[
  {
    "name": "1password",
    "title": "1Password",
    "version": "1.34.0",
    "release": "ga",
    "description": "Collect logs from 1Password with Elastic Agent.",
    "type": "integration",
    "download": "/epr/1password/1password-1.34.0.zip",
    "path": "/package/1password/1.34.0",
    "icons": [
      {
        "src": "/img/1password-logo-light-bg.svg",
        "path": "/package/1password/1.34.0/img/1password-logo-light-bg.svg",
        "title": "1Password",
        "size": "116x116",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "1password",
        "title": "1Password Events",
        "description": "Collect events from 1Password Events Reporting",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ^9.0.7"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "credential_management"
    ],
    "signature_path": "/epr/1password/1password-1.34.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "1password.audit_events",
        "title": "Collect 1Password audit events"
      },
      {
        "type": "logs",
        "dataset": "1password.item_usages",
        "title": "Collect 1Password item usages events"
      },
      {
        "type": "logs",
        "dataset": "1password.signin_attempts",
        "title": "1Password sign-in attempt events"
      }
    ]
  },
  {
    "name": "ti_anyrun",
    "title": "ANY.RUN Threat Intelligence Feeds",
    "version": "1.0.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Ingest Threat Intelligence indicators from ANY.RUN TI Feeds with Elastic Agent",
    "type": "integration",
    "download": "/epr/ti_anyrun/ti_anyrun-1.0.0.zip",
    "path": "/package/ti_anyrun/1.0.0",
    "icons": [
      {
        "src": "/img/anyrun-logo.svg",
        "path": "/package/ti_anyrun/1.0.0/img/anyrun-logo.svg",
        "title": "ANY.RUN",
        "size": "1000x1000",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_anyrun",
        "title": "ANY.RUN Threat Intelligence Feeds",
        "description": "Ingest Threat Intelligence indicators from ANY.RUN TI Feeds with Elastic Agent"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_anyrun/ti_anyrun-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_anyrun.ioc",
        "title": "ANY.RUN TI Feeds"
      }
    ]
  },
  {
    "name": "aws",
    "title": "AWS",
    "version": "6.14.0",
    "release": "ga",
    "description": "Collect logs and metrics from Amazon Web Services (AWS) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/aws/aws-6.14.0.zip",
    "path": "/package/aws/6.14.0",
    "icons": [
      {
        "src": "/img/logo_aws.svg",
        "path": "/package/aws/6.14.0/img/logo_aws.svg",
        "title": "logo aws",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "awshealth",
        "title": "AWS Health",
        "description": "Collect AWS Health metrics with Elastic Agent (experimental)",
        "icons": [
          {
            "src": "/img/logo_aws_health.svg",
            "path": "/package/aws/6.14.0/img/logo_aws_health.svg",
            "title": "AWS Health logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "awshealth"
        ]
      },
      {
        "name": "billing",
        "title": "AWS Billing",
        "description": "Collect billing metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_billing.svg",
            "path": "/package/aws/6.14.0/img/logo_billing.svg",
            "title": "AWS Billing logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "billing"
        ]
      },
      {
        "name": "cloudtrail",
        "title": "AWS CloudTrail",
        "description": "Collect AWS CloudTrail logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_cloudtrail.svg",
            "path": "/package/aws/6.14.0/img/logo_cloudtrail.svg",
            "title": "AWS Cloudtrail logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "cloudtrail"
        ]
      },
      {
        "name": "cloudwatch",
        "title": "AWS CloudWatch",
        "description": "Use this integration to collect logs and metrics from Amazon CloudWatch with Elastic Agent, where no out of the box integration is available.",
        "icons": [
          {
            "src": "/img/logo_cloudwatch.svg",
            "path": "/package/aws/6.14.0/img/logo_cloudwatch.svg",
            "title": "AWS CloudWatch logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "monitoring"
        ],
        "data_streams": [
          "cloudwatch_logs",
          "cloudwatch_metrics"
        ]
      },
      {
        "name": "config",
        "title": "AWS Config",
        "description": "Collect AWS Config Logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo-aws-config.svg",
            "path": "/package/aws/6.14.0/img/logo-aws-config.svg",
            "title": "AWS Config logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloudsecurity_cdr",
          "misconfiguration_workflow"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "config"
        ]
      },
      {
        "name": "dynamodb",
        "title": "Amazon DynamoDB",
        "description": "Collect Amazon DynamoDB metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_dynamodb.svg",
            "path": "/package/aws/6.14.0/img/logo_dynamodb.svg",
            "title": "AWS DynamoDB logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "dynamodb"
        ]
      },
      {
        "name": "ebs",
        "title": "Amazon EBS",
        "description": "Collect Amazon Elastic Block Storage metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_ebs.svg",
            "path": "/package/aws/6.14.0/img/logo_ebs.svg",
            "title": "AWS EBS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "ebs"
        ]
      },
      {
        "name": "ec2",
        "title": "Amazon EC2",
        "description": "Collect logs and metrics for Amazon Elastic Compute Cloud service with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_ec2.svg",
            "path": "/package/aws/6.14.0/img/logo_ec2.svg",
            "title": "AWS EC2 logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "ec2_logs",
          "ec2_metrics"
        ]
      },
      {
        "name": "ecs",
        "title": "Amazon ECS",
        "description": "Collect metrics for Amazon Elastic Container Service with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_ecs.svg",
            "path": "/package/aws/6.14.0/img/logo_ecs.svg",
            "title": "AWS ECS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "containers"
        ],
        "data_streams": [
          "ecs_metrics"
        ]
      },
      {
        "name": "elb",
        "title": "AWS ELB",
        "description": "Collect logs and metrics for Amazon Elastic Load Balancing service with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_elb.svg",
            "path": "/package/aws/6.14.0/img/logo_elb.svg",
            "title": "AWS ELB logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "load_balancer"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "elb_logs",
          "elb_metrics"
        ]
      },
      {
        "name": "lambda",
        "title": "AWS Lambda",
        "description": "Collect Lambda metrics and logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_lambda.svg",
            "path": "/package/aws/6.14.0/img/logo_lambda.svg",
            "title": "AWS Lambda logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "lambda",
          "lambda_logs"
        ]
      },
      {
        "name": "natgateway",
        "title": "Amazon NAT Gateway",
        "description": "Collect Amazon NAT Gateways metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_natgateway.svg",
            "path": "/package/aws/6.14.0/img/logo_natgateway.svg",
            "title": "AWS NATGateway logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "network"
        ],
        "data_streams": [
          "natgateway"
        ]
      },
      {
        "name": "firewall",
        "title": "AWS Network Firewall",
        "description": "Collect AWS Network Firewall logs and metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_firewall.svg",
            "path": "/package/aws/6.14.0/img/logo_firewall.svg",
            "title": "AWS Network Firewall logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "firewall_security"
        ],
        "data_streams": [
          "firewall_logs",
          "firewall_metrics"
        ]
      },
      {
        "name": "rds",
        "title": "Amazon RDS",
        "description": "Collect Amazon Relational Database Service metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_rds.svg",
            "path": "/package/aws/6.14.0/img/logo_rds.svg",
            "title": "AWS RDS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "rds"
        ]
      },
      {
        "name": "s3",
        "title": "Amazon S3",
        "description": "Monitor Amazon S3 buckets by collecting access logs, storage & request metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_s3.svg",
            "path": "/package/aws/6.14.0/img/logo_s3.svg",
            "title": "AWS S3 logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "s3_daily_storage",
          "s3_request",
          "s3access"
        ]
      },
      {
        "name": "s3_storage_lens",
        "title": "Amazon S3 Storage Lens",
        "description": "Collect Amazon S3 Storage Lens metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_s3_storage_lens.svg",
            "path": "/package/aws/6.14.0/img/logo_s3_storage_lens.svg",
            "title": "AWS S3 storage lens logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "s3_storage_lens"
        ]
      },
      {
        "name": "sns",
        "title": "Amazon SNS",
        "description": "Collect Amazon SNS metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_sns.svg",
            "path": "/package/aws/6.14.0/img/logo_sns.svg",
            "title": "AWS SNS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "notification"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "sns"
        ]
      },
      {
        "name": "sqs",
        "title": "Amazon SQS",
        "description": "Collect Amazon SQS metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_sqs.svg",
            "path": "/package/aws/6.14.0/img/logo_sqs.svg",
            "title": "AWS SQS logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "sqs"
        ]
      },
      {
        "name": "transitgateway",
        "title": "AWS Transit Gateway",
        "description": "Collect AWS Transit Gateways metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_transitgateway.svg",
            "path": "/package/aws/6.14.0/img/logo_transitgateway.svg",
            "title": "AWS Transit Gateway logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "transitgateway"
        ]
      },
      {
        "name": "usage",
        "title": "AWS Usage",
        "description": "Collect AWS usage metrics with Elastic Agent",
        "categories": [
          "observability"
        ],
        "data_streams": [
          "usage"
        ]
      },
      {
        "name": "vpcflow",
        "title": "Amazon VPC",
        "description": "Collect Amazon VPC flow logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_vpcflow.svg",
            "path": "/package/aws/6.14.0/img/logo_vpcflow.svg",
            "title": "AWS VPC logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "network"
        ],
        "data_streams": [
          "vpcflow"
        ]
      },
      {
        "name": "vpn",
        "title": "Amazon VPN",
        "description": "Collect VPN metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_vpn.svg",
            "path": "/package/aws/6.14.0/img/logo_vpn.svg",
            "title": "AWS VPN logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "network"
        ],
        "data_streams": [
          "vpn"
        ]
      },
      {
        "name": "waf",
        "title": "AWS WAF",
        "description": "Collect AWS WAF logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_waf.svg",
            "path": "/package/aws/6.14.0/img/logo_waf.svg",
            "title": "AWS VPC logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "web_application_firewall"
        ],
        "data_streams": [
          "waf"
        ]
      },
      {
        "name": "route53",
        "title": "AWS Route 53",
        "description": "Collect AWS Route53 logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_route53.svg",
            "path": "/package/aws/6.14.0/img/logo_route53.svg",
            "title": "AWS Route53 logo",
            "size": "32x40",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "dns_security"
        ],
        "data_streams": [
          "route53_public_logs",
          "route53_resolver_logs"
        ]
      },
      {
        "name": "cloudfront",
        "title": "Amazon CloudFront",
        "description": "Collect Amazon CloudFront logs with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_cloudfront.svg",
            "path": "/package/aws/6.14.0/img/logo_cloudfront.svg",
            "title": "AWS CloudFront logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "monitoring",
          "observability"
        ],
        "data_streams": [
          "cloudfront_logs"
        ]
      },
      {
        "name": "redshift",
        "title": "Amazon Redshift",
        "description": "Collect Amazon Redshift metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_redshift.svg",
            "path": "/package/aws/6.14.0/img/logo_redshift.svg",
            "title": "Amazon Redshift logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "datastore"
        ],
        "data_streams": [
          "redshift"
        ]
      },
      {
        "name": "kinesis",
        "title": "Amazon Kinesis Data Stream",
        "description": "Collect Amazon Kinesis Data Stream metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_kinesis.svg",
            "path": "/package/aws/6.14.0/img/logo_kinesis.svg",
            "title": "Amazon Kinesis logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability",
          "stream_processing"
        ],
        "data_streams": [
          "kinesis"
        ]
      },
      {
        "name": "securityhub",
        "title": "AWS Security Hub CSPM",
        "description": "Collect AWS Security Hub CSPM Logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_securityhub.svg",
            "path": "/package/aws/6.14.0/img/logo_securityhub.svg",
            "title": "AWS Security Hub logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloudsecurity_cdr",
          "misconfiguration_workflow"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "securityhub_findings",
          "securityhub_findings_full_posture",
          "securityhub_insights"
        ]
      },
      {
        "name": "inspector",
        "title": "Amazon Inspector",
        "description": "Collect Amazon Inspector Logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_inspector.svg",
            "path": "/package/aws/6.14.0/img/logo_inspector.svg",
            "title": "Amazon Inspector logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloudsecurity_cdr",
          "vulnerability_workflow"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "inspector"
        ]
      },
      {
        "name": "guardduty",
        "title": "Amazon GuardDuty",
        "description": "Collect Amazon GuardDuty logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_guardduty.svg",
            "path": "/package/aws/6.14.0/img/logo_guardduty.svg",
            "title": "Amazon GuardDuty logo",
            "size": "33x39",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "cloudsecurity_cdr"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "guardduty"
        ]
      },
      {
        "name": "apigateway",
        "title": "AWS API Gateway",
        "description": "Collect logs and metrics for AWS API Gateway with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_apigateway.svg",
            "path": "/package/aws/6.14.0/img/logo_apigateway.svg",
            "title": "AWS API Gateway logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "apigateway_metrics",
          "apigateway_logs"
        ]
      },
      {
        "name": "emr",
        "title": "Amazon EMR",
        "description": "Collect logs and metrics for Amazon EMR service with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_emr.svg",
            "path": "/package/aws/6.14.0/img/logo_emr.svg",
            "title": "AWS EMR logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "emr_metrics",
          "emr_logs"
        ]
      },
      {
        "name": "kafka",
        "title": "Amazon Managed Streaming for Apache Kafka (MSK)",
        "description": "Collect Amazon MSK metrics with Elastic Agent",
        "icons": [
          {
            "src": "/img/logo_msk.svg",
            "path": "/package/aws/6.14.0/img/logo_msk.svg",
            "title": "Amazon MSK logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "observability"
        ],
        "data_streams": [
          "kafka_metrics"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "aws",
      "cloud",
      "observability",
      "security",
      "containers",
      "network",
      "datastore"
    ],
    "signature_path": "/epr/aws/aws-6.14.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "aws.apigateway_logs",
        "title": "AWS API Gateway logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.apigateway_metrics",
        "title": "AWS API Gateway metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.awshealth",
        "title": "AWS Health"
      },
      {
        "type": "metrics",
        "dataset": "aws.billing",
        "title": "AWS Billing Metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.cloudfront_logs",
        "title": "AWS CloudFront logs"
      },
      {
        "type": "logs",
        "dataset": "aws.cloudtrail",
        "title": "AWS CloudTrail Logs"
      },
      {
        "type": "logs",
        "dataset": "aws.cloudwatch_logs",
        "title": "AWS CloudWatch logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.cloudwatch_metrics",
        "title": "AWS CloudWatch metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.config",
        "title": "Collect AWS Config Findings logs via API"
      },
      {
        "type": "metrics",
        "dataset": "aws.dynamodb",
        "title": "AWS DynamoDB metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.ebs",
        "title": "AWS EBS metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.ec2_logs",
        "title": "AWS EC2 logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.ec2_metrics",
        "title": "AWS EC2 metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.ecs_metrics",
        "title": "AWS ECS metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.elb_logs",
        "title": "AWS ELB logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.elb_metrics",
        "title": "AWS ELB metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.emr_logs",
        "title": "AWS EMR logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.emr_metrics",
        "title": "AWS EMR metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.firewall_logs",
        "title": "AWS Network Firewall logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.firewall_metrics",
        "title": "AWS Network Firewall metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.guardduty",
        "title": "Collect Amazon GuardDuty Findings logs from AWS"
      },
      {
        "type": "logs",
        "dataset": "aws.inspector",
        "title": "Collect Amazon Inspector logs from AWS"
      },
      {
        "type": "metrics",
        "dataset": "aws.kafka_metrics",
        "title": "AWS Kafka metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.kinesis",
        "title": "AWS Kinesis Data Stream metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.lambda",
        "title": "AWS Lambda metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.lambda_logs",
        "title": "AWS Lambda logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.natgateway",
        "title": "AWS NAT gateway metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.rds",
        "title": "AWS RDS metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.redshift",
        "title": "Amazon Redshift metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.route53_public_logs",
        "title": "AWS Route 53 Public Zone Logs"
      },
      {
        "type": "logs",
        "dataset": "aws.route53_resolver_logs",
        "title": "AWS Route 53 Resolver Query Logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.s3_daily_storage",
        "title": "AWS S3 daily storage metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.s3_request",
        "title": "AWS S3 request metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.s3_storage_lens",
        "title": "AWS S3 Storage Lens metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.s3access",
        "title": "AWS s3access logs"
      },
      {
        "type": "logs",
        "dataset": "aws.securityhub_findings",
        "title": "Collect AWS Security Hub CSPM Findings logs from AWS"
      },
      {
        "type": "logs",
        "dataset": "aws.securityhub_findings_full_posture",
        "title": "Collect AWS Security Hub CSPM Findings Full Posture logs from AWS"
      },
      {
        "type": "logs",
        "dataset": "aws.securityhub_insights",
        "title": "Collect AWS Security Hub CSPM Insights logs from AWS"
      },
      {
        "type": "metrics",
        "dataset": "aws.sns",
        "title": "AWS SNS metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.sqs",
        "title": "AWS SQS metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.transitgateway",
        "title": "AWS Transit Gateway metrics"
      },
      {
        "type": "metrics",
        "dataset": "aws.usage",
        "title": "AWS usage metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.vpcflow",
        "title": "AWS vpcflow logs"
      },
      {
        "type": "metrics",
        "dataset": "aws.vpn",
        "title": "AWS VPN metrics"
      },
      {
        "type": "logs",
        "dataset": "aws.waf",
        "title": "AWS WAF logs"
      }
    ]
  },
  {
    "name": "aws_cloudtrail_otel",
    "title": "AWS CloudTrail Logs OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "AWS CloudTrail Logs OpenTelemetry Assets",
    "type": "content",
    "download": "/epr/aws_cloudtrail_otel/aws_cloudtrail_otel-0.1.0.zip",
    "path": "/package/aws_cloudtrail_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_cloudtrail_otel.svg",
        "path": "/package/aws_cloudtrail_otel/0.1.0/img/logo_cloudtrail_otel.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/aws_cloudtrail_otel/aws_cloudtrail_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "aws.cloudtrail.otel"
        }
      ]
    }
  },
  {
    "name": "aws_billing",
    "title": "AWS Cost and Usage Report (CUR 2.0)",
    "version": "0.2.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect AWS CUR 2.0 billing data from S3 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/aws_billing/aws_billing-0.2.1.zip",
    "path": "/package/aws_billing/0.2.1",
    "icons": [
      {
        "src": "/img/logo_aws.svg",
        "path": "/package/aws_billing/0.2.1/img/logo_aws.svg",
        "title": "logo aws",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "aws_billing",
        "title": "AWS Cost and Usage Report (CUR)",
        "description": "Collect AWS Cost and Usage Report (CUR 2.0) data with Elastic Agent for cost analysis and visualization."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "observability"
    ],
    "signature_path": "/epr/aws_billing/aws_billing-0.2.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "aws_billing.cur",
        "title": "AWS Cost and Usage Metrics"
      }
    ]
  },
  {
    "name": "aws_elb_otel",
    "title": "AWS ELB OpenTelemetry Assets",
    "version": "0.1.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "AWS ELB logs for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/aws_elb_otel/aws_elb_otel-0.1.1.zip",
    "path": "/package/aws_elb_otel/0.1.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/aws_elb_otel/0.1.1/img/logo.svg",
        "title": "AWS ELB OpenTelemetry Logo",
        "size": "150x150",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/aws_elb_otel/aws_elb_otel-0.1.1.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "aws.elbaccess.otel"
        }
      ]
    }
  },
  {
    "name": "aws_securityhub",
    "title": "AWS Security Hub",
    "version": "1.0.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from AWS Security Hub with Elastic Agent.",
    "type": "integration",
    "download": "/epr/aws_securityhub/aws_securityhub-1.0.0.zip",
    "path": "/package/aws_securityhub/1.0.0",
    "icons": [
      {
        "src": "/img/logo_securityhub.svg",
        "path": "/package/aws_securityhub/1.0.0/img/logo_securityhub.svg",
        "title": "AWS Security Hub logo",
        "size": "33x39",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "aws_securityhub",
        "title": "AWS Security Hub logs",
        "description": "Collect AWS Security Hub logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "aws",
      "security",
      "cloudsecurity_cdr",
      "vulnerability_workflow"
    ],
    "signature_path": "/epr/aws_securityhub/aws_securityhub-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "aws_securityhub.finding",
        "title": "Finding"
      }
    ]
  },
  {
    "name": "aws_vpcflow_otel",
    "title": "AWS VPC Flow Logs OpenTelemetry Assets",
    "version": "0.2.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "AWS VPC Flow Logs OpenTelemetry Assets",
    "type": "content",
    "download": "/epr/aws_vpcflow_otel/aws_vpcflow_otel-0.2.0.zip",
    "path": "/package/aws_vpcflow_otel/0.2.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/aws_vpcflow_otel/0.2.0/img/icon.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/aws_vpcflow_otel/aws_vpcflow_otel-0.2.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "aws.vpcflow.otel"
        }
      ]
    }
  },
  {
    "name": "aws_waf_otel",
    "title": "AWS WAF Logs OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "AWS WAF Logs OpenTelemetry Assets",
    "type": "content",
    "download": "/epr/aws_waf_otel/aws_waf_otel-0.1.0.zip",
    "path": "/package/aws_waf_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_waf_otel.svg",
        "path": "/package/aws_waf_otel/0.1.0/img/logo_waf_otel.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "web",
      "observability",
      "opentelemetry",
      "security",
      "web_application_firewall"
    ],
    "signature_path": "/epr/aws_waf_otel/aws_waf_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "aws.waf.otel"
        }
      ]
    }
  },
  {
    "name": "abnormal_security",
    "title": "Abnormal AI",
    "version": "1.14.0",
    "release": "ga",
    "description": "Collect logs from Abnormal AI with Elastic Agent.",
    "type": "integration",
    "download": "/epr/abnormal_security/abnormal_security-1.14.0.zip",
    "path": "/package/abnormal_security/1.14.0",
    "icons": [
      {
        "src": "/img/abnormal-security-logo.svg",
        "path": "/package/abnormal_security/1.14.0/img/abnormal-security-logo.svg",
        "title": "Abnormal AI Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      },
      {
        "src": "/img/abnormal-security-logo-dark.svg",
        "path": "/package/abnormal_security/1.14.0/img/abnormal-security-logo-dark.svg",
        "title": "Abnormal AI Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "abnormal_security",
        "title": "Abnormal AI logs",
        "description": "Collect Abnormal AI logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.2 || ^9.1.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security",
      "threat_intel"
    ],
    "signature_path": "/epr/abnormal_security/abnormal_security-1.14.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "abnormal_security.ai_security_mailbox",
        "title": "AI Security Mailbox logs"
      },
      {
        "type": "logs",
        "dataset": "abnormal_security.ai_security_mailbox_not_analyzed",
        "title": "AI Security Mailbox Not Analyzed"
      },
      {
        "type": "logs",
        "dataset": "abnormal_security.audit",
        "title": "Audit logs"
      },
      {
        "type": "logs",
        "dataset": "abnormal_security.case",
        "title": "Case logs"
      },
      {
        "type": "logs",
        "dataset": "abnormal_security.threat",
        "title": "Threat logs"
      },
      {
        "type": "logs",
        "dataset": "abnormal_security.vendor_case",
        "title": "Vendor Case Logs"
      }
    ]
  },
  {
    "name": "activemq_otel",
    "title": "ActiveMQ OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "ActiveMQ Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/activemq_otel/activemq_otel-0.1.0.zip",
    "path": "/package/activemq_otel/0.1.0",
    "icons": [
      {
        "src": "/img/activemq.svg",
        "path": "/package/activemq_otel/0.1.0/img/activemq.svg",
        "title": "ActiveMQ logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.3"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "message_queue",
      "opentelemetry"
    ],
    "signature_path": "/epr/activemq_otel/activemq_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "activemq.otel"
        }
      ]
    }
  },
  {
    "name": "admin_by_request_epm",
    "title": "Admin By Request EPM",
    "version": "1.2.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Admin By Request EPM with Elastic Agent.",
    "type": "integration",
    "download": "/epr/admin_by_request_epm/admin_by_request_epm-1.2.0.zip",
    "path": "/package/admin_by_request_epm/1.2.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/admin_by_request_epm/1.2.0/img/logo.svg",
        "title": "Sample logo",
        "size": "832x101",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "admin_by_request_epm",
        "title": "Admin By Request EPM Events",
        "description": "Collect events and audit logs from Admin By Request EPM",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.2 || ^9.0.5"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam",
      "credential_management"
    ],
    "signature_path": "/epr/admin_by_request_epm/admin_by_request_epm-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "admin_by_request_epm.auditlog",
        "title": "Admin By Request EPM Auditlog Data Stream"
      },
      {
        "type": "logs",
        "dataset": "admin_by_request_epm.events",
        "title": "Admin By Request EPM Events Data Stream"
      }
    ]
  },
  {
    "name": "agentless_hello_world",
    "title": "Agentless Hello World",
    "version": "0.2.0",
    "release": "beta",
    "description": "A sample integration to exercise the Agentless infrastructure by fetching https://epr.elastic.co every minute. Optionally includes a counter data stream for high-rate mock metric ingestion testing.",
    "type": "integration",
    "download": "/epr/agentless_hello_world/agentless_hello_world-0.2.0.zip",
    "path": "/package/agentless_hello_world/0.2.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/agentless_hello_world/0.2.0/img/icon.svg",
        "title": "Agentless Hello World",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "agentless_hello_world",
        "title": "Agentless Hello World",
        "description": "Collect data from EPR endpoint every minute.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true,
            "is_default": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ingest-managed-jobs"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/agentless_hello_world/agentless_hello_world-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "agentless_hello_world.generic",
        "title": "Generic logs"
      },
      {
        "type": "metrics",
        "dataset": "agentless_hello_world.mock_counter",
        "title": "Mock counter metrics"
      }
    ]
  },
  {
    "name": "airflow_otel",
    "title": "Airflow OpenTelemetry",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Airflow OpenTelemetry Integration.",
    "type": "content",
    "download": "/epr/airflow_otel/airflow_otel-0.1.0.zip",
    "path": "/package/airflow_otel/0.1.0",
    "icons": [
      {
        "src": "/img/airflow.svg",
        "path": "/package/airflow_otel/0.1.0/img/airflow.svg",
        "title": "Airflow logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "opentelemetry",
      "observability",
      "process_manager"
    ],
    "signature_path": "/epr/airflow_otel/airflow_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "airflow.otel"
        }
      ]
    }
  },
  {
    "name": "airlock_digital",
    "title": "Airlock Digital",
    "version": "0.3.0",
    "release": "beta",
    "description": "Collect logs from Airlock Digital with Elastic Agent.",
    "type": "integration",
    "download": "/epr/airlock_digital/airlock_digital-0.3.0.zip",
    "path": "/package/airlock_digital/0.3.0",
    "icons": [
      {
        "src": "/img/airlock_digital-logo.svg",
        "path": "/package/airlock_digital/0.3.0/img/airlock_digital-logo.svg",
        "title": "Airlock Digital",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "airlock_digital",
        "title": "Airlock Digital Logs",
        "description": "Collect logs from Airlock Digital API.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/airlock_digital/airlock_digital-0.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "airlock_digital.agent",
        "title": "Collect Agent logs from Airlock Digital."
      },
      {
        "type": "logs",
        "dataset": "airlock_digital.execution_histories",
        "title": "Collect Execution Histories logs from Airlock Digital."
      },
      {
        "type": "logs",
        "dataset": "airlock_digital.server_activities",
        "title": "Collect Server Activities logs from Airlock Digital."
