0.4.0.zip.sig"
  },
  {
    "name": "jumpcloud",
    "title": "JumpCloud",
    "version": "1.9.1",
    "release": "ga",
    "description": "Collect logs from JumpCloud Directory as a Service",
    "type": "integration",
    "download": "/epr/jumpcloud/jumpcloud-1.9.1.zip",
    "path": "/package/jumpcloud/1.9.1",
    "icons": [
      {
        "src": "/img/jumpcloud.svg",
        "path": "/package/jumpcloud/1.9.1/img/jumpcloud.svg",
        "title": "JumpCloud",
        "size": "100x100",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "jumpcloud",
        "title": "JumpCloud Events",
        "description": "Collect JumpCloud Directory as a Service Events"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "security"
    ],
    "signature_path": "/epr/jumpcloud/jumpcloud-1.9.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "jumpcloud.events",
        "title": "JumpCloud Directory as a Service Events"
      }
    ]
  },
  {
    "name": "juniper",
    "title": "Juniper Logs",
    "version": "1.2.0",
    "release": "ga",
    "description": "Deprecated. Use a specific Juniper package instead.",
    "type": "integration",
    "download": "/epr/juniper/juniper-1.2.0.zip",
    "path": "/package/juniper/1.2.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/juniper/1.2.0/img/logo.svg",
        "title": "Juniper logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "juniper",
        "title": "Juniper logs",
        "description": "Collect Juniper logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.0.0"
      }
    },
    "owner": {
      "github": "elastic/security-external-integrations"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/juniper/juniper-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "juniper.junos",
        "title": "Juniper JUNOS logs"
      },
      {
        "type": "logs",
        "dataset": "juniper.netscreen",
        "title": "Netscreen logs"
      },
      {
        "type": "logs",
        "dataset": "juniper.srx",
        "title": "Juniper SRX logs"
      }
    ]
  },
  {
    "name": "juniper_srx",
    "title": "Juniper SRX",
    "version": "1.27.0",
    "release": "ga",
    "description": "Collect logs from Juniper SRX devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/juniper_srx/juniper_srx-1.27.0.zip",
    "path": "/package/juniper_srx/1.27.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/juniper_srx/1.27.0/img/logo.svg",
        "title": "Juniper logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "juniper",
        "title": "Juniper SRX logs",
        "description": "Collect Juniper SRX logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "firewall_security"
    ],
    "signature_path": "/epr/juniper_srx/juniper_srx-1.27.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "juniper_srx.log",
        "title": "Juniper SRX logs"
      }
    ]
  },
  {
    "name": "kafka",
    "title": "Kafka",
    "version": "1.12.1",
    "release": "ga",
    "description": "Collect logs and metrics from Kafka servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/kafka/kafka-1.12.1.zip",
    "path": "/package/kafka/1.12.1",
    "icons": [
      {
        "src": "/img/logo_kafka.svg",
        "path": "/package/kafka/1.12.1/img/logo_kafka.svg",
        "title": "logo kafka",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kafka",
        "title": "Kafka logs and metrics",
        "description": "Collect logs and metrics from Kafka brokers"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "stream_processing",
      "observability"
    ],
    "signature_path": "/epr/kafka/kafka-1.12.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "kafka.broker",
        "title": "Kafka broker metrics"
      },
      {
        "type": "metrics",
        "dataset": "kafka.consumergroup",
        "title": "Kafka consumergroup metrics"
      },
      {
        "type": "logs",
        "dataset": "kafka.log",
        "title": "Kafka log logs"
      },
      {
        "type": "metrics",
        "dataset": "kafka.partition",
        "title": "Kafka partition metrics"
      }
    ]
  },
  {
    "name": "keycloak",
    "title": "Keycloak",
    "version": "1.21.0",
    "release": "ga",
    "description": "Collect logs from Keycloak with Elastic Agent.",
    "type": "integration",
    "download": "/epr/keycloak/keycloak-1.21.0.zip",
    "path": "/package/keycloak/1.21.0",
    "icons": [
      {
        "src": "/img/keycloak-logo.svg",
        "path": "/package/keycloak/1.21.0/img/keycloak-logo.svg",
        "title": "Keycloak",
        "size": "256x256",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "keycloak",
        "title": "Keycloak logs",
        "description": "Collect logs from Keycloak"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.16.0 || ^8.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/keycloak/keycloak-1.21.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "keycloak.log",
        "title": "Keycloak"
      }
    ]
  },
  {
    "name": "kibana",
    "title": "Kibana",
    "version": "2.8.0",
    "release": "ga",
    "description": "Collect logs and metrics from Kibana with Elastic Agent.",
    "type": "integration",
    "download": "/epr/kibana/kibana-2.8.0.zip",
    "path": "/package/kibana/2.8.0",
    "icons": [
      {
        "src": "/img/logo_kibana.svg",
        "path": "/package/kibana/2.8.0/img/logo_kibana.svg",
        "title": "logo kibana",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kibana",
        "title": "Kibana logs and metrics",
        "description": "Collect logs and metrics from Kibana instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/stack-monitoring"
    },
    "categories": [
      "elastic_stack"
    ],
    "signature_path": "/epr/kibana/kibana-2.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "kibana.audit",
        "title": "kibana audit logs"
      },
      {
        "type": "metrics",
        "dataset": "kibana.background_task_utilization",
        "title": "Kibana background task utilization metrics"
      },
      {
        "type": "metrics",
        "dataset": "kibana.stack_monitoring.cluster_actions",
        "title": "Kibana cluster_actions metrics"
      },
      {
        "type": "metrics",
        "dataset": "kibana.stack_monitoring.cluster_rules",
        "title": "Kibana cluster_rules metrics"
      },
      {
        "type": "logs",
        "dataset": "kibana.log",
        "title": "Kibana logs"
      },
      {
        "type": "metrics",
        "dataset": "kibana.stack_monitoring.node_actions",
        "title": "Kibana node_actions metrics"
      },
      {
        "type": "metrics",
        "dataset": "kibana.stack_monitoring.node_rules",
        "title": "Kibana node_rules metrics"
      },
      {
        "type": "metrics",
        "dataset": "kibana.stack_monitoring.stats",
        "title": "Kibana stats metrics"
      },
      {
        "type": "metrics",
        "dataset": "kibana.stack_monitoring.status",
        "title": "Kibana status metrics"
      },
      {
        "type": "metrics",
        "dataset": "kibana.task_manager_metrics",
        "title": "Kibana task manager metrics"
      }
    ]
  },
  {
    "name": "kubernetes",
    "title": "Kubernetes",
    "version": "1.55.1",
    "release": "ga",
    "description": "Collect logs and metrics from Kubernetes clusters with Elastic Agent.",
    "type": "integration",
    "download": "/epr/kubernetes/kubernetes-1.55.1.zip",
    "path": "/package/kubernetes/1.55.1",
    "icons": [
      {
        "src": "/img/logo_kubernetes.svg",
        "path": "/package/kubernetes/1.55.1/img/logo_kubernetes.svg",
        "title": "Logo Kubernetes",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kubelet",
        "title": "Kubelet Metrics",
        "description": "Collect metrics from Kubernetes Kubelet API with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.55.1/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "container",
          "node",
          "pod",
          "system",
          "volume"
        ]
      },
      {
        "name": "kube-state-metrics",
        "title": "Kube-state-metrics",
        "description": "Collect container metrics from Kubernetes Kube-state-metrics with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.55.1/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "state_container",
          "state_cronjob",
          "state_daemonset",
          "state_deployment",
          "state_job",
          "state_namespace",
          "state_node",
          "state_persistentvolume",
          "state_persistentvolumeclaim",
          "state_pod",
          "state_replicaset",
          "state_resourcequota",
          "state_service",
          "state_statefulset",
          "state_storageclass"
        ]
      },
      {
        "name": "kube-apiserver",
        "title": "Kube-apiserver Metrics",
        "description": "Collect metrics from Kubernetes API Server with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.55.1/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "apiserver"
        ]
      },
      {
        "name": "kube-proxy",
        "title": "Kube-proxy Metrics",
        "description": "Collect metrics from Kubernetes Proxy server with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.55.1/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "proxy"
        ]
      },
      {
        "name": "kube-scheduler",
        "title": "Kube-scheduler Metrics",
        "description": "Collect metrics from Kubernetes Scheduler with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.55.1/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "scheduler"
        ]
      },
      {
        "name": "kube-controller-manager",
        "title": "Kube-controller-manager Metrics",
        "description": "Collect metrics from Kubernetes Controller Manager with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.55.1/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "controllermanager"
        ]
      },
      {
        "name": "events",
        "title": "Kubernetes Event Metrics",
        "description": "Collect events related metrics from Kubernetes API server with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.55.1/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "event"
        ]
      },
      {
        "name": "container-logs",
        "title": "Kubernetes Container Logs",
        "description": "Collect container related logs from Kubernetes clusters with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.55.1/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "container_logs"
        ]
      },
      {
        "name": "audit-logs",
        "title": "Kubernetes Audit Logs",
        "description": "Collect audit logs from Kubernetes nodes with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.55.1/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "audit_logs"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      }
    },
    "owner": {
      "github": "elastic/obs-cloudnative-monitoring"
    },
    "categories": [
      "observability",
      "containers",
      "kubernetes"
    ],
    "signature_path": "/epr/kubernetes/kubernetes-1.55.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "kubernetes.apiserver",
        "title": "Kubernetes API Server metrics"
      },
      {
        "type": "logs",
        "dataset": "kubernetes.audit_logs",
        "title": "Kubernetes audit logs"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.container",
        "title": "Kubernetes Container metrics"
      },
      {
        "type": "logs",
        "dataset": "kubernetes.container_logs",
        "title": "Kubernetes container logs"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.controllermanager",
        "title": "Kubernetes Controller Manager metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.event",
        "title": "Kubernetes Event metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.node",
        "title": "Kubernetes Node metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.pod",
        "title": "Kubernetes Pod metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.proxy",
        "title": "Kubernetes Proxy metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.scheduler",
        "title": "Kubernetes Scheduler metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_container",
        "title": "Kubernetes Container metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_cronjob",
        "title": "Kubernetes Cronjob metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_daemonset",
        "title": "Kubernetes Deamonset metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_deployment",
        "title": "Kubernetes Deployment metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_job",
        "title": "Kubernetes Job metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_namespace",
        "title": "Kubernetes Namespace metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_node",
        "title": "Kubernetes Node metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_persistentvolume",
        "title": "Kubernetes PersistentVolume metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_persistentvolumeclaim",
        "title": "Kubernetes PersistentVolumeClaim metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_pod",
        "title": "Kubernetes Pod metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_replicaset",
        "title": "Kubernetes state_replicaset metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_resourcequota",
        "title": "Kubernetes ResourceQuota metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_service",
        "title": "Kubernetes Service metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_statefulset",
        "title": "Kubernetes StatefulSet metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_storageclass",
        "title": "Kubernetes StorageClass metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.system",
        "title": "Kubernetes System metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.volume",
        "title": "Kubernetes Volume metrics"
      }
    ]
  },
  {
    "name": "lastpass",
    "title": "LastPass",
    "version": "1.14.2",
    "release": "ga",
    "description": "Collect logs from LastPass with Elastic Agent.",
    "type": "integration",
    "download": "/epr/lastpass/lastpass-1.14.2.zip",
    "path": "/package/lastpass/1.14.2",
    "icons": [
      {
        "src": "/img/lastpass-logo.svg",
        "path": "/package/lastpass/1.14.2/img/lastpass-logo.svg",
        "title": "LastPass Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "lastpass",
        "title": "LastPass",
        "description": "Collect logs from LastPass."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "credential_management"
    ],
    "signature_path": "/epr/lastpass/lastpass-1.14.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "lastpass.detailed_shared_folder",
        "title": "Collect Detailed Shared Folder logs from LastPass"
      },
      {
        "type": "logs",
        "dataset": "lastpass.event_report",
        "title": "Collect Event Report logs from LastPass"
      },
      {
        "type": "logs",
        "dataset": "lastpass.user",
        "title": "Collect User logs from LastPass"
      }
    ]
  },
  {
    "name": "lmd",
    "title": "Lateral Movement Detection",
    "version": "2.6.3",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "ML package to detect lateral movement based on file transfer activity and Windows RDP events.",
    "type": "integration",
    "download": "/epr/lmd/lmd-2.6.3.zip",
    "path": "/package/lmd/2.6.3",
    "icons": [
      {
        "src": "/img/icon-machine-learning.svg",
        "path": "/package/lmd/2.6.3/img/icon-machine-learning.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "platinum",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-applied-ml"
    },
    "categories": [
      "security",
      "advanced_analytics_ueba"
    ],
    "signature_path": "/epr/lmd/lmd-2.6.3.zip.sig"
  },
  {
    "name": "linux",
    "title": "Linux Metrics",
    "version": "0.6.12",
    "release": "beta",
    "description": "Collect metrics from Linux servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/linux/linux-0.6.12.zip",
    "path": "/package/linux/0.6.12",
    "policy_templates": [
      {
        "name": "system",
        "title": "Linux kernel metrics",
        "description": "Collect system metrics from Linux operating systems"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.14.0 || ^8.0.0"
      }
    },
    "owner": {
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "os_system"
    ],
    "signature_path": "/epr/linux/linux-0.6.12.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "linux.conntrack",
        "title": "System conntrack metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.entropy",
        "title": "System entropy metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.iostat",
        "title": "Linux disk iostat metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.ksm",
        "title": "Kernel Samepage merging metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.memory",