      }
    ]
  },
  {
    "name": "akamai",
    "title": "Akamai",
    "version": "3.1.1",
    "release": "ga",
    "description": "Collect logs from Akamai with Elastic Agent.",
    "type": "integration",
    "download": "/epr/akamai/akamai-3.1.1.zip",
    "path": "/package/akamai/3.1.1",
    "icons": [
      {
        "src": "/img/akamai_logo.svg",
        "path": "/package/akamai/3.1.1/img/akamai_logo.svg",
        "title": "Akamai",
        "size": "409×167",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "akamai",
        "title": "Akamai logs",
        "description": "Collect SIEM logs from Akamai"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "cdn_security"
    ],
    "signature_path": "/epr/akamai/akamai-3.1.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "akamai.siem",
        "title": "Akamai SIEM Logs"
      }
    ]
  },
  {
    "name": "aws_bedrock_agentcore",
    "title": "Amazon Bedrock AgentCore",
    "version": "0.7.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Amazon Bedrock AgentCore's Agent runtime, Gateway, Identity, Memory, Browser Tools and Code Interpreter metrics and logs using Elastic Agent",
    "type": "integration",
    "download": "/epr/aws_bedrock_agentcore/aws_bedrock_agentcore-0.7.0.zip",
    "path": "/package/aws_bedrock_agentcore/0.7.0",
    "icons": [
      {
        "src": "/img/amazon_bedrock_agentcore.svg",
        "path": "/package/aws_bedrock_agentcore/0.7.0/img/amazon_bedrock_agentcore.svg",
        "title": "Amazon Bedrock AgentCore logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "aws_bedrock_agentcore",
        "title": "Amazon Bedrock AgentCore",
        "description": "Collect Amazon Bedrock AgentCore metrics using AWS CloudWatch."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "observability"
    ],
    "signature_path": "/epr/aws_bedrock_agentcore/aws_bedrock_agentcore-0.7.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "aws_bedrock_agentcore.gateway_application_logs",
        "title": "Amazon Bedrock AgentCore gateway application logs"
      },
      {
        "type": "logs",
        "dataset": "aws_bedrock_agentcore.memory_application_logs",
        "title": "Amazon Bedrock AgentCore memory application logs"
      },
      {
        "type": "metrics",
        "dataset": "aws_bedrock_agentcore.metrics",
        "title": "Amazon Bedrock AgentCore metrics"
      },
      {
        "type": "logs",
        "dataset": "aws_bedrock_agentcore.runtime_application_logs",
        "title": "Amazon Bedrock AgentCore runtime application logs"
      }
    ]
  },
  {
    "name": "awsfirehose",
    "title": "Amazon Data Firehose",
    "version": "1.9.1",
    "release": "ga",
    "description": "Stream logs and metrics from Amazon Data Firehose into Elastic Cloud.",
    "type": "integration",
    "download": "/epr/awsfirehose/awsfirehose-1.9.1.zip",
    "path": "/package/awsfirehose/1.9.1",
    "icons": [
      {
        "src": "/img/logo_firehose.svg",
        "path": "/package/awsfirehose/1.9.1/img/logo_firehose.svg",
        "title": "logo aws firehose",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "cloud",
      "observability",
      "aws"
    ],
    "signature_path": "/epr/awsfirehose/awsfirehose-1.9.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "awsfirehose",
        "title": "Logs from Amazon Data Firehose"
      },
      {
        "type": "metrics",
        "dataset": "aws.cloudwatch",
        "title": "Metrics ingested from Amazon Data Firehose"
      }
    ]
  },
  {
    "name": "aws_mq",
    "title": "Amazon MQ",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collect Amazon MQ metrics and logs with Elastic Agent",
    "type": "integration",
    "download": "/epr/aws_mq/aws_mq-1.0.0.zip",
    "path": "/package/aws_mq/1.0.0",
    "icons": [
      {
        "src": "/img/aws-mq-logo.svg",
        "path": "/package/aws_mq/1.0.0/img/aws-mq-logo.svg",
        "title": "Amazon MQ logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "amazon_mq",
        "title": "Amazon MQ",
        "description": "Collect Amazon MQ metrics and logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "aws",
      "cloud",
      "message_queue",
      "observability"
    ],
    "signature_path": "/epr/aws_mq/aws_mq-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "aws_mq.activemq_audit_logs",
        "title": "ActiveMQ audit logs"
      },
      {
        "type": "logs",
        "dataset": "aws_mq.activemq_general_logs",
        "title": "ActiveMQ general logs"
      },
      {
        "type": "metrics",
        "dataset": "aws_mq.activemq_metrics",
        "title": "ActiveMQ Metrics"
      },
      {
        "type": "logs",
        "dataset": "aws_mq.rabbitmq_general_logs",
        "title": "RabbitMQ general logs"
      },
      {
        "type": "metrics",
        "dataset": "aws_mq.rabbitmq_metrics",
        "title": "RabbitMQ Metrics"
      }
    ]
  },
  {
    "name": "otel_android_dashboards",
    "title": "Android OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "description": "Dashboards for visualizing Android application's telemetry",
    "type": "content",
    "download": "/epr/otel_android_dashboards/otel_android_dashboards-0.1.0.zip",
    "path": "/package/otel_android_dashboards/0.1.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/otel_android_dashboards/0.1.0/img/logo.svg",
        "title": "Android OpenTelemetry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/apm-agent-android"
    },
    "categories": [
      "observability",
      "application_observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/otel_android_dashboards/otel_android_dashboards-0.1.0.zip.sig"
  },
  {
    "name": "ti_anomali",
    "title": "Anomali ThreatStream",
    "version": "2.6.1",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from Anomali ThreatStream with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_anomali/ti_anomali-2.6.1.zip",
    "path": "/package/ti_anomali/2.6.1",
    "icons": [
      {
        "src": "/img/anomali.svg",
        "path": "/package/ti_anomali/2.6.1/img/anomali.svg",
        "title": "Anomali ThreatStream",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_anomali",
        "title": "Anomali ThreatStream",
        "description": "Ingest threat intelligence indicators from Anomali ThreatStream with Elastic Agent.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_anomali/ti_anomali-2.6.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_anomali.intelligence",
        "title": "Anomali ThreatStream"
      },
      {
        "type": "logs",
        "dataset": "ti_anomali.threatstream",
        "title": "Anomali ThreatStream"
      }
    ]
  },
  {
    "name": "apache",
    "title": "Apache HTTP Server",
    "version": "3.0.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs and metrics from Apache servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/apache/apache-3.0.0.zip",
    "path": "/package/apache/3.0.0",
    "icons": [
      {
        "src": "/img/logo_apache.svg",
        "path": "/package/apache/3.0.0/img/logo_apache.svg",
        "title": "Apache Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "apache",
        "title": "Apache logs and metrics",
        "description": "Collect logs and metrics from Apache instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability"
    ],
    "signature_path": "/epr/apache/apache-3.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "apache.access",
        "title": "Apache access logs"
      },
      {
        "type": "logs",
        "dataset": "apache.error",
        "title": "Apache error logs"
      },
      {
        "type": "metrics",
        "dataset": "apache.status",
        "title": "Apache status metrics"
      }
    ]
  },
  {
    "name": "apache_input_otel",
    "title": "Apache HTTP Server OpenTelemetry Input Package",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Apache HTTP Server status metrics using OpenTelemetry Collector",
    "type": "input",
    "download": "/epr/apache_input_otel/apache_input_otel-0.1.0.zip",
    "path": "/package/apache_input_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_apache_otel.svg",
        "path": "/package/apache_input_otel/0.1.0/img/logo_apache_otel.svg",
        "title": "Apache OpenTelemetry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "apachereceiver",
        "title": "Apache HTTP Server Metrics (OpenTelemetry)",
        "description": "Collect Apache HTTP Server status metrics using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/apache_input_otel/apache_input_otel-0.1.0.zip.sig"
  },
  {
    "name": "apache_otel",
    "title": "Apache OpenTelemetry Assets",
    "version": "0.3.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Apache HTTP Server Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/apache_otel/apache_otel-0.3.0.zip",
    "path": "/package/apache_otel/0.3.0",
    "icons": [
      {
        "src": "/img/logo_apache_otel.svg",
        "path": "/package/apache_otel/0.3.0/img/logo_apache_otel.svg",
        "title": "Apache Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "web",
      "opentelemetry"
    ],
    "signature_path": "/epr/apache_otel/apache_otel-0.3.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "apachereceiver.otel"
        }
      ]
    }
  },
  {
    "name": "apache_tomcat_otel",
    "title": "Apache Tomcat OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Apache Tomcat Assets from OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/apache_tomcat_otel/apache_tomcat_otel-0.1.0.zip",
    "path": "/package/apache_tomcat_otel/0.1.0",
    "icons": [
      {
        "src": "/img/apache_tomcat_otel_logo.svg",
        "path": "/package/apache_tomcat_otel/0.1.0/img/apache_tomcat_otel_logo.svg",
        "title": "Apache Tomcat OTel",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "web",
      "application_observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/apache_tomcat_otel/apache_tomcat_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "tomcat.otel"
        }
      ]
    }
  },
  {
    "name": "armis",
    "title": "Armis",
    "version": "0.4.1",
    "release": "beta",
    "description": "Collect logs from Armis with Elastic Agent.",
    "type": "integration",
    "download": "/epr/armis/armis-0.4.1.zip",
    "path": "/package/armis/0.4.1",
    "icons": [
      {
        "src": "/img/armis-logo.svg",
        "path": "/package/armis/0.4.1/img/armis-logo.svg",
        "title": "Armis logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "armis",
        "title": "Armis logs",
        "description": "Collect Armis logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management",
      "network_security"
    ],
    "signature_path": "/epr/armis/armis-0.4.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "armis.alert",
        "title": "Alert"
      },
      {
        "type": "logs",
        "dataset": "armis.device",
        "title": "Device"
      },
      {
        "type": "logs",
        "dataset": "armis.vulnerability",
        "title": "Vulnerability"
      }
    ]
  },
  {
    "name": "azure_activity_otel",
    "title": "Azure Activity Logs OpenTelemetry Assets",
    "version": "0.1.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Azure Activity Logs OpenTelemetry Assets",
    "type": "content",
    "download": "/epr/azure_activity_otel/azure_activity_otel-0.1.1.zip",
    "path": "/package/azure_activity_otel/0.1.1",
    "icons": [
      {
        "src": "/img/azure_activitylogs_otel.svg",
        "path": "/package/azure_activity_otel/0.1.1/img/azure_activitylogs_otel.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "cloud",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/azure_activity_otel/azure_activity_otel-0.1.1.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "azure.activity.otel"
        }
      ]
    }
  },
  {
    "name": "azure_application_insights",
    "title": "Azure Application Insights Metrics Overview",
    "version": "1.11.0",
    "release": "ga",
    "description": "Collect application insights metrics from Azure Monitor with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_application_insights/azure_application_insights-1.11.0.zip",
    "path": "/package/azure_application_insights/1.11.0",
    "icons": [
      {
        "src": "/img/app_insights.png",
        "path": "/package/azure_application_insights/1.11.0/img/app_insights.png",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "app_insights",
        "title": "Azure Application Insights Metrics",
        "description": "Collect application insights metrics from Azure Monitor with Elastic Agent.",
        "icons": [
          {
            "src": "/img//app_insights.png",
            "path": "/package/azure_application_insights/1.11.0/img/app_insights.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "app_insights"
        ]
      },
      {
        "name": "app_state",
        "title": "Azure Application State Insights Metrics",
        "description": "Collect application state related metrics from Azure Monitor with Elastic Agent.",
        "icons": [
          {
            "src": "/img/application_insights_blue.png",
            "path": "/package/azure_application_insights/1.11.0/img/application_insights_blue.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        },
        "data_streams": [
          "app_state"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~8.19.14 || ~9.2.8 || ^9.3.3"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "cloud",
      "observability"
    ],
    "signature_path": "/epr/azure_application_insights/azure_application_insights-1.11.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "azure.app_insights",
        "title": "Azure Application Insights"
      },
      {
        "type": "metrics",
        "dataset": "azure.app_state",
        "title": "Azure Application State"
      }
    ]
  },
  {
    "name": "azure",
    "title": "Azure Logs",
    "version": "1.36.1",
    "release": "ga",
    "description": "This Elastic integration collects logs from Azure",
    "type": "integration",
    "download": "/epr/azure/azure-1.36.1.zip",
    "path": "/package/azure/1.36.1",
    "icons": [
      {
        "src": "/img/azure_logs_logo.png",
        "path": "/package/azure/1.36.1/img/azure_logs_logo.png",
        "title": "logo azure",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "events",
        "title": "Azure Logs (v2 preview)",
        "description": "Azure Logs (v2 preview) integration",
        "icons": [
          {
            "src": "/img/eventhub.png",
            "path": "/package/azure/1.36.1/img/eventhub.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "stream_processing"
        ],
        "data_streams": [
          "events"
        ]
      },
      {
        "name": "eventhub",
        "title": "Azure Event Hub Input",
        "description": "Azure Event Hub input integration",
        "icons": [
          {
            "src": "/img/eventhub.png",
            "path": "/package/azure/1.36.1/img/eventhub.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "stream_processing"
        ],
        "data_streams": [
          "eventhub"
        ]
      },
      {
        "name": "adlogs",
        "title": "Microsoft Entra ID",
        "description": "Collect logs from Microsoft Entra ID (formerly Azure Active Directory) with Elastic Agent.",
        "icons": [
          {
            "src": "/img/microsoft-entra-id-logo.svg",
            "path": "/package/azure/1.36.1/img/microsoft-entra-id-logo.svg",
            "title": "Microsoft Entra ID logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "auditlogs",
          "signinlogs",
          "identity_protection",
          "provisioning"
        ]
      },
      {
        "name": "platformlogs",
        "title": "Azure platform logs",
        "description": "Azure platform logs integration",
        "icons": [
          {
            "src": "/img/platformlogs_logo.png",
            "path": "/package/azure/1.36.1/img/platformlogs_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "platformlogs"
        ]
      },
      {
        "name": "activitylogs",
        "title": "Azure Activity Logs",
        "description": "Azure Activity Logs integration",
        "icons": [
          {
            "src": "/img/platformlogs_logo.png",
            "path": "/package/azure/1.36.1/img/platformlogs_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "activitylogs"
        ]
      },
      {
        "name": "graphactivitylogs",
        "title": "Microsoft Graph Activity Logs",
        "description": "Microsoft Graph Activity Logs integration",
        "icons": [
          {
            "src": "/img/graph_activity.png",
            "path": "/package/azure/1.36.1/img/graph_activity.png",
            "title": "logo graphactivity",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "graphactivitylogs"
        ]
      },
      {
        "name": "springcloudlogs",
        "title": "Azure Spring Apps logs",
        "description": "Azure Spring Apps logs integration",
        "icons": [
          {
            "src": "/img/spring_logs.svg",
            "path": "/package/azure/1.36.1/img/spring_logs.svg",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "springcloudlogs"
        ]
      },
      {
        "name": "firewall_logs",
        "title": "Azure Firewall logs",
        "description": "Azure firewall logs integration",
        "icons": [
          {
            "src": "/img/firewall_logo.svg",
            "path": "/package/azure/1.36.1/img/firewall_logo.svg",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "firewall_security"
        ],
        "data_streams": [
          "firewall_logs"
        ]
      },
      {
        "name": "application_gateway",
        "title": "Azure Application Gateway",
        "description": "Collect Azure Application Gateway logs with Elastic Agent.",
        "icons": [
          {
            "src": "/img/application_gateway_logo.svg",
            "path": "/package/azure/1.36.1/img/application_gateway_logo.svg",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security"
        ],
        "data_streams": [
          "application_gateway"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "cloud",
      "azure",
      "observability",
      "security"
    ],
    "signature_path": "/epr/azure/azure-1.36.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure.activitylogs",
        "title": "Azure Activity Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.application_gateway",
        "title": "Azure Application Gateway logs"
      },
      {
        "type": "logs",
        "dataset": "azure.auditlogs",
        "title": "Azure Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.eventhub",
        "title": "Azure Event Hub Input"
      },
      {
        "type": "logs",
        "dataset": "azure.events",
        "title": "Azure Logs (v2 preview)"
      },
      {
        "type": "logs",
        "dataset": "azure.firewall_logs",
        "title": "Collect Network rule logs from Azure Firewall"
      },
      {
        "type": "logs",
        "dataset": "azure.graphactivitylogs",
        "title": "Microsoft Graph Activity Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.identity_protection",
        "title": "Microsoft Entra ID Identity Protection Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.platformlogs",
        "title": "Azure Platform Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.provisioning",
        "title": "Microsoft Entra ID Provisioning Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.signinlogs",
        "title": "Azure Signin Logs"
      },
      {
        "type": "logs",
        "dataset": "azure.springcloudlogs",
        "title": "Azure Spring Apps Logs"
      }
    ]
  },
  {
    "name": "azure_network_watcher_nsg",
    "title": "Azure Network Watcher NSG",
    "version": "1.5.1",
    "release": "ga",
    "description": "Collect logs from Azure Network Watcher NSG with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_network_watcher_nsg/azure_network_watcher_nsg-1.5.1.zip",
    "path": "/package/azure_network_watcher_nsg/1.5.1",
    "icons": [
      {
        "src": "/img/azure_network_watcher_logo.svg",
        "path": "/package/azure_network_watcher_nsg/1.5.1/img/azure_network_watcher_logo.svg",
        "title": "Azure Network Watcher logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure_network_watcher_nsg",
        "title": "Azure Network Watcher NSG logs",
        "description": "Collect Azure Network Watcher NSG logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "azure",
      "security"
    ],
    "signature_path": "/epr/azure_network_watcher_nsg/azure_network_watcher_nsg-1.5.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_network_watcher_nsg.log",
        "title": "Collect NSG logs from Azure Network Watcher"
      }
    ]
  },
  {
    "name": "azure_network_watcher_vnet",
    "title": "Azure Network Watcher VNet",
    "version": "1.6.0",
    "release": "ga",
    "description": "Collect logs from Azure Network Watcher VNet with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_network_watcher_vnet/azure_network_watcher_vnet-1.6.0.zip",
    "path": "/package/azure_network_watcher_vnet/1.6.0",
    "icons": [
      {
        "src": "/img/azure_network_watcher_logo.svg",
        "path": "/package/azure_network_watcher_vnet/1.6.0/img/azure_network_watcher_logo.svg",
        "title": "Azure Network Watcher logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure_network_watcher_vnet",
        "title": "Azure Network Watcher VNet logs",
        "description": "Collect Azure Network Watcher VNet logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "azure",
      "security"
    ],
    "signature_path": "/epr/azure_network_watcher_vnet/azure_network_watcher_vnet-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_network_watcher_vnet.log",
        "title": "Collect VNet logs from Azure Network Watcher"
      }
    ]
  },
  {
    "name": "azure_openai",
    "title": "Azure OpenAI",
    "version": "1.11.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collects Azure OpenAI Logs and Metrics",
    "type": "integration",
    "download": "/epr/azure_openai/azure_openai-1.11.0.zip",
    "path": "/package/azure_openai/1.11.0",
    "icons": [
      {
        "src": "/img/open_ai.png",
        "path": "/package/azure_openai/1.11.0/img/open_ai.png",
        "title": "Azure OpenAI logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure_open_ai",
        "title": "Collects Azure OpenAI logs and metrics",
        "description": "Azure OpenAI logs and metrics with Elastic Agent.",
        "categories": [
          "azure",
          "cloud"
        ],
        "data_streams": [
          "logs",
          "metrics"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "cloud",
      "observability",
      "security"
    ],
    "signature_path": "/epr/azure_openai/azure_openai-1.11.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_openai.logs",
        "title": "Collect Azure OpenAI logs"
      },
      {
        "type": "metrics",
        "dataset": "azure.open_ai",
        "title": "Collect OpenAI metrics"
      }
    ]
  },
  {
    "name": "azure_metrics",
    "title": "Azure Resource Metrics",
    "version": "1.11.0",
    "release": "ga",
    "description": "Collect metrics from Azure resources with Elastic Agent.",
    "type": "integration",
    "download": "/epr/azure_metrics/azure_metrics-1.11.0.zip",
    "path": "/package/azure_metrics/1.11.0",
    "icons": [
      {
        "src": "/img/azure_metrics_logo.png",
        "path": "/package/azure_metrics/1.11.0/img/azure_metrics_logo.png",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "monitor",
        "title": "Azure Monitor Metrics",
        "description": "Collect metrics from Azure Monitor with Elastic Agent.",
        "icons": [
          {
            "src": "/img/monitor_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/monitor_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "monitor"
        ]
      },
      {
        "name": "compute_vm",
        "title": "Azure Virtual Machines Metrics",
        "description": "Collect metrics from Azure Virtual Machines with Elastic Agent.",
        "icons": [
          {
            "src": "/img/compute_vm_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/compute_vm_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "compute_vm"
        ]
      },
      {
        "name": "compute_vm_scaleset",
        "title": "Azure Virtual Machines Scaleset Metrics",
        "description": "Collect metrics from Azure Virtual Machine Scalesets with Elastic Agent.",
        "icons": [
          {
            "src": "/img/compute_vm_scaleset_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/compute_vm_scaleset_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "compute_vm_scaleset"
        ]
      },
      {
        "name": "container_registry",
        "title": "Azure Container Registry Metrics",
        "description": "Collect metrics from Azure Container Registry with Elastic Agent.",
        "icons": [
          {
            "src": "/img/container_registry_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/container_registry_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "containers"
        ],
        "data_streams": [
          "container_registry"
        ]
      },
      {
        "name": "container_instance",
        "title": "Azure Container Instance Metrics",
        "description": "Collect metrics from Azure Container Instances with Elastic Agent.",
        "icons": [
          {
            "src": "/img/container_instance_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/container_instance_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "containers"
        ],
        "data_streams": [
          "container_instance"
        ]
      },
      {
        "name": "container_service",
        "title": "Azure Container Service Metrics",
        "description": "Collect metrics from Azure Container Service with Elastic Agent.",
        "icons": [
          {
            "src": "/img/container_service_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/container_service_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "containers"
        ],
        "data_streams": [
          "container_service"
        ]
      },
      {
        "name": "database_account",
        "title": "Azure Database Account Metrics",
        "description": "Collect metrics from Azure Database accounts with Elastic Agent.",
        "icons": [
          {
            "src": "/img/database_account_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/database_account_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "datastore"
        ],
        "data_streams": [
          "database_account"
        ]
      },
      {
        "name": "storage_account",
        "title": "Azure Storage Account Metrics",
        "description": "Collect metrics from Azure Storage accounts with Elastic Agent.",
        "icons": [
          {
            "src": "/img/storage_account_logo.png",
            "path": "/package/azure_metrics/1.11.0/img/storage_account_logo.png",
            "title": "logo azure",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "storage_account"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~8.18.8 || ~8.19.5 || ~9.0.8 || ^9.1.5"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "cloud",
      "observability",
      "azure",
      "custom"
    ],
    "signature_path": "/epr/azure_metrics/azure_metrics-1.11.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "azure.compute_vm",
        "title": "Compute VM"
      },
      {
        "type": "metrics",
        "dataset": "azure.compute_vm_scaleset",
        "title": "Compute VM Scaleset"
      },
      {
        "type": "metrics",
        "dataset": "azure.container_instance",
        "title": "Container Instance"
      },
      {
        "type": "metrics",
        "dataset": "azure.container_registry",
        "title": "Container Registry"
      },
      {
        "type": "metrics",
        "dataset": "azure.container_service",
        "title": "Container Service"
      },
      {
        "type": "metrics",
        "dataset": "azure.database_account",
        "title": "Database Account"
      },
      {
        "type": "metrics",
        "dataset": "azure.monitor",
        "title": "Monitor"
      },
      {
        "type": "metrics",
        "dataset": "azure.storage_account",
        "title": "Storage Account"
      }
    ]
  },
  {
    "name": "bbot",
    "title": "BBOT (Bighuge BLS OSINT Tool)",
    "version": "1.4.0",
    "release": "ga",
    "description": "BBOT is a recursive internet scanner inspired by Spiderfoot, but designed to be faster, more reliable, and friendlier to pentesters, bug bounty hunters, and developers. ",
    "type": "integration",
    "download": "/epr/bbot/bbot-1.4.0.zip",
    "path": "/package/bbot/1.4.0",
    "icons": [
      {
        "src": "/img/BlackLantern-LOGO.svg",
        "path": "/package/bbot/1.4.0/img/BlackLantern-LOGO.svg",
        "title": "BBOT Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "bbot",
        "title": "BBOT Scan Data",
        "description": "Collect BBOT output.ndjson"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/bbot/bbot-1.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "bbot.asm_intel",
        "title": "BBOT-Data-Ingest"
      }
    ]
  },
  {
    "name": "beelzebub",
    "title": "Beelzebub",
    "version": "0.4.0",
    "release": "beta",
    "description": "Beelzebub is an advanced honeypot framework designed to provide a highly secure environment for detecting and analyzing cyber attacks. It offers a low code approach for easy implementation and uses AI to mimic the behavior of a high-interaction honeypot.",
    "type": "integration",
    "download": "/epr/beelzebub/beelzebub-0.4.0.zip",
    "path": "/package/beelzebub/0.4.0",
    "icons": [
      {
        "src": "/img/beelzebub.svg",
        "path": "/package/beelzebub/0.4.0/img/beelzebub.svg",
        "title": "Beelzebub logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Beelzebub",
        "title": "Beelzebub logs",
        "description": "Collect Beelzebub logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/beelzebub/beelzebub-0.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "beelzebub.logs",
        "title": "Beelzebub Logs"
      }
    ]
  },
  {
    "name": "beyondinsight_password_safe",
    "title": "BeyondInsight and Password Safe",
    "version": "1.1.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Ingest privileged access management (PAM) data from BeyondTrust's BeyondInsight PAM Reporting Platform and Password Safe, using Elastic Agent.",
    "type": "integration",
    "download": "/epr/beyondinsight_password_safe/beyondinsight_password_safe-1.1.0.zip",
    "path": "/package/beyondinsight_password_safe/1.1.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/beyondinsight_password_safe/1.1.0/img/logo.svg",
        "title": "BeyondTrust logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "beyondinsight",
        "title": "BeyondInsight and Password Safe Events",
        "description": "Collect events from BeyondInsight and Password Safe",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.2 || ^9.0.5"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "credential_management",
      "iam"
    ],
    "signature_path": "/epr/beyondinsight_password_safe/beyondinsight_password_safe-1.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "beyondinsight_password_safe.asset",
        "title": "BeyondInsight and Password Safe Assets Events"
      },
      {
        "type": "logs",
        "dataset": "beyondinsight_password_safe.managedaccount",
        "title": "BeyondInsight and Password Safe Managed Accounts Events"
      },
      {
        "type": "logs",
        "dataset": "beyondinsight_password_safe.managedsystem",
        "title": "BeyondInsight and Password Safe Managed Systems Events"
      },
      {
        "type": "logs",
        "dataset": "beyondinsight_password_safe.session",
        "title": "BeyondInsight and Password Safe Session Events"
      },
      {
        "type": "logs",
        "dataset": "beyondinsight_password_safe.useraudit",
        "title": "BeyondInsight and Password Safe User Audit Events"
      }
    ]
  },
  {
    "name": "beyondtrust_pra",
    "title": "BeyondTrust PRA",
    "version": "0.3.3",
    "release": "beta",
    "description": "Collect logs from BeyondTrust PRA with Elastic Agent.",
    "type": "integration",
    "download": "/epr/beyondtrust_pra/beyondtrust_pra-0.3.3.zip",
    "path": "/package/beyondtrust_pra/0.3.3",
    "icons": [
      {
        "src": "/img/beyondtrust_pra-logo.png",
        "path": "/package/beyondtrust_pra/0.3.3/img/beyondtrust_pra-logo.png",
        "title": "BeyondTrust PRA",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "beyondtrust_pra",
        "title": "BeyondTrust PRA",
        "description": "Collect logs from BeyondTrust PRA.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam",
      "network_security"
    ],
    "signature_path": "/epr/beyondtrust_pra/beyondtrust_pra-0.3.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "beyondtrust_pra.access_session",
        "title": "Access Session"
      }
    ]
  },
  {
    "name": "bitsight",
    "title": "Bitsight",
    "version": "0.1.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Ingest data from the Bitsight API.",
    "type": "integration",
    "download": "/epr/bitsight/bitsight-0.1.1.zip",
    "path": "/package/bitsight/0.1.1",
    "icons": [
      {
        "src": "/img/bitsight.svg",
        "path": "/package/bitsight/0.1.1/img/bitsight.svg",
        "title": "Bitsight Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "bitsight",
        "title": "Bitsight",
        "description": "Collect data from Bitsight API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "security"
    ],
    "signature_path": "/epr/bitsight/bitsight-0.1.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "bitsight.vulnerability",
        "title": "Bitsight Vulnerability"
      }
    ]
  },
  {
    "name": "proxysg",
    "title": "Broadcom ProxySG",
    "version": "0.8.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect access logs from Broadcom ProxySG with Elastic Agent.",
    "type": "integration",
    "download": "/epr/proxysg/proxysg-0.8.0.zip",
    "path": "/package/proxysg/0.8.0",
    "icons": [
      {
        "src": "/img/proxysg_logo.svg",
        "path": "/package/proxysg/0.8.0/img/proxysg_logo.svg",
        "title": "ProxySG logo",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "proxysg-access-logs",
        "title": "ProxySG access logs",
        "description": "Collect access logs from ProxySG instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/proxysg/proxysg-0.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proxysg.log",
        "title": "ProxySG Access Logs"
      }
    ]
  },
  {
    "name": "canva",
    "title": "Canva",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collect logs from Canva with Elastic Agent.",
    "type": "integration",
    "download": "/epr/canva/canva-1.0.0.zip",
    "path": "/package/canva/1.0.0",
    "icons": [
      {
        "src": "/img/canva-logo.svg",
        "path": "/package/canva/1.0.0/img/canva-logo.svg",
        "title": "Canva logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "canva",
        "title": "Canva logs",
        "description": "Collect Canva logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity"
    ],
    "signature_path": "/epr/canva/canva-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "canva.audit",
        "title": "Collect Audit Logs from Canva"
      }
    ]
  },
  {
    "name": "cassandra_otel",
    "title": "Cassandra OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Apache Cassandra Assets from OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/cassandra_otel/cassandra_otel-0.1.0.zip",
    "path": "/package/cassandra_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_cassandra_otel.svg",
        "path": "/package/cassandra_otel/0.1.0/img/logo_cassandra_otel.svg",
        "title": "Cassandra OTel logo",
        "size": "279x279",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "opentelemetry"
    ],
    "signature_path": "/epr/cassandra_otel/cassandra_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "cassandra.otel"
        }
      ]
    }
  },
  {
    "name": "checkpoint_email",
    "title": "Check Point Harmony Email & Collaboration",
    "version": "1.4.0",
    "release": "ga",
    "description": "Collect logs from Check Point Harmony Email & Collaboration with Elastic Agent.",
    "type": "integration",
    "download": "/epr/checkpoint_email/checkpoint_email-1.4.0.zip",
    "path": "/package/checkpoint_email/1.4.0",
    "icons": [
      {
        "src": "/img/checkpoint-logo.svg",
        "path": "/package/checkpoint_email/1.4.0/img/checkpoint-logo.svg",
        "title": "Check Point logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "checkpoint_email",