        "title": "Linux-only memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.network_summary",
        "title": "System network_summary metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.pageinfo",
        "title": "System page info metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.raid",
        "title": "System raid metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.service",
        "title": "System service metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.socket",
        "title": "System socket metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.users",
        "title": "System users metrics"
      }
    ]
  },
  {
    "name": "problemchild",
    "title": "Living off the Land Attack Detection",
    "version": "2.4.6",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "ML solution package to detect Living off the Land (LotL) attacks in your environment. Requires a Platinum subscription.",
    "type": "integration",
    "download": "/epr/problemchild/problemchild-2.4.6.zip",
    "path": "/package/problemchild/2.4.6",
    "icons": [
      {
        "src": "/img/icon-machine-learning.svg",
        "path": "/package/problemchild/2.4.6/img/icon-machine-learning.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "platinum",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-applied-ml"
    },
    "categories": [
      "security",
      "advanced_analytics_ueba"
    ],
    "signature_path": "/epr/problemchild/problemchild-2.4.6.zip.sig"
  },
  {
    "name": "logstash",
    "title": "Logstash",
    "version": "2.5.0",
    "release": "ga",
    "description": "Collect logs and metrics from Logstash with Elastic Agent.",
    "type": "integration",
    "download": "/epr/logstash/logstash-2.5.0.zip",
    "path": "/package/logstash/2.5.0",
    "icons": [
      {
        "src": "/img/logo_logstash.svg",
        "path": "/package/logstash/2.5.0/img/logo_logstash.svg",
        "title": "logo logstash",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logstash",
        "title": "Logstash logs and metrics",
        "description": "Collect logs and metrics from Logstash instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/logstash"
    },
    "categories": [
      "observability",
      "elastic_stack"
    ],
    "signature_path": "/epr/logstash/logstash-2.5.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "logstash.log",
        "title": "Logstash logs"
      },
      {
        "type": "metrics",
        "dataset": "logstash.stack_monitoring.node",
        "title": "Logstash node metrics"
      },
      {
        "type": "metrics",
        "dataset": "logstash.node",
        "title": "Logstash Node Stats"
      },
      {
        "type": "metrics",
        "dataset": "logstash.stack_monitoring.node_stats",
        "title": "Logstash node_stats metrics"
      },
      {
        "type": "metrics",
        "dataset": "logstash.pipeline",
        "title": "Logstash pipeline"
      },
      {
        "type": "metrics",
        "dataset": "logstash.plugins",
        "title": "Logstash plugins"
      },
      {
        "type": "logs",
        "dataset": "logstash.slowlog",
        "title": "logstash slowlog logs"
      }
    ]
  },
  {
    "name": "lyve_cloud",
    "title": "Lyve Cloud",
    "version": "1.12.1",
    "release": "ga",
    "description": "Collect S3 API audit log from Lyve Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/lyve_cloud/lyve_cloud-1.12.1.zip",
    "path": "/package/lyve_cloud/1.12.1",
    "icons": [
      {
        "src": "/img/LyveCloud-Logo.svg",
        "path": "/package/lyve_cloud/1.12.1/img/LyveCloud-Logo.svg",
        "title": "Seagate-Lyve-Cloud",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Seagate Lyve Cloud",
        "title": "Lyve Cloud logs",
        "description": "Collect logs from Lyve Cloud"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.5.0"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/lyve_cloud/lyve_cloud-1.12.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "lyve_cloud.audit",
        "title": "Lyve Cloud logs"
      }
    ]
  },
  {
    "name": "ti_misp",
    "title": "MISP",
    "version": "1.31.0",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from MISP platform with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_misp/ti_misp-1.31.0.zip",
    "path": "/package/ti_misp/1.31.0",
    "icons": [
      {
        "src": "/img/misp.svg",
        "path": "/package/ti_misp/1.31.0/img/misp.svg",
        "title": "MISP",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_misp",
        "title": "MISP",
        "description": "Ingest threat intelligence indicators from MISP platform with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_misp/ti_misp-1.31.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_misp.threat",
        "title": "MISP"
      },
      {
        "type": "logs",
        "dataset": "ti_misp.threat_attributes",
        "title": "MISP"
      }
    ]
  },
  {
    "name": "ti_maltiverse",
    "title": "Maltiverse",
    "version": "1.0.1",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from Maltiverse feeds with Elastic Agent",
    "type": "integration",
    "download": "/epr/ti_maltiverse/ti_maltiverse-1.0.1.zip",
    "path": "/package/ti_maltiverse/1.0.1",
    "icons": [
      {
        "src": "/img/logo-maltiverse.svg",
        "path": "/package/ti_maltiverse/1.0.1/img/logo-maltiverse.svg",
        "title": "Maltiverse",
        "size": "678x566",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_maltiverse",
        "title": "Maltiverse",
        "description": "Ingest threat intelligence indicators from Maltiverse feeds with Elastic Agent"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_maltiverse/ti_maltiverse-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_maltiverse.indicator",
        "title": "Maltiverse indicator"
      }
    ]
  },
  {
    "name": "ti_mandiant_advantage",
    "title": "Mandiant Advantage",
    "version": "1.0.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Threat Intelligence from products within the Mandiant Advantage platform.",
    "type": "integration",
    "download": "/epr/ti_mandiant_advantage/ti_mandiant_advantage-1.0.1.zip",
    "path": "/package/ti_mandiant_advantage/1.0.1",
    "icons": [
      {
        "src": "/img/mandiant-logo.svg",
        "path": "/package/ti_mandiant_advantage/1.0.1/img/mandiant-logo.svg",
        "title": "Mandiant logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_mandiant_advantage",
        "title": "Mandiant Advantage",
        "description": "Collect Threat Intelligence from products within the Mandiant Advantage platform."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.6.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "threat_intel",
      "security"
    ],
    "signature_path": "/epr/ti_mandiant_advantage/ti_mandiant_advantage-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_mandiant_advantage.threat_intelligence",
        "title": "Mandiant Threat Intelligence"
      }
    ]
  },
  {
    "name": "mattermost",
    "title": "Mattermost",
    "version": "2.0.1",
    "release": "ga",
    "description": "Collect logs from Mattermost with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mattermost/mattermost-2.0.1.zip",
    "path": "/package/mattermost/2.0.1",
    "icons": [
      {
        "src": "/img/mattermost-logo.svg",
        "path": "/package/mattermost/2.0.1/img/mattermost-logo.svg",
        "title": "Mattermost logo",
        "size": "537x535",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Mattermost Logs",
        "description": "Collect logs from Mattermost"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.16.0 || ^8.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/mattermost/mattermost-2.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "mattermost.audit",
        "title": "Audit Logs"
      }
    ]
  },
  {
    "name": "memcached",
    "title": "Memcached",
    "version": "1.4.0",
    "release": "ga",
    "description": "Memcached Integration",
    "type": "integration",
    "download": "/epr/memcached/memcached-1.4.0.zip",
    "path": "/package/memcached/1.4.0",
    "icons": [
      {
        "src": "/img/logo_memcached.svg",
        "path": "/package/memcached/1.4.0/img/logo_memcached.svg",
        "title": "logo memcached",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "memcached",
        "title": "Memcached metrics",
        "description": "Collect metrics from Memcached instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/memcached/memcached-1.4.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "memcached.stats",
        "title": "Memcached stats metrics"
      }
    ]
  },
  {
    "name": "o365",
    "title": "Microsoft 365",
    "version": "2.2.2",
    "release": "ga",
    "description": "Collect logs from Microsoft 365 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/o365/o365-2.2.2.zip",
    "path": "/package/o365/2.2.2",
    "icons": [
      {
        "src": "/img/logo-integrations-microsoft-365.svg",
        "path": "/package/o365/2.2.2/img/logo-integrations-microsoft-365.svg",
        "title": "Microsoft Office 365",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "o365",
        "title": "Office 365 logs",
        "description": "Collect logs from Office 365"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/o365/o365-2.2.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "o365.audit",
        "title": "Office 365 audit logs"
      }
    ]
  },
  {
    "name": "microsoft_dhcp",
    "title": "Microsoft DHCP",
    "version": "1.27.0",
    "release": "ga",
    "description": "Collect logs from Microsoft DHCP with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_dhcp/microsoft_dhcp-1.27.0.zip",
    "path": "/package/microsoft_dhcp/1.27.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/microsoft_dhcp/1.27.0/img/logo.svg",
        "title": "Microsoft logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_dhcp",
        "title": "Microsoft DHCP",
        "description": "Collect Microsoft DHCP logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/microsoft_dhcp/microsoft_dhcp-1.27.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_dhcp.log",
        "title": "Microsoft DHCP Logs"
      }
    ]
  },
  {
    "name": "microsoft_defender_cloud",
    "title": "Microsoft Defender for Cloud",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect logs from Microsoft Defender for Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_defender_cloud/microsoft_defender_cloud-1.0.1.zip",
    "path": "/package/microsoft_defender_cloud/1.0.1",
    "icons": [
      {
        "src": "/img/microsoft-defender-cloud-logo.svg",
        "path": "/package/microsoft_defender_cloud/1.0.1/img/microsoft-defender-cloud-logo.svg",
        "title": "Microsoft Defender for Cloud logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_defender_cloud",
        "title": "Microsoft Defender for Cloud Logs",
        "description": "Collect logs from Microsoft Defender for Cloud."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/microsoft_defender_cloud/microsoft_defender_cloud-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_defender_cloud.event",
        "title": "Collect Event(Alert and Recommendation) logs from Microsoft Defender for Cloud."
      }
    ]
  },
  {
    "name": "microsoft_defender_endpoint",
    "title": "Microsoft Defender for Endpoint",
    "version": "2.23.3",
    "release": "ga",
    "description": "Collect logs from Microsoft Defender for Endpoint with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_defender_endpoint/microsoft_defender_endpoint-2.23.3.zip",
    "path": "/package/microsoft_defender_endpoint/2.23.3",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/microsoft_defender_endpoint/2.23.3/img/logo.svg",
        "title": "Microsoft Defender for Endpoint logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_defender_endpoint",
        "title": "Microsoft Defender for Endpoint",
        "description": "Collect logs from Microsoft Defender for Endpoint"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/microsoft_defender_endpoint/microsoft_defender_endpoint-2.23.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_defender_endpoint.log",
        "title": "Microsoft Defender for Endpoint logs"
      }
    ]
  },
  {
    "name": "entityanalytics_entra_id",
    "title": "Microsoft Entra ID Entity Analytics",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect identities from Microsoft Entra ID (formerly Azure Active Directory) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/entityanalytics_entra_id/entityanalytics_entra_id-1.0.1.zip",
    "path": "/package/entityanalytics_entra_id/1.0.1",
    "icons": [
      {
        "src": "/img/logo-azure.svg",
        "path": "/package/entityanalytics_entra_id/1.0.1/img/logo-azure.svg",
        "title": "Azure logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "entity",
        "title": "Identities",
        "description": "Collect identities."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "azure",
      "cloud",
      "security"
    ],
    "signature_path": "/epr/entityanalytics_entra_id/entityanalytics_entra_id-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "entityanalytics_entra_id.device",
        "title": "Microsoft Entra ID Entity Analytics Device Events"
      },
      {
        "type": "logs",
        "dataset": "entityanalytics_entra_id.entity",
        "title": "Identities"
      },
      {
        "type": "logs",
        "dataset": "entityanalytics_entra_id.user",
        "title": "Microsoft Entra ID Entity Analytics User Events"
      }
    ]
  },
  {
    "name": "microsoft_exchange_online_message_trace",
    "title": "Microsoft Exchange Online Message Trace",
    "version": "1.18.1",
    "release": "ga",
    "description": "Microsoft Exchange Online Message Trace Integration",
    "type": "integration",
    "download": "/epr/microsoft_exchange_online_message_trace/microsoft_exchange_online_message_trace-1.18.1.zip",
    "path": "/package/microsoft_exchange_online_message_trace/1.18.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/microsoft_exchange_online_message_trace/1.18.1/img/logo.svg",
        "title": "Microsoft Exchange Online Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_exchange_online_message_trace",
        "title": "Microsoft Exchange Online Message Trace",
        "description": "Microsoft Exchange Online Message Trace logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/microsoft_exchange_online_message_trace/microsoft_exchange_online_message_trace-1.18.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_exchange_online_message_trace.log",
        "title": "Microsoft Exchange Online Message Trace logs"
      }
    ]
  },
  {
    "name": "microsoft_exchange_server",
    "title": "Microsoft Exchange Server",
    "version": "1.5.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Microsoft Exchange Server with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_exchange_server/microsoft_exchange_server-1.5.1.zip",
    "path": "/package/microsoft_exchange_server/1.5.1",
    "icons": [
      {
        "src": "/img/exchange.svg",
        "path": "/package/microsoft_exchange_server/1.5.1/img/exchange.svg",
        "title": "Exchange Server logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_exchange_server",
        "title": "Microsoft Exchange Server",
        "description": "Microsoft Exchange Server Logs",
        "data_streams": [
          "smtp",
          "httpproxy",
          "messagetracking",
          "imap4_pop3"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/microsoft_exchange_server/microsoft_exchange_server-1.5.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_exchange_server.httpproxy",
        "title": "Exchange HTTPProxy"
      },
      {
        "type": "logs",
        "dataset": "microsoft_exchange_server.imap4_pop3",
        "title": "Exchange Server IMAP4 POP3"
      },
      {
        "type": "logs",
        "dataset": "microsoft_exchange_server.messagetracking",
        "title": "Exchange Messagetracking"
      },
      {
        "type": "logs",
        "dataset": "microsoft_exchange_server.smtp",
        "title": "Exchange SMTP"
      }
    ]
  },
  {
    "name": "m365_defender",
    "title": "Microsoft M365 Defender",
    "version": "2.7.1",
    "release": "ga",
    "description": "Collect logs from Microsoft M365 Defender with Elastic Agent.",
    "type": "integration",
    "download": "/epr/m365_defender/m365_defender-2.7.1.zip",
    "path": "/package/m365_defender/2.7.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/m365_defender/2.7.1/img/logo.svg",
        "title": "M365 logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "m365_defender",
        "title": "M365 Defender Logs",
        "description": "Collect logs from M365 Defender API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/m365_defender/m365_defender-2.7.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "m365_defender.alert",
        "title": "Collect Alert logs from Microsoft 365 Defender"
      },
      {
        "type": "logs",
        "dataset": "m365_defender.event",
        "title": "Collect Event logs from Microsoft 365 Defender."
      },
      {
        "type": "logs",
        "dataset": "m365_defender.incident",
        "title": "Collect Incident logs from Microsoft 365 Defender"
      },
      {
        "type": "logs",
        "dataset": "m365_defender.log",
        "title": "M365 Defender Logs"
      }
    ]
  },
  {
    "name": "microsoft_sqlserver",
    "title": "Microsoft SQL Server",
    "version": "2.4.1",
    "release": "ga",
    "description": "Collect events from Microsoft SQL Server with Elastic Agent",
    "type": "integration",
    "download": "/epr/microsoft_sqlserver/microsoft_sqlserver-2.4.1.zip",
    "path": "/package/microsoft_sqlserver/2.4.1",
    "icons": [
      {
        "src": "/img/microsoft-sql-server-logo.svg",
        "path": "/package/microsoft_sqlserver/2.4.1/img/microsoft-sql-server-logo.svg",
        "title": "Microsoft SQL Server",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "audit_logs",
        "title": "Microsoft SQL Server logs and metrics",
        "description": "Collect logs and metrics from Microsoft SQL Server"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "database_security",
      "security"
    ],
    "signature_path": "/epr/microsoft_sqlserver/microsoft_sqlserver-2.4.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_sqlserver.audit",
        "title": "SQL Server audit events"
      },
      {
        "type": "logs",
        "dataset": "microsoft_sqlserver.log",
        "title": "Microsoft SQL Server error logs"
      },
      {
        "type": "metrics",
        "dataset": "microsoft_sqlserver.performance",
        "title": "Microsoft SQL Server performance metrics"
      },
      {
        "type": "metrics",
        "dataset": "microsoft_sqlserver.transaction_log",
        "title": "Microsoft SQL Server transaction_log metrics"
      }
    ]
  },
  {
    "name": "mimecast",
    "title": "Mimecast",
    "version": "1.22.1",
    "release": "ga",
    "description": "Collect logs from Mimecast with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mimecast/mimecast-1.22.1.zip",
    "path": "/package/mimecast/1.22.1",
    "icons": [
      {
        "src": "/img/mimecast.svg",
        "path": "/package/mimecast/1.22.1/img/mimecast.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mimecast",
        "title": "Mimecast",
        "description": "Collect logs from the Mimecast API with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/mimecast/mimecast-1.22.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "mimecast.archive_search_logs",
        "title": "Archive Search Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.audit_events",
        "title": "Audit Events Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.dlp_logs",
        "title": "DLP Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.siem_logs",
        "title": "SIEM Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.threat_intel_malware_customer",
        "title": "Threat Intel Feed - Malware Customer"
      },
      {
        "type": "logs",
        "dataset": "mimecast.threat_intel_malware_grid",
        "title": "Threat Intel Feed - Malware Grid"
      },
      {
        "type": "logs",
        "dataset": "mimecast.ttp_ap_logs",
        "title": "TTP Attachment Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.ttp_ip_logs",
        "title": "TTP Impersonation Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.ttp_url_logs",
        "title": "TTP URL Logs"
      }
    ]
  },
  {
    "name": "modsecurity",
    "title": "ModSecurity Audit",
    "version": "1.23.1",
    "release": "ga",
    "description": "Collect logs from ModSecurity with Elastic Agent",
    "type": "integration",
    "download": "/epr/modsecurity/modsecurity-1.23.1.zip",
    "path": "/package/modsecurity/1.23.1",
    "icons": [
      {
        "src": "/img/modsec.svg",
        "path": "/package/modsecurity/1.23.1/img/modsec.svg",
        "title": "ModSecurity",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "modsec",
        "title": "ModSecurity audit logs",
        "description": "Collect modsecurity audit logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "web_application_firewall"
    ],
    "signature_path": "/epr/modsecurity/modsecurity-1.23.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "modsecurity.auditlog",
        "title": "Modsecurity Audit Log"
      }
    ]
  },
  {
    "name": "mongodb",
    "title": "MongoDB",
    "version": "1.13.1",
    "release": "ga",
    "description": "Collect logs and metrics from MongoDB instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mongodb/mongodb-1.13.1.zip",
    "path": "/package/mongodb/1.13.1",
    "icons": [
      {
        "src": "/img/logo_mongodb.svg",
        "path": "/package/mongodb/1.13.1/img/logo_mongodb.svg",
        "title": "logo mongodb",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mongodb",
        "title": "MongoDB logs and metrics",
        "description": "Collect logs and metrics from MongoDB instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/mongodb/mongodb-1.13.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "mongodb.collstats",
        "title": "MongoDB collstats metrics"
      },
      {
        "type": "metrics",
        "dataset": "mongodb.dbstats",
        "title": "MongoDB dbstats metrics"
      },
      {
        "type": "logs",
        "dataset": "mongodb.log",
        "title": "mongodb log logs"
      },
      {
        "type": "metrics",
        "dataset": "mongodb.metrics",
        "title": "MongoDB metrics"
      },
      {
        "type": "metrics",
        "dataset": "mongodb.replstatus",
        "title": "MongoDB replstatus metrics"
      },
      {
        "type": "metrics",
        "dataset": "mongodb.status",
        "title": "MongoDB status metrics"
      }
    ]
  },
  {
    "name": "mysql",
    "title": "MySQL",
    "version": "1.18.2",
    "release": "ga",
    "description": "Collect logs and metrics from MySQL servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mysql/mysql-1.18.2.zip",
    "path": "/package/mysql/1.18.2",
    "icons": [
      {
        "src": "/img/logo_mysql.svg",
        "path": "/package/mysql/1.18.2/img/logo_mysql.svg",
        "title": "logo mysql",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mysql",
        "title": "MySQL logs and metrics",
        "description": "Collect logs and metrics from MySQL instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/mysql/mysql-1.18.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "mysql.error",
        "title": "MySQL error logs"
      },
      {
        "type": "metrics",
        "dataset": "mysql.galera_status",
        "title": "MySQL galera_status metrics"
      },
      {
        "type": "metrics",
        "dataset": "mysql.performance",
        "title": "MySQL performance metrics"
      },
      {
        "type": "logs",
        "dataset": "mysql.slowlog",
        "title": "MySQL slowlog logs"
      },
      {
        "type": "metrics",
        "dataset": "mysql.status",
        "title": "MySQL status metrics"
      }
    ]
  },
  {
    "name": "mysql_enterprise",
    "title": "MySQL Enterprise",
    "version": "1.17.0",
    "release": "ga",
    "description": "Collect audit logs from MySQL Enterprise with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mysql_enterprise/mysql_enterprise-1.17.0.zip",
    "path": "/package/mysql_enterprise/1.17.0",
    "icons": [
      {
        "src": "/img/logo_mysql.svg",
        "path": "/package/mysql_enterprise/1.17.0/img/logo_mysql.svg",
        "title": "MySQL",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mysql_enterprise",
        "title": "MySQL Enterprise audit logs",
        "description": "Collect MySQL Enterprise audit logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "security",
      "datastore"
    ],
    "signature_path": "/epr/mysql_enterprise/mysql_enterprise-1.17.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "mysql_enterprise.audit",
        "title": "MySQL Enterprise Audit Log"
      }
    ]
  },
  {
    "name": "nats",
    "title": "NATS",
    "version": "1.6.0",
    "release": "ga",
    "description": "Collect logs and metrics from NATS servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/nats/nats-1.6.0.zip",
    "path": "/package/nats/1.6.0",
    "icons": [
      {
        "src": "/img/nats.svg",
        "path": "/package/nats/1.6.0/img/nats.svg",
        "title": "NATS Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nats",
        "title": "NATS Logs and Metrics",
        "description": "Collect logs and metrics from NATS instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2"
      }
    },
    "owner": {
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "message_queue"
    ],
    "signature_path": "/epr/nats/nats-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "nats.connection",
        "title": "NATS connection metrics"
      },
      {
        "type": "metrics",
        "dataset": "nats.connections",
        "title": "NATS connections metrics"
      },
      {
        "type": "logs",
        "dataset": "nats.log",
        "title": "NATS logs"
      },
      {
        "type": "metrics",
        "dataset": "nats.route",
        "title": "NATS route metrics"
      },
      {
        "type": "metrics",
        "dataset": "nats.routes",
        "title": "NATS routes metrics"
      },
      {
        "type": "metrics",
        "dataset": "nats.stats",
        "title": "NATS stats metrics"
      },
      {
        "type": "metrics",
        "dataset": "nats.subscriptions",
        "title": "NATS subscriptions metrics"
      }
    ]
  },
  {
    "name": "nagios_xi",
    "title": "Nagios XI",
    "version": "1.2.1",
    "release": "ga",
    "description": "Collect Logs and Metrics from Nagios XI with Elastic Agent.",
    "type": "integration",
    "download": "/epr/nagios_xi/nagios_xi-1.2.1.zip",
    "path": "/package/nagios_xi/1.2.1",
    "icons": [
      {
        "src": "/img/nagios_xi-logo.svg",
        "path": "/package/nagios_xi/1.2.1/img/nagios_xi-logo.svg",
        "title": "Nagios XI logo",
        "size": "512x512",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nagios",
        "title": "Nagios XI logs and metrics",
        "description": "Collect Nagios XI logs and metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.3.0"
      }
    },
    "owner": {
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "monitoring"
    ],
    "signature_path": "/epr/nagios_xi/nagios_xi-1.2.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "nagios_xi.events",
        "title": "Events"
      },
      {
        "type": "logs",
        "dataset": "nagios_xi.host",
        "title": "Host"
      },
      {
        "type": "logs",
        "dataset": "nagios_xi.service",
        "title": "Service"
      }
    ]
  },
  {
    "name": "netflow",
    "title": "NetFlow Records",
    "version": "2.20.0",
    "release": "ga",
    "description": "Collect flow records from NetFlow and IPFIX exporters with Elastic Agent.",
    "type": "integration",
    "download": "/epr/netflow/netflow-2.20.0.zip",
    "path": "/package/netflow/2.20.0",
    "policy_templates": [
      {
        "name": "netflow",
        "title": "NetFlow logs",
        "description": "Collect Netflow logs from networks via UDP"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-deployment-and-devices"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/netflow/netflow-2.20.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "netflow.log",
        "title": "NetFlow logs"
      }
    ]
  },
  {
    "name": "netskope",
    "title": "Netskope",
    "version": "1.18.0",
    "release": "ga",
    "description": "Collect logs from Netskope with Elastic Agent.",
    "type": "integration",
    "download": "/epr/netskope/netskope-1.18.0.zip",
    "path": "/package/netskope/1.18.0",
    "icons": [
      {
        "src": "/img/netskope-logo.svg",
        "path": "/package/netskope/1.18.0/img/netskope-logo.svg",
        "title": "Netskope logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "netskope",
        "title": "Netskope logs",
        "description": "Collect Netskope logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/netskope/netskope-1.18.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "netskope.alerts",
        "title": "Alerts"
      },
      {
        "type": "logs",
        "dataset": "netskope.events",
        "title": "Events"
      }
    ]
  },
  {
    "name": "beaconing",
    "title": "Network Beaconing Identification",
    "version": "1.6.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Package to identify beaconing activity in your network events.",
    "type": "integration",
    "download": "/epr/beaconing/beaconing-1.6.0.zip",
    "path": "/package/beaconing/1.6.0",
    "icons": [
      {
        "src": "/img/icon-machine-learning.svg",
        "path": "/package/beaconing/1.6.0/img/icon-machine-learning.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "platinum",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-applied-ml"
    },
    "categories": [
      "security",
      "advanced_analytics_ueba",
      "network_security"
    ],
    "signature_path": "/epr/beaconing/beaconing-1.6.0.zip.sig"
  },
  {
    "name": "network_traffic",
    "title": "Network Packet Capture",
    "version": "1.33.0",
    "release": "ga",
    "description": "Capture and analyze network traffic from a host with Elastic Agent.",
    "type": "integration",
    "download": "/epr/network_traffic/network_traffic-1.33.0.zip",
    "path": "/package/network_traffic/1.33.0",
    "policy_templates": [
      {
        "name": "network",
        "title": "Network Packet Capture",
        "description": "Capture network traffic"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.6.2 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/network_traffic/network_traffic-1.33.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "network_traffic.amqp",
        "title": "AMQP"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.cassandra",
        "title": "Cassandra"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.dhcpv4",
        "title": "DHCP"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.dns",
        "title": "DNS"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.flow",
        "title": "Flows"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.http",
        "title": "HTTP"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.icmp",
        "title": "ICMP"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.memcached",
        "title": "Memcached"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.mongodb",
        "title": "MongoDB"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.mysql",
        "title": "MySQL"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.nfs",
        "title": "NFS"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.pgsql",
        "title": "PostgreSQL"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.redis",
        "title": "Redis"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.sip",
        "title": "SIP"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.thrift",
        "title": "Thrift"
      },
      {
        "type": "logs",
        "dataset": "network_traffic.tls",
        "title": "TLS"
      }
    ]
  },
  {
    "name": "nginx",
    "title": "Nginx",
    "version": "1.19.1",
    "release": "ga",
    "description": "Collect logs and metrics from Nginx HTTP servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/nginx/nginx-1.19.1.zip",
    "path": "/package/nginx/1.19.1",
    "icons": [
      {
        "src": "/img/logo_nginx.svg",
        "path": "/package/nginx/1.19.1/img/logo_nginx.svg",
        "title": "logo nginx",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nginx",
        "title": "Nginx logs and metrics",
        "description": "Collect logs and metrics from Nginx instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability"
    ],
    "signature_path": "/epr/nginx/nginx-1.19.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "nginx.access",
        "title": "Nginx access logs"
      },
      {
        "type": "logs",
        "dataset": "nginx.error",
        "title": "Nginx error logs"
      },
      {
        "type": "metrics",
        "dataset": "nginx.stubstatus",
        "title": "Nginx stubstatus metrics"
      }
    ]
  },
  {
    "name": "nginx_ingress_controller",
    "title": "Nginx Ingress Controller Logs",
    "version": "1.9.0",
    "release": "ga",
    "description": "Collect Nginx Ingress Controller logs.",
    "type": "integration",
    "download": "/epr/nginx_ingress_controller/nginx_ingress_controller-1.9.0.zip",
    "path": "/package/nginx_ingress_controller/1.9.0",
    "icons": [
      {
        "src": "/img/logo_nginx.svg",
        "path": "/package/nginx_ingress_controller/1.9.0/img/logo_nginx.svg",
        "title": "Nginx logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nginx_ingress_controller",
        "title": "Nginx Ingress Controller logs",
        "description": "Collect logs from Nginx Ingress Controller instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.6.0"
      }
    },
    "owner": {
      "github": "elastic/obs-cloudnative-monitoring"
    },
    "categories": [
      "observability",
      "containers",
      "kubernetes"
    ],
    "signature_path": "/epr/nginx_ingress_controller/nginx_ingress_controller-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "nginx_ingress_controller.access",
        "title": "Nginx Ingress Controller access logs"
      },
      {
        "type": "logs",
        "dataset": "nginx_ingress_controller.error",
        "title": "Nginx Ingress Controller error logs"
      }
    ]
  },
  {
    "name": "okta",
    "title": "Okta",
    "version": "2.7.1",
    "release": "ga",
    "description": "Collect and parse event logs from Okta API with Elastic Agent.",
    "type": "integration",
    "download": "/epr/okta/okta-2.7.1.zip",
    "path": "/package/okta/2.7.1",
    "icons": [
      {
        "src": "/img/okta-logo.svg",
        "path": "/package/okta/2.7.1/img/okta-logo.svg",
        "title": "Okta",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "okta",
        "title": "Okta logs",
        "description": "Collect logs from Okta"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/okta/okta-2.7.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "okta.system",
        "title": "Okta system logs"
      }
    ]
  },
  {
    "name": "entityanalytics_okta",
    "title": "Okta Entity Analytics",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect User Identities from Okta with Elastic Agent.",
    "type": "integration",
    "download": "/epr/entityanalytics_okta/entityanalytics_okta-1.0.1.zip",
    "path": "/package/entityanalytics_okta/1.0.1",
    "icons": [
      {
        "src": "/img/okta-logo.svg",
        "path": "/package/entityanalytics_okta/1.0.1/img/okta-logo.svg",
        "title": "Okta Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      },
      {
        "src": "/img/okta-logo-dark.svg",
        "path": "/package/entityanalytics_okta/1.0.1/img/okta-logo-dark.svg",
        "title": "Okta Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "user",
        "title": "User Identities",
        "description": "Collect user identities."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/entityanalytics_okta/entityanalytics_okta-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "entityanalytics_okta.user",
        "title": "Collect User Identities logs from Okta"
      }
    ]
  },
  {
    "name": "ti_opencti",
    "title": "OpenCTI",
    "version": "2.0.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Ingest threat intelligence indicators from OpenCTI with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_opencti/ti_opencti-2.0.0.zip",
    "path": "/package/ti_opencti/2.0.0",
    "icons": [
      {
        "src": "/img/opencti-logo.svg",
        "path": "/package/ti_opencti/2.0.0/img/opencti-logo.svg",
        "title": "OpenCTI logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "opencti",
        "title": "OpenCTI",
        "description": "Collect OpenCTI data."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_opencti/ti_opencti-2.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_opencti.indicator",
        "title": "Indicator"
      }
    ]
  },
  {
    "name": "oracle",
    "title": "Oracle",
    "version": "1.25.0",
    "release": "ga",
    "description": "Collect Oracle Audit Log, Performance metrics, Tablespace metrics, Sysmetrics metrics, System statistics metrics, memory metrics from Oracle database.",
    "type": "integration",
    "download": "/epr/oracle/oracle-1.25.0.zip",
    "path": "/package/oracle/1.25.0",
    "icons": [
      {
        "src": "/img/oracle_logo.svg",
        "path": "/package/oracle/1.25.0/img/oracle_logo.svg",
        "title": "Oracle",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "oracle",
        "title": "Oracle Audit Logs",
        "description": "Collect Oracle Audit logs, Performance metrics, Tablespace metrics, Sysmetrics integration, System statistics, memory metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore"
    ],
    "signature_path": "/epr/oracle/oracle-1.25.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "oracle.database_audit",
        "title": "Oracle Audit Log"
      },
      {
        "type": "metrics",
        "dataset": "oracle.memory",
        "title": "Memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "oracle.performance",
        "title": "Oracle performance metrics"
      },
      {
        "type": "metrics",
        "dataset": "oracle.sysmetric",
        "title": "Sysmetric related metrics."