        "title": "Check Point Harmony Email & Collaboration logs",
        "description": "Collect Check Point Harmony Email & Collaboration logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/checkpoint_email/checkpoint_email-1.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "checkpoint_email.event",
        "title": "Check Point Harmony Email & Collaboration Event logs"
      }
    ]
  },
  {
    "name": "checkpoint_harmony_endpoint",
    "title": "Check Point Harmony Endpoint",
    "version": "1.2.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Check Point Harmony Endpoint",
    "type": "integration",
    "download": "/epr/checkpoint_harmony_endpoint/checkpoint_harmony_endpoint-1.2.0.zip",
    "path": "/package/checkpoint_harmony_endpoint/1.2.0",
    "icons": [
      {
        "src": "/img/checkpoint-logo.svg",
        "path": "/package/checkpoint_harmony_endpoint/1.2.0/img/checkpoint-logo.svg",
        "title": "Check Point logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "harmony",
        "title": "Check Point Harmony Endpoint Events Collector",
        "description": "Collect Check Point Harmony Endpoint Events",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/checkpoint_harmony_endpoint/checkpoint_harmony_endpoint-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.antibot",
        "title": "Anti-Bot"
      },
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.antimalware",
        "title": "Anti-Malware"
      },
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.forensics",
        "title": "Forensics"
      },
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.threatemulation",
        "title": "Threat Emulation"
      },
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.threatextraction",
        "title": "Threat Extraction"
      },
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.urlfiltering",
        "title": "URL Filtering"
      },
      {
        "type": "logs",
        "dataset": "checkpoint_harmony_endpoint.zerophishing",
        "title": "Zero Phishing"
      }
    ]
  },
  {
    "name": "cilium_tetragon",
    "title": "Cilium Tetragon",
    "version": "0.4.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Cilium Tetragon logs from Kubernetes environments.",
    "type": "integration",
    "download": "/epr/cilium_tetragon/cilium_tetragon-0.4.0.zip",
    "path": "/package/cilium_tetragon/0.4.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/cilium_tetragon/0.4.0/img/logo.svg",
        "title": "Cilium Tetragon Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cilium_tetragon",
        "title": "Cilium Tetragon",
        "description": "Cilium Tetragon is an open-source security observability tool that leverages eBPF technology to provide real-time visibility and monitoring for containerized applications."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "cloud",
      "cloudsecurity_cdr",
      "kubernetes",
      "observability"
    ],
    "signature_path": "/epr/cilium_tetragon/cilium_tetragon-0.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cilium_tetragon.log",
        "title": "log\n"
      }
    ]
  },
  {
    "name": "cisco_duo",
    "title": "Cisco Duo",
    "version": "2.9.0",
    "release": "ga",
    "description": "Collect logs from Cisco Duo with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_duo/cisco_duo-2.9.0.zip",
    "path": "/package/cisco_duo/2.9.0",
    "icons": [
      {
        "src": "/img/cisco_duo-logo.svg",
        "path": "/package/cisco_duo/2.9.0/img/cisco_duo-logo.svg",
        "title": "Cisco Duo logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_duo",
        "title": "Cisco Duo logs",
        "description": "Collect Cisco Duo logs",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/cisco_duo/cisco_duo-2.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cisco_duo.activity",
        "title": "Cisco Duo activity logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.admin",
        "title": "Cisco Duo administrator logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.auth",
        "title": "Cisco Duo authentication logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.offline_enrollment",
        "title": "Cisco Duo offline enrollment logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.summary",
        "title": "Cisco Duo summary logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.telephony",
        "title": "Cisco Duo telephony logs (legacy)"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.telephony_v2",
        "title": "Cisco Duo telephony logs"
      },
      {
        "type": "logs",
        "dataset": "cisco_duo.trust_monitor",
        "title": "Cisco Duo trust monitor logs"
      }
    ]
  },
  {
    "name": "cisco_meraki_metrics",
    "title": "Cisco Meraki Metrics",
    "version": "0.4.3",
    "release": "beta",
    "description": "Collect metrics from Cisco Meraki with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cisco_meraki_metrics/cisco_meraki_metrics-0.4.3.zip",
    "path": "/package/cisco_meraki_metrics/0.4.3",
    "icons": [
      {
        "src": "/img/cisco-logo.svg",
        "path": "/package/cisco_meraki_metrics/0.4.3/img/cisco-logo.svg",
        "title": "Cisco Meraki logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cisco_meraki_metrics",
        "title": "Cisco Meraki metrics",
        "description": "Collects metrics from Cisco Meraki with Elastic Agent"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.2 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "network",
      "observability",
      "security"
    ],
    "signature_path": "/epr/cisco_meraki_metrics/cisco_meraki_metrics-0.4.3.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "cisco_meraki_metrics.device_health",
        "title": "Cisco Meraki Device Health Metrics"
      }
    ]
  },
  {
    "name": "claroty_ctd",
    "title": "Claroty CTD",
    "version": "1.2.0",
    "release": "ga",
    "description": "Collect logs from Claroty CTD using Elastic Agent.",
    "type": "integration",
    "download": "/epr/claroty_ctd/claroty_ctd-1.2.0.zip",
    "path": "/package/claroty_ctd/1.2.0",
    "icons": [
      {
        "src": "/img/claroty-ctd-logo.svg",
        "path": "/package/claroty_ctd/1.2.0/img/claroty-ctd-logo.svg",
        "title": "Claroty CTD logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "claroty_ctd",
        "title": "claroty CTD  logs",
        "description": "Collect sample logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/claroty_ctd/claroty_ctd-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "claroty_ctd.asset",
        "title": "Asset logs"
      },
      {
        "type": "logs",
        "dataset": "claroty_ctd.baseline",
        "title": "Baseline logs"
      },
      {
        "type": "logs",
        "dataset": "claroty_ctd.event",
        "title": "Event logs"
      }
    ]
  },
  {
    "name": "claroty_xdome",
    "title": "Claroty xDome",
    "version": "1.0.2",
    "release": "ga",
    "description": "Collect logs from Claroty xDome with Elastic Agent.",
    "type": "integration",
    "download": "/epr/claroty_xdome/claroty_xdome-1.0.2.zip",
    "path": "/package/claroty_xdome/1.0.2",
    "icons": [
      {
        "src": "/img/claroty-xdome-logo.svg",
        "path": "/package/claroty_xdome/1.0.2/img/claroty-xdome-logo.svg",
        "title": "Claroty xDome",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "claroty_xdome",
        "title": "Claroty xDome",
        "description": "Collect logs from Claroty xDome.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management"
    ],
    "signature_path": "/epr/claroty_xdome/claroty_xdome-1.0.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "claroty_xdome.alert",
        "title": "Collect Alert logs from Claroty xDome"
      },
      {
        "type": "logs",
        "dataset": "claroty_xdome.event",
        "title": "Collect Event logs from Claroty xDome"
      },
      {
        "type": "logs",
        "dataset": "claroty_xdome.vulnerability",
        "title": "Collect Vulnerability logs from Claroty xDome"
      }
    ]
  },
  {
    "name": "cloud_asset_inventory",
    "title": "Cloud Asset Discovery",
    "version": "1.5.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Discover and Create Cloud Assets Discovery",
    "type": "integration",
    "download": "/epr/cloud_asset_inventory/cloud_asset_inventory-1.5.0.zip",
    "path": "/package/cloud_asset_inventory/1.5.0",
    "icons": [
      {
        "src": "/img/logo_cloud_security_posture.svg",
        "path": "/package/cloud_asset_inventory/1.5.0/img/logo_cloud_security_posture.svg",
        "title": "Cloud Security Posture logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "asset_inventory",
        "title": "Cloud Asset Discovery",
        "description": "Discover assets in your Cloud Environment and store within Elastic Search",
        "icons": [
          {
            "src": "/img/logo_cloud_security_posture.svg",
            "path": "/package/cloud_asset_inventory/1.5.0/img/logo_cloud_security_posture.svg",
            "title": "CSPM logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloud"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true,
            "is_default": true
          }
        },
        "data_streams": [
          "asset_inventory"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": ">=9.4.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/cloud-services"
    },
    "categories": [
      "security",
      "asset_inventory",
      "cloudsecurity_cdr",
      "cloud"
    ],
    "signature_path": "/epr/cloud_asset_inventory/cloud_asset_inventory-1.5.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cloud_asset_inventory.asset_inventory",
        "title": "Cloud Assets Discovery"
      }
    ]
  },
  {
    "name": "cloudflare",
    "title": "Cloudflare",
    "version": "2.33.0",
    "release": "ga",
    "description": "Collect logs from Cloudflare with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cloudflare/cloudflare-2.33.0.zip",
    "path": "/package/cloudflare/2.33.0",
    "icons": [
      {
        "src": "/img/cf-logo-v.svg",
        "path": "/package/cloudflare/2.33.0/img/cf-logo-v.svg",
        "title": "Cloudflare",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cloudflare",
        "title": "Cloudflare logs",
        "description": "Collect logs from Cloudflare",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "cdn_security"
    ],
    "signature_path": "/epr/cloudflare/cloudflare-2.33.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cloudflare.audit",
        "title": "Cloudflare Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "cloudflare.logpull",
        "title": "Cloudflare Logpull"
      }
    ]
  },
  {
    "name": "cockroachdb_otel",
    "title": "CockroachDB OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "CockroachDB Assets from OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/cockroachdb_otel/cockroachdb_otel-0.1.0.zip",
    "path": "/package/cockroachdb_otel/0.1.0",
    "icons": [
      {
        "src": "/img/cockroachdb_otel.svg",
        "path": "/package/cockroachdb_otel/0.1.0/img/cockroachdb_otel.svg",
        "title": "CockroachDB OTel",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "opentelemetry"
    ],
    "signature_path": "/epr/cockroachdb_otel/cockroachdb_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "cockroachdb.otel"
        }
      ]
    }
  },
  {
    "name": "containerd",
    "title": "Containerd",
    "version": "0.6.0",
    "release": "beta",
    "description": "Collect metrics from containerd containers.",
    "type": "integration",
    "download": "/epr/containerd/containerd-0.6.0.zip",
    "path": "/package/containerd/0.6.0",
    "icons": [
      {
        "src": "/img/containerd-logo.svg",
        "path": "/package/containerd/0.6.0/img/containerd-logo.svg",
        "title": "logo containerd",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "containerd",
        "title": "Containerd Metrics",
        "description": "Collect metrics from Containerd API with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "observability",
      "containers"
    ],
    "signature_path": "/epr/containerd/containerd-0.6.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "containerd.blkio",
        "title": "Containerd blkio metrics"
      },
      {
        "type": "metrics",
        "dataset": "containerd.cpu",
        "title": "Containerd cpu metrics"
      },
      {
        "type": "metrics",
        "dataset": "containerd.memory",
        "title": "Containerd memory metrics"
      }
    ]
  },
  {
    "name": "corelight",
    "title": "Corelight",
    "version": "1.1.0",
    "release": "ga",
    "description": "Collect logs from Corelight with Elastic Agent.",
    "type": "integration",
    "download": "/epr/corelight/corelight-1.1.0.zip",
    "path": "/package/corelight/1.1.0",
    "icons": [
      {
        "src": "/img/corelight-logo.svg",
        "path": "/package/corelight/1.1.0/img/corelight-logo.svg",
        "title": "Corelight logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "dns_security",
      "network",
      "network_security",
      "vpn_security"
    ],
    "signature_path": "/epr/corelight/corelight-1.1.0.zip.sig"
  },
  {
    "name": "couchdb_otel",
    "title": "CouchDB OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "CouchDB Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/couchdb_otel/couchdb_otel-0.1.0.zip",
    "path": "/package/couchdb_otel/0.1.0",
    "icons": [
      {
        "src": "/img/couchdb_otel.svg",
        "path": "/package/couchdb_otel/0.1.0/img/couchdb_otel.svg",
        "title": "Couchdb logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "opentelemetry"
    ],
    "signature_path": "/epr/couchdb_otel/couchdb_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "couchdbreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "crowdstrike",
    "title": "CrowdStrike",
    "version": "3.15.0",
    "release": "ga",
    "description": "Collect logs from Crowdstrike with Elastic Agent.",
    "type": "integration",
    "download": "/epr/crowdstrike/crowdstrike-3.15.0.zip",
    "path": "/package/crowdstrike/3.15.0",
    "icons": [
      {
        "src": "/img/logo-integrations-crowdstrike.svg",
        "path": "/package/crowdstrike/3.15.0/img/logo-integrations-crowdstrike.svg",
        "title": "CrowdStrike",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "crowdstrike",
        "title": "CrowdStrike",
        "description": "Collect events and data from CrowdStrike Falcon",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/crowdstrike/crowdstrike-3.15.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "crowdstrike.alert",
        "title": "Collect alerts from CrowdStrike."
      },
      {
        "type": "logs",
        "dataset": "crowdstrike.falcon",
        "title": "CrowdStrike Falcon events"
      },
      {
        "type": "logs",
        "dataset": "crowdstrike.fdr",
        "title": "Falcon Data Replicator"
      },
      {
        "type": "logs",
        "dataset": "crowdstrike.host",
        "title": "Collect host inventory from CrowdStrike."
      },
      {
        "type": "logs",
        "dataset": "crowdstrike.vulnerability",
        "title": "Collect vulnerability data from CrowdStrike."
      }
    ]
  },
  {
    "name": "ti_crowdstrike",
    "title": "CrowdStrike Falcon Intelligence",
    "version": "2.7.1",
    "release": "ga",
    "description": "Collect logs from CrowdStrike Falcon Intelligence with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_crowdstrike/ti_crowdstrike-2.7.1.zip",
    "path": "/package/ti_crowdstrike/2.7.1",
    "icons": [
      {
        "src": "/img/crowdstrike_falcon_intelligence-logo.svg",
        "path": "/package/ti_crowdstrike/2.7.1/img/crowdstrike_falcon_intelligence-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_crowdstrike",
        "title": "CrowdStrike Falcon Intelligence logs",
        "description": "Collect CrowdStrike Falcon Intelligence logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_crowdstrike/ti_crowdstrike-2.7.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_crowdstrike.intel",
        "title": "Collect Intel logs from CrowdStrike Falcon Intelligence."
      },
      {
        "type": "logs",
        "dataset": "ti_crowdstrike.ioc",
        "title": "Collect IOC logs from CrowdStrike Falcon Intelligence."
      }
    ]
  },
  {
    "name": "aws_logs",
    "title": "Custom AWS Logs",
    "version": "1.8.3",
    "release": "ga",
    "description": "Collect raw logs from AWS S3 or CloudWatch with Elastic Agent.",
    "type": "integration",
    "download": "/epr/aws_logs/aws_logs-1.8.3.zip",
    "path": "/package/aws_logs/1.8.3",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/aws_logs/1.8.3/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "aws_logs",
        "title": "Custom AWS Logs",
        "description": "Collect raw logs from AWS S3 or CloudWatch with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "cloud",
      "observability",
      "custom",
      "aws"
    ],
    "signature_path": "/epr/aws_logs/aws_logs-1.8.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "aws_logs.generic",
        "title": "Custom logs from AWS"
      }
    ]
  },
  {
    "name": "azure_logs",
    "title": "Custom Azure Logs",
    "version": "0.6.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect log events from Azure Event Hubs with Elastic Agent",
    "type": "input",
    "download": "/epr/azure_logs/azure_logs-0.6.0.zip",
    "path": "/package/azure_logs/0.6.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/azure_logs/0.6.0/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure-logs",
        "title": "Collect Azure logs from Event Hub",
        "description": "Collect Azure logs from Event Hub using the azure-eventhub input."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "custom",
      "observability"
    ],
    "signature_path": "/epr/azure_logs/azure_logs-0.6.0.zip.sig"
  },
  {
    "name": "journald",
    "title": "Custom Journald logs",
    "version": "1.2.1",
    "release": "ga",
    "description": "Collect logs from journald with Elastic Agent.",
    "type": "input",
    "download": "/epr/journald/journald-1.2.1.zip",
    "path": "/package/journald/1.2.1",
    "icons": [
      {
        "src": "/img/systemd-logo.svg",
        "path": "/package/journald/1.2.1/img/systemd-logo.svg",
        "title": "systemd logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Journald logs",
        "description": "Collect journald logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "observability",
      "custom"
    ],
    "signature_path": "/epr/journald/journald-1.2.1.zip.sig"
  },
  {
    "name": "log",
    "title": "Custom Logs (Deprecated)",
    "version": "2.4.4",
    "release": "ga",
    "description": "Collect custom logs with Elastic Agent.",
    "type": "input",
    "download": "/epr/log/log-2.4.4.zip",
    "path": "/package/log/2.4.4",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/log/2.4.4/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Custom log file",
        "description": "Collect your custom log files."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.8.0|| ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "custom",
      "custom_logs"
    ],
    "signature_path": "/epr/log/log-2.4.4.zip.sig"
  },
  {
    "name": "filestream",
    "title": "Custom Logs (Filestream)",
    "version": "2.4.0",
    "release": "ga",
    "description": "Collect log data using filestream with Elastic Agent.",
    "type": "input",
    "download": "/epr/filestream/filestream-2.4.0.zip",
    "path": "/package/filestream/2.4.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/filestream/2.4.0/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "filestream",
        "title": "Custom Filestream Logs",
        "description": "Collect log data from filestream with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "custom",
      "custom_logs"
    ],
    "signature_path": "/epr/filestream/filestream-2.4.0.zip.sig"
  },
  {
    "name": "tcp",
    "title": "Custom TCP Logs",
    "version": "2.3.0",
    "release": "ga",
    "description": "Collect raw TCP data from listening TCP port with Elastic Agent.",
    "type": "input",
    "download": "/epr/tcp/tcp-2.3.0.zip",
    "path": "/package/tcp/2.3.0",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/tcp/2.3.0/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tcp",
        "title": "Custom TCP Logs",
        "description": "Collect raw TCP data from listening TCP port with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "custom",
      "custom_logs"
    ],
    "signature_path": "/epr/tcp/tcp-2.3.0.zip.sig"
  },
  {
    "name": "ti_custom",
    "title": "Custom Threat Intelligence",
    "version": "1.5.0",
    "release": "ga",
    "description": "Ingest threat intelligence data in STIX 2.1 format with Elastic Agent",
    "type": "integration",
    "download": "/epr/ti_custom/ti_custom-1.5.0.zip",
    "path": "/package/ti_custom/1.5.0",
    "icons": [
      {
        "src": "/img/stix-logo.png",
        "path": "/package/ti_custom/1.5.0/img/stix-logo.png",
        "title": "STIX-TAXII logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_custom",
        "title": "Custom Threat Intelligence",
        "description": "Collect threat intelligence IOCs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_custom/ti_custom-1.5.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_custom.indicator",
        "title": "STIX 2.1 indicators"
      }
    ]
  },
  {
    "name": "wmi",
    "title": "Custom WMI Input Package",
    "version": "0.0.2",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Custom WMI Input Package",
    "type": "input",
    "download": "/epr/wmi/wmi-0.0.2.zip",
    "path": "/package/wmi/0.0.2",
    "icons": [
      {
        "src": "/img/logo_windows.svg",
        "path": "/package/wmi/0.0.2/img/logo_windows.svg",
        "title": "Windows logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "wmi",
        "title": "Custom WMI Input",
        "description": "Collect the Windows metrics via WMI"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "custom"
    ],
    "signature_path": "/epr/wmi/wmi-0.0.2.zip.sig"
  },
  {
    "name": "windows_etw",
    "title": "Custom Windows ETW logs",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collect and parse logs from any Windows ETW provider with Elastic Agent.",
    "type": "input",
    "download": "/epr/windows_etw/windows_etw-1.0.0.zip",
    "path": "/package/windows_etw/1.0.0",
    "icons": [
      {
        "src": "/img/logo_windows.svg",
        "path": "/package/windows_etw/1.0.0/img/logo_windows.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "etw",
        "title": "Custom Windows ETW logs",
        "description": "Collect custom Windows ETW logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "custom",
      "os_system"
    ],
    "signature_path": "/epr/windows_etw/windows_etw-1.0.0.zip.sig"
  },
  {
    "name": "unifiedlogs",
    "title": "Custom macOS Unified Logs",
    "version": "0.5.1",
    "release": "beta",
    "description": "Collect and parse logs from macOS unified logs with Elastic Agent.",
    "type": "input",
    "download": "/epr/unifiedlogs/unifiedlogs-0.5.1.zip",
    "path": "/package/unifiedlogs/0.5.1",
    "icons": [
      {
        "src": "/img/logo_macos.svg",
        "path": "/package/unifiedlogs/0.5.1/img/logo_macos.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "unifiedlogs",
        "title": "Custom macOS unified logs",
        "description": "Collect your custom macOS logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "custom",
      "os_system",
      "observability",
      "security"
    ],
    "signature_path": "/epr/unifiedlogs/unifiedlogs-0.5.1.zip.sig"
  },
  {
    "name": "cyberark_epm",
    "title": "CyberArk EPM",
    "version": "1.3.3",
    "release": "ga",
    "description": "Collect logs from CyberArk EPM with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cyberark_epm/cyberark_epm-1.3.3.zip",
    "path": "/package/cyberark_epm/1.3.3",
    "icons": [
      {
        "src": "/img/cyberark-logo.svg",
        "path": "/package/cyberark_epm/1.3.3/img/cyberark-logo.svg",
        "title": "CyberArk logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cyberark_epm",
        "title": "CyberArk EPM logs",
        "description": "Collect CyberArk EPM logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/cyberark_epm/cyberark_epm-1.3.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cyberark_epm.admin_audit",
        "title": "Admin Audit Event"
      },
      {
        "type": "logs",
        "dataset": "cyberark_epm.aggregated_event",
        "title": "Aggregated Event"
      },
      {
        "type": "logs",
        "dataset": "cyberark_epm.policyaudit_aggregated_event",
        "title": "Policy Audit Aggregated Event"
      },
      {
        "type": "logs",
        "dataset": "cyberark_epm.policyaudit_raw_event",
        "title": "Policy Audit Raw Event"
      },
      {
        "type": "logs",
        "dataset": "cyberark_epm.raw_event",
        "title": "Raw Event"
      }
    ]
  },
  {
    "name": "cyera",
    "title": "Cyera",
    "version": "0.6.0",
    "release": "beta",
    "description": "Collect logs from Cyera with Elastic Agent.",
    "type": "integration",
    "download": "/epr/cyera/cyera-0.6.0.zip",
    "path": "/package/cyera/0.6.0",
    "icons": [
      {
        "src": "/img/cyera-logo.svg",
        "path": "/package/cyera/0.6.0/img/cyera-logo.svg",
        "title": "Cyera logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "cyera",
        "title": "Cyera logs",
        "description": "Collect Cyera logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.7 || ^9.1.7 || ^9.2.1 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/cyera/cyera-0.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cyera.classification",
        "title": "Classification"
      },
      {
        "type": "logs",
        "dataset": "cyera.datastore",
        "title": "Datastore"
      },
      {
        "type": "logs",
        "dataset": "cyera.event",
        "title": "Event"
      },
      {
        "type": "logs",
        "dataset": "cyera.issue",
        "title": "Issue"
      }
    ]
  },
  {
    "name": "ti_cyware_intel_exchange",
    "title": "Cyware Intel Exchange",
    "version": "0.2.0",
    "release": "beta",
    "description": "Collect logs from Cyware Intel Exchange with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_cyware_intel_exchange/ti_cyware_intel_exchange-0.2.0.zip",
    "path": "/package/ti_cyware_intel_exchange/0.2.0",
    "icons": [
      {
        "src": "/img/cyware_logo.svg",
        "path": "/package/ti_cyware_intel_exchange/0.2.0/img/cyware_logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_cyware_intel_exchange",
        "title": "Cyware Intel Exchange",
        "description": "Collect indicator logs from Cyware Intel Exchange.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_cyware_intel_exchange/ti_cyware_intel_exchange-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_cyware_intel_exchange.indicator",
        "title": "Collect Indicator logs from Cyware Intel Exchange"
      }
    ]
  },
  {
    "name": "dataminr_pulse",
    "title": "Dataminr Pulse",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect real-time alerts from Dataminr Pulse API",
    "type": "integration",
    "download": "/epr/dataminr_pulse/dataminr_pulse-0.1.0.zip",
    "path": "/package/dataminr_pulse/0.1.0",
    "icons": [
      {
        "src": "/img/Dataminr_Logo-Mark_Full-Color_RGB.svg",
        "path": "/package/dataminr_pulse/0.1.0/img/Dataminr_Logo-Mark_Full-Color_RGB.svg",
        "title": "Dataminr Pulse Logo",
        "size": "any",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "dataminr_pulse",
        "title": "Dataminr Pulse Alerts",
        "description": "Collect real-time alerts from Dataminr Pulse API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/dataminr_pulse/dataminr_pulse-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "dataminr_pulse.alerts",
        "title": "Dataminr Pulse Alerts"
      }
    ]
  },
  {
    "name": "digital_guardian",
    "title": "Digital Guardian",
    "version": "1.8.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Digital Guardian with Elastic Agent.",
    "type": "integration",
    "download": "/epr/digital_guardian/digital_guardian-1.8.0.zip",
    "path": "/package/digital_guardian/1.8.0",
    "icons": [
      {
        "src": "/img/digital-guardian-logo.svg",
        "path": "/package/digital_guardian/1.8.0/img/digital-guardian-logo.svg",
        "title": "Digital Guardian logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "digital_guardian",
        "title": "Digital Guardian logs",
        "description": "Collect Digital Guardian logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/digital_guardian/digital_guardian-1.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "digital_guardian.arc",
        "title": "Digital Guardian ARC Logs"
      }
    ]
  },
  {
    "name": "docker",
    "title": "Docker",
    "version": "2.15.1",
    "release": "ga",
    "description": "Collect metrics and logs from Docker instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/docker/docker-2.15.1.zip",
    "path": "/package/docker/2.15.1",
    "icons": [
      {
        "src": "/img/logo_docker.svg",
        "path": "/package/docker/2.15.1/img/logo_docker.svg",
        "title": "logo docker",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "docker",
        "title": "Docker logs and metrics",
        "description": "Collect logs and metrics from Docker instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.2 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "observability",
      "containers"
    ],
    "signature_path": "/epr/docker/docker-2.15.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "docker.container",
        "title": "Docker container metrics"
      },
      {
        "type": "logs",
        "dataset": "docker.container_logs",
        "title": "Docker container logs"
      },
      {
        "type": "metrics",
        "dataset": "docker.cpu",
        "title": "Docker cpu metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.diskio",
        "title": "Docker diskio metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.event",
        "title": "Docker event metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.healthcheck",
        "title": "Docker healthcheck metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.image",
        "title": "Docker image metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.info",
        "title": "Docker info metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.memory",
        "title": "Docker memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "docker.network",
        "title": "Docker network metrics"
      }
    ]
  },
  {
    "name": "docker_otel",
    "title": "Docker OpenTelemetry Assets",
    "version": "0.2.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Utilise the pre-built dashboard for OTel-native metrics of Docker hosts and their running containers",
    "type": "content",
    "download": "/epr/docker_otel/docker_otel-0.2.0.zip",
    "path": "/package/docker_otel/0.2.0",
    "icons": [
      {
        "src": "/img/docker_logo.svg",
        "path": "/package/docker_otel/0.2.0/img/docker_logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "containers",
      "monitoring",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/docker_otel/docker_otel-0.2.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "dockerstatsreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "docker_input_otel",
    "title": "Docker OpenTelemetry Input Package",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Docker container metrics using OpenTelemetry Collector",
    "type": "input",
    "download": "/epr/docker_input_otel/docker_input_otel-0.1.0.zip",
    "path": "/package/docker_input_otel/0.1.0",
    "icons": [
      {
        "src": "/img/docker_otel_logo.svg",
        "path": "/package/docker_input_otel/0.1.0/img/docker_otel_logo.svg",
        "title": "Docker OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "dockerstatsreceiver",
        "title": "Docker Stats",
        "description": "Collect Docker container performance metrics including CPU, memory, network, and block I/O"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "containers",
      "monitoring",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/docker_input_otel/docker_input_otel-0.1.0.zip.sig"
  },
  {
    "name": "ti_domaintools",
    "title": "DomainTools Feeds",
    "version": "1.3.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "DomainTools Feeds provide data on the different stages of the domain lifecycle: from first-observed in the wild, to newly re-activated after a period of quiet.",
    "type": "integration",
    "download": "/epr/ti_domaintools/ti_domaintools-1.3.0.zip",
    "path": "/package/ti_domaintools/1.3.0",
    "icons": [
      {
        "src": "/img/logo.png",
        "path": "/package/ti_domaintools/1.3.0/img/logo.png",
        "title": "DomainTools logo",
        "size": "250x250",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "domaintools",
        "title": "DomainTools Feeds",
        "description": "The DomainTools Feed provides real-time access to newly registered and observed domains, enabling proactive threat detection and defense."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_domaintools/ti_domaintools-1.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_domaintools.domaindiscovery_feed",
        "title": "DomainTools Domain Discovery Feed"
      },
      {
        "type": "logs",
        "dataset": "ti_domaintools.domainhotlist_feed",
        "title": "DomainTools Domain Hotlist Feed"
      },
      {
        "type": "logs",
        "dataset": "ti_domaintools.domainrdap_feed",
        "title": "DomainTools Domain RDAP Feed"
      },
      {
        "type": "logs",
        "dataset": "ti_domaintools.domainrisk_feed",
        "title": "DomainTools Domain Risk Feed"
      },
      {
        "type": "logs",
        "dataset": "ti_domaintools.nad_feed",
        "title": "DomainTools Newly Active Domains Feed"
      },
      {
        "type": "logs",
        "dataset": "ti_domaintools.nod_feed",
        "title": "DomainTools Newly Observed Domains Feed"
      }
    ]
  },
  {
    "name": "eset_protect",
    "title": "ESET PROTECT",
    "version": "2.2.0",
    "release": "ga",
    "description": "Collect logs from ESET PROTECT with Elastic Agent.",
    "type": "integration",
    "download": "/epr/eset_protect/eset_protect-2.2.0.zip",
    "path": "/package/eset_protect/2.2.0",
    "icons": [
      {
        "src": "/img/eset-protect-logo.svg",
        "path": "/package/eset_protect/2.2.0/img/eset-protect-logo.svg",
        "title": "ESET PROTECT logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "eset_protect",
        "title": "ESET PROTECT logs",
        "description": "Collect logs from ESET PROTECT."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/eset_protect/eset_protect-2.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "eset_protect.detection",
        "title": "Collect Detection logs from ESET PROTECT"
      },
      {
        "type": "logs",
        "dataset": "eset_protect.device_task",
        "title": "Collect Device Task logs from ESET PROTECT"
      },
      {
        "type": "logs",
        "dataset": "eset_protect.event",
        "title": "Collect Event logs from ESET PROTECT"
      }
    ]
  },
  {
    "name": "elastic_agent",
    "title": "Elastic Agent",
    "version": "2.8.0",
    "release": "ga",
    "description": "Collect logs and metrics from Elastic Agents.",
    "type": "integration",
    "download": "/epr/elastic_agent/elastic_agent-2.8.0.zip",
    "path": "/package/elastic_agent/2.8.0",
    "icons": [
      {
        "src": "/img/logo_elastic_agent.svg",
        "path": "/package/elastic_agent/2.8.0/img/logo_elastic_agent.svg",
        "title": "logo Elastic Agent",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent"
    },
    "categories": [
      "elastic_stack"
    ],
    "signature_path": "/epr/elastic_agent/elastic_agent-2.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "elastic_agent.apm_server",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.apm_server",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.auditbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.auditbeat",
        "title": "Elastic Agent Auditbeat Metrics"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.cloud_defend",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.cloudbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.cloudbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.elastic_agent",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.endpoint_security",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.endpoint_security",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.filebeat_input",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.filebeat_input",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.filebeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.filebeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.fleet_server",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.fleet_server",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.heartbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.heartbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.metricbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.metricbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.osquerybeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.osquerybeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.packetbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "metrics",
        "dataset": "elastic_agent.packetbeat",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.pf_elastic_collector",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.pf_elastic_symbolizer",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.pf_host_agent",
        "title": "Elastic Agent"
      },
      {
        "type": "logs",
        "dataset": "elastic_agent.status_change",
        "title": "Elastic Agent Status Change"
      }
    ]
  },
  {
    "name": "ece",
    "title": "Elastic Cloud Enterprise",
    "version": "0.0.2",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "This is a helpful integration for all customers using ECE and need to track the events generated within the ECE admin UI or against the ECE API.",
    "type": "integration",
    "download": "/epr/ece/ece-0.0.2.zip",
    "path": "/package/ece/0.0.2",
    "icons": [
      {
        "src": "/img/ece_logo.svg",
        "path": "/package/ece/0.0.2/img/ece_logo.svg",
        "title": "logo ECE",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ece admin console log",
        "title": "ECE Adminconsole logs",
        "description": "Collect the ECE Adminconsole logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "enterprise"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/stack-monitoring"
    },
    "categories": [
      "elastic_stack"
    ],
    "signature_path": "/epr/ece/ece-0.0.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ece.adminconsole",
        "title": "ECE Adminconsole log"
      }
    ]
  },
  {
    "name": "elastic_connectors",
    "title": "Elastic Connectors",
    "version": "1.0.3",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Sync data from source to the Elasticsearch index.",
    "type": "integration",
    "download": "/epr/elastic_connectors/elastic_connectors-1.0.3.zip",
    "path": "/package/elastic_connectors/1.0.3",
    "icons": [
      {
        "src": "/img/connectors-logo.svg",
        "path": "/package/elastic_connectors/1.0.3/img/connectors-logo.svg",
        "title": "Connectors Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates_behavior": "individual_policies",
    "policy_templates": [
      {
        "name": "github",
        "title": "GitHub & GitHub Enterprise Server Connector",
        "description": "Use a connector to sync data from your GitHub data source.",
        "icons": [
          {
            "src": "/img/service_type/github.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/github.svg",
            "title": "GitHub logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "google_drive",
        "title": "Google Drive Connector",
        "description": "Use a connector to sync from your Google Drive data source.",
        "icons": [
          {
            "src": "/img/service_type/google_drive.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/google_drive.svg",
            "title": "Google Drive logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "gmail",
        "title": "Gmail Connector",
        "description": "Use a connector to sync from your Gmail data source.",
        "icons": [
          {
            "src": "/img/service_type/gmail.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/gmail.svg",
            "title": "Gmail logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "azure_blob_storage",
        "title": "Azure Blob Storage Connector",
        "description": "Use a connector to sync from your Azure Blob Storage data source.",
        "icons": [
          {
            "src": "/img/service_type/azure_blob_storage.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/azure_blob_storage.svg",
            "title": "Azure Blob Storage logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "box",
        "title": "Box Connector",
        "description": "Use a connector to sync from your Box data source.",
        "icons": [
          {
            "src": "/img/service_type/box.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/box.svg",
            "title": "Box logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "confluence",
        "title": "Confluence Connector",
        "description": "Use a connector to sync from your Confluence data source.",
        "icons": [
          {
            "src": "/img/service_type/confluence.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/confluence.svg",
            "title": "Confluence logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "dropbox",
        "title": "Dropbox Connector",
        "description": "Use a connector to sync from your Dropbox data source.",
        "icons": [
          {
            "src": "/img/service_type/dropbox.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/dropbox.svg",
            "title": "Dropbox logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "google_cloud_storage",
        "title": "Google Cloud Storage Connector",
        "description": "Use a connector to sync from your Google Cloud Storage data source.",
        "icons": [
          {
            "src": "/img/service_type/google_cloud_storage.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/google_cloud_storage.svg",
            "title": "Google Cloud Storage logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "jira",
        "title": "Jira Connector",
        "description": "Use a connector to sync from your Jira data source.",
        "icons": [
          {
            "src": "/img/service_type/jira.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/jira.svg",
            "title": "Jira logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "microsoft_sql",
        "title": "Microsoft SQL Connector",
        "description": "Use a connector to sync from your Microsoft SQL data source.",
        "icons": [
          {
            "src": "/img/service_type/microsoft_sql.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/microsoft_sql.svg",
            "title": "Microsoft SQL logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "mongodb",
        "title": "MongoDB Connector",
        "description": "Use a connector to sync from your MongoDB data source.",
        "icons": [
          {
            "src": "/img/service_type/mongodb.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/mongodb.svg",
            "title": "MongoDB logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "mysql",
        "title": "MySQL Connector",
        "description": "Use a connector to sync from your MySQL data source.",
        "icons": [
          {
            "src": "/img/service_type/mysql.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/mysql.svg",
            "title": "MySQL logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "network_drive",
        "title": "Network Drive Connector",
        "description": "Use a connector to sync from your Network Drive data source.",
        "icons": [
          {
            "src": "/img/service_type/network_drive.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/network_drive.svg",
            "title": "Network Drive logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "notion",
        "title": "Notion Connector",
        "description": "Use a connector to sync from your Notion data source.",
        "icons": [
          {
            "src": "/img/service_type/notion.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/notion.svg",
            "title": "Notion logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "onedrive",
        "title": "OneDrive Connector",
        "description": "Use a connector to sync from your OneDrive data source.",
        "icons": [
          {
            "src": "/img/service_type/onedrive.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/onedrive.svg",
            "title": "OneDrive logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "oracle",
        "title": "Oracle Connector",
        "description": "Use a connector to sync from your Oracle data source.",
        "icons": [
          {
            "src": "/img/service_type/oracle.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/oracle.svg",
            "title": "Oracle logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "outlook",
        "title": "Outlook Connector",
        "description": "Use a connector to sync from your Outlook data source.",
        "icons": [
          {
            "src": "/img/service_type/outlook.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/outlook.svg",
            "title": "Outlook logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "postgresql",
        "title": "PostgreSQL Connector",
        "description": "Use a connector to sync from your PostgreSQL data source.",
        "icons": [
          {
            "src": "/img/service_type/postgresql.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/postgresql.svg",
            "title": "PostgreSQL logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "amazon_s3",
        "title": "Amazon S3 Connector",
        "description": "Use a connector to sync from your Amazon S3 data source.",
        "icons": [
          {
            "src": "/img/service_type/amazon_s3.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/amazon_s3.svg",
            "title": "Amazon S3 logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "salesforce",
        "title": "Salesforce Connector",
        "description": "Use a connector to sync from your Salesforce data source.",
        "icons": [
          {
            "src": "/img/service_type/salesforce.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/salesforce.svg",
            "title": "Salesforce logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "sandfly",
        "title": "Sandfly Security Connector",
        "description": "Use a connector to sync from your Sandfly Security data source.",
        "icons": [
          {
            "src": "/img/service_type/sandfly.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/sandfly.svg",
            "title": "Sandfly Security logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "servicenow",
        "title": "ServiceNow Connector",
        "description": "Use a connector to sync from your ServiceNow data source.",
        "icons": [
          {
            "src": "/img/service_type/servicenow.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/servicenow.svg",
            "title": "ServiceNow logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "sharepoint_online",
        "title": "SharePoint Online Connector",
        "description": "Use a connector to sync from your SharePoint Online data source.",
        "icons": [
          {
            "src": "/img/service_type/sharepoint_online.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/sharepoint_online.svg",
            "title": "SharePoint Online logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "sharepoint_server",
        "title": "SharePoint Server Connector",
        "description": "Use a connector to sync from your SharePoint Server data source.",
        "icons": [
          {
            "src": "/img/service_type/sharepoint_server.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/sharepoint_server.svg",
            "title": "SharePoint Server logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "slack",
        "title": "Slack Connector",
        "description": "Use a connector to sync from your Slack data source.",
        "icons": [
          {
            "src": "/img/service_type/slack.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/slack.svg",
            "title": "Slack logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "teams",
        "title": "Teams Connector",
        "description": "Use a connector to sync from your Teams data source.",
        "icons": [
          {
            "src": "/img/service_type/teams.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/teams.svg",
            "title": "Teams logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      },
      {
        "name": "zoom",
        "title": "Zoom Connector",
        "description": "Use a connector to sync from your Zoom data source.",
        "icons": [
          {
            "src": "/img/service_type/zoom.svg",
            "path": "/package/elastic_connectors/1.0.3/img/service_type/zoom.svg",
            "title": "Zoom logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "deployment_modes": {
          "default": {
            "enabled": false
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "platinum"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/search-extract-and-transform"
    },
    "categories": [
      "connector",
      "enterprise_search"
    ],
    "signature_path": "/epr/elastic_connectors/elastic_connectors-1.0.3.zip.sig"
  },
  {
    "name": "elastic_security",
    "title": "Elastic Security",
    "version": "0.4.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Elastic Instance with Elastic Agent.",
    "type": "integration",
    "download": "/epr/elastic_security/elastic_security-0.4.0.zip",
    "path": "/package/elastic_security/0.4.0",
    "icons": [
      {
        "src": "/img/elastic-security-logo.svg",
        "path": "/package/elastic_security/0.4.0/img/elastic-security-logo.svg",
        "title": "Elastic Security Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "elastic_security",
        "title": "Elastic Security logs",
        "description": "Collect Elastic Security logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.1.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "siem"
    ],
    "signature_path": "/epr/elastic_security/elastic_security-0.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "elastic_security.alert",
        "title": "Alert"
      }
    ]
  },
  {
    "name": "ess_billing",
    "title": "Elasticsearch Service Billing",
    "version": "1.7.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collects billing metrics from Elasticsearch Service billing API",
    "type": "integration",
    "download": "/epr/ess_billing/ess_billing-1.7.1.zip",
    "path": "/package/ess_billing/1.7.1",
    "icons": [
      {
        "src": "/img/sample-logo.svg",
        "path": "/package/ess_billing/1.7.1/img/sample-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ESS Billing",
        "title": "Elasticsearch Service Billing Metrics",
        "description": "Collect billing metrics from Elasticsearch Service billing API.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true,
            "is_default": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "cloud"
    ],
    "signature_path": "/epr/ess_billing/ess_billing-1.7.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "ess_billing.billing",
        "title": "Elasticsearch Service Billing"
      },
      {
        "type": "metrics",
        "dataset": "ess_billing.credits",
        "title": "Elasticsearch Service Credits"
      }
    ]
  },
  {
    "name": "entro",
    "title": "Entro",
    "version": "0.2.0",
    "release": "beta",
    "description": "Collect logs from Entro with Elastic Agent.",
    "type": "integration",
    "download": "/epr/entro/entro-0.2.0.zip",
    "path": "/package/entro/0.2.0",
    "icons": [
      {
        "src": "/img/entro_security-logo.svg",
        "path": "/package/entro/0.2.0/img/entro_security-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "entro",
        "title": "Entro audit events",
        "description": "Collect Entro audit events."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "security"
    ],
    "signature_path": "/epr/entro/entro-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "entro.audit",
        "title": "Audit Logs"
      }
    ]
  },
  {
    "name": "envoyproxy",
    "title": "Envoyproxy",
    "version": "0.4.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Envoyproxy Integration",
    "type": "integration",
    "download": "/epr/envoyproxy/envoyproxy-0.4.0.zip",
    "path": "/package/envoyproxy/0.4.0",
    "icons": [
      {
        "src": "/img/envoy.svg",
        "path": "/package/envoyproxy/0.4.0/img/envoy.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "envoyproxy",
        "title": "Envoyproxy logs",
        "description": "Collect logs from Envoyproxy instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability"
    ],
    "signature_path": "/epr/envoyproxy/envoyproxy-0.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "envoyproxy.log",
        "title": "Envoy Logs"
      },
      {
        "type": "metrics",
        "dataset": "envoyproxy.stats",
        "title": "Envoyproxy statistics"
      }
    ]
  },
  {
    "name": "envoyproxy_otel",
    "title": "Envoyproxy OpenTelemetry assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Envoyproxy Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/envoyproxy_otel/envoyproxy_otel-0.1.0.zip",
    "path": "/package/envoyproxy_otel/0.1.0",
    "icons": [
      {
        "src": "/img/envoy_otel.svg",
        "path": "/package/envoyproxy_otel/0.1.0/img/envoy_otel.svg",
        "title": "Envoyproxy logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/envoyproxy_otel/envoyproxy_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "statsdreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "extrahop",
    "title": "ExtraHop",
    "version": "0.2.1",
    "release": "beta",
    "description": "Collect logs from ExtraHop RevealX 360 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/extrahop/extrahop-0.2.1.zip",
    "path": "/package/extrahop/0.2.1",
    "icons": [
      {
        "src": "/img/extrahop-logo.svg",
        "path": "/package/extrahop/0.2.1/img/extrahop-logo.svg",
        "title": "ExtraHop logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "extrahop",
        "title": "ExtraHop RevealX 360 Logs",
        "description": "Collect logs from ExtraHop RevealX 360 API.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.5 || ^8.19.2  || ^9.0.5  || ^9.1.2"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/extrahop/extrahop-0.2.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "extrahop.detection",
        "title": "Collect Detection logs from ExtaHop RevealX 360."
      },
      {
        "type": "logs",
        "dataset": "extrahop.investigation",
        "title": "Collect Investigation logs from ExtaHop RevealX 360."
      }
    ]
  },
  {
    "name": "falco",
    "title": "Falco",
    "version": "2.0.2",
    "release": "ga",
    "description": "Collect events and alerts from Falco using Elastic Agent",
    "type": "integration",
    "download": "/epr/falco/falco-2.0.2.zip",
    "path": "/package/falco/2.0.2",
    "icons": [
      {
        "src": "/img/falco-stacked-color.svg",
        "path": "/package/falco/2.0.2/img/falco-stacked-color.svg",
        "title": "Falco logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "falco",
        "title": "Falco Alerts",
        "description": "Collect Alerts from Falco using Elastic Agent"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "containers",
      "kubernetes",
      "monitoring",
      "observability",
      "security"
    ],
    "signature_path": "/epr/falco/falco-2.0.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "falco.alerts",
        "title": "Falco Alerts"
      },
      {
        "type": "logs",
        "dataset": "falco.alerts_agent",
        "title": "Falco Alerts Agent"
      }
    ]
  },
  {
    "name": "filelog_otel",
    "title": "File Log OpenTelemetry input",
    "version": "0.2.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Tails and parses logs from files using the filelog receiver of the OTel collector.",
    "type": "input",
    "download": "/epr/filelog_otel/filelog_otel-0.2.0.zip",
    "path": "/package/filelog_otel/0.2.0",
    "icons": [
      {
        "src": "/img/logs-icon.svg",
        "path": "/package/filelog_otel/0.2.0/img/logs-icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "filelogreceiver",
        "title": "Custom log file",
        "description": "Collect your custom log files."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "custom",
      "custom_logs",
      "opentelemetry"
    ],
    "signature_path": "/epr/filelog_otel/filelog_otel-0.2.0.zip.sig"
  },
  {
    "name": "first_epss",
    "title": "First EPSS",
    "version": "1.2.0",
    "release": "ga",
    "description": "Collect exploit prediction score data from the First EPSS API with Elastic Agent.",
    "type": "integration",
    "download": "/epr/first_epss/first_epss-1.2.0.zip",
    "path": "/package/first_epss/1.2.0",
    "icons": [
      {
        "src": "/img/first-org-RGB.svg",
        "path": "/package/first_epss/1.2.0/img/first-org-RGB.svg",
        "title": "First logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "first_epss",
        "title": "First EPSS data",
        "description": "Collect First EPSS data."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management"
    ],
    "signature_path": "/epr/first_epss/first_epss-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "first_epss.vulnerability",
        "title": "Collect EPSS data from First API."
      }
    ]
  },
  {
    "name": "ti_flashpoint",
    "title": "Flashpoint",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from Flashpoint with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_flashpoint/ti_flashpoint-0.1.0.zip",
    "path": "/package/ti_flashpoint/0.1.0",
    "icons": [
      {
        "src": "/img/ti_flashpoint-logo.svg",
        "path": "/package/ti_flashpoint/0.1.0/img/ti_flashpoint-logo.svg",
        "title": "Flashpoint logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_flashpoint",
        "title": "Flashpoint",
        "description": "Collect logs from Flashpoint.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_flashpoint/ti_flashpoint-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_flashpoint.alert",
        "title": "Alert"
      },
      {
        "type": "logs",
        "dataset": "ti_flashpoint.indicator",
        "title": "Indicator"
      },
      {
        "type": "logs",
        "dataset": "ti_flashpoint.vulnerability",
        "title": "Vulnerability"
      }
    ]
  },
  {
    "name": "fleet_server",
    "title": "Fleet Server",
    "version": "1.6.1",
    "release": "ga",
    "description": "Centrally manage Elastic Agents with the Fleet Server integration.",
    "type": "integration",
    "download": "/epr/fleet_server/fleet_server-1.6.1.zip",
    "path": "/package/fleet_server/1.6.1",
    "icons": [
      {
        "src": "/img/logo_fleet_server.svg",
        "path": "/package/fleet_server/1.6.1/img/logo_fleet_server.svg",
        "title": "logo Fleet Server",
        "size": "64x64",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fleet_server",
        "title": "Fleet Server",
        "description": "Fleet Server setup"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.12.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/fleet"
    },
    "categories": [
      "elastic_stack"
    ],
    "signature_path": "/epr/fleet_server/fleet_server-1.6.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "fleet_server.agent_status",
        "title": "Fleet Agent Status"
      },
      {
        "type": "metrics",
        "dataset": "fleet_server.agent_versions",
        "title": "Fleet Agent Versions"
      },
      {
        "type": "logs",
        "dataset": "fleet_server.output_health",
        "title": "Output Health"
      }
    ]
  },
  {
    "name": "forescout",
    "title": "Forescout",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from Forescout with Elastic Agent and EyeExtend Connect.",
    "type": "integration",
    "download": "/epr/forescout/forescout-0.1.0.zip",
    "path": "/package/forescout/0.1.0",
    "icons": [
      {
        "src": "/img/forescout-logo.svg",
        "path": "/package/forescout/0.1.0/img/forescout-logo.svg",
        "title": "Forescout logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "forescout",
        "title": "Forescout Logs",
        "description": "Collect Forescout logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/forescout/forescout-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "forescout.event",
        "title": "Collect Syslog from Forescout."
      },
      {
        "type": "logs",
        "dataset": "forescout.host",
        "title": "Collect Logs Sent by Forescout EyeExtend Connect."
      }
    ]
  },
  {
    "name": "fortinet_fortiproxy",
    "title": "Fortinet FortiProxy",
    "version": "1.4.0",
    "release": "ga",
    "description": "Collect logs from Fortinet FortiProxy with Elastic Agent.",
    "type": "integration",
    "download": "/epr/fortinet_fortiproxy/fortinet_fortiproxy-1.4.0.zip",
    "path": "/package/fortinet_fortiproxy/1.4.0",
    "icons": [
      {
        "src": "/img/fortinet-logo.svg",
        "path": "/package/fortinet_fortiproxy/1.4.0/img/fortinet-logo.svg",
        "title": "Fortinet",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "fortinet_fortiproxy",
        "title": "Fortinet FortiProxy logs",
        "description": "Collect logs from Fortinet FortiProxy instances."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.12.2 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "observability",
      "proxy_security",
      "security",
      "web"
    ],
    "signature_path": "/epr/fortinet_fortiproxy/fortinet_fortiproxy-1.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "fortinet_fortiproxy.log",
        "title": "Collect logs from Fortinet FortiProxy"
      }
    ]
  },
  {
    "name": "gcp_audit_otel",
    "title": "GCP Audit Logs OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "GCP Audit Logs OpenTelemetry Assets",
    "type": "content",
    "download": "/epr/gcp_audit_otel/gcp_audit_otel-0.1.0.zip",
    "path": "/package/gcp_audit_otel/0.1.0",
    "icons": [
      {
        "src": "/img/gcp_otel_logo.svg",
        "path": "/package/gcp_audit_otel/0.1.0/img/gcp_otel_logo.svg",
        "title": "GCP OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "google_cloud",
      "cloud",
      "security",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/gcp_audit_otel/gcp_audit_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "gcp.auditlog.otel"
        }
      ]
    }
  },
  {
    "name": "gcp_metrics",
    "title": "GCP Metrics Input",
    "version": "0.3.1",
    "release": "beta",
    "description": "GCP Metrics Input",
    "type": "input",
    "download": "/epr/gcp_metrics/gcp_metrics-0.3.1.zip",
    "path": "/package/gcp_metrics/0.3.1",
    "icons": [
      {
        "src": "/img/logo_gcp.svg",
        "path": "/package/gcp_metrics/0.3.1/img/logo_gcp.svg",
        "title": "logo gcp",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "gcp_metrics",
        "title": "GCP Metrics",
        "description": "GCP Metrics."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "cloud",
      "observability",
      "google_cloud",
      "custom"
    ],
    "signature_path": "/epr/gcp_metrics/gcp_metrics-0.3.1.zip.sig"
  },
  {
    "name": "gcp_vpcflow_otel",
    "title": "GCP VPC Flow Logs OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "GCP VPC Flow Logs OpenTelemetry Assets",
    "type": "content",
    "download": "/epr/gcp_vpcflow_otel/gcp_vpcflow_otel-0.1.0.zip",
    "path": "/package/gcp_vpcflow_otel/0.1.0",
    "icons": [
      {
        "src": "/img/gcp_otel_logo.svg",
        "path": "/package/gcp_vpcflow_otel/0.1.0/img/gcp_otel_logo.svg",
        "title": "GCP OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "google_cloud",
      "cloud",
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/gcp_vpcflow_otel/gcp_vpcflow_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "gcp.vpcflow.otel"
        }
      ]
    }
  },
  {
    "name": "gcp_vertexai",
    "title": "GCP Vertex AI",
    "version": "1.4.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect GCP Vertex AI metrics and logs with Elastic Agent",
    "type": "integration",
    "download": "/epr/gcp_vertexai/gcp_vertexai-1.4.0.zip",
    "path": "/package/gcp_vertexai/1.4.0",
    "icons": [
      {
        "src": "/img/gcp_vertexai.svg",
        "path": "/package/gcp_vertexai/1.4.0/img/gcp_vertexai.svg",
        "title": "Vertex AI logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates_behavior": "combined_policy",
    "policy_templates": [
      {
        "name": "GCP Vertex AI Metrics",
        "title": "GCP Vertex AI Metrics",
        "description": "GCP Vertex AI Metrics",
        "data_streams": [
          "metrics"
        ]
      },
      {
        "name": "GCP Vertex AI  Logs",
        "title": "GCP Vertex AI  Logs",
        "description": "GCP Vertex AI Logs",
        "data_streams": [
          "prompt_response_logs",
          "auditlogs"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "cloud",
      "google_cloud",
      "observability"
    ],
    "signature_path": "/epr/gcp_vertexai/gcp_vertexai-1.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "gcp_vertexai.auditlogs",
        "title": "Google Cloud Platform (GCP) VertexAI Audit Logs"
      },
      {
        "type": "metrics",
        "dataset": "gcp_vertexai.metrics",
        "title": "GCP Vertex AI Metrics"
      },
      {
        "type": "logs",
        "dataset": "gcp_vertexai.prompt_response_logs",
        "title": "Google Cloud Platform (GCP) VertexAI Prompt Response Logs"
      }
    ]
  },
  {
    "name": "gigamon",
    "title": "Gigamon",
    "version": "2.2.0",
    "release": "ga",
    "description": "Collect logs from Gigamon with Elastic Agent.",
    "type": "integration",
    "download": "/epr/gigamon/gigamon-2.2.0.zip",
    "path": "/package/gigamon/2.2.0",
    "icons": [
      {
        "src": "/img/gigamon-logo.svg",
        "path": "/package/gigamon/2.2.0/img/gigamon-logo.svg",
        "title": "Gigamon logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "gigamon",
        "title": "Gigamon AMI json",
        "description": "Collect json data from Gigamon AMI"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "security",
      "network",
      "application_observability",
      "observability"
    ],
    "signature_path": "/epr/gigamon/gigamon-2.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "gigamon.ami",
        "title": "Gigamon Application Metadata Intelligence (AMI) Logs"
      }
    ]
  },
  {
    "name": "github",
    "title": "GitHub",
    "version": "2.23.1",
    "release": "ga",
    "description": "Collect logs from GitHub with Elastic Agent.",
    "type": "integration",
    "download": "/epr/github/github-2.23.1.zip",
    "path": "/package/github/2.23.1",
    "icons": [
      {
        "src": "/img/github.svg",
        "path": "/package/github/2.23.1/img/github.svg",
        "title": "GitHub",
        "size": "1024x1024",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "github",
        "title": "GitHub logs",
        "description": "Collect logs from GitHub",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/github/github-2.23.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "github.audit",
        "title": "GitHub Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "github.code_scanning",
        "title": "GHAS Code Scanning"
      },
      {
        "type": "logs",
        "dataset": "github.dependabot",
        "title": "GHAS Dependabot"
      },
      {
        "type": "logs",
        "dataset": "github.issues",
        "title": "GitHub Issue"
      },
      {
        "type": "logs",
        "dataset": "github.secret_scanning",
        "title": "GHAS Secret Scanning"
      },
      {
        "type": "logs",
        "dataset": "github.security_advisories",
        "title": "Collect GitHub Security Advisories data from GitHub REST API."
      }
    ]
  },
  {
    "name": "gitlab",
    "title": "GitLab",
    "version": "2.6.0",
    "release": "ga",
    "description": "Collect logs from GitLab with Elastic Agent.",
    "type": "integration",
    "download": "/epr/gitlab/gitlab-2.6.0.zip",
    "path": "/package/gitlab/2.6.0",
    "icons": [
      {
        "src": "/img/gitlab-logo.svg",
        "path": "/package/gitlab/2.6.0/img/gitlab-logo.svg",
        "title": "gitlab Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "gitlab",
        "title": "GitLab",
        "description": "Collect logs from GitLab with Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/gitlab/gitlab-2.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "gitlab.api",
        "title": "GitLab API logs"
      },
      {
        "type": "logs",
        "dataset": "gitlab.application",
        "title": "Application"
      },
      {
        "type": "logs",
        "dataset": "gitlab.audit",
        "title": "Audit"
      },
      {
        "type": "logs",
        "dataset": "gitlab.auth",
        "title": "Auth"
      },
      {
        "type": "logs",
        "dataset": "gitlab.pages",
        "title": "GitLab Pages logs"
      },
      {
        "type": "logs",
        "dataset": "gitlab.production",
        "title": "GitLab Production logs"
      },
      {
        "type": "logs",
        "dataset": "gitlab.sidekiq",
        "title": "GitLab Sidekiq logs"
      }
    ]
  },
  {
    "name": "goflow2",
    "title": "GoFlow2 logs",
    "version": "0.7.0",
    "release": "beta",
    "description": "Collect logs from goflow2 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/goflow2/goflow2-0.7.0.zip",
    "path": "/package/goflow2/0.7.0",
    "icons": [
      {
        "src": "/img/goflow2-logo.svg",
        "path": "/package/goflow2/0.7.0/img/goflow2-logo.svg",
        "title": "goflow2 logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "goflow2",
        "title": "goflow2 logs",
        "description": "Collect logs generated with goflow2"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network"
    ],
    "signature_path": "/epr/goflow2/goflow2-0.7.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "goflow2.sflow",
        "title": "Goflow2 sFlow"
      }
    ]
  },
  {
    "name": "google_secops",
    "title": "Google SecOps",
    "version": "1.2.2",
    "release": "ga",
    "description": "Collect alerts from Google SecOps with Elastic Agent.",
    "type": "integration",
    "download": "/epr/google_secops/google_secops-1.2.2.zip",
    "path": "/package/google_secops/1.2.2",
    "icons": [
      {
        "src": "/img/google-secops-logo.svg",
        "path": "/package/google_secops/1.2.2/img/google-secops-logo.svg",
        "title": "Google SecOps logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "google_secops",
        "title": "Google SecOps alerts",
        "description": "Collect Google SecOps alerts.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "google_cloud",
      "security",
      "siem"
    ],
    "signature_path": "/epr/google_secops/google_secops-1.2.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "google_secops.alert",
        "title": "Collect Alerts from Google SecOps."
      }
    ]
  },
  {
    "name": "google_scc",
    "title": "Google Security Command Center",
    "version": "2.4.0",
    "release": "ga",
    "description": "Collect logs from Google Security Command Center with Elastic Agent.",
    "type": "integration",
    "download": "/epr/google_scc/google_scc-2.4.0.zip",
    "path": "/package/google_scc/2.4.0",
    "icons": [
      {
        "src": "/img/google-scc-logo.svg",
        "path": "/package/google_scc/2.4.0/img/google-scc-logo.svg",
        "title": "Google SCC logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "google_scc",
        "title": "Google SCC logs",
        "description": "Collect logs from Google SCC.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "google_cloud",
      "security",
      "cloudsecurity_cdr",
      "vulnerability_workflow",
      "misconfiguration_workflow"
    ],
    "signature_path": "/epr/google_scc/google_scc-2.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "google_scc.asset",
        "title": "Collect Asset logs from Google Security Command Center."
      },
      {
        "type": "logs",
        "dataset": "google_scc.audit",
        "title": "Collect Audit logs from Google Security Command Center."
      },
      {
        "type": "logs",
        "dataset": "google_scc.finding",
        "title": "Collect Finding logs from Google Security Command Center."
      },
      {
        "type": "logs",
        "dataset": "google_scc.source",
        "title": "Collect Source logs from Google Security Command Center."