      },
      {
        "type": "metrics",
        "dataset": "oracle.system_statistics",
        "title": "System Statistics"
      },
      {
        "type": "metrics",
        "dataset": "oracle.tablespace",
        "title": "Oracle tablespace metrics"
      }
    ]
  },
  {
    "name": "oracle_weblogic",
    "title": "Oracle WebLogic",
    "version": "1.4.1",
    "release": "ga",
    "description": "Collect logs and metrics from Oracle WebLogic with Elastic Agent.",
    "type": "integration",
    "download": "/epr/oracle_weblogic/oracle_weblogic-1.4.1.zip",
    "path": "/package/oracle_weblogic/1.4.1",
    "icons": [
      {
        "src": "/img/oracle_weblogic-logo.svg",
        "path": "/package/oracle_weblogic/1.4.1/img/oracle_weblogic-logo.svg",
        "title": "Oracle WebLogic logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "oracle_weblogic",
        "title": "Oracle WebLogic metrics",
        "description": "Collect Oracle WebLogic metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability"
    ],
    "signature_path": "/epr/oracle_weblogic/oracle_weblogic-1.4.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "oracle_weblogic.access",
        "title": "Access logs"
      },
      {
        "type": "logs",
        "dataset": "oracle_weblogic.admin_server",
        "title": "Admin Server logs"
      },
      {
        "type": "metrics",
        "dataset": "oracle_weblogic.deployed_application",
        "title": "Collect Oracle WebLogic Deployed Application metrics"
      },
      {
        "type": "logs",
        "dataset": "oracle_weblogic.domain",
        "title": "Domain logs"
      },
      {
        "type": "logs",
        "dataset": "oracle_weblogic.managed_server",
        "title": "Managed Server logs"
      },
      {
        "type": "metrics",
        "dataset": "oracle_weblogic.threadpool",
        "title": "Collect Oracle WebLogic ThreadPool metrics"
      }
    ]
  },
  {
    "name": "osquery",
    "title": "Osquery Logs",
    "version": "1.24.1",
    "release": "ga",
    "description": "Collect logs from Osquery with Elastic Agent.",
    "type": "integration",
    "download": "/epr/osquery/osquery-1.24.1.zip",
    "path": "/package/osquery/1.24.1",
    "icons": [
      {
        "src": "/img/logo_osquery.svg",
        "path": "/package/osquery/1.24.1/img/logo_osquery.svg",
        "title": "logo osquery",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "osquery",
        "title": "Osquery logs",
        "description": "Collect logs from Osquery instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/osquery/osquery-1.24.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "osquery.result",
        "title": "Osquery result logs"
      }
    ]
  },
  {
    "name": "osquery_manager",
    "title": "Osquery Manager",
    "version": "1.10.1",
    "release": "ga",
    "description": "Deploy Osquery with Elastic Agent, then run and schedule queries in Kibana",
    "type": "integration",
    "download": "/epr/osquery_manager/osquery_manager-1.10.1.zip",
    "path": "/package/osquery_manager/1.10.1",
    "icons": [
      {
        "src": "/img/logo_osquery.svg",
        "path": "/package/osquery_manager/1.10.1/img/logo_osquery.svg",
        "title": "logo osquery",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "osquery_manager",
        "title": "Osquery Manager",
        "description": "Send interactive or scheduled queries to the osquery instances executed by the elastic-agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      },
      "elastic": {
        "subscription": "",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-asset-management"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/osquery_manager/osquery_manager-1.10.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "osquery_manager.result",
        "title": "Osquery Manager queries"
      }
    ]
  },
  {
    "name": "php_fpm",
    "title": "PHP-FPM",
    "version": "1.3.0",
    "release": "ga",
    "description": "This Elastic integration collects metrics from PHP-FPM.",
    "type": "integration",
    "download": "/epr/php_fpm/php_fpm-1.3.0.zip",
    "path": "/package/php_fpm/1.3.0",
    "icons": [
      {
        "src": "/img/php_fpm-logo.svg",
        "path": "/package/php_fpm/1.3.0/img/php_fpm-logo.svg",
        "title": "PHP-FPM logo",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "PHP-FPM",
        "title": "PHP-FPM metrics",
        "description": "Collect PHP-FPM metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "process_manager"
    ],
    "signature_path": "/epr/php_fpm/php_fpm-1.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "php_fpm.pool",
        "title": "Pool metrics"
      },
      {
        "type": "logs",
        "dataset": "php_fpm.process",
        "title": "Process metrics"
      }
    ]
  },
  {
    "name": "panw_cortex_xdr",
    "title": "Palo Alto Cortex XDR",
    "version": "1.24.2",
    "release": "ga",
    "description": "Collect logs from Palo Alto Cortex XDR with Elastic Agent.",
    "type": "integration",
    "download": "/epr/panw_cortex_xdr/panw_cortex_xdr-1.24.2.zip",
    "path": "/package/panw_cortex_xdr/1.24.2",
    "icons": [
      {
        "src": "/img/icon-cortex.svg",
        "path": "/package/panw_cortex_xdr/1.24.2/img/icon-cortex.svg",
        "title": "Palo Alto",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "xdr",
        "title": "Palo Alto Cortex XDR API",
        "description": "Collect logs from Palo Alto Cortex XDR API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/panw_cortex_xdr/panw_cortex_xdr-1.24.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "panw_cortex_xdr.alerts",
        "title": "Palo Alto Cortex XDR Alerts API"
      },
      {
        "type": "logs",
        "dataset": "panw_cortex_xdr.incidents",
        "title": "Palo Alto Cortex XDR Incidents API"
      }
    ]
  },
  {
    "name": "panw",
    "title": "Palo Alto Next-Gen Firewall",
    "version": "5.5.0",
    "release": "ga",
    "description": "Collect logs from Palo Alto next-gen firewalls with Elastic Agent.",
    "type": "integration",
    "download": "/epr/panw/panw-5.5.0.zip",
    "path": "/package/panw/5.5.0",
    "icons": [
      {
        "src": "/img/logo-integrations-paloalto-networks.svg",
        "path": "/package/panw/5.5.0/img/logo-integrations-paloalto-networks.svg",
        "title": "Palo Alto Networks",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "panw",
        "title": "Palo Alto Networks PAN-OS firewall logs",
        "description": "Collect logs from Palo Alto Networks PAN-OS firewall."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/panw/panw-5.5.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "panw.panos",
        "title": "Palo Alto Networks PAN-OS firewall logs"
      }
    ]
  },
  {
    "name": "prisma_cloud",
    "title": "Palo Alto Prisma Cloud",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect logs from Prisma Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/prisma_cloud/prisma_cloud-1.0.1.zip",
    "path": "/package/prisma_cloud/1.0.1",
    "icons": [
      {
        "src": "/img/prisma_cloud-logo.svg",
        "path": "/package/prisma_cloud/1.0.1/img/prisma_cloud-logo.svg",
        "title": "Prisma Cloud logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sample",
        "title": "Sample logs",
        "description": "Collect sample logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/prisma_cloud/prisma_cloud-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "prisma_cloud.alert",
        "title": "Collect Alert logs from Prisma Cloud Security Posture Management."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.audit",
        "title": "Collect Audit logs from Prisma Cloud Security Posture Management."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.host",
        "title": "Collect Host logs from Prisma Cloud Workload Protection."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.host_profile",
        "title": "Collect Host Profile logs from Prisma Cloud Workload Protection."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.incident_audit",
        "title": "Collect Incident Audit logs from Prisma Cloud Workload Protection."
      }
    ]
  },
  {
    "name": "ping_one",
    "title": "PingOne",
    "version": "1.13.2",
    "release": "ga",
    "description": "Collect logs from PingOne with Elastic-Agent.",
    "type": "integration",
    "download": "/epr/ping_one/ping_one-1.13.2.zip",
    "path": "/package/ping_one/1.13.2",
    "icons": [
      {
        "src": "/img/ping-one-logo.svg",
        "path": "/package/ping_one/1.13.2/img/ping-one-logo.svg",
        "title": "PingOne logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ping_one",
        "title": "PingOne",
        "description": "Collect logs from PingOne."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/ping_one/ping_one-1.13.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ping_one.audit",
        "title": "Collect Audit logs from PingOne"
      }
    ]
  },
  {
    "name": "platform_observability",
    "title": "Platform Observability",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect stack component logs with Elastic Agent",
    "type": "integration",
    "download": "/epr/platform_observability/platform_observability-0.1.0.zip",
    "path": "/package/platform_observability/0.1.0",
    "icons": [
      {
        "src": "/img/logo_kibana.svg",
        "path": "/package/platform_observability/0.1.0/img/logo_kibana.svg",
        "title": "logo kibana",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "platform_observability_kibana_logs",
        "title": "Kibana logs",
        "description": "Collect logs from Kibana"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/stack-monitoring"
    },
    "categories": [
      "elastic_stack",
      "monitoring",
      "observability"
    ],
    "signature_path": "/epr/platform_observability/platform_observability-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "platform_observability.kibana_audit",
        "title": "Platform Observability Kibana audit logs"
      },
      {
        "type": "logs",
        "dataset": "platform_observability.kibana_log",
        "title": "Platform Observability Kibana logs"
      }
    ]
  },
  {
    "name": "pps",
    "title": "Pleasant Password Server",
    "version": "0.0.1",
    "release": "beta",
    "source": {
      "license": "Apache-2.0"
    },
    "description": "Integration for Pleasant Password Server Syslog Messages",
    "type": "integration",
    "download": "/epr/pps/pps-0.0.1.zip",
    "path": "/package/pps/0.0.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/pps/0.0.1/img/logo.svg",
        "title": "PPS logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Pleasant Password Server",
        "title": "Pleasant Password Server logs",
        "description": "Collect Pleasant Password Server logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "productivity",
      "security"
    ],
    "signature_path": "/epr/pps/pps-0.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "pps.log",
        "title": "Pleasant Password Server logs"
      }
    ]
  },
  {
    "name": "postgresql",
    "title": "PostgreSQL",
    "version": "1.18.1",
    "release": "ga",
    "description": "Collect logs and metrics from PostgreSQL servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/postgresql/postgresql-1.18.1.zip",
    "path": "/package/postgresql/1.18.1",
    "icons": [
      {
        "src": "/img/logo_postgres.svg",
        "path": "/package/postgresql/1.18.1/img/logo_postgres.svg",
        "title": "logo postgres",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "postgresql",
        "title": "PostgreSQL logs and metrics",
        "description": "Collect logs and metrics from PostgreSQL instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/postgresql/postgresql-1.18.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "postgresql.activity",
        "title": "PostgreSQL activity metrics"
      },
      {
        "type": "metrics",
        "dataset": "postgresql.bgwriter",
        "title": "PostgreSQL bgwriter metrics"
      },
      {
        "type": "metrics",
        "dataset": "postgresql.database",
        "title": "PostgreSQL database metrics"
      },
      {
        "type": "logs",
        "dataset": "postgresql.log",
        "title": "PostgreSQL logs"
      },
      {
        "type": "metrics",
        "dataset": "postgresql.statement",
        "title": "PostgreSQL statement metrics"
      }
    ]
  },
  {
    "name": "security_detection_engine",
    "title": "Prebuilt Security Detection Rules",
    "version": "8.11.21",
    "release": "ga",
    "description": "Prebuilt detection rules for Elastic Security",
    "type": "integration",
    "download": "/epr/security_detection_engine/security_detection_engine-8.11.21.zip",
    "path": "/package/security_detection_engine/8.11.21",
    "icons": [
      {
        "src": "/img/security-logo-color-64px.svg",
        "path": "/package/security_detection_engine/8.11.21/img/security-logo-color-64px.svg",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      }
    },
    "owner": {
      "github": "elastic/protections"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/security_detection_engine/security_detection_engine-8.11.21.zip.sig"
  },
  {
    "name": "prometheus",
    "title": "Prometheus",
    "version": "1.14.2",
    "release": "ga",
    "description": "Collect metrics from Prometheus servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/prometheus/prometheus-1.14.2.zip",
    "path": "/package/prometheus/1.14.2",
    "icons": [
      {
        "src": "/img/logo_prometheus.svg",
        "path": "/package/prometheus/1.14.2/img/logo_prometheus.svg",
        "title": "logo prometheus",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "prometheus",
        "title": "Prometheus metrics",
        "description": "Collect metrics from Prometheus instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      }
    },
    "owner": {
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "monitoring",
      "containers"
    ],
    "signature_path": "/epr/prometheus/prometheus-1.14.2.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "prometheus.collector",
        "title": "Prometheus collector metrics"
      },
      {
        "type": "metrics",
        "dataset": "prometheus.query",
        "title": "Prometheus query metrics"
      },
      {
        "type": "metrics",
        "dataset": "prometheus.remote_write",
        "title": "Prometheus remote_write metrics"
      }
    ]
  },
  {
    "name": "prometheus_input",
    "title": "Prometheus Input",
    "version": "0.3.1",
    "release": "beta",
    "description": "Collects metrics from Prometheus exporter.",
    "type": "input",
    "download": "/epr/prometheus_input/prometheus_input-0.3.1.zip",
    "path": "/package/prometheus_input/0.3.1",
    "icons": [
      {
        "src": "/img/logo_prometheus.svg",
        "path": "/package/prometheus_input/0.3.1/img/logo_prometheus.svg",
        "title": "logo prometheus",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "prometheus",
        "title": "Prometheus Metrics",
        "description": "Collects Prometheus Metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "monitoring",
      "containers",
      "custom"
    ],
    "signature_path": "/epr/prometheus_input/prometheus_input-0.3.1.zip.sig"
  },
  {
    "name": "proofpoint_tap",
    "title": "Proofpoint TAP",
    "version": "1.16.3",
    "release": "ga",
    "description": "Collect logs from Proofpoint TAP with Elastic Agent.",
    "type": "integration",
    "download": "/epr/proofpoint_tap/proofpoint_tap-1.16.3.zip",
    "path": "/package/proofpoint_tap/1.16.3",
    "icons": [
      {
        "src": "/img/proofpoint_tap-logo.svg",
        "path": "/package/proofpoint_tap/1.16.3/img/proofpoint_tap-logo.svg",
        "title": "Proofpoint TAP logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Proofpoint TAP",
        "title": "Proofpoint_TAP logs",
        "description": "Collect proofpoint_tap logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/proofpoint_tap/proofpoint_tap-1.16.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proofpoint_tap.clicks_blocked",
        "title": "Clicks Blocked"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_tap.clicks_permitted",
        "title": "Clicks Permitted"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_tap.message_blocked",
        "title": "Message Blocked"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_tap.message_delivered",
        "title": "Message Delivered"
      }
    ]
  },
  {
    "name": "pulse_connect_secure",
    "title": "Pulse Connect Secure",
    "version": "2.0.1",
    "release": "ga",
    "description": "Collect logs from Pulse Connect Secure with Elastic Agent.",
    "type": "integration",
    "download": "/epr/pulse_connect_secure/pulse_connect_secure-2.0.1.zip",
    "path": "/package/pulse_connect_secure/2.0.1",
    "icons": [
      {
        "src": "/img/pulse_connect_secure.svg",
        "path": "/package/pulse_connect_secure/2.0.1/img/pulse_connect_secure.svg",
        "title": "pulse_connect_secure",
        "size": "300x70",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "pulse_connect_secure",
        "title": "Pulse Connect Secure logs",
        "description": "Collect logs from Pulse Connect Secure instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.16.0 || ^8.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "vpn_security",
      "security"
    ],
    "signature_path": "/epr/pulse_connect_secure/pulse_connect_secure-2.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "pulse_connect_secure.log",
        "title": "Pulse Connect Secure"
      }
    ]
  },
  {
    "name": "qnap_nas",
    "title": "QNAP NAS",
    "version": "1.25.2",
    "release": "ga",
    "description": "Collect logs from QNAP NAS devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/qnap_nas/qnap_nas-1.25.2.zip",
    "path": "/package/qnap_nas/1.25.2",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/qnap_nas/1.25.2/img/logo.svg",
        "title": "QNAP logo",
        "size": "643x121",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "qnap",
        "title": "QNAP NAS Event & Access logs",
        "description": "Collect logs from QNAP NAS"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/qnap_nas/qnap_nas-1.25.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "qnap_nas.log",
        "title": "QNAP NAS logs"
      }
    ]
  },
  {
    "name": "qualys_vmdr",
    "title": "Qualys VMDR",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect data from Qualys VMDR platform with Elastic Agent.",
    "type": "integration",
    "download": "/epr/qualys_vmdr/qualys_vmdr-1.0.1.zip",
    "path": "/package/qualys_vmdr/1.0.1",
    "icons": [
      {
        "src": "/img/qualys-vmdr-logo.svg",
        "path": "/package/qualys_vmdr/1.0.1/img/qualys-vmdr-logo.svg",
        "title": "Qualys VMDR logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "qualys_vmdr",
        "title": "Qualys VMDR data",
        "description": "Collect Qualys VMDR data."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management"
    ],
    "signature_path": "/epr/qualys_vmdr/qualys_vmdr-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "qualys_vmdr.asset_host_detection",
        "title": "Collect Asset Host Detection data from Qualys VMDR platform."
      },
      {
        "type": "logs",
        "dataset": "qualys_vmdr.knowledge_base",
        "title": "Collect Knowledge Base data from Qualys VMDR platform."
      }
    ]
  },
  {
    "name": "rabbitmq",
    "title": "RabbitMQ Logs and Metrics",
    "version": "1.12.1",
    "release": "ga",
    "description": "Collect and parse logs from RabbitMQ servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/rabbitmq/rabbitmq-1.12.1.zip",
    "path": "/package/rabbitmq/1.12.1",
    "icons": [
      {
        "src": "/img/logo_rabbitmq.svg",
        "path": "/package/rabbitmq/1.12.1/img/logo_rabbitmq.svg",
        "title": "RabbitMQ Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "rabbitmq",
        "title": "RabbitMQ logs and metrics",
        "description": "Collect logs and metrics from RabbitMQ instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "message_queue",
      "observability"
    ],
    "signature_path": "/epr/rabbitmq/rabbitmq-1.12.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "rabbitmq.connection",
        "title": "RabbitMQ connection metrics"
      },
      {
        "type": "metrics",
        "dataset": "rabbitmq.exchange",
        "title": "RabbitMQ exchange metrics"
      },
      {
        "type": "logs",
        "dataset": "rabbitmq.log",
        "title": "RabbitMQ application logs"
      },
      {
        "type": "metrics",
        "dataset": "rabbitmq.node",
        "title": "RabbitMQ node metrics"
      },
      {
        "type": "metrics",
        "dataset": "rabbitmq.queue",
        "title": "RabbitMQ queue metrics"
      }
    ]
  },
  {
    "name": "radware",
    "title": "Radware DefensePro Logs (Deprecated)",
    "version": "0.20.1",
    "release": "beta",
    "description": "Deprecated. Radware DefensePro Logs is no longer supported.",
    "type": "integration",
    "download": "/epr/radware/radware-0.20.1.zip",
    "path": "/package/radware/0.20.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/radware/0.20.1/img/logo.svg",
        "title": "Radware DefensePro logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "defensepro",
        "title": "Radware DefensePro",
        "description": "Collect Radware DefensePro logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/radware/radware-0.20.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "radware.defensepro",
        "title": "Radware DefensePro logs"
      }
    ]
  },
  {
    "name": "rapid7_insightvm",
    "title": "Rapid7 InsightVM",
    "version": "1.8.2",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Rapid7 InsightVM with Elastic Agent.",
    "type": "integration",
    "download": "/epr/rapid7_insightvm/rapid7_insightvm-1.8.2.zip",
    "path": "/package/rapid7_insightvm/1.8.2",
    "icons": [
      {
        "src": "/img/rapid7-insightvm-logo.svg",
        "path": "/package/rapid7_insightvm/1.8.2/img/rapid7-insightvm-logo.svg",
        "title": "Rapid7 InsightVM",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "rapid7_insightvm",
        "title": "Rapid7 InsightVM logs",
        "description": "Collect Rapid7 InsightVM logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management"
    ],
    "signature_path": "/epr/rapid7_insightvm/rapid7_insightvm-1.8.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "rapid7_insightvm.asset",
        "title": "Collect Asset logs from Rapid7 InsightVM"
      },
      {
        "type": "logs",
        "dataset": "rapid7_insightvm.vulnerability",
        "title": "Collect Vulnerability logs from Rapid7 InsightVM"
      }
    ]
  },
  {
    "name": "ti_rapid7_threat_command",
    "title": "Rapid7 Threat Command",
    "version": "1.14.1",
    "release": "ga",
    "description": "Collect threat intelligence from Threat Command API with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_rapid7_threat_command/ti_rapid7_threat_command-1.14.1.zip",
    "path": "/package/ti_rapid7_threat_command/1.14.1",
    "icons": [
      {
        "src": "/img/ti_rapid7_threat_command-logo.svg",
        "path": "/package/ti_rapid7_threat_command/1.14.1/img/ti_rapid7_threat_command-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_rapid7_threat_command",
        "title": "Rapid7 Threat Command",
        "description": "Collect Threat Intel data from Rapid7 Threat Command."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_rapid7_threat_command/ti_rapid7_threat_command-1.14.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_rapid7_threat_command.alert",
        "title": "Rapid7 Threat Command Alerts"
      },
      {
        "type": "logs",
        "dataset": "ti_rapid7_threat_command.ioc",
        "title": "Rapid7 Threat Command IOCs"
      },
      {
        "type": "logs",
        "dataset": "ti_rapid7_threat_command.vulnerability",
        "title": "Rapid7 Threat Command Vulnerability"
      }
    ]
  },
  {
    "name": "ti_recordedfuture",
    "title": "Recorded Future",
    "version": "1.21.0",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from Recorded Future risk lists with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_recordedfuture/ti_recordedfuture-1.21.0.zip",
    "path": "/package/ti_recordedfuture/1.21.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/ti_recordedfuture/1.21.0/img/logo.svg",
        "title": "Recorded Future",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_recordedfuture",
        "title": "Recorded Future",
        "description": "Ingest threat intelligence indicators from Recorded Future risk lists with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_recordedfuture/ti_recordedfuture-1.21.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_recordedfuture.threat",
        "title": "Recorded Future"
      }
    ]
  },
  {
    "name": "redis",
    "title": "Redis",
    "version": "1.13.1",
    "release": "ga",
    "description": "Collect logs and metrics from Redis servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/redis/redis-1.13.1.zip",
    "path": "/package/redis/1.13.1",
    "icons": [
      {
        "src": "/img/logo_redis.svg",
        "path": "/package/redis/1.13.1/img/logo_redis.svg",
        "title": "logo redis",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "redis",
        "title": "Redis logs and metrics",
        "description": "Collect logs and metrics from Redis instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/redis/redis-1.13.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "redis.info",
        "title": "Redis info metrics"
      },
      {
        "type": "metrics",
        "dataset": "redis.key",
        "title": "Redis key metrics"
      },
      {
        "type": "metrics",
        "dataset": "redis.keyspace",
        "title": "Redis keyspace metrics"
      },
      {
        "type": "logs",
        "dataset": "redis.log",
        "title": "Redis application logs"
      },
      {
        "type": "logs",
        "dataset": "redis.slowlog",
        "title": "Redis slow logs"
      }
    ]
  },
  {
    "name": "redisenterprise",
    "title": "Redis Enterprise",
    "version": "0.9.1",
    "release": "beta",
    "description": "Collect metrics from Redis Enterprise Cluster",
    "type": "integration",
    "download": "/epr/redisenterprise/redisenterprise-0.9.1.zip",
    "path": "/package/redisenterprise/0.9.1",
    "icons": [
      {
        "src": "/img/logo_redis.svg",
        "path": "/package/redisenterprise/0.9.1/img/logo_redis.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "redisenterprise",
        "title": "Redis Enterprise metrics",
        "description": "Collect metrics from Redis Enterprise Cluster"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/redisenterprise/redisenterprise-0.9.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "redisenterprise.node",
        "title": "node"
      },
      {
        "type": "metrics",
        "dataset": "redisenterprise.proxy",
        "title": "proxy"
      }
    ]
  },
  {
    "name": "sql",
    "title": "SQL Input",
    "version": "0.4.0",
    "release": "beta",
    "description": "Collects Metrics by Quering on SQL Databases",
    "type": "input",
    "download": "/epr/sql/sql-0.4.0.zip",
    "path": "/package/sql/0.4.0",
    "icons": [
      {
        "src": "/img/sql-server-icon.svg",
        "path": "/package/sql/0.4.0/img/sql-server-icon.svg",
        "title": "SQL logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sql",
        "title": "SQL Metrics",
        "description": "Collects Metrics by Quering on SQL Databases"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "custom"
    ],
    "signature_path": "/epr/sql/sql-0.4.0.zip.sig"
  },
  {
    "name": "stan",
    "title": "STAN",
    "version": "1.6.0",
    "release": "ga",
    "description": "Collect logs and metrics from STAN servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/stan/stan-1.6.0.zip",
    "path": "/package/stan/1.6.0",
    "icons": [
      {
        "src": "/img/stan.svg",
        "path": "/package/stan/1.6.0/img/stan.svg",
        "title": "STAN Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "stan",
        "title": "STAN Logs and Metrics",
        "description": "Collect logs and metrics from STAN instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2"
      }
    },
    "owner": {
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/stan/stan-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "stan.channels",
        "title": "Stan channels metrics"
      },
      {
        "type": "logs",
        "dataset": "stan.log",
        "title": "STAN logs"
      },
      {
        "type": "metrics",
        "dataset": "stan.stats",
        "title": "Stan stats metrics"
      },
      {
        "type": "metrics",
        "dataset": "stan.subscriptions",
        "title": "Stan subscriptions metrics"
      }
    ]
  },
  {
    "name": "salesforce",
    "title": "Salesforce",
    "version": "0.13.1",
    "release": "beta",
    "description": "Collect logs from Salesforce with Elastic Agent.",
    "type": "integration",
    "download": "/epr/salesforce/salesforce-0.13.1.zip",
    "path": "/package/salesforce/0.13.1",
    "icons": [
      {
        "src": "/img/salesforce.svg",
        "path": "/package/salesforce/0.13.1/img/salesforce.svg",
        "title": "Salesforce",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "salesforce",
        "title": "Salesforce logs",
        "description": "Collect logs from Salesforce instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/salesforce/salesforce-0.13.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "salesforce.apex",
        "title": "Salesforce apex logs"
      },
      {
        "type": "logs",
        "dataset": "salesforce.login_rest",
        "title": "Salesforce login logs"
      },
      {
        "type": "logs",
        "dataset": "salesforce.login_stream",
        "title": "Salesforce login logs"
      },
      {
        "type": "logs",
        "dataset": "salesforce.logout_rest",
        "title": "Salesforce logout logs"
      },
      {
        "type": "logs",
        "dataset": "salesforce.logout_stream",
        "title": "Salesforce logout logs"
      },
      {
        "type": "logs",
        "dataset": "salesforce.setupaudittrail",
        "title": "Salesforce setupaudittrail logs"
      }
    ]
  },
  {
    "name": "cloud_security_posture",
    "title": "Security Posture Management",
    "version": "1.6.5",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Identify & remediate configuration risks in your Cloud infrastructure",
    "type": "integration",
    "download": "/epr/cloud_security_posture/cloud_security_posture-1.6.5.zip",
    "path": "/package/cloud_security_posture/1.6.5",
    "icons": [
      {
        "src": "/img/logo_cloud_security_posture.svg",
        "path": "/package/cloud_security_posture/1.6.5/img/logo_cloud_security_posture.svg",
        "title": "Cloud Security Posture logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kspm",
        "title": "Kubernetes Security Posture Management (KSPM)",
        "description": "Identify & remediate configuration risks in Kubernetes",
        "icons": [
          {
            "src": "/img/logo_kspm.svg",
            "path": "/package/cloud_security_posture/1.6.5/img/logo_kspm.svg",
            "title": "KSPM logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "containers",
          "kubernetes",
          "security",
          "aws"
        ],
        "data_streams": [
          "findings"
        ]
      },
      {
        "name": "cspm",
        "title": "Cloud Security Posture Management (CSPM)",
        "description": "Identify & remediate configuration risks in the Cloud services you leverage",
        "icons": [
          {
            "src": "/img/logo_cspm.svg",
            "path": "/package/cloud_security_posture/1.6.5/img/logo_cspm.svg",
            "title": "CSPM logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloud",
          "aws",
          "google_cloud"
        ],
        "data_streams": [
          "findings"
        ]
      },
      {
        "name": "vuln_mgmt",
        "title": "Cloud Native Vulnerability Management (CNVM)",
        "description": "Scan for cloud workload vulnerabilities",
        "icons": [
          {
            "src": "/img/logo_vuln_mgmt.svg",
            "path": "/package/cloud_security_posture/1.6.5/img/logo_vuln_mgmt.svg",
            "title": "Vulnerability Management logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloud"
        ],
        "data_streams": [
          "vulnerabilities"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/cloud-security-posture"
    },
    "categories": [
      "aws",
      "kubernetes",
      "security"
    ],
    "signature_path": "/epr/cloud_security_posture/cloud_security_posture-1.6.5.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cloud_security_posture.findings",
        "title": "Cloud Security Posture Findings"
      },
      {
        "type": "logs",
        "dataset": "cloud_security_posture.vulnerabilities",
        "title": "Cloud Vulnerabilities"
      }
    ]
  },
  {
    "name": "sentinel_one",
    "title": "SentinelOne",
    "version": "1.19.2",
    "release": "ga",
    "description": "Collect logs from SentinelOne with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sentinel_one/sentinel_one-1.19.2.zip",
    "path": "/package/sentinel_one/1.19.2",
    "icons": [
      {
        "src": "/img/sentinel-one-logo.svg",
        "path": "/package/sentinel_one/1.19.2/img/sentinel-one-logo.svg",
        "title": "SentinelOne Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sentinel_one",
        "title": "SentinelOne",
        "description": "Collect logs from SentinelOne."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/sentinel_one/sentinel_one-1.19.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sentinel_one.activity",
        "title": "Collect Activity logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.agent",
        "title": "Collect Agent logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.alert",
        "title": "Collect Alert logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.group",
        "title": "Collect Group logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.threat",
        "title": "Collect Threat logs from SentinelOne"
      }
    ]
  },
  {
    "name": "sentinel_one_cloud_funnel",
    "title": "SentinelOne Cloud Funnel",
    "version": "0.14.1",
    "release": "beta",
    "description": "Collect logs from SentinelOne Cloud Funnel with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sentinel_one_cloud_funnel/sentinel_one_cloud_funnel-0.14.1.zip",
    "path": "/package/sentinel_one_cloud_funnel/0.14.1",
    "icons": [
      {
        "src": "/img/sentinel-one-cloud-funnel-logo.svg",
        "path": "/package/sentinel_one_cloud_funnel/0.14.1/img/sentinel-one-cloud-funnel-logo.svg",
        "title": "SentinelOne Cloud Funnel Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "SentinelOne Cloud Funnel",
        "title": "SentinelOne Cloud Funnel logs",
        "description": "Collect logs using AWS S3 or AWS SQS."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/sentinel_one_cloud_funnel/sentinel_one_cloud_funnel-0.14.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sentinel_one_cloud_funnel.event",
        "title": "Collect Event logs from SentinelOne Cloud Funnel."