      }
    ]
  },
  {
    "name": "ti_google_threat_intelligence",
    "title": "Google Threat Intelligence",
    "version": "0.8.1",
    "release": "beta",
    "description": "Collect Threat Intelligence Events from Google Threat Intelligence using Elastic Agent, and perform enrichment on Elasticsearch by correlating Indicators of Compromise (IOCs).",
    "type": "integration",
    "download": "/epr/ti_google_threat_intelligence/ti_google_threat_intelligence-0.8.1.zip",
    "path": "/package/ti_google_threat_intelligence/0.8.1",
    "icons": [
      {
        "src": "/img/ti_google_threat_intelligence-logo.png",
        "path": "/package/ti_google_threat_intelligence/0.8.1/img/ti_google_threat_intelligence-logo.png",
        "title": "Google Threat Intelligence Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_google_threat_intelligence",
        "title": "Google Threat Intelligence events",
        "description": "Collect Google Threat Intelligence events.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_google_threat_intelligence/ti_google_threat_intelligence-0.8.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.cryptominer",
        "title": "Cryptominer Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.first_stage_delivery_vectors",
        "title": "First Stage Delivery Vectors Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.infostealer",
        "title": "Infostealer Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.ioc_stream",
        "title": "IOC Stream Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.iot",
        "title": "Internet of Things Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.linux",
        "title": "Linux Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.malicious_network_infrastructure",
        "title": "Malicious Network Infrastructure Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.malware",
        "title": "Malware Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.mobile",
        "title": "Mobile Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.osx",
        "title": "OS X Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.phishing",
        "title": "Phishing Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.ransomware",
        "title": "Ransomware Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.threat_actor",
        "title": "Threat Actor Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.trending",
        "title": "Daily Top trending Events"
      },
      {
        "type": "logs",
        "dataset": "ti_google_threat_intelligence.vulnerability_weaponization",
        "title": "Vulnerability Weaponization Events"
      }
    ]
  },
  {
    "name": "google_workspace",
    "title": "Google Workspace",
    "version": "3.3.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Google Workspace with Elastic Agent.",
    "type": "integration",
    "download": "/epr/google_workspace/google_workspace-3.3.1.zip",
    "path": "/package/google_workspace/3.3.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/google_workspace/3.3.1/img/logo.svg",
        "title": "logo Google",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "google_workspace",
        "title": "Google Workspace logs",
        "description": "Collect logs from Google Workspace APIs",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security"
    ],
    "signature_path": "/epr/google_workspace/google_workspace-3.3.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "google_workspace.access_transparency",
        "title": "Access Transparency logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.admin",
        "title": "Admin logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.alert",
        "title": "Collect Alert logs from Google Workspace"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.calendar",
        "title": "Google Workspace Calendar logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.chat",
        "title": "Google Workspace Chat logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.chrome",
        "title": "Google Workspace Chrome logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.context_aware_access",
        "title": "Context Aware Access logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.data_studio",
        "title": "Google Workspace Data Studio logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.device",
        "title": "Device logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.drive",
        "title": "Drive logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.gcp",
        "title": "GCP logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.gmail",
        "title": "Google Workspace Gmail logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.group_enterprise",
        "title": "Group Enterprise logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.groups",
        "title": "Groups logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.keep",
        "title": "Google Workspace Keep logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.login",
        "title": "Login logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.meet",
        "title": "Google Workspace Meet logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.rules",
        "title": "Rules logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.saml",
        "title": "SAML logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.token",
        "title": "Token logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.user_accounts",
        "title": "User accounts logs"
      },
      {
        "type": "logs",
        "dataset": "google_workspace.vault",
        "title": "Google Workspace Vault logs"
      }
    ]
  },
  {
    "name": "grafana",
    "title": "Grafana",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect metrics and logs from Grafana instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/grafana/grafana-0.1.0.zip",
    "path": "/package/grafana/0.1.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/grafana/0.1.0/img/logo.svg",
        "title": "Grafana",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "grafana",
        "title": "Grafana",
        "description": "Collect metrics and logs from Grafana instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "monitoring"
    ],
    "signature_path": "/epr/grafana/grafana-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "grafana.logs",
        "title": "Grafana logs"
      },
      {
        "type": "metrics",
        "dataset": "grafana.metrics",
        "title": "Grafana metrics"
      }
    ]
  },
  {
    "name": "greenhouse",
    "title": "Greenhouse",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect audit logs from Greenhouse ATS with Elastic Agent.",
    "type": "integration",
    "download": "/epr/greenhouse/greenhouse-0.1.0.zip",
    "path": "/package/greenhouse/0.1.0",
    "icons": [
      {
        "src": "/img/greenhouse-logo.svg",
        "path": "/package/greenhouse/0.1.0/img/greenhouse-logo.svg",
        "title": "Greenhouse logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "greenhouse",
        "title": "Greenhouse Audit Logs",
        "description": "Collect audit logs from Greenhouse API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/greenhouse/greenhouse-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "greenhouse.audit",
        "title": "Collect Greenhouse Audit Logs"
      }
    ]
  },
  {
    "name": "ti_greynoise",
    "title": "GreyNoise",
    "version": "0.7.3",
    "release": "beta",
    "description": "Collect Threat Intelligence Indicators from GreyNoise using Elastic Agent, and perform enrichment on Elasticsearch by correlating Indicators of Compromise (IOCs).",
    "type": "integration",
    "download": "/epr/ti_greynoise/ti_greynoise-0.7.3.zip",
    "path": "/package/ti_greynoise/0.7.3",
    "icons": [
      {
        "src": "/img/greynoise_logo.jpeg",
        "path": "/package/ti_greynoise/0.7.3/img/greynoise_logo.jpeg",
        "title": "GreyNoise Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_greynoise",
        "title": "GreyNoise events",
        "description": "Collect GreyNoise events.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "threat_intel",
      "security"
    ],
    "signature_path": "/epr/ti_greynoise/ti_greynoise-0.7.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_greynoise.ip",
        "title": "IP Indicators"
      }
    ]
  },
  {
    "name": "hpe_aruba_cx",
    "title": "HPE Aruba CX",
    "version": "0.4.1",
    "release": "beta",
    "description": "Collect logs from HPE Aruba CX with Elastic Agent",
    "type": "integration",
    "download": "/epr/hpe_aruba_cx/hpe_aruba_cx-0.4.1.zip",
    "path": "/package/hpe_aruba_cx/0.4.1",
    "icons": [
      {
        "src": "/img/aruba-networks-logo.svg",
        "path": "/package/hpe_aruba_cx/0.4.1/img/aruba-networks-logo.svg",
        "title": "Aruba Networks Logo",
        "size": "800x800",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "hpe_aruba_cx",
        "title": "HPE Aruba CX logs",
        "description": "Collect HPE Aruba CX logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "config_management",
      "network",
      "security"
    ],
    "signature_path": "/epr/hpe_aruba_cx/hpe_aruba_cx-0.4.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "hpe_aruba_cx.log",
        "title": "Aruba CX logs"
      }
    ]
  },
  {
    "name": "haproxy_otel",
    "title": "Haproxy OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Haproxy Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/haproxy_otel/haproxy_otel-0.1.0.zip",
    "path": "/package/haproxy_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_haproxy_otel.svg",
        "path": "/package/haproxy_otel/0.1.0/img/logo_haproxy_otel.svg",
        "title": "logo HAProxy otel",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "web",
      "opentelemetry"
    ],
    "signature_path": "/epr/haproxy_otel/haproxy_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "haproxyreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "hostmetrics_input_otel",
    "title": "Host Metrics OpenTelemetry Input Package",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect system metrics using OpenTelemetry Collector",
    "type": "input",
    "download": "/epr/hostmetrics_input_otel/hostmetrics_input_otel-0.1.0.zip",
    "path": "/package/hostmetrics_input_otel/0.1.0",
    "icons": [
      {
        "src": "/img/system-otel.svg",
        "path": "/package/hostmetrics_input_otel/0.1.0/img/system-otel.svg",
        "title": "System OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "hostmetricsreceiver",
        "title": "Host Metrics OpenTelemetry Input",
        "description": "Collect system metrics using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "monitoring",
      "os_system",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/hostmetrics_input_otel/hostmetrics_input_otel-0.1.0.zip.sig"
  },
  {
    "name": "ibmmq_otel",
    "title": "IBM MQ OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "IBM MQ Assets from OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/ibmmq_otel/ibmmq_otel-0.1.0.zip",
    "path": "/package/ibmmq_otel/0.1.0",
    "icons": [
      {
        "src": "/img/ibmmq_otel_logo.svg",
        "path": "/package/ibmmq_otel/0.1.0/img/ibmmq_otel_logo.svg",
        "title": "IBM MQ OTel",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "message_queue",
      "opentelemetry",
      "observability"
    ],
    "signature_path": "/epr/ibmmq_otel/ibmmq_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "ibmmq.otel"
        }
      ]
    }
  },
  {
    "name": "ibm_qradar",
    "title": "IBM QRadar",
    "version": "0.2.0",
    "release": "beta",
    "description": "Collect logs from IBM QRadar with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ibm_qradar/ibm_qradar-0.2.0.zip",
    "path": "/package/ibm_qradar/0.2.0",
    "icons": [
      {
        "src": "/img/ibm_qradar-logo.svg",
        "path": "/package/ibm_qradar/0.2.0/img/ibm_qradar-logo.svg",
        "title": "IBM QRadar logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ibm_qradar",
        "title": "IBM QRadar",
        "description": "Collect logs from IBM QRadar.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "siem"
    ],
    "signature_path": "/epr/ibm_qradar/ibm_qradar-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ibm_qradar.offense",
        "title": "Collect Offenses from IBM QRadar."
      }
    ]
  },
  {
    "name": "iis_otel_input",
    "title": "IIS OpenTelemetry Input Package",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "IIS OpenTelemetry Input Package",
    "type": "input",
    "download": "/epr/iis_otel_input/iis_otel_input-0.1.0.zip",
    "path": "/package/iis_otel_input/0.1.0",
    "icons": [
      {
        "src": "/img/iis_otellogo.svg",
        "path": "/package/iis_otel_input/0.1.0/img/iis_otellogo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "iisreceiver",
        "title": "IIS OpenTelemetry Input",
        "description": "Collect IIS metrics using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/iis_otel_input/iis_otel_input-0.1.0.zip.sig"
  },
  {
    "name": "iis_otel",
    "title": "IIS OpenTelemetry assets",
    "version": "0.3.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "IIS Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/iis_otel/iis_otel-0.3.0.zip",
    "path": "/package/iis_otel/0.3.0",
    "icons": [
      {
        "src": "/img/iis_otel.svg",
        "path": "/package/iis_otel/0.3.0/img/iis_otel.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/iis_otel/iis_otel-0.3.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "iisreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "ironscales",
    "title": "IRONSCALES",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from IRONSCALES with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ironscales/ironscales-0.1.0.zip",
    "path": "/package/ironscales/0.1.0",
    "icons": [
      {
        "src": "/img/ironscales-logo.svg",
        "path": "/package/ironscales/0.1.0/img/ironscales-logo.svg",
        "title": "IRONSCALES logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ironscales",
        "title": "IRONSCALES",
        "description": "Collect logs from IRONSCALES.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.8 || ^9.1.8 || ^9.2.2 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/ironscales/ironscales-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ironscales.incident",
        "title": "Collect Incidents from IRONSCALES."
      }
    ]
  },
  {
    "name": "imperva_cloud_waf",
    "title": "Imperva Cloud WAF",
    "version": "1.13.1",
    "release": "ga",
    "description": "Collect logs from Imperva Cloud WAF with Elastic Agent.",
    "type": "integration",
    "download": "/epr/imperva_cloud_waf/imperva_cloud_waf-1.13.1.zip",
    "path": "/package/imperva_cloud_waf/1.13.1",
    "icons": [
      {
        "src": "/img/imperva-logo.svg",
        "path": "/package/imperva_cloud_waf/1.13.1/img/imperva-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "imperva_cloud_waf",
        "title": "Imperva Cloud WAF logs",
        "description": "Collect logs from Imperva Cloud WAF instance."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/imperva_cloud_waf/imperva_cloud_waf-1.13.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "imperva_cloud_waf.event",
        "title": "Collect Imperva Cloud WAF Events"
      }
    ]
  },
  {
    "name": "influxdb_otel",
    "title": "InfluxDb OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "InfluxDb Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/influxdb_otel/influxdb_otel-0.1.0.zip",
    "path": "/package/influxdb_otel/0.1.0",
    "icons": [
      {
        "src": "/img/influxdb_otel.svg",
        "path": "/package/influxdb_otel/0.1.0/img/influxdb_otel.svg",
        "title": "InfluxDb OpenTelemetry Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/influxdb_otel/influxdb_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "influxdb.otel"
        }
      ]
    }
  },
  {
    "name": "infoblox_threat_defense",
    "title": "Infoblox Threat Defense",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from Infoblox Threat Defense with Elastic Agent.",
    "type": "integration",
    "download": "/epr/infoblox_threat_defense/infoblox_threat_defense-0.1.0.zip",
    "path": "/package/infoblox_threat_defense/0.1.0",
    "icons": [
      {
        "src": "/img/infoblox-threat-defense-logo.svg",
        "path": "/package/infoblox_threat_defense/0.1.0/img/infoblox-threat-defense-logo.svg",
        "title": "Infoblox Threat Defense logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "infoblox_threat_defense",
        "title": "Infoblox Threat Defense logs",
        "description": "Collect Infoblox Threat Defense logs from syslog."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0 "
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/infoblox_threat_defense/infoblox_threat_defense-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "infoblox_threat_defense.event",
        "title": "Event"
      }
    ]
  },
  {
    "name": "island_browser",
    "title": "Island Browser",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collect logs from Island Browser with Elastic Agent.",
    "type": "integration",
    "download": "/epr/island_browser/island_browser-1.0.0.zip",
    "path": "/package/island_browser/1.0.0",
    "icons": [
      {
        "src": "/img/island-browser-logo.svg",
        "path": "/package/island_browser/1.0.0/img/island-browser-logo.svg",
        "title": "Island Browser logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "island_browser",
        "title": "Island Browser",
        "description": "Collect logs from Island Browser.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.8 || ^8.19.5  || ^9.0.8  || ^9.1.5"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/island_browser/island_browser-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "island_browser.admin_actions",
        "title": "Collect Admin Action logs from Island Browser."
      },
      {
        "type": "logs",
        "dataset": "island_browser.audit",
        "title": "Collect Audit logs from Island Browser."
      },
      {
        "type": "logs",
        "dataset": "island_browser.compromised_credential",
        "title": "Collect Compromised Credential logs from Island Browser."
      },
      {
        "type": "logs",
        "dataset": "island_browser.device",
        "title": "Collect Device logs from Island Browser."
      },
      {
        "type": "logs",
        "dataset": "island_browser.user",
        "title": "Collect User logs from Island Browser."
      }
    ]
  },
  {
    "name": "istio",
    "title": "Istio",
    "version": "0.8.0",
    "release": "beta",
    "description": "Collect logs and metrics from the service mesh Istio with Elastic Agent.",
    "type": "integration",
    "download": "/epr/istio/istio-0.8.0.zip",
    "path": "/package/istio/0.8.0",
    "icons": [
      {
        "src": "/img/logo_istio.svg",
        "path": "/package/istio/0.8.0/img/logo_istio.svg",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "istio",
        "title": "Istio logs and metrics",
        "description": "Collect access logs and metrics from Istio service mesh.",
        "data_streams": [
          "access_logs",
          "proxy_metrics",
          "istiod_metrics"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "observability",
      "network",
      "containers",
      "kubernetes"
    ],
    "signature_path": "/epr/istio/istio-0.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "istio.access_logs",
        "title": "Istio access logs"
      },
      {
        "type": "metrics",
        "dataset": "istio.istiod_metrics",
        "title": "Istiod Metrics"
      },
      {
        "type": "metrics",
        "dataset": "istio.proxy_metrics",
        "title": "Istio Proxy Metrics"
      }
    ]
  },
  {
    "name": "jamf_pro",
    "title": "Jamf Pro",
    "version": "1.1.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs and inventory data from Jamf Pro with Elastic Agent",
    "type": "integration",
    "download": "/epr/jamf_pro/jamf_pro-1.1.0.zip",
    "path": "/package/jamf_pro/1.1.0",
    "icons": [
      {
        "src": "/img/logo.png",
        "path": "/package/jamf_pro/1.1.0/img/logo.png",
        "title": "Jamf Pro logo",
        "size": "128x128",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "general_settings",
        "title": "Jamf Pro settings",
        "description": "Jamf Pro related settings"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "custom"
    ],
    "signature_path": "/epr/jamf_pro/jamf_pro-1.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "jamf_pro.events",
        "title": "Jamf Pro Events"
      },
      {
        "type": "logs",
        "dataset": "jamf_pro.inventory",
        "title": "Inventory data"
      }
    ]
  },
  {
    "name": "jupiter_one",
    "title": "JupiterOne",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from JupiterOne with Elastic Agent.",
    "type": "integration",
    "download": "/epr/jupiter_one/jupiter_one-0.1.0.zip",
    "path": "/package/jupiter_one/0.1.0",
    "icons": [
      {
        "src": "/img/jupiter_one-logo.svg",
        "path": "/package/jupiter_one/0.1.0/img/jupiter_one-logo.svg",
        "title": "JupiterOne logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "jupiter_one",
        "title": "JupiterOne",
        "description": "Collect logs from JupiterOne.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ^9.1.10 || ^9.2.4 || ^9.3.1 || ^9.4.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/jupiter_one/jupiter_one-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "jupiter_one.asset",
        "title": "Collect Assets from JupiterOne."
      },
      {
        "type": "logs",
        "dataset": "jupiter_one.risks_and_alerts",
        "title": "JupiterOne Risks and Alerts"
      }
    ]
  },
  {
    "name": "kafka_otel",
    "title": "Kafka OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Kafka Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/kafka_otel/kafka_otel-0.1.0.zip",
    "path": "/package/kafka_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_kafka.svg",
        "path": "/package/kafka_otel/0.1.0/img/logo_kafka.svg",
        "title": "Kafka logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "message_queue",
      "opentelemetry"
    ],
    "signature_path": "/epr/kafka_otel/kafka_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "kafkametricsreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "kubernetes",
    "title": "Kubernetes",
    "version": "1.85.0",
    "release": "ga",
    "description": "Collect logs and metrics from Kubernetes clusters with Elastic Agent.",
    "type": "integration",
    "download": "/epr/kubernetes/kubernetes-1.85.0.zip",
    "path": "/package/kubernetes/1.85.0",
    "icons": [
      {
        "src": "/img/logo_kubernetes.svg",
        "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
        "title": "Logo Kubernetes",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kubelet",
        "title": "Kubelet Metrics",
        "description": "Collect metrics from Kubernetes Kubelet API with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "container",
          "node",
          "pod",
          "system",
          "volume"
        ]
      },
      {
        "name": "kube-state-metrics",
        "title": "Kube-state-metrics",
        "description": "Collect container metrics from Kubernetes Kube-state-metrics with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "state_container",
          "state_cronjob",
          "state_daemonset",
          "state_deployment",
          "state_job",
          "state_namespace",
          "state_node",
          "state_persistentvolume",
          "state_persistentvolumeclaim",
          "state_pod",
          "state_replicaset",
          "state_resourcequota",
          "state_service",
          "state_statefulset",
          "state_storageclass"
        ]
      },
      {
        "name": "kube-apiserver",
        "title": "Kube-apiserver Metrics",
        "description": "Collect metrics from Kubernetes API Server with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "apiserver"
        ]
      },
      {
        "name": "kube-proxy",
        "title": "Kube-proxy Metrics",
        "description": "Collect metrics from Kubernetes Proxy server with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "proxy"
        ]
      },
      {
        "name": "kube-scheduler",
        "title": "Kube-scheduler Metrics",
        "description": "Collect metrics from Kubernetes Scheduler with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "scheduler"
        ]
      },
      {
        "name": "kube-controller-manager",
        "title": "Kube-controller-manager Metrics",
        "description": "Collect metrics from Kubernetes Controller Manager with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "controllermanager"
        ]
      },
      {
        "name": "events",
        "title": "Kubernetes Event Metrics",
        "description": "Collect events related metrics from Kubernetes API server with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "event"
        ]
      },
      {
        "name": "container-logs",
        "title": "Kubernetes Container Logs",
        "description": "Collect container related logs from Kubernetes clusters with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "container_logs"
        ]
      },
      {
        "name": "audit-logs",
        "title": "Kubernetes Audit Logs",
        "description": "Collect audit logs from Kubernetes nodes with Elastic Agent.",
        "icons": [
          {
            "src": "/img/logo_kubernetes.svg",
            "path": "/package/kubernetes/1.85.0/img/logo_kubernetes.svg",
            "title": "Logo Kubernetes",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "data_streams": [
          "audit_logs"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~9.1.10 || ~9.2.4 || ^9.3.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "observability",
      "containers",
      "kubernetes"
    ],
    "signature_path": "/epr/kubernetes/kubernetes-1.85.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "kubernetes.apiserver",
        "title": "Kubernetes API Server metrics"
      },
      {
        "type": "logs",
        "dataset": "kubernetes.audit_logs",
        "title": "Kubernetes audit logs"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.container",
        "title": "Kubernetes Container metrics"
      },
      {
        "type": "logs",
        "dataset": "kubernetes.container_logs",
        "title": "Kubernetes container logs"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.controllermanager",
        "title": "Kubernetes Controller Manager metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.event",
        "title": "Kubernetes Event metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.node",
        "title": "Kubernetes Node metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.pod",
        "title": "Kubernetes Pod metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.proxy",
        "title": "Kubernetes Proxy metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.scheduler",
        "title": "Kubernetes Scheduler metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_container",
        "title": "Kubernetes Container metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_cronjob",
        "title": "Kubernetes Cronjob metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_daemonset",
        "title": "Kubernetes Deamonset metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_deployment",
        "title": "Kubernetes Deployment metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_job",
        "title": "Kubernetes Job metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_namespace",
        "title": "Kubernetes Namespace metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_node",
        "title": "Kubernetes Node metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_persistentvolume",
        "title": "Kubernetes PersistentVolume metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_persistentvolumeclaim",
        "title": "Kubernetes PersistentVolumeClaim metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_pod",
        "title": "Kubernetes Pod metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_replicaset",
        "title": "Kubernetes state_replicaset metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_resourcequota",
        "title": "Kubernetes ResourceQuota metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_service",
        "title": "Kubernetes Service metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_statefulset",
        "title": "Kubernetes StatefulSet metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.state_storageclass",
        "title": "Kubernetes StorageClass metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.system",
        "title": "Kubernetes System metrics"
      },
      {
        "type": "metrics",
        "dataset": "kubernetes.volume",
        "title": "Kubernetes Volume metrics"
      }
    ]
  },
  {
    "name": "kubernetes_otel",
    "title": "Kubernetes OpenTelemetry Assets",
    "version": "1.4.0",
    "release": "ga",
    "description": "Utilise the pre-built dashboard for OTel-native metrics and events collected from a Kubernetes cluster",
    "type": "content",
    "download": "/epr/kubernetes_otel/kubernetes_otel-1.4.0.zip",
    "path": "/package/kubernetes_otel/1.4.0",
    "icons": [
      {
        "src": "/img/kubernetes-otel-logo.svg",
        "path": "/package/kubernetes_otel/1.4.0/img/kubernetes-otel-logo.svg",
        "title": "Sample logo",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-ds-hosted-services"
    },
    "categories": [
      "kubernetes",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/kubernetes_otel/kubernetes_otel-1.4.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "kubeletstatsreceiver.otel"
        },
        {
          "name": "k8sobjectsreceiver.otel"
        },
        {
          "name": "k8seventsreceiver.otel"
        },
        {
          "name": "k8sclusterreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "linux",
    "title": "Linux Metrics",
    "version": "1.1.0",
    "release": "ga",
    "description": "Collect metrics from Linux servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/linux/linux-1.1.0.zip",
    "path": "/package/linux/1.1.0",
    "policy_templates": [
      {
        "name": "system",
        "title": "Linux kernel metrics",
        "description": "Collect system metrics from Linux operating systems"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "os_system"
    ],
    "signature_path": "/epr/linux/linux-1.1.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "linux.conntrack",
        "title": "System conntrack metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.entropy",
        "title": "System entropy metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.iostat",
        "title": "Linux disk iostat metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.ksm",
        "title": "Kernel Samepage merging metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.memory",
        "title": "Linux-only memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.network_summary",
        "title": "System network_summary metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.pageinfo",
        "title": "System page info metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.raid",
        "title": "System raid metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.service",
        "title": "System service metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.socket",
        "title": "System socket metrics"
      },
      {
        "type": "metrics",
        "dataset": "linux.users",
        "title": "System users metrics"
      }
    ]
  },
  {
    "name": "lumos",
    "title": "Lumos",
    "version": "1.6.0",
    "release": "ga",
    "description": "An integration with Lumos to ship your Activity logs to your Elastic instance.",
    "type": "integration",
    "download": "/epr/lumos/lumos-1.6.0.zip",
    "path": "/package/lumos/1.6.0",
    "icons": [
      {
        "src": "/img/lumos-logo.svg",
        "path": "/package/lumos/1.6.0/img/lumos-logo.svg",
        "title": "Lumos logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "lumos",
        "title": "Lumos Activity Logs",
        "description": "Collect Activity Logs from Lumos"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/lumos/lumos-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "lumos.activity_logs",
        "title": "Lumos Activity Logs"
      }
    ]
  },
  {
    "name": "memcached_otel",
    "title": "Memcached OpenTelemetry assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Memcached Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/memcached_otel/memcached_otel-0.1.0.zip",
    "path": "/package/memcached_otel/0.1.0",
    "icons": [
      {
        "src": "/img/memcached_otel.svg",
        "path": "/package/memcached_otel/0.1.0/img/memcached_otel.svg",
        "title": "Memcached OpenTelemetry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/memcached_otel/memcached_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "memcachedreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "microsoft_dnsserver",
    "title": "Microsoft DNS Server",
    "version": "1.5.1",
    "release": "ga",
    "description": "Collect logs from Microsoft DNS Server with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_dnsserver/microsoft_dnsserver-1.5.1.zip",
    "path": "/package/microsoft_dnsserver/1.5.1",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/microsoft_dnsserver/1.5.1/img/logo.svg",
        "title": "Microsoft logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_dnsserver",
        "title": "Microsoft DNS Server",
        "description": "Collect Microsoft DNS Server (Audit and Analytical) logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "network",
      "security"
    ],
    "signature_path": "/epr/microsoft_dnsserver/microsoft_dnsserver-1.5.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_dnsserver.analytical",
        "title": "Collect DNS Server Analytical logs"
      },
      {
        "type": "logs",
        "dataset": "microsoft_dnsserver.audit",
        "title": "Collect DNS Server Audit logs"
      }
    ]
  },
  {
    "name": "m365_defender",
    "title": "Microsoft Defender XDR",
    "version": "5.13.0",
    "release": "ga",
    "description": "Collect logs from Microsoft Defender XDR with Elastic Agent.",
    "type": "integration",
    "download": "/epr/m365_defender/m365_defender-5.13.0.zip",
    "path": "/package/m365_defender/5.13.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/m365_defender/5.13.0/img/logo.svg",
        "title": "M365 logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "m365_defender",
        "title": "Microsoft Defender XDR Logs",
        "description": "Collect logs from Microsoft Defender XDR.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr",
      "vulnerability_workflow",
      "cloudsecurity_cdr"
    ],
    "signature_path": "/epr/m365_defender/m365_defender-5.13.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "m365_defender.alert",
        "title": "Collect Alert logs from Microsoft Defender XDR"
      },
      {
        "type": "logs",
        "dataset": "m365_defender.event",
        "title": "Collect Event logs from Microsoft Defender XDR."
      },
      {
        "type": "logs",
        "dataset": "m365_defender.incident",
        "title": "Collect Incident logs from Microsoft Defender XDR"
      },
      {
        "type": "logs",
        "dataset": "m365_defender.vulnerability",
        "title": "Collect Vulnerability logs from Microsoft Defender XDR."
      }
    ]
  },
  {
    "name": "microsoft_defender_cloud",
    "title": "Microsoft Defender for Cloud",
    "version": "3.4.0",
    "release": "ga",
    "description": "Collect logs from Microsoft Defender for Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_defender_cloud/microsoft_defender_cloud-3.4.0.zip",
    "path": "/package/microsoft_defender_cloud/3.4.0",
    "icons": [
      {
        "src": "/img/microsoft-defender-cloud-logo.svg",
        "path": "/package/microsoft_defender_cloud/3.4.0/img/microsoft-defender-cloud-logo.svg",
        "title": "Microsoft Defender for Cloud logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_defender_cloud",
        "title": "Microsoft Defender for Cloud Logs",
        "description": "Collect logs from Microsoft Defender for Cloud.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "cloudsecurity_cdr",
      "vulnerability_workflow",
      "misconfiguration_workflow"
    ],
    "signature_path": "/epr/microsoft_defender_cloud/microsoft_defender_cloud-3.4.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_defender_cloud.assessment",
        "title": "Collect Assessments from Microsoft Defender for Cloud"
      },
      {
        "type": "logs",
        "dataset": "microsoft_defender_cloud.event",
        "title": "Collect Event(Alert and Recommendation) logs from Microsoft Defender for Cloud."
      }
    ]
  },
  {
    "name": "microsoft_defender_endpoint",
    "title": "Microsoft Defender for Endpoint",
    "version": "4.6.0",
    "release": "ga",
    "description": "Collect logs from Microsoft Defender for Endpoint with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_defender_endpoint/microsoft_defender_endpoint-4.6.0.zip",
    "path": "/package/microsoft_defender_endpoint/4.6.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/microsoft_defender_endpoint/4.6.0/img/logo.svg",
        "title": "Microsoft Defender for Endpoint logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_defender_endpoint",
        "title": "Microsoft Defender for Endpoint",
        "description": "Collect logs from Microsoft Defender for Endpoint",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.3 || ^9.1.2"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr",
      "siem",
      "vulnerability_workflow",
      "cloudsecurity_cdr"
    ],
    "signature_path": "/epr/microsoft_defender_endpoint/microsoft_defender_endpoint-4.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_defender_endpoint.log",
        "title": "Microsoft Defender for Endpoint logs"
      },
      {
        "type": "logs",
        "dataset": "microsoft_defender_endpoint.machine",
        "title": "Collect Microsoft Defender for Endpoint machine logs from API"
      },
      {
        "type": "logs",
        "dataset": "microsoft_defender_endpoint.machine_action",
        "title": "Collect Microsoft Defender for Endpoint machine action logs from API"
      },
      {
        "type": "logs",
        "dataset": "microsoft_defender_endpoint.vulnerability",
        "title": "Collect Microsoft Defender for Endpoint vulnerability and affected machine logs from API"
      }
    ]
  },
  {
    "name": "azure_ai_foundry",
    "title": "Microsoft Foundry",
    "version": "0.9.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collects Microsoft Foundry logs and metrics",
    "type": "integration",
    "download": "/epr/azure_ai_foundry/azure_ai_foundry-0.9.1.zip",
    "path": "/package/azure_ai_foundry/0.9.1",
    "icons": [
      {
        "src": "/img/microsoft_foundry.jpeg",
        "path": "/package/azure_ai_foundry/0.9.1/img/microsoft_foundry.jpeg",
        "title": "Microsoft Foundry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "azure_ai_foundry",
        "title": "Collects Microsoft Foundry logs and metrics",
        "description": "Microsoft Foundry metrics with Elastic Agent.",
        "categories": [
          "azure",
          "cloud"
        ],
        "data_streams": [
          "logs",
          "metrics"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "azure",
      "cloud",
      "observability",
      "security"
    ],
    "signature_path": "/epr/azure_ai_foundry/azure_ai_foundry-0.9.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "azure_ai_foundry.logs",
        "title": "Collect Microsoft Foundry logs"
      },
      {
        "type": "metrics",
        "dataset": "azure.ai_foundry",
        "title": "Collect Microsoft Foundry metrics"
      }
    ]
  },
  {
    "name": "microsoft_intune",
    "title": "Microsoft Intune",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from Microsoft Intune with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_intune/microsoft_intune-0.1.0.zip",
    "path": "/package/microsoft_intune/0.1.0",
    "icons": [
      {
        "src": "/img/microsoft-intune-logo.svg",
        "path": "/package/microsoft_intune/0.1.0/img/microsoft-intune-logo.svg",
        "title": "Microsoft Intune logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_intune",
        "title": "Microsoft Intune Logs",
        "description": "Collect logs from Microsoft Intune."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "azure"
    ],
    "signature_path": "/epr/microsoft_intune/microsoft_intune-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_intune.audit",
        "title": "Audit"
      },
      {
        "type": "logs",
        "dataset": "microsoft_intune.managed_device",
        "title": "Managed Device"
      }
    ]
  },
  {
    "name": "o365",
    "title": "Microsoft Office 365",
    "version": "3.8.1",
    "release": "ga",
    "description": "Collect logs from Microsoft Office 365 with Elastic Agent.",
    "type": "integration",
    "download": "/epr/o365/o365-3.8.1.zip",
    "path": "/package/o365/3.8.1",
    "icons": [
      {
        "src": "/img/logo-integrations-microsoft-365.svg",
        "path": "/package/o365/3.8.1/img/logo-integrations-microsoft-365.svg",
        "title": "Microsoft Office 365",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "o365",
        "title": "Office 365 logs",
        "description": "Collect logs from Office 365",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "productivity_security",
      "iam",
      "observability"
    ],
    "signature_path": "/epr/o365/o365-3.8.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "o365.audit",
        "title": "Microsoft Office 365 audit logs"
      }
    ]
  },
  {
    "name": "microsoft_sqlserver",
    "title": "Microsoft SQL Server",
    "version": "2.16.0",
    "release": "ga",
    "description": "Collect events from Microsoft SQL Server with Elastic Agent",
    "type": "integration",
    "download": "/epr/microsoft_sqlserver/microsoft_sqlserver-2.16.0.zip",
    "path": "/package/microsoft_sqlserver/2.16.0",
    "icons": [
      {
        "src": "/img/microsoft-sql-server-logo.svg",
        "path": "/package/microsoft_sqlserver/2.16.0/img/microsoft-sql-server-logo.svg",
        "title": "Microsoft SQL Server",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "audit_logs",
        "title": "Microsoft SQL Server logs and metrics",
        "description": "Collect logs and metrics from Microsoft SQL Server"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "database_security",
      "security",
      "observability"
    ],
    "signature_path": "/epr/microsoft_sqlserver/microsoft_sqlserver-2.16.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_sqlserver.audit",
        "title": "SQL Server audit events"
      },
      {
        "type": "metrics",
        "dataset": "microsoft_sqlserver.availability_groups",
        "title": "Microsoft SQL Server Always On Availability Groups metrics"
      },
      {
        "type": "logs",
        "dataset": "microsoft_sqlserver.log",
        "title": "Microsoft SQL Server error logs"
      },
      {
        "type": "metrics",
        "dataset": "microsoft_sqlserver.performance",
        "title": "Microsoft SQL Server performance metrics"
      },
      {
        "type": "metrics",
        "dataset": "microsoft_sqlserver.transaction_log",
        "title": "Microsoft SQL Server transaction_log metrics"
      }
    ]
  },
  {
    "name": "microsoft_sqlserver_otel",
    "title": "Microsoft SQL Server Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Microsoft SQL Server Assets",
    "type": "content",
    "download": "/epr/microsoft_sqlserver_otel/microsoft_sqlserver_otel-0.1.0.zip",
    "path": "/package/microsoft_sqlserver_otel/0.1.0",
    "icons": [
      {
        "src": "/img/microsoft-sql-server-otel-logo.svg",
        "path": "/package/microsoft_sqlserver_otel/0.1.0/img/microsoft-sql-server-otel-logo.svg",
        "title": "Microsoft SQL Server",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "opentelemetry",
      "observability"
    ],
    "signature_path": "/epr/microsoft_sqlserver_otel/microsoft_sqlserver_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "sqlserverreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "microsoft_sentinel",
    "title": "Microsoft Sentinel",
    "version": "1.3.1",
    "release": "ga",
    "description": "Collect logs from Microsoft Sentinel with Elastic Agent.",
    "type": "integration",
    "download": "/epr/microsoft_sentinel/microsoft_sentinel-1.3.1.zip",
    "path": "/package/microsoft_sentinel/1.3.1",
    "icons": [
      {
        "src": "/img/microsoft-sentinel-logo.svg",
        "path": "/package/microsoft_sentinel/1.3.1/img/microsoft-sentinel-logo.svg",
        "title": "Microsoft Sentinel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "microsoft_sentinel",
        "title": "Microsoft Sentinel Logs",
        "description": "Collect logs from Microsoft Sentinel.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.10 || ~9.1.10 || ~9.2.4 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "azure",
      "security",
      "siem"
    ],
    "signature_path": "/epr/microsoft_sentinel/microsoft_sentinel-1.3.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "microsoft_sentinel.alert",
        "title": "Microsoft Sentinel Alert logs"
      },
      {
        "type": "logs",
        "dataset": "microsoft_sentinel.event",
        "title": "Collect Events from Microsoft Sentinel."
      },
      {
        "type": "logs",
        "dataset": "microsoft_sentinel.incident",
        "title": "Microsoft Sentinel Incident logs"
      }
    ]
  },
  {
    "name": "mimecast",
    "title": "Mimecast",
    "version": "3.3.1",
    "release": "ga",
    "description": "Collect logs from Mimecast with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mimecast/mimecast-3.3.1.zip",
    "path": "/package/mimecast/3.3.1",
    "icons": [
      {
        "src": "/img/mimecast.svg",
        "path": "/package/mimecast/3.3.1/img/mimecast.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mimecast",
        "title": "Mimecast",
        "description": "Collect logs from the Mimecast API with Elastic Agent.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/mimecast/mimecast-3.3.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "mimecast.archive_search_logs",
        "title": "Archive Search Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.audit_events",
        "title": "Audit Events Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.cloud_integrated_logs",
        "title": "Cloud Integrated Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.dlp_logs",
        "title": "DLP Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.message_release_logs",
        "title": "Mimecast Message Release"
      },
      {
        "type": "logs",
        "dataset": "mimecast.siem_logs",
        "title": "SIEM Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.threat_intel_malware_customer",
        "title": "Threat Intel Feed - Malware Customer"
      },
      {
        "type": "logs",
        "dataset": "mimecast.threat_intel_malware_grid",
        "title": "Threat Intel Feed - Malware Grid"
      },
      {
        "type": "logs",
        "dataset": "mimecast.ttp_ap_logs",
        "title": "TTP Attachment Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.ttp_ip_logs",
        "title": "TTP Impersonation Mimecast Logs"
      },
      {
        "type": "logs",
        "dataset": "mimecast.ttp_url_logs",
        "title": "TTP URL Logs"
      }
    ]
  },
  {
    "name": "miniflux",
    "title": "Miniflux RSS reader",
    "version": "1.0.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect RSS feed content from the Miniflux API with Elastic Agent.",
    "type": "integration",
    "download": "/epr/miniflux/miniflux-1.0.1.zip",
    "path": "/package/miniflux/1.0.1",
    "icons": [
      {
        "src": "/img/miniflux-logo.svg",
        "path": "/package/miniflux/1.0.1/img/miniflux-logo.svg",
        "title": "Miniflux logo",
        "size": "32x32",
        "type": "image/svg+xml"
      },
      {
        "src": "/img/miniflux-overview-dashboard.png",
        "path": "/package/miniflux/1.0.1/img/miniflux-overview-dashboard.png",
        "title": "GitHub user overview",
        "size": "600x600",
        "type": "image/png"
      }
    ],
    "policy_templates": [
      {
        "name": "miniflux",
        "title": "Miniflux data",
        "description": "Collect Miniflux data."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.4 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "observability",
      "web"
    ],
    "signature_path": "/epr/miniflux/miniflux-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "miniflux.feed_entry",
        "title": "Collect Miniflux data from Miniflux API."
      }
    ]
  },
  {
    "name": "mongodb",
    "title": "MongoDB",
    "version": "1.24.0",
    "release": "ga",
    "description": "Collect logs and metrics from MongoDB instances with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mongodb/mongodb-1.24.0.zip",
    "path": "/package/mongodb/1.24.0",
    "icons": [
      {
        "src": "/img/logo_mongodb.svg",
        "path": "/package/mongodb/1.24.0/img/logo_mongodb.svg",
        "title": "logo mongodb",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mongodb",
        "title": "MongoDB logs and metrics",
        "description": "Collect logs and metrics from MongoDB instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/mongodb/mongodb-1.24.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "mongodb.collstats",
        "title": "MongoDB collstats metrics"
      },
      {
        "type": "metrics",
        "dataset": "mongodb.dbstats",
        "title": "MongoDB dbstats metrics"
      },
      {
        "type": "logs",
        "dataset": "mongodb.log",
        "title": "mongodb log logs"
      },
      {
        "type": "metrics",
        "dataset": "mongodb.metrics",
        "title": "MongoDB metrics"
      },
      {
        "type": "metrics",
        "dataset": "mongodb.replstatus",
        "title": "MongoDB replstatus metrics"
      },
      {
        "type": "metrics",
        "dataset": "mongodb.status",
        "title": "MongoDB status metrics"
      }
    ]
  },
  {
    "name": "mongodb_atlas",
    "title": "MongoDB Atlas",
    "version": "1.2.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "This Elastic integration collects logs and metrics from MongoDB Atlas instance.",
    "type": "integration",
    "download": "/epr/mongodb_atlas/mongodb_atlas-1.2.0.zip",
    "path": "/package/mongodb_atlas/1.2.0",
    "icons": [
      {
        "src": "/img/mongodb_atlas-logo.svg",
        "path": "/package/mongodb_atlas/1.2.0/img/mongodb_atlas-logo.svg",
        "title": "MongoDB Atlas logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mongodb_atlas",
        "title": "MongoDB Atlas logs and metrics",
        "description": "Collect MongoDB Atlas logs and metrics.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "cloud",
      "datastore",
      "observability",
      "database_security",
      "security"
    ],
    "signature_path": "/epr/mongodb_atlas/mongodb_atlas-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "mongodb_atlas.alert",
        "title": "Collect Alert logs from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.disk",
        "title": "Collect Disk metrics from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.hardware",
        "title": "Collect Hardware metrics from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.mongod_audit",
        "title": "Collect Mongod Audit logs from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.mongod_database",
        "title": "Collect Mongod Database logs from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.organization",
        "title": "Collect Organization logs from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.process",
        "title": "Collect Process metrics from MongoDB Atlas"
      },
      {
        "type": "logs",
        "dataset": "mongodb_atlas.project",
        "title": "Collect Project logs from MongoDB Atlas"
      }
    ]
  },
  {
    "name": "mongodb_otel",
    "title": "MongoDB OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "MongoDB Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/mongodb_otel/mongodb_otel-0.1.0.zip",
    "path": "/package/mongodb_otel/0.1.0",
    "icons": [
      {
        "src": "/img/mongodb_otel_logo.svg",
        "path": "/package/mongodb_otel/0.1.0/img/mongodb_otel_logo.svg",
        "title": "MongoDB OTel",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "opentelemetry"
    ],
    "signature_path": "/epr/mongodb_otel/mongodb_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "mongodbreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "mysql",
    "title": "MySQL",
    "version": "1.29.2",
    "release": "ga",
    "description": "Collect logs and metrics from MySQL servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/mysql/mysql-1.29.2.zip",
    "path": "/package/mysql/1.29.2",
    "icons": [
      {
        "src": "/img/logo_mysql.svg",
        "path": "/package/mysql/1.29.2/img/logo_mysql.svg",
        "title": "logo mysql",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mysql",
        "title": "MySQL logs and metrics",
        "description": "Collect logs and metrics from MySQL instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/mysql/mysql-1.29.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "mysql.error",
        "title": "MySQL error logs"
      },
      {
        "type": "metrics",
        "dataset": "mysql.galera_status",
        "title": "MySQL galera_status metrics"
      },
      {
        "type": "metrics",
        "dataset": "mysql.performance",
        "title": "MySQL performance metrics"
      },
      {
        "type": "metrics",
        "dataset": "mysql.replica_status",
        "title": "Collect replica status metrics from mysql"
      },
      {
        "type": "logs",
        "dataset": "mysql.slowlog",
        "title": "MySQL slowlog logs"
      },
      {
        "type": "metrics",
        "dataset": "mysql.status",
        "title": "MySQL status metrics"
      }
    ]
  },
  {
    "name": "mysql_otel",
    "title": "MySQL OpenTelemetry Assets",
    "version": "0.4.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "MySQL Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/mysql_otel/mysql_otel-0.4.0.zip",
    "path": "/package/mysql_otel/0.4.0",
    "icons": [
      {
        "src": "/img/logo_mysql_otel.svg",
        "path": "/package/mysql_otel/0.4.0/img/logo_mysql_otel.svg",
        "title": "Logo MySQL OTEL",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/mysql_otel/mysql_otel-0.4.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "mysqlreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "mysql_input_otel",
    "title": "MySQL OpenTelemetry Input Package",
    "version": "0.2.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect MySQL metrics and logs using OpenTelemetry Collector",
    "type": "input",
    "download": "/epr/mysql_input_otel/mysql_input_otel-0.2.1.zip",
    "path": "/package/mysql_input_otel/0.2.1",
    "icons": [
      {
        "src": "/img/logo_mysql_otel.svg",
        "path": "/package/mysql_input_otel/0.2.1/img/logo_mysql_otel.svg",
        "title": "MySQL logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "mysqlreceiver",
        "title": "MySQL Metrics and Logs (OpenTelemetry)",
        "description": "Collect MySQL metrics and logs (query samples, top queries) using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/mysql_input_otel/mysql_input_otel-0.2.1.zip.sig"
  },
  {
    "name": "nginx_otel",
    "title": "NGINX OpenTelemetry Assets",
    "version": "0.3.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "NGINX Assets from OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/nginx_otel/nginx_otel-0.3.0.zip",
    "path": "/package/nginx_otel/0.3.0",
    "icons": [
      {
        "src": "/img/nginx_otel_logo.svg",
        "path": "/package/nginx_otel/0.3.0/img/nginx_otel_logo.svg",
        "title": "NGINX logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "web",
      "opentelemetry"
    ],
    "signature_path": "/epr/nginx_otel/nginx_otel-0.3.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "nginxreceiver.otel"
        },
        {
          "name": "nginx.access.otel"
        },
        {
          "name": "nginx.error.otel"
        }
      ]
    }
  },
  {
    "name": "nginx_otel_input",
    "title": "NGINX OpenTelemetry Input Package",
    "version": "0.2.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "NGINX OpenTelemetry Input Package",
    "type": "input",
    "download": "/epr/nginx_otel_input/nginx_otel_input-0.2.0.zip",
    "path": "/package/nginx_otel_input/0.2.0",
    "icons": [
      {
        "src": "/img/nginx_otellogo.svg",
        "path": "/package/nginx_otel_input/0.2.0/img/nginx_otellogo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nginxreceiver",
        "title": "NGINX OpenTelemetry Input",
        "description": "Collect NGINX metrics using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "web",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/nginx_otel_input/nginx_otel_input-0.2.0.zip.sig"
  },
  {
    "name": "nvidia_gpu",
    "title": "NVIDIA GPU Monitoring",
    "version": "0.4.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Monitor NVIDIA GPUs via NVIDIA Data Center GPU Manager",
    "type": "integration",
    "download": "/epr/nvidia_gpu/nvidia_gpu-0.4.1.zip",
    "path": "/package/nvidia_gpu/0.4.1",
    "icons": [
      {
        "src": "/img/nvidia_logo.svg",
        "path": "/package/nvidia_gpu/0.4.1/img/nvidia_logo.svg",
        "title": "NVIDIA Logo",
        "size": "351×259",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nvidia_gpu",
        "title": "NVIDIA GPU Metrics",
        "description": "Monitor NVIDIA GPUs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "cloud",
      "observability",
      "custom",
      "kubernetes",
      "os_system"
    ],
    "signature_path": "/epr/nvidia_gpu/nvidia_gpu-0.4.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "nvidia_gpu.stats",
        "title": "Collect GPU Statistics"
      }
    ]
  },
  {
    "name": "nvidia_gpu_otel",
    "title": "NVIDIA GPU OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "NVIDIA GPU Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/nvidia_gpu_otel/nvidia_gpu_otel-0.1.0.zip",
    "path": "/package/nvidia_gpu_otel/0.1.0",
    "icons": [
      {
        "src": "/img/nvidia_gpu_otel.svg",
        "path": "/package/nvidia_gpu_otel/0.1.0/img/nvidia_gpu_otel.svg",
        "title": "NVIDIA GPU OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "cloud",
      "observability",
      "opentelemetry",
      "os_system"
    ],
    "signature_path": "/epr/nvidia_gpu_otel/nvidia_gpu_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "nvidia_gpu.otel"
        }
      ]
    }
  },
  {
    "name": "neon_cyber",
    "title": "Neon Cyber",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "The Neon Cyber integration for the Elastic Stack",
    "type": "integration",
    "download": "/epr/neon_cyber/neon_cyber-0.1.0.zip",
    "path": "/package/neon_cyber/0.1.0",
    "icons": [
      {
        "src": "/img/neoncyber-logo.svg",
        "path": "/package/neon_cyber/0.1.0/img/neoncyber-logo.svg",
        "title": "Neon Cyber logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "neon_cyber",
        "title": "Neon Cyber",
        "description": "Collect workforce logs from the Neon Cyber API",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.17.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/neon_cyber/neon_cyber-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "neon_cyber.detections",
        "title": "Neon Cyber Detections"
      },
      {
        "type": "logs",
        "dataset": "neon_cyber.events",
        "title": "Neon Cyber Events"
      }
    ]
  },
  {
    "name": "netbox",
    "title": "NetBox",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from NetBox with Elastic Agent",
    "type": "integration",
    "download": "/epr/netbox/netbox-0.1.0.zip",
    "path": "/package/netbox/0.1.0",
    "icons": [
      {
        "src": "/img/netbox-logo.svg",
        "path": "/package/netbox/0.1.0/img/netbox-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "netbox",
        "title": "NetBox logs",
        "description": "Collect logs from NetBox"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "network",
      "security",
      "web"
    ],
    "signature_path": "/epr/netbox/netbox-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "netbox.devices",
        "title": "Devices"
      },
      {
        "type": "logs",
        "dataset": "netbox.ips",
        "title": "IPs"
      }
    ]
  },
  {
    "name": "nextron_thor_apt_scanner",
    "title": "Nextron Thor APT Scanner",
    "version": "0.0.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Integration for Nextron Thor APT Scanner",
    "type": "integration",
    "download": "/epr/nextron_thor_apt_scanner/nextron_thor_apt_scanner-0.0.1.zip",
    "path": "/package/nextron_thor_apt_scanner/0.0.1",
    "icons": [
      {
        "src": "/img/thor-logo.svg",
        "path": "/package/nextron_thor_apt_scanner/0.0.1/img/thor-logo.svg",
        "title": "Thor logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nextron_thor_apt_scanner",
        "title": "Thor Cloud Log Forwarding",
        "description": "Collect Thor Cloud logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/nextron_thor_apt_scanner/nextron_thor_apt_scanner-0.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "nextron_thor_apt_scanner.thor_forwarding",
        "title": "Thor Forwarding"
      }
    ]
  },
  {
    "name": "nginx_ingress_controller_otel",
    "title": "Nginx Ingress Controller OpenTelemetry Logs",
    "version": "0.2.2",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Nginx Ingress Controller logs using the OpenTelemetry collector.",
    "type": "content",
    "download": "/epr/nginx_ingress_controller_otel/nginx_ingress_controller_otel-0.2.2.zip",
    "path": "/package/nginx_ingress_controller_otel/0.2.2",
    "icons": [
      {
        "src": "/img/logo_nginx.svg",
        "path": "/package/nginx_ingress_controller_otel/0.2.2/img/logo_nginx.svg",
        "title": "logo nginx",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "containers",
      "kubernetes",
      "opentelemetry"
    ],
    "signature_path": "/epr/nginx_ingress_controller_otel/nginx_ingress_controller_otel-0.2.2.zip.sig"
  },
  {
    "name": "nozomi_networks",
    "title": "Nozomi Networks",
    "version": "0.2.1",
    "release": "beta",
    "description": "Collect logs from Nozomi Networks with Elastic Agent.",
    "type": "integration",
    "download": "/epr/nozomi_networks/nozomi_networks-0.2.1.zip",
    "path": "/package/nozomi_networks/0.2.1",
    "icons": [
      {
        "src": "/img/nozomi_networks-logo.svg",
        "path": "/package/nozomi_networks/0.2.1/img/nozomi_networks-logo.svg",
        "title": "Nozomi Networks logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "nozomi_networks",
        "title": "Nozomi Networks",
        "description": "Collect logs from Nozomi Networks.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/nozomi_networks/nozomi_networks-0.2.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "nozomi_networks.alert",
        "title": "Collect Alert logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.asset",
        "title": "Collect Asset logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.audit",
        "title": "Collect Audit logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.health",
        "title": "Collect Health logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.node",
        "title": "Collect Node logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.node_cve",
        "title": "Collect Node CVE logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.session",
        "title": "Collect Session logs from Nozomi Networks"
      },
      {
        "type": "logs",
        "dataset": "nozomi_networks.variable",
        "title": "Collect Variable logs from Nozomi Networks"
      }
    ]
  },
  {
    "name": "okta",
    "title": "Okta",
    "version": "3.14.1",
    "release": "ga",
    "description": "Collect and parse event logs from Okta API with Elastic Agent.",
    "type": "integration",
    "download": "/epr/okta/okta-3.14.1.zip",
    "path": "/package/okta/3.14.1",
    "icons": [
      {
        "src": "/img/okta-logo.svg",
        "path": "/package/okta/3.14.1/img/okta-logo.svg",
        "title": "Okta",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "okta",
        "title": "Okta logs",
        "description": "Collect logs from Okta",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.8 || ^9.2.2"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/okta/okta-3.14.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "okta.system",
        "title": "Okta system logs"
      }
    ]
  },
  {
    "name": "openai",
    "title": "OpenAI",
    "version": "1.2.1",
    "release": "ga",
    "description": "Collect OpenAI usage metrics with Elastic Agent.\n",
    "type": "integration",
    "download": "/epr/openai/openai-1.2.1.zip",
    "path": "/package/openai/1.2.1",
    "icons": [
      {
        "src": "/img/openai-logo.svg",
        "path": "/package/openai/1.2.1/img/openai-logo.svg",
        "title": "OpenAI logo",
        "size": "512x138",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "openai",
        "title": "OpenAI API usage",
        "description": "Collect OpenAI API usage events."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "monitoring"
    ],
    "signature_path": "/epr/openai/openai-1.2.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "openai.audio_speeches",
        "title": "Audio speeches usage"
      },
      {
        "type": "logs",
        "dataset": "openai.audio_transcriptions",
        "title": "Audio transcriptions usage"
      },
      {
        "type": "logs",
        "dataset": "openai.code_interpreter_sessions",
        "title": "Code interpreter sessions usage"
      },
      {
        "type": "logs",
        "dataset": "openai.completions",
        "title": "Completions usage"
      },
      {
        "type": "logs",
        "dataset": "openai.embeddings",
        "title": "Embeddings usage"
      },
      {
        "type": "logs",
        "dataset": "openai.images",
        "title": "Images usage"
      },
      {
        "type": "logs",
        "dataset": "openai.moderations",
        "title": "Moderations usage"
      },
      {
        "type": "logs",
        "dataset": "openai.vector_stores",
        "title": "Vector stores usage"
      }
    ]
  },
  {
    "name": "ti_opencti",
    "title": "OpenCTI",
    "version": "2.13.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Ingest threat intelligence indicators from OpenCTI with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_opencti/ti_opencti-2.13.0.zip",
    "path": "/package/ti_opencti/2.13.0",
    "icons": [
      {
        "src": "/img/opencti-logo.svg",
        "path": "/package/ti_opencti/2.13.0/img/opencti-logo.svg",
        "title": "OpenCTI logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "opencti",
        "title": "OpenCTI",
        "description": "Collect OpenCTI data."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_opencti/ti_opencti-2.13.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_opencti.indicator",
        "title": "Indicator"
      }
    ]
  },
  {
    "name": "opencanary",
    "title": "OpenCanary",
    "version": "1.0.0",
    "release": "ga",
    "description": "This integration collects and parses logs from OpenCanary honeypots.",
    "type": "integration",
    "download": "/epr/opencanary/opencanary-1.0.0.zip",
    "path": "/package/opencanary/1.0.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/opencanary/1.0.0/img/logo.svg",
        "title": "OpenCanary Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "events",
        "title": "OpenCanary Events",
        "description": "Collect OpenCanary events from logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/opencanary/opencanary-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "opencanary.events",
        "title": "OpenCanary HoneyPot Events"
      }
    ]
  },
  {
    "name": "otel_collector_internal_telemetry",
    "title": "OpenTelemetry Collector Internal Telemetry",
    "version": "1.2.0",
    "release": "ga",
    "source": {
      "license": "Apache-2.0"
    },
    "description": "This package contains dashboards that visualize the internal telemetry from the OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/otel_collector_internal_telemetry/otel_collector_internal_telemetry-1.2.0.zip",
    "path": "/package/otel_collector_internal_telemetry/1.2.0",
    "icons": [
      {
        "src": "/img/opentelemetry-logo.svg",
        "path": "/package/otel_collector_internal_telemetry/1.2.0/img/opentelemetry-logo.svg",
        "title": "OpenTelemetry logo",
        "size": "100x100",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ingest-otel-data"
    },
    "categories": [
      "monitoring",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/otel_collector_internal_telemetry/otel_collector_internal_telemetry-1.2.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "collectortelemetry.otel"
        }
      ]
    }
  },
  {
    "name": "profiling_otel",
    "title": "OpenTelemetry Profiling",
    "version": "0.0.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "OpenTelemetry Profiling",
    "type": "input",
    "download": "/epr/profiling_otel/profiling_otel-0.0.1.zip",
    "path": "/package/profiling_otel/0.0.1",
    "icons": [
      {
        "src": "/img/profiler-logo-color-48px.svg",
        "path": "/package/profiling_otel/0.0.1/img/profiler-logo-color-48px.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "profilingreceiver",
        "title": "OpenTelemetry Profiling receiver",
        "description": "Collect profiling data"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ingest-otel-data"
    },
    "categories": [
      "custom",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/profiling_otel/profiling_otel-0.0.1.zip.sig"
  },
  {
    "name": "oracle_otel",
    "title": "Oracle OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Oracle Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/oracle_otel/oracle_otel-0.1.0.zip",
    "path": "/package/oracle_otel/0.1.0",
    "icons": [
      {
        "src": "/img/oracle_logo_otel.svg",
        "path": "/package/oracle_otel/0.1.0/img/oracle_logo_otel.svg",
        "title": "Oracle logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "message_queue",
      "opentelemetry"
    ],
    "signature_path": "/epr/oracle_otel/oracle_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "oracledbreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "osquery_manager",
    "title": "Osquery Manager",
    "version": "1.28.1",
    "release": "ga",
    "description": "Deploy Osquery with Elastic Agent, then run and schedule queries in Kibana",
    "type": "integration",
    "download": "/epr/osquery_manager/osquery_manager-1.28.1.zip",
    "path": "/package/osquery_manager/1.28.1",
    "icons": [
      {
        "src": "/img/logo_osquery.svg",
        "path": "/package/osquery_manager/1.28.1/img/logo_osquery.svg",
        "title": "logo osquery",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "osquery_manager",
        "title": "Osquery Manager",
        "description": "Send interactive or scheduled queries to the osquery instances executed by the elastic-agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      },
      "elastic": {
        "subscription": "",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-defend-workflows"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/osquery_manager/osquery_manager-1.28.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "osquery_manager.action.responses",
        "title": "Osquery Manager queries"
      },
      {
        "type": "logs",
        "dataset": "osquery_manager.result",
        "title": "Osquery Manager queries"
      }
    ]
  },
  {
    "name": "panw_cortex_xdr",
    "title": "Palo Alto Cortex XDR",
    "version": "2.5.2",
    "release": "ga",
    "description": "Collect logs from Palo Alto Cortex XDR with Elastic Agent.",
    "type": "integration",
    "download": "/epr/panw_cortex_xdr/panw_cortex_xdr-2.5.2.zip",
    "path": "/package/panw_cortex_xdr/2.5.2",
    "icons": [
      {
        "src": "/img/icon-cortex.svg",
        "path": "/package/panw_cortex_xdr/2.5.2/img/icon-cortex.svg",
        "title": "Palo Alto",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "xdr",
        "title": "Palo Alto Cortex XDR API",
        "description": "Collect logs from Palo Alto Cortex XDR API",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/panw_cortex_xdr/panw_cortex_xdr-2.5.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "panw_cortex_xdr.alerts",
        "title": "Palo Alto Cortex XDR Alerts API"
      },
      {
        "type": "logs",
        "dataset": "panw_cortex_xdr.event",
        "title": "Event"
      },
      {
        "type": "logs",
        "dataset": "panw_cortex_xdr.incidents",
        "title": "Palo Alto Cortex XDR Incidents API"
      }
    ]
  },
  {
    "name": "panw_metrics",
    "title": "Palo Alto Networks Metrics",
    "version": "0.2.0",
    "release": "beta",
    "description": "Collect metrics from Palo Alto Networks with Elastic Agent.",
    "type": "integration",
    "download": "/epr/panw_metrics/panw_metrics-0.2.0.zip",
    "path": "/package/panw_metrics/0.2.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/panw_metrics/0.2.0/img/logo.svg",
        "title": "PANW logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "panw_metrics",
        "title": "Palo Alto Networks metrics",
        "description": "Collects metrics from Palo Alto Networks with Elastic Agent"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.2 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "network",
      "security",
      "observability"
    ],
    "signature_path": "/epr/panw_metrics/panw_metrics-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "panw_metrics.interfaces",
        "title": "Palo Alto Networks Interfaces metrics"
      },
      {
        "type": "metrics",
        "dataset": "panw_metrics.routing",
        "title": "Palo Alto Networks Routing metrics"
      },
      {
        "type": "metrics",
        "dataset": "panw_metrics.system",
        "title": "Palo Alto Networks System metrics"
      },
      {
        "type": "metrics",
        "dataset": "panw_metrics.vpn",
        "title": "Palo Alto Networks VPN metrics"
      }
    ]
  },
  {
    "name": "prisma_access",
    "title": "Palo Alto Prisma Access",
    "version": "1.7.2",
    "release": "ga",
    "description": "Collect logs from Palo Alto Prisma Access with Elastic Agent.",
    "type": "integration",
    "download": "/epr/prisma_access/prisma_access-1.7.2.zip",
    "path": "/package/prisma_access/1.7.2",
    "icons": [
      {
        "src": "/img/prisma-access-logo.svg",
        "path": "/package/prisma_access/1.7.2/img/prisma-access-logo.svg",
        "title": "Palo Alto Prisma Access logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "prisma_access",
        "title": "Palo Alto Prisma Access logs",
        "description": "Collect Palo Alto Prisma Access logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network"
    ],
    "signature_path": "/epr/prisma_access/prisma_access-1.7.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "prisma_access.event",
        "title": "Collect Events from Palo Alto Prisma Access"
      }
    ]
  },
  {
    "name": "prisma_cloud",
    "title": "Palo Alto Prisma Cloud",
    "version": "4.1.0",
    "release": "ga",
    "description": "Collect logs from Prisma Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/prisma_cloud/prisma_cloud-4.1.0.zip",
    "path": "/package/prisma_cloud/4.1.0",
    "icons": [
      {
        "src": "/img/prisma_cloud-logo.svg",
        "path": "/package/prisma_cloud/4.1.0/img/prisma_cloud-logo.svg",
        "title": "Prisma Cloud logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sample",
        "title": "Sample logs",
        "description": "Collect sample logs",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.8 || ~9.1.8 || ~9.2.2 || ^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "cloudsecurity_cdr",
      "misconfiguration_workflow",
      "vulnerability_workflow"
    ],
    "signature_path": "/epr/prisma_cloud/prisma_cloud-4.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "prisma_cloud.alert",
        "title": "Collect Alert logs from Prisma Cloud Security Posture Management."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.audit",
        "title": "Collect Audit logs from Prisma Cloud Security Posture Management."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.host",
        "title": "Collect Host logs from Prisma Cloud Workload Protection."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.host_profile",
        "title": "Collect Host Profile logs from Prisma Cloud Workload Protection."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.incident_audit",
        "title": "Collect Incident Audit logs from Prisma Cloud Workload Protection."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.misconfiguration",
        "title": "Collect Misconfiguration logs from Prisma Cloud."