      }
    ]
  },
  {
    "name": "slack",
    "title": "Slack Logs",
    "version": "1.17.1",
    "release": "ga",
    "description": "Slack Logs Integration",
    "type": "integration",
    "download": "/epr/slack/slack-1.17.1.zip",
    "path": "/package/slack/1.17.1",
    "icons": [
      {
        "src": "/img/slack.svg",
        "path": "/package/slack/1.17.1/img/slack.svg",
        "title": "Slack logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "slack",
        "title": "Slack logs",
        "description": "Collect logs from Slack"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "productivity",
      "security"
    ],
    "signature_path": "/epr/slack/slack-1.17.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "slack.audit",
        "title": "Slack Audit Logs"
      }
    ]
  },
  {
    "name": "snort",
    "title": "Snort",
    "version": "1.21.1",
    "release": "ga",
    "description": "Collect logs from Snort with Elastic Agent.",
    "type": "integration",
    "download": "/epr/snort/snort-1.21.1.zip",
    "path": "/package/snort/1.21.1",
    "icons": [
      {
        "src": "/img/snort.svg",
        "path": "/package/snort/1.21.1/img/snort.svg",
        "title": "snort",
        "size": "120x60",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "snort",
        "title": "Snort logs",
        "description": "Collect logs from Snort instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "ids_ips",
      "security",
      "network_security"
    ],
    "signature_path": "/epr/snort/snort-1.21.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "snort.log",
        "title": "Snort"
      }
    ]
  },
  {
    "name": "snyk",
    "title": "Snyk",
    "version": "1.19.1",
    "release": "ga",
    "description": "Collect logs from Snyk with Elastic Agent.",
    "type": "integration",
    "download": "/epr/snyk/snyk-1.19.1.zip",
    "path": "/package/snyk/1.19.1",
    "icons": [
      {
        "src": "/img/snyk-logo.svg",
        "path": "/package/snyk/1.19.1/img/snyk-logo.svg",
        "title": "Snyk logo",
        "size": "382x625",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "snyk",
        "title": "Snyk Events",
        "description": "Collect data from Snyk API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/snyk/snyk-1.19.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "snyk.audit",
        "title": "Collect Snyk Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "snyk.vulnerabilities",
        "title": "Collect Snyk Vulnerability Data"
      }
    ]
  },
  {
    "name": "sonicwall_firewall",
    "title": "SonicWall Firewall",
    "version": "1.22.0",
    "release": "ga",
    "description": "Integration for SonicWall firewall logs",
    "type": "integration",
    "download": "/epr/sonicwall_firewall/sonicwall_firewall-1.22.0.zip",
    "path": "/package/sonicwall_firewall/1.22.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/sonicwall_firewall/1.22.0/img/logo.svg",
        "title": "SonicWall logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sample",
        "title": "Sample logs",
        "description": "Collect sample logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "firewall_security",
      "network_security"
    ],
    "signature_path": "/epr/sonicwall_firewall/sonicwall_firewall-1.22.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sonicwall_firewall.log",
        "title": "SonicWall Firewall logs"
      }
    ]
  },
  {
    "name": "sophos",
    "title": "Sophos",
    "version": "3.17.0",
    "release": "ga",
    "description": "Collect logs from Sophos with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sophos/sophos-3.17.0.zip",
    "path": "/package/sophos/3.17.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/sophos/3.17.0/img/logo.svg",
        "title": "Sophos logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sophos",
        "title": "Sophos logs",
        "description": "Collect Sophos logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "firewall_security"
    ],
    "signature_path": "/epr/sophos/sophos-3.17.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sophos.utm",
        "title": "Sophos UTM logs"
      },
      {
        "type": "logs",
        "dataset": "sophos.xg",
        "title": "Sophos XG logs"
      }
    ]
  },
  {
    "name": "sophos_central",
    "title": "Sophos Central",
    "version": "1.13.2",
    "release": "ga",
    "description": "This Elastic integration collects logs from Sophos Central with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sophos_central/sophos_central-1.13.2.zip",
    "path": "/package/sophos_central/1.13.2",
    "icons": [
      {
        "src": "/img/sophos_central_logo.svg",
        "path": "/package/sophos_central/1.13.2/img/sophos_central_logo.svg",
        "title": "Sophos Central logo",
        "size": "108x18",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sophos_central",
        "title": "Sophos Central logs",
        "description": "Collect logs using HTTP JSON."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/sophos_central/sophos_central-1.13.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sophos_central.alert",
        "title": "Collect Sophos Central SIEM Alert logs"
      },
      {
        "type": "logs",
        "dataset": "sophos_central.event",
        "title": "Collect Sophos Central SIEM Events logs"
      }
    ]
  },
  {
    "name": "spring_boot",
    "title": "Spring Boot",
    "version": "1.3.2",
    "release": "ga",
    "description": "This Elastic integration collects logs and metrics from Spring Boot integration.",
    "type": "integration",
    "download": "/epr/spring_boot/spring_boot-1.3.2.zip",
    "path": "/package/spring_boot/1.3.2",
    "icons": [
      {
        "src": "/img/spring_boot-logo.svg",
        "path": "/package/spring_boot/1.3.2/img/spring_boot-logo.svg",
        "title": "Spring Boot logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "spring_boot",
        "title": "Spring Boot metrics",
        "description": "Collect Spring Boot metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "java_observability"
    ],
    "signature_path": "/epr/spring_boot/spring_boot-1.3.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "spring_boot.audit_events",
        "title": "Audit Events"
      },
      {
        "type": "metrics",
        "dataset": "spring_boot.gc",
        "title": "Garbage Collector (GC) Metrics"
      },
      {
        "type": "logs",
        "dataset": "spring_boot.http_trace",
        "title": "HTTP Trace Metrics"
      },
      {
        "type": "metrics",
        "dataset": "spring_boot.memory",
        "title": "Memory Metrics"
      },
      {
        "type": "metrics",
        "dataset": "spring_boot.threading",
        "title": "Threading Metrics"
      }
    ]
  },
  {
    "name": "squid",
    "title": "Squid Logs",
    "version": "0.19.3",
    "release": "beta",
    "description": "Collect and parse logs from Squid devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/squid/squid-0.19.3.zip",
    "path": "/package/squid/0.19.3",
    "policy_templates": [
      {
        "name": "log",
        "title": "Squid",
        "description": "Collect Squid logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.14.1 || ^8.0.0"
      }
    },
    "owner": {
      "github": "elastic/sec-deployment-and-devices"
    },
    "categories": [
      "security",
      "network",
      "proxy_security"
    ],
    "signature_path": "/epr/squid/squid-0.19.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "squid.log",
        "title": "Squid logs"
      }
    ]
  },
  {
    "name": "statsd_input",
    "title": "StatsD Input",
    "version": "0.3.0",
    "release": "beta",
    "description": "StatsD Input Package",
    "type": "input",
    "download": "/epr/statsd_input/statsd_input-0.3.0.zip",
    "path": "/package/statsd_input/0.3.0",
    "icons": [
      {
        "src": "/img/statsd.svg",
        "path": "/package/statsd_input/0.3.0/img/statsd.svg",
        "title": "statsd",
        "size": "266x266",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "statsd",
        "title": "StatsD Metrics",
        "description": "Collect metrics from StatsD instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/statsd_input/statsd_input-0.3.0.zip.sig"
  },
  {
    "name": "suricata",
    "title": "Suricata",
    "version": "2.27.0",
    "release": "ga",
    "description": "Collect logs from Suricata with Elastic Agent.",
    "type": "integration",
    "download": "/epr/suricata/suricata-2.27.0.zip",
    "path": "/package/suricata/2.27.0",
    "icons": [
      {
        "src": "/img/suricata.svg",
        "path": "/package/suricata/2.27.0/img/suricata.svg",
        "title": "suricata",
        "size": "309x309",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "suricata",
        "title": "Suricata logs",
        "description": "Collect logs from Suricata instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "ids_ips",
      "network_security"
    ],
    "signature_path": "/epr/suricata/suricata-2.27.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "suricata.eve",
        "title": "Suricata eve logs"
      }
    ]
  },
  {
    "name": "symantec_edr_cloud",
    "title": "Symantec EDR Cloud",
    "version": "1.0.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Symantec EDR Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/symantec_edr_cloud/symantec_edr_cloud-1.0.1.zip",
    "path": "/package/symantec_edr_cloud/1.0.1",
    "icons": [
      {
        "src": "/img/symantec-logo.svg",
        "path": "/package/symantec_edr_cloud/1.0.1/img/symantec-logo.svg",
        "title": "Symantec Logo",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "symantec_edr_cloud",
        "title": "Symantec EDR Cloud logs",
        "description": "Collect Symantec EDR Cloud logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/symantec_edr_cloud/symantec_edr_cloud-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "symantec_edr_cloud.incident",
        "title": "Collect Incident logs from Symantec EDR Cloud"
      }
    ]
  },
  {
    "name": "symantec_endpoint",
    "title": "Symantec Endpoint Protection",
    "version": "2.15.0",
    "release": "ga",
    "description": "Collect logs from Symantec Endpoint Protection with Elastic Agent.",
    "type": "integration",
    "download": "/epr/symantec_endpoint/symantec_endpoint-2.15.0.zip",
    "path": "/package/symantec_endpoint/2.15.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/symantec_endpoint/2.15.0/img/logo.svg",
        "title": "Symantec",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "symantec",
        "title": "Symantec Endpoint Protection logs",
        "description": "Collect Symantec Endpoint Protection logs from file or over syslog."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.16.0 || ^8.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/symantec_endpoint/symantec_endpoint-2.15.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "symantec_endpoint.log",
        "title": "Symantec Endpoint Protection (SEP) Logs"
      }
    ]
  },
  {
    "name": "sysmon_linux",
    "title": "Sysmon for Linux",
    "version": "1.9.0",
    "release": "ga",
    "description": "Collect Sysmon Linux logs with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sysmon_linux/sysmon_linux-1.9.0.zip",
    "path": "/package/sysmon_linux/1.9.0",
    "icons": [
      {
        "src": "/img/sysmon-linux.svg",
        "path": "/package/sysmon_linux/1.9.0/img/sysmon-linux.svg",
        "title": "sysmon-linux",
        "size": "1000x1000",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sysmon_linux",
        "title": "Sysmon for Linux logs",
        "description": "Collect Sysmon for Linux logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "os_system",
      "security"
    ],
    "signature_path": "/epr/sysmon_linux/sysmon_linux-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sysmon_linux.log",
        "title": "Sysmon for Linux logs"
      }
    ]
  },
  {
    "name": "system",
    "title": "System",
    "version": "1.53.1",
    "release": "ga",
    "description": "Collect system logs and metrics from your servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/system/system-1.53.1.zip",
    "path": "/package/system/1.53.1",
    "icons": [
      {
        "src": "/img/system.svg",
        "path": "/package/system/1.53.1/img/system.svg",
        "title": "system",
        "size": "1000x1000",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "system",
        "title": "System logs and metrics",
        "description": "Collect logs and metrics from System instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "os_system"
    ],
    "signature_path": "/epr/system/system-1.53.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "system.application",
        "title": "Windows Application Events"
      },
      {
        "type": "logs",
        "dataset": "system.auth",
        "title": "System auth logs"
      },
      {
        "type": "metrics",
        "dataset": "system.core",
        "title": "System core metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.cpu",
        "title": "System cpu metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.diskio",
        "title": "System diskio metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.filesystem",
        "title": "System filesystem metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.fsstat",
        "title": "System fsstat metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.load",
        "title": "System load metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.memory",
        "title": "System memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.network",
        "title": "System network metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.process",
        "title": "System process metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.process.summary",
        "title": "System process_summary metrics"
      },
      {
        "type": "logs",
        "dataset": "system.security",
        "title": "Security logs"
      },
      {
        "type": "metrics",
        "dataset": "system.socket_summary",
        "title": "System socket_summary metrics"
      },
      {
        "type": "logs",
        "dataset": "system.syslog",
        "title": "System syslog logs"
      },
      {
        "type": "logs",
        "dataset": "system.system",
        "title": "Windows System Events"
      },
      {
        "type": "metrics",
        "dataset": "system.uptime",
        "title": "System uptime metrics"
      }
    ]
  },
  {
    "name": "system_audit",
    "title": "System Audit",
    "version": "1.11.0",
    "release": "ga",
    "description": "Collect various logs & metrics from System Audit modules with Elastic Agent.",
    "type": "integration",
    "download": "/epr/system_audit/system_audit-1.11.0.zip",
    "path": "/package/system_audit/1.11.0",
    "policy_templates": [
      {
        "name": "system_audit",
        "title": "System Audit",
        "description": "Collect various logs & metrics from System Audit modules with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-linux-platform"
    },
    "categories": [
      "custom",
      "os_system"
    ],
    "signature_path": "/epr/system_audit/system_audit-1.11.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "system_audit.package",
        "title": "System Audit - [Package]"
      }
    ]
  },
  {
    "name": "tanium",
    "title": "Tanium",
    "version": "1.7.1",
    "release": "ga",
    "description": "This Elastic integration collects logs from Tanium with Elastic Agent.",
    "type": "integration",
    "download": "/epr/tanium/tanium-1.7.1.zip",
    "path": "/package/tanium/1.7.1",
    "icons": [
      {
        "src": "/img/tanium-logo.svg",
        "path": "/package/tanium/1.7.1/img/tanium-logo.svg",
        "title": "Sample logo",
        "size": "224x224",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Tanium",
        "title": "Tanium logs",
        "description": "Collect logs using TCP, HTTP endpoint, and AWS S3 or AWS SQS."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/tanium/tanium-1.7.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tanium.action_history",
        "title": "Collect Action History logs from Tanium."
      },
      {
        "type": "logs",
        "dataset": "tanium.client_status",
        "title": "Client Status"
      },
      {
        "type": "logs",
        "dataset": "tanium.discover",
        "title": "Collect Tanium Discover logs from Tanium"
      },
      {
        "type": "logs",
        "dataset": "tanium.endpoint_config",
        "title": "Collect Endpoint Config logs from Tanium"
      },
      {
        "type": "logs",
        "dataset": "tanium.reporting",
        "title": "Reporting"
      },
      {
        "type": "logs",
        "dataset": "tanium.threat_response",
        "title": "Collect Threat Response logs from Tanium."