      },
      {
        "type": "logs",
        "dataset": "prisma_cloud.vulnerability",
        "title": "Collect Vulnerability logs from Prisma Cloud."
      }
    ]
  },
  {
    "name": "verifier_otel",
    "title": "Permission Verifier",
    "version": "0.0.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Verify identity federation based integration permissions and report results to Elasticsearch using the Verifier receiver of the OTel Collector.",
    "type": "input",
    "download": "/epr/verifier_otel/verifier_otel-0.0.1.zip",
    "path": "/package/verifier_otel/0.0.1",
    "icons": [
      {
        "src": "/img/verifier-logo.svg",
        "path": "/package/verifier_otel/0.0.1/img/verifier-logo.svg",
        "title": "Verifier logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "verifierreceiver",
        "title": "Permission Verifier",
        "description": "Verify identity federation based integration permissions and report status.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/cloud-services"
    },
    "categories": [
      "monitoring",
      "security",
      "opentelemetry",
      "cloud"
    ],
    "signature_path": "/epr/verifier_otel/verifier_otel-0.0.1.zip.sig"
  },
  {
    "name": "ping_federate",
    "title": "PingFederate",
    "version": "1.2.0",
    "release": "ga",
    "description": "Collect logs from PingFederate with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ping_federate/ping_federate-1.2.0.zip",
    "path": "/package/ping_federate/1.2.0",
    "icons": [
      {
        "src": "/img/ping_federate-logo.svg",
        "path": "/package/ping_federate/1.2.0/img/ping_federate-logo.svg",
        "title": "PingFederate logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ping_federate",
        "title": "PingFederate logs",
        "description": "Collect PingFederate logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "authentication",
      "iam"
    ],
    "signature_path": "/epr/ping_federate/ping_federate-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ping_federate.admin",
        "title": "Admin logs"
      },
      {
        "type": "logs",
        "dataset": "ping_federate.audit",
        "title": "Audit logs"
      }
    ]
  },
  {
    "name": "ping_one",
    "title": "PingOne",
    "version": "1.23.0",
    "release": "ga",
    "description": "Collect logs from PingOne with Elastic-Agent.",
    "type": "integration",
    "download": "/epr/ping_one/ping_one-1.23.0.zip",
    "path": "/package/ping_one/1.23.0",
    "icons": [
      {
        "src": "/img/ping-one-logo.svg",
        "path": "/package/ping_one/1.23.0/img/ping-one-logo.svg",
        "title": "PingOne logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ping_one",
        "title": "PingOne",
        "description": "Collect logs from PingOne.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/ping_one/ping_one-1.23.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ping_one.audit",
        "title": "Collect Audit logs from PingOne"
      }
    ]
  },
  {
    "name": "postgresql",
    "title": "PostgreSQL",
    "version": "1.32.1",
    "release": "ga",
    "description": "Collect logs and metrics from PostgreSQL servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/postgresql/postgresql-1.32.1.zip",
    "path": "/package/postgresql/1.32.1",
    "icons": [
      {
        "src": "/img/logo_postgres.svg",
        "path": "/package/postgresql/1.32.1/img/logo_postgres.svg",
        "title": "logo postgres",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "postgresql",
        "title": "PostgreSQL logs and metrics",
        "description": "Collect logs and metrics from PostgreSQL instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability"
    ],
    "signature_path": "/epr/postgresql/postgresql-1.32.1.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "postgresql.activity",
        "title": "PostgreSQL activity metrics"
      },
      {
        "type": "metrics",
        "dataset": "postgresql.bgwriter",
        "title": "PostgreSQL bgwriter metrics"
      },
      {
        "type": "metrics",
        "dataset": "postgresql.database",
        "title": "PostgreSQL database metrics"
      },
      {
        "type": "logs",
        "dataset": "postgresql.log",
        "title": "PostgreSQL logs"
      },
      {
        "type": "metrics",
        "dataset": "postgresql.statement",
        "title": "PostgreSQL statement metrics"
      }
    ]
  },
  {
    "name": "postgresql_otel",
    "title": "PostgreSQL OpenTelemetry Assets",
    "version": "0.3.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "PostgreSQL Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/postgresql_otel/postgresql_otel-0.3.0.zip",
    "path": "/package/postgresql_otel/0.3.0",
    "icons": [
      {
        "src": "/img/postgresql_otel_logo.svg",
        "path": "/package/postgresql_otel/0.3.0/img/postgresql_otel_logo.svg",
        "title": "OTel PostgreSQL",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "opentelemetry"
    ],
    "signature_path": "/epr/postgresql_otel/postgresql_otel-0.3.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "postgresqlreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "profilingmetrics_otel",
    "title": "Profilingmetrics OpenTelemetry Assets",
    "version": "0.0.6",
    "release": "beta",
    "source": {
      "license": "Apache-2.0"
    },
    "description": "Create metrics from profiling data.",
    "type": "content",
    "download": "/epr/profilingmetrics_otel/profilingmetrics_otel-0.0.6.zip",
    "path": "/package/profilingmetrics_otel/0.0.6",
    "icons": [
      {
        "src": "/img/profiler-logo-color-48px.svg",
        "path": "/package/profilingmetrics_otel/0.0.6/img/profiler-logo-color-48px.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ingest-otel-data"
    },
    "categories": [
      "custom",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/profilingmetrics_otel/profilingmetrics_otel-0.0.6.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "profilingmetricsconnector.otel"
        }
      ]
    }
  },
  {
    "name": "prometheus",
    "title": "Prometheus",
    "version": "1.24.2",
    "release": "ga",
    "description": "Collect metrics from Prometheus servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/prometheus/prometheus-1.24.2.zip",
    "path": "/package/prometheus/1.24.2",
    "icons": [
      {
        "src": "/img/logo_prometheus.svg",
        "path": "/package/prometheus/1.24.2/img/logo_prometheus.svg",
        "title": "logo prometheus",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "prometheus",
        "title": "Prometheus metrics",
        "description": "Collect metrics from Prometheus instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "monitoring",
      "containers"
    ],
    "signature_path": "/epr/prometheus/prometheus-1.24.2.zip.sig",
    "data_streams": [
      {
        "type": "metrics",
        "dataset": "prometheus.collector",
        "title": "Prometheus collector metrics"
      },
      {
        "type": "metrics",
        "dataset": "prometheus.query",
        "title": "Prometheus query metrics"
      },
      {
        "type": "metrics",
        "dataset": "prometheus.remote_write",
        "title": "Prometheus remote_write metrics"
      }
    ]
  },
  {
    "name": "prometheus_input_otel_raw",
    "title": "Prometheus OTel Scrape (Bring Your Own Config)",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Scrape Prometheus metrics endpoints using the OpenTelemetry Collector Prometheus receiver with raw scrape configuration",
    "type": "input",
    "download": "/epr/prometheus_input_otel_raw/prometheus_input_otel_raw-0.1.0.zip",
    "path": "/package/prometheus_input_otel_raw/0.1.0",
    "icons": [
      {
        "src": "/img/logo_prometheus_otel.svg",
        "path": "/package/prometheus_input_otel_raw/0.1.0/img/logo_prometheus_otel.svg",
        "title": "Prometheus OpenTelemetry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "prometheusreceiver",
        "title": "Prometheus Metrics (Raw Config)",
        "description": "Paste your existing Prometheus scrape configuration directly"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "monitoring",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/prometheus_input_otel_raw/prometheus_input_otel_raw-0.1.0.zip.sig"
  },
  {
    "name": "prometheus_input_otel",
    "title": "Prometheus OTel Scrape (Guided)",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Scrape Prometheus metrics endpoints using the OpenTelemetry Collector Prometheus receiver with guided configuration",
    "type": "input",
    "download": "/epr/prometheus_input_otel/prometheus_input_otel-0.1.0.zip",
    "path": "/package/prometheus_input_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_prometheus_otel.svg",
        "path": "/package/prometheus_input_otel/0.1.0/img/logo_prometheus_otel.svg",
        "title": "Prometheus OpenTelemetry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "prometheusreceiver",
        "title": "Prometheus Metrics",
        "description": "Scrape metrics from Prometheus-compatible endpoints using guided configuration fields"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "monitoring",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/prometheus_input_otel/prometheus_input_otel-0.1.0.zip.sig"
  },
  {
    "name": "proofpoint_365totalprotection",
    "title": "Proofpoint 365 Total Protection",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "The Proofpoint 365 Total Protection integration for Elastic collects detailed email security and delivery logs via a REST API. It provides security teams with centralized visibility into email traffic, threat activity, and message disposition directly in Elastic.",
    "type": "integration",
    "download": "/epr/proofpoint_365totalprotection/proofpoint_365totalprotection-0.1.0.zip",
    "path": "/package/proofpoint_365totalprotection/0.1.0",
    "icons": [
      {
        "src": "/img/proofpoint_365totalprotection-logo.svg",
        "path": "/package/proofpoint_365totalprotection/0.1.0/img/proofpoint_365totalprotection-logo.svg",
        "title": "Proofpoint 365 Total Protection logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "logs",
        "title": "Proofpoint 365 Total Protection logs",
        "description": "Collect email logs for Proofpoint 365 Total Protection"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/proofpoint_365totalprotection/proofpoint_365totalprotection-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proofpoint_365totalprotection.email",
        "title": "Email logs"
      }
    ]
  },
  {
    "name": "proofpoint_essentials",
    "title": "Proofpoint Essentials",
    "version": "0.1.0",
    "release": "beta",
    "description": "Collect logs from Proofpoint Essentials with Elastic Agent.",
    "type": "integration",
    "download": "/epr/proofpoint_essentials/proofpoint_essentials-0.1.0.zip",
    "path": "/package/proofpoint_essentials/0.1.0",
    "icons": [
      {
        "src": "/img/proofpoint-logo.svg",
        "path": "/package/proofpoint_essentials/0.1.0/img/proofpoint-logo.svg",
        "title": "Proofpoint logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "proofpoint_essentials",
        "title": "Proofpoint Essentials logs",
        "description": "Collect Proofpoint Essentials logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/proofpoint_essentials/proofpoint_essentials-0.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proofpoint_essentials.clicks_blocked",
        "title": "Proofpoint Essentials Clicks Blocked Events"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_essentials.clicks_permitted",
        "title": "Proofpoint Essentials Clicks Permitted Events"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_essentials.message_blocked",
        "title": "Proofpoint Essentials Messages Blocked Events"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_essentials.message_delivered",
        "title": "Proofpoint Essentials Messages Delivered Events"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_essentials.threat",
        "title": "Threat"
      }
    ]
  },
  {
    "name": "proofpoint_itm",
    "title": "Proofpoint ITM",
    "version": "1.0.1",
    "release": "ga",
    "description": "Collect logs from Proofpoint ITM using Elastic Agent.",
    "type": "integration",
    "download": "/epr/proofpoint_itm/proofpoint_itm-1.0.1.zip",
    "path": "/package/proofpoint_itm/1.0.1",
    "icons": [
      {
        "src": "/img/proofpoint_itm-logo.svg",
        "path": "/package/proofpoint_itm/1.0.1/img/proofpoint_itm-logo.svg",
        "title": "Proofpoint ITM logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "proofpoint_itm",
        "title": "Proofpoint ITM Logs",
        "description": "Collect Proofpoint ITM logs",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/proofpoint_itm/proofpoint_itm-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proofpoint_itm.report",
        "title": "Collect Reports from Proofpoint ITM"
      }
    ]
  },
  {
    "name": "proofpoint_on_demand",
    "title": "Proofpoint On Demand",
    "version": "1.9.1",
    "release": "ga",
    "description": "Collect logs from Proofpoint On Demand with Elastic Agent.",
    "type": "integration",
    "download": "/epr/proofpoint_on_demand/proofpoint_on_demand-1.9.1.zip",
    "path": "/package/proofpoint_on_demand/1.9.1",
    "icons": [
      {
        "src": "/img/proofpoint_on_demand-logo.svg",
        "path": "/package/proofpoint_on_demand/1.9.1/img/proofpoint_on_demand-logo.svg",
        "title": "Proofpoint On Demand Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "proofpoint_on_demand",
        "title": "Proofpoint On Demand logs",
        "description": "Collect Proofpoint On Demand logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/proofpoint_on_demand/proofpoint_on_demand-1.9.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proofpoint_on_demand.audit",
        "title": "Proofpoint On Demand Audit logs"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_on_demand.mail",
        "title": "Proofpoint On Demand Mail logs"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_on_demand.message",
        "title": "Proofpoint On Demand Message logs"
      }
    ]
  },
  {
    "name": "proofpoint_tap",
    "title": "Proofpoint TAP",
    "version": "1.29.1",
    "release": "ga",
    "description": "Collect logs from Proofpoint TAP with Elastic Agent.",
    "type": "integration",
    "download": "/epr/proofpoint_tap/proofpoint_tap-1.29.1.zip",
    "path": "/package/proofpoint_tap/1.29.1",
    "icons": [
      {
        "src": "/img/proofpoint_tap-logo.svg",
        "path": "/package/proofpoint_tap/1.29.1/img/proofpoint_tap-logo.svg",
        "title": "Proofpoint TAP logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Proofpoint TAP",
        "title": "Proofpoint_TAP logs",
        "description": "Collect proofpoint_tap logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/proofpoint_tap/proofpoint_tap-1.29.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "proofpoint_tap.clicks_blocked",
        "title": "Clicks Blocked"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_tap.clicks_permitted",
        "title": "Clicks Permitted"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_tap.message_blocked",
        "title": "Message Blocked"
      },
      {
        "type": "logs",
        "dataset": "proofpoint_tap.message_delivered",
        "title": "Message Delivered"
      }
    ]
  },
  {
    "name": "qualys_gav",
    "title": "Qualys Global AssetView",
    "version": "0.7.2",
    "release": "beta",
    "description": "Collect logs from Qualys Global AssetView with Elastic Agent.",
    "type": "integration",
    "download": "/epr/qualys_gav/qualys_gav-0.7.2.zip",
    "path": "/package/qualys_gav/0.7.2",
    "icons": [
      {
        "src": "/img/qualys_gav-logo.svg",
        "path": "/package/qualys_gav/0.7.2/img/qualys_gav-logo.svg",
        "title": "Qualys Global AssetView logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "qualys_gav",
        "title": "Qualys Global AssetView",
        "description": "Collect logs from Qualys Global AssetView.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.11 || ^9.2.5"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/qualys_gav/qualys_gav-0.7.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "qualys_gav.asset",
        "title": "Collect Assets from Qualys Global AssetView."
      }
    ]
  },
  {
    "name": "qualys_vmdr",
    "title": "Qualys VMDR",
    "version": "6.18.0",
    "release": "ga",
    "description": "Collect data from Qualys VMDR platform with Elastic Agent.",
    "type": "integration",
    "download": "/epr/qualys_vmdr/qualys_vmdr-6.18.0.zip",
    "path": "/package/qualys_vmdr/6.18.0",
    "icons": [
      {
        "src": "/img/qualys-vmdr-logo.svg",
        "path": "/package/qualys_vmdr/6.18.0/img/qualys-vmdr-logo.svg",
        "title": "Qualys VMDR logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "qualys_vmdr",
        "title": "Qualys VMDR data",
        "description": "Collect Qualys VMDR data.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.11 || ^9.2.5"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management",
      "vulnerability_workflow",
      "cloudsecurity_cdr"
    ],
    "signature_path": "/epr/qualys_vmdr/qualys_vmdr-6.18.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "qualys_vmdr.asset_host_detection",
        "title": "Collect Asset Host Detection data from Qualys VMDR platform."
      },
      {
        "type": "logs",
        "dataset": "qualys_vmdr.knowledge_base",
        "title": "Collect Knowledge Base data from Qualys VMDR platform."
      },
      {
        "type": "logs",
        "dataset": "qualys_vmdr.user_activity",
        "title": "Collect User Activity Log data from Qualys VMDR platform."
      }
    ]
  },
  {
    "name": "qualys_was",
    "title": "Qualys Web Application Scanning (WAS)",
    "version": "0.3.1",
    "release": "beta",
    "description": "Collect data from Qualys Web Application Scanning platform with Elastic Agent or Agentless",
    "type": "integration",
    "download": "/epr/qualys_was/qualys_was-0.3.1.zip",
    "path": "/package/qualys_was/0.3.1",
    "policy_templates": [
      {
        "name": "qualys_was",
        "title": "Qualys WAS data",
        "description": "Collect Qualys WAS data.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management"
    ],
    "signature_path": "/epr/qualys_was/qualys_was-0.3.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "qualys_was.vulnerability",
        "title": "Collects Web Application Vulnerabilty Findings from Qualys WAS platform."
      }
    ]
  },
  {
    "name": "otel_rum_dashboards",
    "title": "RUM OpenTelemetry Assets",
    "version": "0.0.3",
    "release": "beta",
    "description": "RUM status metrics from OpenTelemetry JS SDKs",
    "type": "content",
    "download": "/epr/otel_rum_dashboards/otel_rum_dashboards-0.0.3.zip",
    "path": "/package/otel_rum_dashboards/0.0.3",
    "icons": [
      {
        "src": "/img/otel-rum.svg",
        "path": "/package/otel_rum_dashboards/0.0.3/img/otel-rum.svg",
        "title": "OpenTelemetry RUM",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/apm-agent-rum"
    },
    "categories": [
      "observability",
      "web",
      "opentelemetry"
    ],
    "signature_path": "/epr/otel_rum_dashboards/otel_rum_dashboards-0.0.3.zip.sig"
  },
  {
    "name": "rabbitmq_otel",
    "title": "RabbitMQ OpenTelemetry assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "RabbitMQ Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/rabbitmq_otel/rabbitmq_otel-0.1.0.zip",
    "path": "/package/rabbitmq_otel/0.1.0",
    "icons": [
      {
        "src": "/img/rabbitmq_otel.svg",
        "path": "/package/rabbitmq_otel/0.1.0/img/rabbitmq_otel.svg",
        "title": "RabbitMQ Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "message_queue",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/rabbitmq_otel/rabbitmq_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "rabbitmqreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "rapid7_insightvm",
    "title": "Rapid7 InsightVM",
    "version": "2.8.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Rapid7 InsightVM with Elastic Agent.",
    "type": "integration",
    "download": "/epr/rapid7_insightvm/rapid7_insightvm-2.8.0.zip",
    "path": "/package/rapid7_insightvm/2.8.0",
    "icons": [
      {
        "src": "/img/rapid7-insightvm-logo.svg",
        "path": "/package/rapid7_insightvm/2.8.0/img/rapid7-insightvm-logo.svg",
        "title": "Rapid7 InsightVM",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "rapid7_insightvm",
        "title": "Rapid7 InsightVM logs",
        "description": "Collect Rapid7 InsightVM logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management",
      "vulnerability_workflow",
      "cloudsecurity_cdr"
    ],
    "signature_path": "/epr/rapid7_insightvm/rapid7_insightvm-2.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "rapid7_insightvm.asset",
        "title": "Collect Asset logs from Rapid7 InsightVM (Deprecated)"
      },
      {
        "type": "logs",
        "dataset": "rapid7_insightvm.asset_vulnerability",
        "title": "Asset Vulnerability Event"
      },
      {
        "type": "logs",
        "dataset": "rapid7_insightvm.vulnerability",
        "title": "Collect Vulnerability logs from Rapid7 InsightVM"
      }
    ]
  },
  {
    "name": "ti_rapid7_threat_command",
    "title": "Rapid7 Threat Command",
    "version": "2.8.0",
    "release": "ga",
    "description": "Collect threat intelligence from Threat Command API with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_rapid7_threat_command/ti_rapid7_threat_command-2.8.0.zip",
    "path": "/package/ti_rapid7_threat_command/2.8.0",
    "icons": [
      {
        "src": "/img/ti_rapid7_threat_command-logo.svg",
        "path": "/package/ti_rapid7_threat_command/2.8.0/img/ti_rapid7_threat_command-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_rapid7_threat_command",
        "title": "Rapid7 Threat Command",
        "description": "Collect Threat Intel data from Rapid7 Threat Command.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel",
      "vulnerability_management"
    ],
    "signature_path": "/epr/ti_rapid7_threat_command/ti_rapid7_threat_command-2.8.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_rapid7_threat_command.alert",
        "title": "Rapid7 Threat Command Alerts"
      },
      {
        "type": "logs",
        "dataset": "ti_rapid7_threat_command.ioc",
        "title": "Rapid7 Threat Command IOCs"
      },
      {
        "type": "logs",
        "dataset": "ti_rapid7_threat_command.vulnerability",
        "title": "Rapid7 Threat Command Vulnerability"
      }
    ]
  },
  {
    "name": "ti_recordedfuture",
    "title": "Recorded Future",
    "version": "2.4.2",
    "release": "ga",
    "description": "Ingest threat intelligence and alert data from Recorded Future with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_recordedfuture/ti_recordedfuture-2.4.2.zip",
    "path": "/package/ti_recordedfuture/2.4.2",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/ti_recordedfuture/2.4.2/img/logo.svg",
        "title": "Recorded Future",
        "size": "216x216",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_recordedfuture",
        "title": "Recorded Future",
        "description": "Ingest threat intelligence and alert data from Recorded Future with Elastic Agent.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_recordedfuture/ti_recordedfuture-2.4.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_recordedfuture.playbook_alert",
        "title": "Playbook Alert"
      },
      {
        "type": "logs",
        "dataset": "ti_recordedfuture.threat",
        "title": "Recorded Future"
      },
      {
        "type": "logs",
        "dataset": "ti_recordedfuture.triggered_alert",
        "title": "Triggered Alert"
      }
    ]
  },
  {
    "name": "redisenterprise_otel",
    "title": "Redis Enterprise OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Redis Enterprise Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/redisenterprise_otel/redisenterprise_otel-0.1.0.zip",
    "path": "/package/redisenterprise_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_redis.svg",
        "path": "/package/redisenterprise_otel/0.1.0/img/logo_redis.svg",
        "title": "Redis Enterprise logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/redisenterprise_otel/redisenterprise_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "redisenterprise.otel"
        }
      ]
    }
  },
  {
    "name": "redis_otel",
    "title": "Redis OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Redis Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/redis_otel/redis_otel-0.1.0.zip",
    "path": "/package/redis_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_redis.svg",
        "path": "/package/redis_otel/0.1.0/img/logo_redis.svg",
        "title": "redis logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/redis_otel/redis_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "redisreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "redis_input_otel",
    "title": "Redis OpenTelemetry Input Package",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Redis OpenTelemetry Input Package",
    "type": "input",
    "download": "/epr/redis_input_otel/redis_input_otel-0.1.0.zip",
    "path": "/package/redis_input_otel/0.1.0",
    "icons": [
      {
        "src": "/img/logo_redis_otel.svg",
        "path": "/package/redis_input_otel/0.1.0/img/logo_redis_otel.svg",
        "title": "Redis logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "redisreceiver",
        "title": "Redis OpenTelemetry Input",
        "description": "Collect Redis metrics using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/redis_input_otel/redis_input_otel-0.1.0.zip.sig"
  },
  {
    "name": "sql",
    "title": "SQL Input",
    "version": "1.1.0",
    "release": "ga",
    "description": "Collects Metrics by querying SQL Databases",
    "type": "input",
    "download": "/epr/sql/sql-1.1.0.zip",
    "path": "/package/sql/1.1.0",
    "icons": [
      {
        "src": "/img/sql-server-icon.svg",
        "path": "/package/sql/1.1.0/img/sql-server-icon.svg",
        "title": "SQL logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sql",
        "title": "SQL Metrics",
        "description": "Collects Metrics by querying SQL Databases"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "custom",
      "observability"
    ],
    "signature_path": "/epr/sql/sql-1.1.0.zip.sig"
  },
  {
    "name": "sql_server_input_otel",
    "title": "SQL Server OpenTelemetry Input Package",
    "version": "0.1.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect SQL Server metrics and logs using OpenTelemetry Collector",
    "type": "input",
    "download": "/epr/sql_server_input_otel/sql_server_input_otel-0.1.1.zip",
    "path": "/package/sql_server_input_otel/0.1.1",
    "icons": [
      {
        "src": "/img/sql_server_otellogo.svg",
        "path": "/package/sql_server_input_otel/0.1.1/img/sql_server_otellogo.svg",
        "title": "SQL Server logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sqlserverreceiver",
        "title": "SQL Server Metrics and Logs (OpenTelemetry)",
        "description": "Collect SQL Server metrics and logs using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "datastore",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/sql_server_input_otel/sql_server_input_otel-0.1.1.zip.sig"
  },
  {
    "name": "sailpoint_identity_sc",
    "title": "Sailpoint Identity Security Cloud",
    "version": "1.2.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Sailpoint identity security cloud provides enterprise identity governance and security capabilities. The integration allows users to extract audit information from their identity security cloud tenant using the ISC's AuditEvent API.",
    "type": "integration",
    "download": "/epr/sailpoint_identity_sc/sailpoint_identity_sc-1.2.0.zip",
    "path": "/package/sailpoint_identity_sc/1.2.0",
    "icons": [
      {
        "src": "/img/sics.svg",
        "path": "/package/sailpoint_identity_sc/1.2.0/img/sics.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sailpoint_identity_sc",
        "title": "Sailpoint identity security cloud events",
        "description": "Collect events from Sailpoint identity security cloud event reporting."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/sailpoint_identity_sc/sailpoint_identity_sc-1.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sailpoint_identity_sc.events",
        "title": "Events"
      }
    ]
  },
  {
    "name": "security_ai_prompts",
    "title": "Security AI Prompts",
    "version": "1.0.13",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Prompts used by Security AI features, including the Security Assistant, and Attack discovery",
    "type": "content",
    "download": "/epr/security_ai_prompts/security_ai_prompts-1.0.13.zip",
    "path": "/package/security_ai_prompts/1.0.13",
    "icons": [
      {
        "src": "/img/security-logo-color-64px.svg",
        "path": "/package/security_ai_prompts/1.0.13/img/security-logo-color-64px.svg",
        "title": "Security logo",
        "size": "16x16",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-generative-ai"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/security_ai_prompts/security_ai_prompts-1.0.13.zip.sig"
  },
  {
    "name": "cloud_security_posture",
    "title": "Security Posture Management",
    "version": "3.3.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Identify & remediate configuration risks in your Cloud infrastructure",
    "type": "integration",
    "download": "/epr/cloud_security_posture/cloud_security_posture-3.3.0.zip",
    "path": "/package/cloud_security_posture/3.3.0",
    "icons": [
      {
        "src": "/img/logo_cloud_security_posture.svg",
        "path": "/package/cloud_security_posture/3.3.0/img/logo_cloud_security_posture.svg",
        "title": "Cloud Security Posture logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "kspm",
        "title": "Kubernetes Security Posture Management (KSPM)",
        "description": "Identify & remediate configuration risks in Kubernetes",
        "icons": [
          {
            "src": "/img/logo_kspm.svg",
            "path": "/package/cloud_security_posture/3.3.0/img/logo_kspm.svg",
            "title": "KSPM logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "containers",
          "kubernetes",
          "security",
          "aws",
          "misconfiguration_workflow"
        ],
        "data_streams": [
          "findings"
        ]
      },
      {
        "name": "cspm",
        "title": "Cloud Security Posture Management (CSPM)",
        "description": "Identify & remediate configuration risks in the Cloud services you leverage",
        "icons": [
          {
            "src": "/img/logo_cspm.svg",
            "path": "/package/cloud_security_posture/3.3.0/img/logo_cspm.svg",
            "title": "CSPM logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloud",
          "aws",
          "google_cloud",
          "misconfiguration_workflow"
        ],
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true,
            "is_default": true
          }
        },
        "data_streams": [
          "findings"
        ]
      },
      {
        "name": "vuln_mgmt",
        "title": "Cloud Native Vulnerability Management (CNVM)",
        "description": "Scan for cloud workload vulnerabilities",
        "icons": [
          {
            "src": "/img/logo_vuln_mgmt.svg",
            "path": "/package/cloud_security_posture/3.3.0/img/logo_vuln_mgmt.svg",
            "title": "Vulnerability Management logo",
            "size": "32x32",
            "type": "image/svg+xml"
          }
        ],
        "categories": [
          "security",
          "cloud",
          "vulnerability_workflow"
        ],
        "data_streams": [
          "vulnerabilities"
        ]
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.4.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/cloud-services"
    },
    "categories": [
      "security",
      "cloudsecurity_cdr",
      "misconfiguration_workflow",
      "vulnerability_workflow",
      "containers",
      "observability",
      "google_cloud",
      "aws",
      "cloud"
    ],
    "signature_path": "/epr/cloud_security_posture/cloud_security_posture-3.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "cloud_security_posture.findings",
        "title": "Cloud Security Posture Findings"
      },
      {
        "type": "logs",
        "dataset": "cloud_security_posture.vulnerabilities",
        "title": "Cloud Vulnerabilities"
      }
    ]
  },
  {
    "name": "sentinel_one",
    "title": "SentinelOne",
    "version": "2.6.0",
    "release": "ga",
    "description": "Collect logs from SentinelOne with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sentinel_one/sentinel_one-2.6.0.zip",
    "path": "/package/sentinel_one/2.6.0",
    "icons": [
      {
        "src": "/img/sentinel-one-logo.svg",
        "path": "/package/sentinel_one/2.6.0/img/sentinel-one-logo.svg",
        "title": "SentinelOne Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sentinel_one",
        "title": "SentinelOne",
        "description": "Collect logs from SentinelOne.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.13 || ^9.2.7 || ^9.3.2"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/sentinel_one/sentinel_one-2.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sentinel_one.activity",
        "title": "Collect activity logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.agent",
        "title": "Collect agent logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.alert",
        "title": "Collect alert logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.application",
        "title": "Collect application logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.application_risk",
        "title": "Collect application risk logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.group",
        "title": "Collect group logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.threat",
        "title": "Collect threat logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.threat_event",
        "title": "Collect threat event logs from SentinelOne"
      },
      {
        "type": "logs",
        "dataset": "sentinel_one.unified_alert",
        "title": "Collect unified alert logs from SentinelOne"
      }
    ]
  },
  {
    "name": "servicenow",
    "title": "ServiceNow",
    "version": "2.0.0",
    "release": "ga",
    "description": "Collect logs from ServiceNow with Elastic Agent.",
    "type": "integration",
    "download": "/epr/servicenow/servicenow-2.0.0.zip",
    "path": "/package/servicenow/2.0.0",
    "icons": [
      {
        "src": "/img/servicenow-logo.svg",
        "path": "/package/servicenow/2.0.0/img/servicenow-logo.svg",
        "title": "ServiceNow Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "servicenow",
        "title": "ServiceNow logs",
        "description": "Collect ServiceNow logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/servicenow/servicenow-2.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "servicenow.event",
        "title": "Event"
      }
    ]
  },
  {
    "name": "httpcheck_otel",
    "title": "Simple HTTP Check",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Perform HTTP checks using the HTTP Check receiver of the OTel Collector.",
    "type": "input",
    "download": "/epr/httpcheck_otel/httpcheck_otel-0.1.0.zip",
    "path": "/package/httpcheck_otel/0.1.0",
    "icons": [
      {
        "src": "/img/http-logo.svg",
        "path": "/package/httpcheck_otel/0.1.0/img/http-logo.svg",
        "title": "HTTP logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "httpcheckreceiver",
        "title": "HTTP Check",
        "description": "Perform HTTP checks and collect its results."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "monitoring",
      "network",
      "opentelemetry",
      "web"
    ],
    "signature_path": "/epr/httpcheck_otel/httpcheck_otel-0.1.0.zip.sig"
  },
  {
    "name": "slack",
    "title": "Slack Logs",
    "version": "1.27.0",
    "release": "ga",
    "description": "Slack Logs Integration",
    "type": "integration",
    "download": "/epr/slack/slack-1.27.0.zip",
    "path": "/package/slack/1.27.0",
    "icons": [
      {
        "src": "/img/slack.svg",
        "path": "/package/slack/1.27.0/img/slack.svg",
        "title": "Slack logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "slack",
        "title": "Slack logs",
        "description": "Collect logs from Slack",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "productivity",
      "security"
    ],
    "signature_path": "/epr/slack/slack-1.27.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "slack.audit",
        "title": "Slack Audit Logs"
      }
    ]
  },
  {
    "name": "snyk",
    "title": "Snyk",
    "version": "3.4.2",
    "release": "ga",
    "description": "Collect logs from Snyk with Elastic Agent.",
    "type": "integration",
    "download": "/epr/snyk/snyk-3.4.2.zip",
    "path": "/package/snyk/3.4.2",
    "icons": [
      {
        "src": "/img/snyk-logo.svg",
        "path": "/package/snyk/3.4.2/img/snyk-logo.svg",
        "title": "Snyk logo",
        "size": "382x625",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "snyk",
        "title": "Snyk Events",
        "description": "Collect data from Snyk API",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "cloudsecurity_cdr",
      "vulnerability_management"
    ],
    "signature_path": "/epr/snyk/snyk-3.4.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "snyk.audit_logs",
        "title": "Collect Snyk Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "snyk.issues",
        "title": "Collect Snyk Issues Data"
      }
    ]
  },
  {
    "name": "splunk",
    "title": "Splunk",
    "version": "1.0.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Splunk with Elastic Agent.",
    "type": "integration",
    "download": "/epr/splunk/splunk-1.0.1.zip",
    "path": "/package/splunk/1.0.1",
    "icons": [
      {
        "src": "/img/splunk-logo.svg",
        "path": "/package/splunk/1.0.1/img/splunk-logo.svg",
        "title": "Splunk Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "splunk",
        "title": "Splunk logs",
        "description": "Collect Splunk logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "siem"
    ],
    "signature_path": "/epr/splunk/splunk-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "splunk.alert",
        "title": "Alert"
      },
      {
        "type": "logs",
        "dataset": "splunk.search",
        "title": "Alert"
      }
    ]
  },
  {
    "name": "spycloud",
    "title": "SpyCloud Enterprise Protection",
    "version": "1.6.0",
    "release": "ga",
    "description": "Collect data from SpyCloud Enterprise Protection with Elastic Agent.",
    "type": "integration",
    "download": "/epr/spycloud/spycloud-1.6.0.zip",
    "path": "/package/spycloud/1.6.0",
    "icons": [
      {
        "src": "/img/spycloud-logo.svg",
        "path": "/package/spycloud/1.6.0/img/spycloud-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "SpyCloud Enterprise Protection",
        "title": "SpyCloud Enterprise Protection logs",
        "description": "Collect SpyCloud Enterprise Protection logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/spycloud/spycloud-1.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "spycloud.breach_catalog",
        "title": "Collect Breach Catalog logs from SpyCloud Enterprise Protection."