      }
    ]
  },
  {
    "name": "tenable_io",
    "title": "Tenable Vulnerability Management",
    "version": "2.8.1",
    "release": "ga",
    "description": "Collect logs from Tenable Vulnerability Management with Elastic Agent.",
    "type": "integration",
    "download": "/epr/tenable_io/tenable_io-2.8.1.zip",
    "path": "/package/tenable_io/2.8.1",
    "icons": [
      {
        "src": "/img/tenable_io-logo.svg",
        "path": "/package/tenable_io/2.8.1/img/tenable_io-logo.svg",
        "title": "Tenable Vulnerability Management logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tenable_io",
        "title": "Tenable Vulnerability Management",
        "description": "Collect logs from Tenable Vulnerability Management."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/tenable_io/tenable_io-2.8.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tenable_io.asset",
        "title": "Collect Asset data from Tenable Vulnerability Management"
      },
      {
        "type": "logs",
        "dataset": "tenable_io.plugin",
        "title": "Collect Plugin logs from Tenable Vulnerability Management"
      },
      {
        "type": "logs",
        "dataset": "tenable_io.scan",
        "title": "Collect Scan logs from Tenable Vulnerability Management"
      },
      {
        "type": "logs",
        "dataset": "tenable_io.vulnerability",
        "title": "Collect Vulnerability logs from Tenable Vulnerability Management"
      }
    ]
  },
  {
    "name": "tenable_sc",
    "title": "Tenable.sc",
    "version": "1.20.2",
    "release": "ga",
    "description": "Collect logs from Tenable.sc with Elastic Agent.\n",
    "type": "integration",
    "download": "/epr/tenable_sc/tenable_sc-1.20.2.zip",
    "path": "/package/tenable_sc/1.20.2",
    "icons": [
      {
        "src": "/img/tenable_sc-logo.svg",
        "path": "/package/tenable_sc/1.20.2/img/tenable_sc-logo.svg",
        "title": "Tenable.sc logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tenable_sc",
        "title": "Tenable.sc logs",
        "description": "Collect Tenable.sc logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/tenable_sc/tenable_sc-1.20.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tenable_sc.asset",
        "title": "Tenable.sc asset logs"
      },
      {
        "type": "logs",
        "dataset": "tenable_sc.plugin",
        "title": "Tenable.sc plugin logs"
      },
      {
        "type": "logs",
        "dataset": "tenable_sc.vulnerability",
        "title": "Tenable.sc vulnerability logs"
      }
    ]
  },
  {
    "name": "ti_util",
    "title": "Threat Intelligence Utilities",
    "version": "1.5.0",
    "release": "ga",
    "description": "Prebuilt Threat Intelligence dashboard for Elastic Security",
    "type": "integration",
    "download": "/epr/ti_util/ti_util-1.5.0.zip",
    "path": "/package/ti_util/1.5.0",
    "icons": [
      {
        "src": "/img/security-logo-color-64px.svg",
        "path": "/package/ti_util/1.5.0/img/security-logo-color-64px.svg",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.5.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_util/ti_util-1.5.0.zip.sig"
  },
  {
    "name": "ti_threatconnect",
    "title": "ThreatConnect",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from ThreatConnect with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_threatconnect/ti_threatconnect-0.1.0.zip",
    "path": "/package/ti_threatconnect/0.1.0",
    "icons": [
      {
        "src": "/img/threat-connect-logo.svg",
        "path": "/package/ti_threatconnect/0.1.0/img/threat-connect-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "threatconnect",
        "title": "ThreatConnect logs",
        "description": "Collect ThreatConnect logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_threatconnect/ti_threatconnect-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_threatconnect.indicator",
        "title": "Collect Indicator logs from ThreatConnect."
      }
    ]
  },
  {
    "name": "ti_threatq",
    "title": "ThreatQuotient",
    "version": "1.24.2",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from ThreatQuotient with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_threatq/ti_threatq-1.24.2.zip",
    "path": "/package/ti_threatq/1.24.2",
    "icons": [
      {
        "src": "/img/threatq.svg",
        "path": "/package/ti_threatq/1.24.2/img/threatq.svg",
        "title": "ThreatQuotient",
        "size": "600x600",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_threatq",
        "title": "ThreatQuotient",
        "description": "Ingest threat intelligence indicators from ThreatQuotient with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_threatq/ti_threatq-1.24.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_threatq.threat",
        "title": "ThreatQ"
      }
    ]
  },
  {
    "name": "thycotic_ss",
    "title": "Thycotic Secret Server",
    "version": "1.7.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Thycotic Secret Server logs",
    "type": "integration",
    "download": "/epr/thycotic_ss/thycotic_ss-1.7.0.zip",
    "path": "/package/thycotic_ss/1.7.0",
    "icons": [
      {
        "src": "/img/thycotic.svg",
        "path": "/package/thycotic_ss/1.7.0/img/thycotic.svg",
        "title": "Thycotic Logo",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Secret Server",
        "description": "Collect Thycotic Secret Server logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.5.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/thycotic_ss/thycotic_ss-1.7.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "thycotic_ss.logs",
        "title": "Thycotic Secret Server Logs"
      }
    ]
  },
  {
    "name": "tines",
    "title": "Tines",
    "version": "1.9.1",
    "release": "ga",
    "description": "Tines Logs & Time Saved Reports",
    "type": "integration",
    "download": "/epr/tines/tines-1.9.1.zip",
    "path": "/package/tines/1.9.1",
    "icons": [
      {
        "src": "/img/tines-purple-logo.png",
        "path": "/package/tines/1.9.1/img/tines-purple-logo.png",
        "title": "Tines",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tines_api",
        "title": "Tines API",
        "description": "Collect events from the Tines API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "security"
    ],
    "signature_path": "/epr/tines/tines-1.9.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tines.audit_logs",
        "title": "Tines Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "tines.time_saved",
        "title": "Tines Time Saved Reports"
      }
    ]
  },
  {
    "name": "tomcat",
    "title": "Tomcat NetWitness Logs",
    "version": "1.10.0",
    "release": "ga",
    "description": "Collect and parse logs from Apache Tomcat servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/tomcat/tomcat-1.10.0.zip",
    "path": "/package/tomcat/1.10.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/tomcat/1.10.0/img/logo.svg",
        "title": "Apache Tomcat logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "log",
        "title": "Apache Tomcat",
        "description": "Collect Apache Tomcat logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.14.1 || ^8.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability"
    ],
    "signature_path": "/epr/tomcat/tomcat-1.10.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tomcat.log",
        "title": "Apache Tomcat logs"
      }
    ]
  },
  {
    "name": "traefik",
    "title": "Traefik",
    "version": "2.1.0",
    "release": "ga",
    "description": "Collect logs from Traefik servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/traefik/traefik-2.1.0.zip",
    "path": "/package/traefik/2.1.0",
    "icons": [
      {
        "src": "/img/traefik.svg",
        "path": "/package/traefik/2.1.0/img/traefik.svg",
        "title": "traefik",
        "size": "259x296",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "traefik",
        "title": "Traefik logs",
        "description": "Collect logs from Traefik instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/traefik/traefik-2.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "traefik.access",
        "title": "Traefik access logs"
      },
      {
        "type": "metrics",
        "dataset": "traefik.health",
        "title": "Traefik health metrics"
      }
    ]
  },
  {
    "name": "trellix_edr_cloud",
    "title": "Trellix EDR Cloud",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect logs from Trellix EDR Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/trellix_edr_cloud/trellix_edr_cloud-1.0.1.zip",
    "path": "/package/trellix_edr_cloud/1.0.1",
    "icons": [
      {
        "src": "/img/trellix-logo.svg",
        "path": "/package/trellix_edr_cloud/1.0.1/img/trellix-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Trellix EDR",
        "title": "Trellix EDR logs",
        "description": "Collect logs using AWS S3 or AWS SQS."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "security"
    ],
    "signature_path": "/epr/trellix_edr_cloud/trellix_edr_cloud-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "trellix_edr_cloud.event",
        "title": "Collect Event logs from Trellix EDR Cloud."
      }
    ]
  },
  {
    "name": "trellix_epo_cloud",
    "title": "Trellix ePO Cloud",
    "version": "1.9.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Trellix ePO Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/trellix_epo_cloud/trellix_epo_cloud-1.9.1.zip",
    "path": "/package/trellix_epo_cloud/1.9.1",
    "icons": [
      {
        "src": "/img/trellix-logo.svg",
        "path": "/package/trellix_epo_cloud/1.9.1/img/trellix-logo.svg",
        "title": "Trellix logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "trellix_epo_cloud",
        "title": "Trellix ePO Cloud logs",
        "description": "Collect Trellix ePO Cloud logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/trellix_epo_cloud/trellix_epo_cloud-1.9.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "trellix_epo_cloud.device",
        "title": "Collect Device logs from Trellix ePO Cloud."
      },
      {
        "type": "logs",
        "dataset": "trellix_epo_cloud.event",
        "title": "Collect Event logs from Trellix ePO Cloud."
      },
      {
        "type": "logs",
        "dataset": "trellix_epo_cloud.group",
        "title": "Collect Group logs from Trellix ePO Cloud."
      }
    ]
  },
  {
    "name": "trendmicro",
    "title": "Trend Micro Deep Security",
    "version": "2.2.0",
    "release": "ga",
    "description": "Collect logs from Trend Micro Deep Security with Elastic Agent.",
    "type": "integration",
    "download": "/epr/trendmicro/trendmicro-2.2.0.zip",
    "path": "/package/trendmicro/2.2.0",
    "icons": [
      {
        "src": "/img/trend-micro-logo.svg",
        "path": "/package/trendmicro/2.2.0/img/trend-micro-logo.svg",
        "title": "Trendmicro logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "trendmicro",
        "title": "Trend Micro Deep Security logs",
        "description": "Collect Deep Security logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "edr_xdr",
      "security"
    ],
    "signature_path": "/epr/trendmicro/trendmicro-2.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "trendmicro.deep_security",
        "title": "Collect logs from Trend Micro Deep Security"
      }
    ]
  },
  {
    "name": "trend_micro_vision_one",
    "title": "Trend Micro Vision One",
    "version": "1.15.1",
    "release": "ga",
    "description": "Collect logs from Trend Micro Vision One with Elastic Agent.",
    "type": "integration",
    "download": "/epr/trend_micro_vision_one/trend_micro_vision_one-1.15.1.zip",
    "path": "/package/trend_micro_vision_one/1.15.1",
    "icons": [
      {
        "src": "/img/trend-micro-vision-one-logo.svg",
        "path": "/package/trend_micro_vision_one/1.15.1/img/trend-micro-vision-one-logo.svg",
        "title": "Trend Micro Vision One Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "trend_micro_vision_one",
        "title": "Trend Micro Vision One",
        "description": "Collect logs from Trend Micro Vision One."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/trend_micro_vision_one/trend_micro_vision_one-1.15.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.alert",
        "title": "Collect Alert logs from Trend Micro Vision One."
      },
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.audit",
        "title": "Collect Audit logs from Trend Micro Vision One."
      },
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.detection",
        "title": "Collect Detection logs from Trend Micro Vision One."
      }
    ]
  },
  {
    "name": "profiler_agent",
    "title": "Universal Profiling Agent",
    "version": "8.9.0",
    "release": "ga",
    "description": "Fleet-wide, whole-system, continuous profiling with zero instrumentation.",
    "type": "integration",
    "download": "/epr/profiler_agent/profiler_agent-8.9.0.zip",
    "path": "/package/profiler_agent/8.9.0",
    "icons": [
      {
        "src": "/img/profiler-logo-color-48px.svg",
        "path": "/package/profiler_agent/8.9.0/img/profiler-logo-color-48px.svg",
        "size": "48x46",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "universal_profiling_agent",
        "title": "Universal Profiling Agent Integration",
        "description": "Interact with the Universal Profiling Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/profiling"
    },
    "categories": [
      "elastic_stack",
      "monitoring"
    ],
    "signature_path": "/epr/profiler_agent/profiler_agent-8.9.0.zip.sig"
  },
  {
    "name": "profiler_collector",
    "title": "Universal Profiling Collector",
    "version": "8.11.0",
    "release": "ga",
    "description": "Fleet-wide, whole-system, continuous profiling with zero instrumentation.",
    "type": "integration",
    "download": "/epr/profiler_collector/profiler_collector-8.11.0.zip",
    "path": "/package/profiler_collector/8.11.0",
    "icons": [
      {
        "src": "/img/profiler-logo-color-48px.svg",
        "path": "/package/profiler_collector/8.11.0/img/profiler-logo-color-48px.svg",
        "title": "Universal Profiling Logo",
        "size": "48x46",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "universal_profiling_collector",
        "title": "Universal Profiling Collection Service",
        "description": "Interact with Universal Profiling."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.3"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/profiling"
    },
    "categories": [
      "elastic_stack",
      "monitoring"
    ],
    "signature_path": "/epr/profiler_collector/profiler_collector-8.11.0.zip.sig"
  },
  {
    "name": "profiler_symbolizer",
    "title": "Universal Profiling Symbolizer",
    "version": "8.10.0",
    "release": "ga",
    "description": "Fleet-wide, whole-system, continuous profiling with zero instrumentation.",
    "type": "integration",
    "download": "/epr/profiler_symbolizer/profiler_symbolizer-8.10.0.zip",
    "path": "/package/profiler_symbolizer/8.10.0",
    "icons": [
      {
        "src": "/img/profiler-logo-color-48px.svg",
        "path": "/package/profiler_symbolizer/8.10.0/img/profiler-logo-color-48px.svg",
        "title": "Universal Profiling Logo",
        "size": "48x46",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "universal_profiling_symbolizer",
        "title": "Universal Profiling Symbolization Service",
        "description": "Interact with Universal Profiling."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "github": "elastic/profiling"
    },
    "categories": [
      "elastic_stack",
      "monitoring"
    ],
    "signature_path": "/epr/profiler_symbolizer/profiler_symbolizer-8.10.0.zip.sig"
  },
  {
    "name": "carbon_black_cloud",
    "title": "VMware Carbon Black Cloud",
    "version": "1.19.1",
    "release": "ga",
    "description": "Collect logs from VMWare Carbon Black Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/carbon_black_cloud/carbon_black_cloud-1.19.1.zip",
    "path": "/package/carbon_black_cloud/1.19.1",
    "icons": [
      {
        "src": "/img/carbon_black_cloud-logo.svg",
        "path": "/package/carbon_black_cloud/1.19.1/img/carbon_black_cloud-logo.svg",
        "title": "Carbon Black Cloud logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "carbon_black_cloud",
        "title": "Carbon Black Cloud",
        "description": "Collect Logs from Carbon Black Cloud."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/carbon_black_cloud/carbon_black_cloud-1.19.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.alert",
        "title": "Alert"
      },
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.asset_vulnerability_summary",
        "title": "Asset Vulnerability Summary"
      },
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.audit",
        "title": "Audit"
      },
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.endpoint_event",
        "title": "Endpoint Event"
      },
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.watchlist_hit",
        "title": "Watchlist Hit"
      }
    ]
  },
  {
    "name": "carbonblack_edr",
    "title": "VMware Carbon Black EDR",
    "version": "1.17.0",
    "release": "ga",
    "description": "Collect logs from VMware Carbon Black EDR with Elastic Agent.",
    "type": "integration",
    "download": "/epr/carbonblack_edr/carbonblack_edr-1.17.0.zip",
    "path": "/package/carbonblack_edr/1.17.0",
    "icons": [
      {
        "src": "/img/carbon-black-logo.svg",
        "path": "/package/carbonblack_edr/1.17.0/img/carbon-black-logo.svg",
        "title": "VMWare Carbon Black",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "log",
        "title": "Carbon Black EDR logs",
        "description": "Collect logs from Carbon Black EDR"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^7.14.0 || ^8.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/carbonblack_edr/carbonblack_edr-1.17.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "carbonblack_edr.log",
        "title": "Carbon Black EDR logs"
      }
    ]
  },
  {
    "name": "vsphere",
    "title": "VMware vSphere",
    "version": "1.10.1",
    "release": "ga",
    "description": "This Elastic integration collects metrics and logs from vSphere/vCenter servers",
    "type": "integration",
    "download": "/epr/vsphere/vsphere-1.10.1.zip",
    "path": "/package/vsphere/1.10.1",
    "icons": [
      {
        "src": "/img/vmware.svg",
        "path": "/package/vsphere/1.10.1/img/vmware.svg",
        "title": "VMware logo",
        "size": "512×83",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "vsphere",
        "title": "vSphere logs and metrics",
        "description": "vSphere logs and metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "virtualization"
    ],
    "signature_path": "/epr/vsphere/vsphere-1.10.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "vsphere.datastore",
        "title": "vSphere datastore metrics"
      },
      {
        "type": "metrics",
        "dataset": "vsphere.host",
        "title": "vSphere host metrics"
      },
      {
        "type": "logs",
        "dataset": "vsphere.log",
        "title": "vSphere Logs"
      },
      {
        "type": "metrics",
        "dataset": "vsphere.virtualmachine",
        "title": "vSphere virtual machine metrics"
      }
    ]
  },
  {
    "name": "vectra_detect",
    "title": "Vectra Detect",
    "version": "1.8.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Vectra Detect with Elastic Agent.",
    "type": "integration",
    "download": "/epr/vectra_detect/vectra_detect-1.8.0.zip",
    "path": "/package/vectra_detect/1.8.0",
    "icons": [
      {
        "src": "/img/vectra-logo.svg",
        "path": "/package/vectra_detect/1.8.0/img/vectra-logo.svg",
        "title": "Vectra Detect",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "vectra_detect",
        "title": "Vectra Detect logs",
        "description": "Collect logs from Vectra Detect instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network_security"
    ],
    "signature_path": "/epr/vectra_detect/vectra_detect-1.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "vectra_detect.log",
        "title": "Collect logs from Vectra Detect"
      }
    ]
  },
  {
    "name": "websphere_application_server",
    "title": "WebSphere Application Server",
    "version": "1.2.1",
    "release": "ga",
    "description": "Collects metrics from IBM WebSphere Application Server with Elastic Agent.",
    "type": "integration",
    "download": "/epr/websphere_application_server/websphere_application_server-1.2.1.zip",
    "path": "/package/websphere_application_server/1.2.1",
    "icons": [
      {
        "src": "/img/websphere_application_server-logo.svg",
        "path": "/package/websphere_application_server/1.2.1/img/websphere_application_server-logo.svg",
        "title": "WebSphere Application Server logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "websphere_application_server",
        "title": "WebSphere Application Server metrics",
        "description": "Collect WebSphere Application Server metrics"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "websphere",
      "observability"
    ],
    "signature_path": "/epr/websphere_application_server/websphere_application_server-1.2.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "websphere_application_server.jdbc",
        "title": "JDBC metrics"
      },
      {
        "type": "metrics",
        "dataset": "websphere_application_server.servlet",
        "title": "Servlet metrics"
      },
      {
        "type": "metrics",
        "dataset": "websphere_application_server.session_manager",
        "title": "Session Manager metrics"
      },
      {
        "type": "metrics",
        "dataset": "websphere_application_server.threadpool",
        "title": "ThreadPool metrics"
      }
    ]
  },
  {
    "name": "windows",
    "title": "Windows",
    "version": "1.47.0",
    "release": "ga",
    "description": "Collect logs and metrics from Windows OS and services with Elastic Agent.",
    "type": "integration",
    "download": "/epr/windows/windows-1.47.0.zip",
    "path": "/package/windows/1.47.0",
    "icons": [
      {
        "src": "/img/logo_windows.svg",
        "path": "/package/windows/1.47.0/img/logo_windows.svg",
        "title": "logo windows",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "windows",
        "title": "Windows logs and metrics",
        "description": "Collect logs and metrics from Windows instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      }
    },
    "owner": {
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "os_system",
      "security"
    ],
    "signature_path": "/epr/windows/windows-1.47.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "windows.applocker_exe_and_dll",
        "title": "Windows AppLocker/EXE and DLL logs"
      },
      {
        "type": "logs",
        "dataset": "windows.applocker_msi_and_script",
        "title": "Windows AppLocker/MSI and Script logs"
      },
      {
        "type": "logs",
        "dataset": "windows.applocker_packaged_app_deployment",
        "title": "Windows AppLocker/Packaged app-Deployment logs"
      },
      {
        "type": "logs",
        "dataset": "windows.applocker_packaged_app_execution",
        "title": "Windows AppLocker/Packaged app-Execution logs"
      },
      {
        "type": "logs",
        "dataset": "windows.forwarded",
        "title": "Windows forwarded events"
      },
      {
        "type": "metrics",
        "dataset": "windows.perfmon",
        "title": "Windows perfmon metrics"
      },
      {
        "type": "logs",
        "dataset": "windows.powershell",
        "title": "Windows Powershell logs"
      },
      {
        "type": "logs",
        "dataset": "windows.powershell_operational",
        "title": "Windows Powershell/Operational logs"
      },
      {
        "type": "metrics",
        "dataset": "windows.service",
        "title": "Windows service metrics"
      },
      {
        "type": "logs",
        "dataset": "windows.sysmon_operational",
        "title": "Windows Sysmon/Operational events"
      },
      {
        "type": "logs",
        "dataset": "windows.windows_defender",
        "title": "Windows Defender logs"
      }
    ]
  },
  {
    "name": "wiz",
    "title": "Wiz",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect logs from Wiz with Elastic Agent.",
    "type": "integration",
    "download": "/epr/wiz/wiz-1.0.1.zip",
    "path": "/package/wiz/1.0.1",
    "icons": [
      {
        "src": "/img/wiz-logo.svg",
        "path": "/package/wiz/1.0.1/img/wiz-logo.svg",
        "title": "Wiz logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "wiz",
        "title": "Wiz logs",
        "description": "Collect Wiz logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.10.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/wiz/wiz-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "wiz.audit",
        "title": "Collect Audit logs from Wiz."
      },
      {
        "type": "logs",
        "dataset": "wiz.issue",
        "title": "Collect Issue logs from Wiz."
      },
      {
        "type": "logs",
        "dataset": "wiz.vulnerability",
        "title": "Collect Vulnerability logs from Wiz."
      }
    ]
  },
  {
    "name": "zeek",
    "title": "Zeek",
    "version": "2.22.4",
    "release": "ga",
    "description": "Collect logs from Zeek with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zeek/zeek-2.22.4.zip",
    "path": "/package/zeek/2.22.4",
    "icons": [
      {
        "src": "/img/zeek.svg",
        "path": "/package/zeek/2.22.4/img/zeek.svg",
        "title": "zeek",
        "size": "214x203",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zeek",
        "title": "Zeek logs",
        "description": "Collect logs from Zeek instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-deployment-and-devices"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/zeek/zeek-2.22.4.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zeek.capture_loss",
        "title": "Zeek capture_loss logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.connection",
        "title": "Zeek connection logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.dce_rpc",
        "title": "Zeek dce_rpc logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.dhcp",
        "title": "Zeek dhcp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.dnp3",
        "title": "Zeek dnp3 logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.dns",
        "title": "Zeek dns logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.dpd",
        "title": "Zeek dpd logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.files",
        "title": "Zeek files logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.ftp",
        "title": "Zeek ftp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.http",
        "title": "Zeek http logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.intel",
        "title": "Zeek intel logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.irc",
        "title": "Zeek irc logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.kerberos",
        "title": "Zeek kerberos logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.known_certs",
        "title": "Zeek Known Certs logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.known_hosts",
        "title": "Zeek Known Hosts logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.known_services",
        "title": "Zeek Known Services logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.modbus",
        "title": "Zeek modbus logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.mysql",
        "title": "Zeek mysql logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.notice",
        "title": "Zeek notice logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.ntlm",
        "title": "Zeek ntlm logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.ntp",
        "title": "Zeek ntp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.ocsp",
        "title": "Zeek ocsp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.pe",
        "title": "Zeek pe logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.radius",
        "title": "Zeek radius logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.rdp",
        "title": "Zeek rdp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.rfb",
        "title": "Zeek rfb logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.signature",
        "title": "Zeek signature logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.sip",
        "title": "Zeek sip logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.smb_cmd",
        "title": "Zeek smb_cmd logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.smb_files",
        "title": "Zeek smb_files logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.smb_mapping",
        "title": "Zeek smb_mapping logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.smtp",
        "title": "Zeek smtp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.snmp",
        "title": "Zeek snmp logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.socks",
        "title": "Zeek socks logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.software",
        "title": "Zeek software logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.ssh",
        "title": "Zeek ssh logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.ssl",
        "title": "Zeek ssl logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.stats",
        "title": "Zeek stats logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.syslog",
        "title": "Zeek syslog logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.traceroute",
        "title": "Zeek traceroute logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.tunnel",
        "title": "Zeek tunnel logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.weird",
        "title": "Zeek weird logs"
      },
      {
        "type": "logs",
        "dataset": "zeek.x509",
        "title": "Zeek x509 logs"
      }
    ]
  },
  {
    "name": "zeronetworks",
    "title": "Zero Networks",
    "version": "1.11.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Zero Networks Logs integration",
    "type": "integration",
    "download": "/epr/zeronetworks/zeronetworks-1.11.1.zip",
    "path": "/package/zeronetworks/1.11.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/zeronetworks/1.11.1/img/logo.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zeronetworks",
        "title": "Zero Networks Logs",
        "description": "Collect logs from Zero Networks"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.6.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/zeronetworks/zeronetworks-1.11.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zeronetworks.audit",
        "title": "Zero Networks Audit Logs"
      }
    ]
  },
  {
    "name": "zerofox",
    "title": "ZeroFox",
    "version": "1.22.1",
    "release": "ga",
    "description": "Collect logs from ZeroFox with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zerofox/zerofox-1.22.1.zip",
    "path": "/package/zerofox/1.22.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/zerofox/1.22.1/img/logo.svg",
        "title": "logo ZeroFox",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zerofox",
        "title": "ZeroFox Alerts",
        "description": "Collect alert from the ZeroFox API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/zerofox/zerofox-1.22.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zerofox.alerts",
        "title": "Alerts"
      }
    ]
  },
  {
    "name": "zookeeper",
    "title": "ZooKeeper Metrics",
    "version": "1.11.0",
    "release": "ga",
    "description": "Collect metrics from ZooKeeper service with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zookeeper/zookeeper-1.11.0.zip",
    "path": "/package/zookeeper/1.11.0",
    "icons": [
      {
        "src": "/img/zookeeper.svg",
        "path": "/package/zookeeper/1.11.0/img/zookeeper.svg",
        "title": "zookeeper",
        "size": "754x754",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zookeeper",
        "title": "ZooKeeper metrics",
        "description": "Collect metrics from ZooKeeper instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/zookeeper/zookeeper-1.11.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "zookeeper.connection",
        "title": "ZooKeeper connection metrics"
      },
      {
        "type": "metrics",
        "dataset": "zookeeper.mntr",
        "title": "ZooKeeper mntr metrics"
      },
      {
        "type": "metrics",
        "dataset": "zookeeper.server",
        "title": "ZooKeeper server metrics"
      }
    ]
  },
  {
    "name": "zoom",
    "title": "Zoom",
    "version": "1.18.1",
    "release": "ga",
    "description": "Collect logs from Zoom with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zoom/zoom-1.18.1.zip",
    "path": "/package/zoom/1.18.1",
    "icons": [
      {
        "src": "/img/zoom_blue.svg",
        "path": "/package/zoom/1.18.1/img/zoom_blue.svg",
        "title": "Zoom",
        "size": "516x240",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zoom",
        "title": "Zoom logs",
        "description": "Collect logs from Zoom instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.9.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/zoom/zoom-1.18.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zoom.webhook",
        "title": "Zoom webhook logs"
      }
    ]
  },
  {
    "name": "zscaler_zia",
    "title": "Zscaler Internet Access",
    "version": "2.18.3",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Zscaler Internet Access (ZIA) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zscaler_zia/zscaler_zia-2.18.3.zip",
    "path": "/package/zscaler_zia/2.18.3",
    "icons": [
      {
        "src": "/img/zscaler-logo.svg",
        "path": "/package/zscaler_zia/2.18.3/img/zscaler-logo.svg",
        "title": "Zscaler logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zscaler_zia",
        "title": "Zscaler Internet Access logs",
        "description": "Collect Zscaler Internet Access logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/zscaler_zia/zscaler_zia-2.18.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zscaler_zia.alerts",
        "title": "Alerts"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.dns",
        "title": "DNS logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.firewall",
        "title": "Firewall Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.tunnel",
        "title": "Tunnel Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.web",
        "title": "Web Logs"
      }
    ]
  },
  {
    "name": "zscaler_zpa",
    "title": "Zscaler Private Access",
    "version": "1.17.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Zscaler Private Access (ZPA) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zscaler_zpa/zscaler_zpa-1.17.0.zip",
    "path": "/package/zscaler_zpa/1.17.0",
    "icons": [
      {
        "src": "/img/zscaler-logo.svg",
        "path": "/package/zscaler_zpa/1.17.0/img/zscaler-logo.svg",
        "title": "Zscaler logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zscaler_zpa",
        "title": "Zscaler Private Access logs",
        "description": "Collect Zscaler Private Access logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.7.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "vpn_security"
    ],
    "signature_path": "/epr/zscaler_zpa/zscaler_zpa-1.17.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zscaler_zpa.app_connector_status",
        "title": "App Connector Status Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zpa.audit",
        "title": "Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zpa.browser_access",
        "title": "Browser Access Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zpa.user_activity",
        "title": "User Activity Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zpa.user_status",
        "title": "User Status Logs"
      }
    ]
  },
  {
    "name": "etcd",
    "title": "etcd",
    "version": "1.1.0",
    "release": "ga",
    "description": "Collect metrics from etcd instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/etcd/etcd-1.1.0.zip",
    "path": "/package/etcd/1.1.0",
    "icons": [
      {
        "src": "/img/etcd.svg",
        "path": "/package/etcd/1.1.0/img/etcd.svg",
        "title": "etcd logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "etcd",
        "title": "etcd metrics",
        "description": "Collect metrics from etcd instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/etcd/etcd-1.1.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "etcd.leader",
        "title": "etcd leader metrics"
      },
      {
        "type": "metrics",
        "dataset": "etcd.metrics",
        "title": "etcd v3 metrics"
      },
      {
        "type": "metrics",
        "dataset": "etcd.self",
        "title": "etcd self metrics"
      },
      {
        "type": "metrics",
        "dataset": "etcd.store",
        "title": "etcd store metrics"
      }
    ]
  },
  {
    "name": "pfsense",
    "title": "pfSense",
    "version": "1.25.2",
    "release": "ga",
    "description": "Collect logs from pfSense and OPNsense with Elastic Agent.",
    "type": "integration",
    "download": "/epr/pfsense/pfsense-1.25.2.zip",
    "path": "/package/pfsense/1.25.2",
    "icons": [
      {
        "src": "/img/pfsense.svg",
        "path": "/package/pfsense/1.25.2/img/pfsense.svg",
        "title": "pfsense",
        "size": "512x143",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "pfsense",
        "title": "pfSense logs",
        "description": "Collect logs from pfSense systems"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "firewall_security",
      "network_security"
    ],
    "signature_path": "/epr/pfsense/pfsense-1.25.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "pfsense.log",
        "title": "pfSense log logs"
      }
    ]
  }
]