      },
      {
        "type": "logs",
        "dataset": "spycloud.breach_record",
        "title": "Collect Breach Record logs from SpyCloud Enterprise Protection."
      },
      {
        "type": "logs",
        "dataset": "spycloud.compass",
        "title": "Collect Compass logs from SpyCloud Enterprise Protection."
      }
    ]
  },
  {
    "name": "squid",
    "title": "Squid Proxy",
    "version": "1.5.0",
    "release": "ga",
    "description": "Collect and parse logs from Squid devices with Elastic Agent.",
    "type": "integration",
    "download": "/epr/squid/squid-1.5.0.zip",
    "path": "/package/squid/1.5.0",
    "icons": [
      {
        "src": "/img/squid-logo.png",
        "path": "/package/squid/1.5.0/img/squid-logo.png",
        "title": "Squid Logo",
        "size": "160x160",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "log",
        "title": "Squid",
        "description": "Collect Squid logs from syslog or a file."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.1 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "observability",
      "network",
      "security",
      "proxy_security",
      "web"
    ],
    "signature_path": "/epr/squid/squid-1.5.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "squid.log",
        "title": "Squid logs"
      }
    ]
  },
  {
    "name": "statsd_input",
    "title": "StatsD Input",
    "version": "0.6.0",
    "release": "beta",
    "description": "StatsD Input Package",
    "type": "input",
    "download": "/epr/statsd_input/statsd_input-0.6.0.zip",
    "path": "/package/statsd_input/0.6.0",
    "icons": [
      {
        "src": "/img/statsd.svg",
        "path": "/package/statsd_input/0.6.0/img/statsd.svg",
        "title": "statsd",
        "size": "266x266",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "statsd",
        "title": "StatsD Metrics",
        "description": "Collect metrics from StatsD instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "custom"
    ],
    "signature_path": "/epr/statsd_input/statsd_input-0.6.0.zip.sig"
  },
  {
    "name": "statsd_input_otel",
    "title": "StatsD OpenTelemetry Input Package",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "StatsD OpenTelemetry Input Package",
    "type": "input",
    "download": "/epr/statsd_input_otel/statsd_input_otel-0.1.0.zip",
    "path": "/package/statsd_input_otel/0.1.0",
    "icons": [
      {
        "src": "/img/statsd_otellogo.svg",
        "path": "/package/statsd_input_otel/0.1.0/img/statsd_otellogo.svg",
        "title": "StatsD OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "statsdreceiver",
        "title": "StatsD OpenTelemetry Input",
        "description": "Collect StatsD metrics using OpenTelemetry Collector"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "~9.2.6 || ^9.3.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ecosystem"
    },
    "categories": [
      "observability",
      "opentelemetry",
      "custom"
    ],
    "signature_path": "/epr/statsd_input_otel/statsd_input_otel-0.1.0.zip.sig"
  },
  {
    "name": "stormshield",
    "title": "StormShield SNS",
    "version": "1.5.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Stormshield SNS integration.",
    "type": "integration",
    "download": "/epr/stormshield/stormshield-1.5.1.zip",
    "path": "/package/stormshield/1.5.1",
    "icons": [
      {
        "src": "/img/stormshield_logo.png",
        "path": "/package/stormshield/1.5.1/img/stormshield_logo.png",
        "title": "Stormshield logo",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "stormshield_sns",
        "title": "Stormshield SNS logs",
        "description": "Collect logs from Stormshield SNS instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.11.4 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "network",
      "security",
      "firewall_security",
      "network_security"
    ],
    "signature_path": "/epr/stormshield/stormshield-1.5.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "stormshield.log",
        "title": "StormShield SNS logs"
      }
    ]
  },
  {
    "name": "sublime_security",
    "title": "Sublime Security",
    "version": "1.11.2",
    "release": "ga",
    "description": "Collect logs from Sublime Security with Elastic Agent.",
    "type": "integration",
    "download": "/epr/sublime_security/sublime_security-1.11.2.zip",
    "path": "/package/sublime_security/1.11.2",
    "icons": [
      {
        "src": "/img/sublime_security.svg",
        "path": "/package/sublime_security/1.11.2/img/sublime_security.svg",
        "title": "Sublime Security logo",
        "size": "32x32",
        "type": "image/svg+xml"
      },
      {
        "src": "/img/sublime_security-dark.svg",
        "path": "/package/sublime_security/1.11.2/img/sublime_security-dark.svg",
        "title": "Sublime Security dark logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sublime_security",
        "title": "Sublime Security logs",
        "description": "Collect Sublime Security logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "email_security"
    ],
    "signature_path": "/epr/sublime_security/sublime_security-1.11.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sublime_security.audit",
        "title": "Sublime Security Audit logs"
      },
      {
        "type": "logs",
        "dataset": "sublime_security.email_message",
        "title": "Sublime Security Email Message logs"
      },
      {
        "type": "logs",
        "dataset": "sublime_security.message_event",
        "title": "Sublime Security Message Event logs"
      }
    ]
  },
  {
    "name": "symantec_endpoint_security",
    "title": "Symantec Endpoint Security",
    "version": "1.14.2",
    "release": "ga",
    "description": "Collect logs from Symantec Endpoint Security with Elastic Agent.",
    "type": "integration",
    "download": "/epr/symantec_endpoint_security/symantec_endpoint_security-1.14.2.zip",
    "path": "/package/symantec_endpoint_security/1.14.2",
    "icons": [
      {
        "src": "/img/symantec-logo.svg",
        "path": "/package/symantec_endpoint_security/1.14.2/img/symantec-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Symantec Endpoint Security",
        "title": "Symantec Endpoint Security logs",
        "description": "Collect logs using AWS S3, AWS SQS or Azure Blob Storage."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.5 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/symantec_endpoint_security/symantec_endpoint_security-1.14.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "symantec_endpoint_security.event",
        "title": "Symantec Endpoint Security Event"
      },
      {
        "type": "logs",
        "dataset": "symantec_endpoint_security.incident",
        "title": "Collect Incident logs from Symantec Endpoint Security"
      }
    ]
  },
  {
    "name": "sysdig",
    "title": "Sysdig",
    "version": "2.3.0",
    "release": "ga",
    "description": "Collect logs from Sysdig using Elastic Agent.",
    "type": "integration",
    "download": "/epr/sysdig/sysdig-2.3.0.zip",
    "path": "/package/sysdig/2.3.0",
    "icons": [
      {
        "src": "/img/sysdig-logo-badge.svg",
        "path": "/package/sysdig/2.3.0/img/sysdig-logo-badge.svg",
        "title": "Sysdig logo",
        "size": "88x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "sysdig",
        "title": "Sysdig logs",
        "description": "Collect logs from Sysdig using Elastic Agent."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "containers",
      "kubernetes",
      "monitoring",
      "observability",
      "security"
    ],
    "signature_path": "/epr/sysdig/sysdig-2.3.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "sysdig.alerts",
        "title": "Sysdig"
      },
      {
        "type": "logs",
        "dataset": "sysdig.cspm",
        "title": "CSPM Compliance Results"
      },
      {
        "type": "logs",
        "dataset": "sysdig.event",
        "title": "Security Event"
      },
      {
        "type": "logs",
        "dataset": "sysdig.vulnerability",
        "title": "Vulnerability"
      }
    ]
  },
  {
    "name": "syslog_router",
    "title": "Syslog Router",
    "version": "1.0.1",
    "release": "ga",
    "description": "Route syslog events to integrations with Elastic Agent.",
    "type": "integration",
    "download": "/epr/syslog_router/syslog_router-1.0.1.zip",
    "path": "/package/syslog_router/1.0.1",
    "icons": [
      {
        "src": "/img/icon.svg",
        "path": "/package/syslog_router/1.0.1/img/icon.svg",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "syslog_router",
        "title": "Collect syslog events",
        "description": "Collect syslog events"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "custom"
    ],
    "signature_path": "/epr/syslog_router/syslog_router-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "syslog_router.log",
        "title": "Route logs to Elastic integrations."
      }
    ]
  },
  {
    "name": "system",
    "title": "System",
    "version": "2.16.2",
    "release": "ga",
    "description": "Collect system logs and metrics from your servers with Elastic Agent.",
    "type": "integration",
    "download": "/epr/system/system-2.16.2.zip",
    "path": "/package/system/2.16.2",
    "icons": [
      {
        "src": "/img/system.svg",
        "path": "/package/system/2.16.2/img/system.svg",
        "title": "system",
        "size": "1000x1000",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "system",
        "title": "System logs and metrics",
        "description": "Collect logs and metrics from System instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "os_system",
      "monitoring",
      "observability"
    ],
    "signature_path": "/epr/system/system-2.16.2.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "system.application",
        "title": "Windows Application Events"
      },
      {
        "type": "logs",
        "dataset": "system.auth",
        "title": "System auth logs"
      },
      {
        "type": "metrics",
        "dataset": "system.core",
        "title": "System core metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.cpu",
        "title": "System cpu metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.diskio",
        "title": "System diskio metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.filesystem",
        "title": "System filesystem metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.fsstat",
        "title": "System fsstat metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.load",
        "title": "System load metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.memory",
        "title": "System memory metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.network",
        "title": "System network metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.ntp",
        "title": "Network Time Protocol metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.process",
        "title": "System process metrics"
      },
      {
        "type": "metrics",
        "dataset": "system.process.summary",
        "title": "System process_summary metrics"
      },
      {
        "type": "logs",
        "dataset": "system.security",
        "title": "Security logs"
      },
      {
        "type": "metrics",
        "dataset": "system.socket_summary",
        "title": "System socket_summary metrics"
      },
      {
        "type": "logs",
        "dataset": "system.syslog",
        "title": "System syslog logs"
      },
      {
        "type": "logs",
        "dataset": "system.system",
        "title": "Windows System Events"
      },
      {
        "type": "metrics",
        "dataset": "system.uptime",
        "title": "System uptime metrics"
      }
    ]
  },
  {
    "name": "system_otel",
    "title": "System OpenTelemetry Assets",
    "version": "0.2.7",
    "release": "beta",
    "description": "Dashboards for the OpenTelemetry data collected with the `hostmetrics` receiver.",
    "type": "content",
    "download": "/epr/system_otel/system_otel-0.2.7.zip",
    "path": "/package/system_otel/0.2.7",
    "icons": [
      {
        "src": "/img/system-otel.svg",
        "path": "/package/system_otel/0.2.7/img/system-otel.svg",
        "title": "System OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/ingest-otel-data"
    },
    "categories": [
      "os_system",
      "monitoring",
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/system_otel/system_otel-0.2.7.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "hostmetricsreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "tychon",
    "title": "TYCHON Agentless",
    "version": "1.1.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect complete master endpoint datasets including vulnerability and STIG to comply with DISA endpoint requirements and C2C without adding services to your endpoints.",
    "type": "integration",
    "download": "/epr/tychon/tychon-1.1.0.zip",
    "path": "/package/tychon/1.1.0",
    "icons": [
      {
        "src": "/img/TychonLogo.svg",
        "path": "/package/tychon/1.1.0/img/TychonLogo.svg",
        "title": "TYCHON",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tychon",
        "title": "Tychon",
        "description": "Tychon"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic",
        "capabilities": [
          "security"
        ]
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "config_management",
      "vulnerability_management"
    ],
    "signature_path": "/epr/tychon/tychon-1.1.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tychon.arp",
        "title": "Endpoint Arp Table Information"
      },
      {
        "type": "logs",
        "dataset": "tychon.browser",
        "title": "Endpoint Browser Configurations"
      },
      {
        "type": "logs",
        "dataset": "tychon.ciphers",
        "title": "Certificate Ciphers"
      },
      {
        "type": "logs",
        "dataset": "tychon.cmrs",
        "title": "DISA Continuous Monitoring and Risk Scoring Data"
      },
      {
        "type": "logs",
        "dataset": "tychon.coams",
        "title": "Endpoint Operational Attributes (Requires DATT)"
      },
      {
        "type": "logs",
        "dataset": "tychon.cpu",
        "title": "Endpoint CPU Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.cve",
        "title": "Vulnerabilites"
      },
      {
        "type": "logs",
        "dataset": "tychon.epp",
        "title": "Endpoint Protection Platform Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.exposedservice",
        "title": "Endpoint Exposed Services"
      },
      {
        "type": "logs",
        "dataset": "tychon.externaldevicecontrol",
        "title": "Endpoint External Device Control"
      },
      {
        "type": "logs",
        "dataset": "tychon.features",
        "title": "Features Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.harddrive",
        "title": "Endpoint Harddrive Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.hardware",
        "title": "Hardware Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.host",
        "title": "Host Operating System Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.networkadapter",
        "title": "Network Adapters"
      },
      {
        "type": "logs",
        "dataset": "tychon.softwareinventory",
        "title": "Endpoint Software Inventory Info"
      },
      {
        "type": "logs",
        "dataset": "tychon.stig",
        "title": "Endpoint STIG Results"
      },
      {
        "type": "logs",
        "dataset": "tychon.systemcerts",
        "title": "System Certificates"
      },
      {
        "type": "logs",
        "dataset": "tychon.volume",
        "title": "Endpoint Volumes Info"
      }
    ]
  },
  {
    "name": "tenable_ot_security",
    "title": "Tenable OT Security",
    "version": "2.0.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Tenable OT Security",
    "type": "integration",
    "download": "/epr/tenable_ot_security/tenable_ot_security-2.0.0.zip",
    "path": "/package/tenable_ot_security/2.0.0",
    "icons": [
      {
        "src": "/img/logo.svg",
        "path": "/package/tenable_ot_security/2.0.0/img/logo.svg",
        "title": "Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tenable_ot_security_cloud",
        "title": "Tenable OT Security Cloud Events",
        "description": "Collect events from Tenable OT Security Cloud event reporting."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.1 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/tenable_ot_security/tenable_ot_security-2.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tenable_ot_security.assets",
        "title": "Assets"
      },
      {
        "type": "logs",
        "dataset": "tenable_ot_security.events",
        "title": "Events"
      },
      {
        "type": "logs",
        "dataset": "tenable_ot_security.system_log",
        "title": "System Log"
      }
    ]
  },
  {
    "name": "tenable_sc",
    "title": "Tenable Security Center",
    "version": "2.2.0",
    "release": "ga",
    "description": "Collect data from Tenable Security Center with Elastic Agent.\n",
    "type": "integration",
    "download": "/epr/tenable_sc/tenable_sc-2.2.0.zip",
    "path": "/package/tenable_sc/2.2.0",
    "icons": [
      {
        "src": "/img/tenable_sc-logo.svg",
        "path": "/package/tenable_sc/2.2.0/img/tenable_sc-logo.svg",
        "title": "Tenable Security Center logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tenable_sc",
        "title": "Tenable Security Center data",
        "description": "Collect Tenable Security Center data.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management"
    ],
    "signature_path": "/epr/tenable_sc/tenable_sc-2.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tenable_sc.asset",
        "title": "Tenable Security Center asset data"
      },
      {
        "type": "logs",
        "dataset": "tenable_sc.plugin",
        "title": "Tenable Security Center plugin data"
      },
      {
        "type": "logs",
        "dataset": "tenable_sc.vulnerability",
        "title": "Tenable Security Center vulnerability data"
      }
    ]
  },
  {
    "name": "tenable_io",
    "title": "Tenable Vulnerability Management",
    "version": "4.10.0",
    "release": "ga",
    "description": "Collect logs from Tenable Vulnerability Management with Elastic Agent.",
    "type": "integration",
    "download": "/epr/tenable_io/tenable_io-4.10.0.zip",
    "path": "/package/tenable_io/4.10.0",
    "icons": [
      {
        "src": "/img/tenable_io-logo.svg",
        "path": "/package/tenable_io/4.10.0/img/tenable_io-logo.svg",
        "title": "Tenable Vulnerability Management logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tenable_io",
        "title": "Tenable Vulnerability Management",
        "description": "Collect logs from Tenable Vulnerability Management.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management",
      "vulnerability_workflow",
      "cloudsecurity_cdr"
    ],
    "signature_path": "/epr/tenable_io/tenable_io-4.10.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tenable_io.asset",
        "title": "Collect Asset data from Tenable Vulnerability Management"
      },
      {
        "type": "logs",
        "dataset": "tenable_io.audit",
        "title": "Collect Audit logs from Tenable Vulnerability Management"
      },
      {
        "type": "logs",
        "dataset": "tenable_io.plugin",
        "title": "Collect Plugin logs from Tenable Vulnerability Management"
      },
      {
        "type": "logs",
        "dataset": "tenable_io.scan",
        "title": "Collect Scan logs from Tenable Vulnerability Management"
      },
      {
        "type": "logs",
        "dataset": "tenable_io.vulnerability",
        "title": "Collect Vulnerability logs from Tenable Vulnerability Management"
      }
    ]
  },
  {
    "name": "tencent_cloud",
    "title": "Tencent Cloud",
    "version": "0.2.0",
    "release": "beta",
    "description": "从腾讯云的 COS 中采集审计日志",
    "type": "integration",
    "download": "/epr/tencent_cloud/tencent_cloud-0.2.0.zip",
    "path": "/package/tencent_cloud/0.2.0",
    "icons": [
      {
        "src": "/img/logo.png",
        "path": "/package/tencent_cloud/0.2.0/img/logo.png",
        "title": "tencent_cloud Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "Tencent cloud",
        "title": "Tencent cloud audit log",
        "description": "从腾讯云的 COS 中采集审计日志"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.16.0 || ^9.0.0"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam",
      "cloud"
    ],
    "signature_path": "/epr/tencent_cloud/tencent_cloud-0.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tencent_cloud.audit",
        "title": "Tencent Cloud Audit Logs"
      }
    ]
  },
  {
    "name": "threat_map",
    "title": "Threat Map",
    "version": "1.1.0",
    "release": "ga",
    "description": "The Threat Map integration includes a dashboard for analyzing network traffic data.",
    "type": "integration",
    "download": "/epr/threat_map/threat_map-1.1.0.zip",
    "path": "/package/threat_map/1.1.0",
    "icons": [
      {
        "src": "/img/sample-logo.svg",
        "path": "/package/threat_map/1.1.0/img/sample-logo.svg",
        "title": "Sample logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "custom",
      "security"
    ],
    "signature_path": "/epr/threat_map/threat_map-1.1.0.zip.sig"
  },
  {
    "name": "ti_threatq",
    "title": "ThreatQuotient",
    "version": "1.37.1",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from ThreatQuotient with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_threatq/ti_threatq-1.37.1.zip",
    "path": "/package/ti_threatq/1.37.1",
    "icons": [
      {
        "src": "/img/threatq.svg",
        "path": "/package/ti_threatq/1.37.1/img/threatq.svg",
        "title": "ThreatQuotient",
        "size": "600x600",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_threatq",
        "title": "ThreatQuotient",
        "description": "Ingest threat intelligence indicators from ThreatQuotient with Elastic Agent.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "partner",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_threatq/ti_threatq-1.37.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_threatq.threat",
        "title": "ThreatQ"
      }
    ]
  },
  {
    "name": "tines",
    "title": "Tines",
    "version": "1.16.0",
    "release": "ga",
    "description": "Tines Logs & Time Saved Reports",
    "type": "integration",
    "download": "/epr/tines/tines-1.16.0.zip",
    "path": "/package/tines/1.16.0",
    "icons": [
      {
        "src": "/img/tines-purple-logo.png",
        "path": "/package/tines/1.16.0/img/tines-purple-logo.png",
        "title": "Tines",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "tines_api",
        "title": "Tines API",
        "description": "Collect events from the Tines API"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "cloud",
      "security"
    ],
    "signature_path": "/epr/tines/tines-1.16.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "tines.audit_logs",
        "title": "Tines Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "tines.time_saved",
        "title": "Tines Time Saved Reports"
      }
    ]
  },
  {
    "name": "traefik_otel",
    "title": "Traefik OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Traefik Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/traefik_otel/traefik_otel-0.1.0.zip",
    "path": "/package/traefik_otel/0.1.0",
    "icons": [
      {
        "src": "/img/traefik_otel.svg",
        "path": "/package/traefik_otel/0.1.0/img/traefik_otel.svg",
        "title": "Traefik OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "opentelemetry",
      "observability",
      "web",
      "load_balancer",
      "network"
    ],
    "signature_path": "/epr/traefik_otel/traefik_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "traefik.otel"
        }
      ]
    }
  },
  {
    "name": "trend_micro_vision_one",
    "title": "TrendAI Vision One",
    "version": "2.11.0",
    "release": "ga",
    "description": "Collect logs from TrendAI Vision One with Elastic Agent.",
    "type": "integration",
    "download": "/epr/trend_micro_vision_one/trend_micro_vision_one-2.11.0.zip",
    "path": "/package/trend_micro_vision_one/2.11.0",
    "icons": [
      {
        "src": "/img/trendai-vision-one-logo.svg",
        "path": "/package/trend_micro_vision_one/2.11.0/img/trendai-vision-one-logo.svg",
        "title": "TrendAI Vision One Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "trend_micro_vision_one",
        "title": "TrendAI Vision One",
        "description": "Collect logs from TrendAI Vision One.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr",
      "siem",
      "network",
      "network_security"
    ],
    "signature_path": "/epr/trend_micro_vision_one/trend_micro_vision_one-2.11.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.alert",
        "title": "Collect alert logs from TrendAI Vision One"
      },
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.audit",
        "title": "Collect audit logs from TrendAI Vision One"
      },
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.detection",
        "title": "Collect detection logs from TrendAI Vision One"
      },
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.endpoint_activity",
        "title": "Collect endpoint activity logs from TrendAI Vision One"
      },
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.network_activity",
        "title": "Collect network activity logs from TrendAI Vision One"
      },
      {
        "type": "logs",
        "dataset": "trend_micro_vision_one.telemetry",
        "title": "Collect telemetry data from the Datalake Pipeline API"
      }
    ]
  },
  {
    "name": "carbon_black_cloud",
    "title": "VMware Carbon Black Cloud",
    "version": "4.2.0",
    "release": "ga",
    "description": "Collect logs from VMWare Carbon Black Cloud with Elastic Agent.",
    "type": "integration",
    "download": "/epr/carbon_black_cloud/carbon_black_cloud-4.2.0.zip",
    "path": "/package/carbon_black_cloud/4.2.0",
    "icons": [
      {
        "src": "/img/carbon_black_cloud-logo.svg",
        "path": "/package/carbon_black_cloud/4.2.0/img/carbon_black_cloud-logo.svg",
        "title": "Carbon Black Cloud logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "carbon_black_cloud",
        "title": "Carbon Black Cloud",
        "description": "Collect Logs from Carbon Black Cloud.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr"
    ],
    "signature_path": "/epr/carbon_black_cloud/carbon_black_cloud-4.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.alert_v7",
        "title": "Alert V7"
      },
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.asset_vulnerability_summary",
        "title": "Asset Vulnerability Summary"
      },
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.audit",
        "title": "Audit"
      },
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.endpoint_event",
        "title": "Endpoint Event"
      },
      {
        "type": "logs",
        "dataset": "carbon_black_cloud.watchlist_hit",
        "title": "Watchlist Hit"
      }
    ]
  },
  {
    "name": "vsphere_otel",
    "title": "VMware vSphere OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "VMware vSphere Assets for OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/vsphere_otel/vsphere_otel-0.1.0.zip",
    "path": "/package/vsphere_otel/0.1.0",
    "icons": [
      {
        "src": "/img/vs.svg",
        "path": "/package/vsphere_otel/0.1.0/img/vs.svg",
        "title": "Vsphere logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "opentelemetry",
      "virtualization"
    ],
    "signature_path": "/epr/vsphere_otel/vsphere_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "vcenterreceiver.otel"
        }
      ]
    }
  },
  {
    "name": "varonis",
    "title": "Varonis",
    "version": "1.0.0",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect Varonis syslog alerts using TCP/UDP input.",
    "type": "integration",
    "download": "/epr/varonis/varonis-1.0.0.zip",
    "path": "/package/varonis/1.0.0",
    "icons": [
      {
        "src": "/img/sample-logo.svg",
        "path": "/package/varonis/1.0.0/img/sample-logo.svg",
        "title": "Sample logo",
        "size": "832x101",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "varonis",
        "title": "Varonis",
        "description": "Collect Varonis syslog alerts using TCP/UDP input."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.15.3 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/varonis/varonis-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "varonis.logs",
        "title": "Varonis"
      }
    ]
  },
  {
    "name": "vectra_rux",
    "title": "Vectra RUX",
    "version": "0.3.3",
    "release": "beta",
    "description": "Collect logs from Vectra RUX with Elastic Agent.",
    "type": "integration",
    "download": "/epr/vectra_rux/vectra_rux-0.3.3.zip",
    "path": "/package/vectra_rux/0.3.3",
    "icons": [
      {
        "src": "/img/vectra_rux-logo.svg",
        "path": "/package/vectra_rux/0.3.3/img/vectra_rux-logo.svg",
        "title": "Vectra RUX logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "vectra_rux",
        "title": "Vectra RUX",
        "description": "Collect logs from Vectra RUX.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "edr_xdr",
      "siem"
    ],
    "signature_path": "/epr/vectra_rux/vectra_rux-0.3.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "vectra_rux.audit",
        "title": "Collect Audit logs from Vectra RUX"
      },
      {
        "type": "logs",
        "dataset": "vectra_rux.detection_event",
        "title": "Collect Detection Event logs from Vectra RUX"
      },
      {
        "type": "logs",
        "dataset": "vectra_rux.entity_event",
        "title": "Collect Entity Event logs from Vectra RUX"
      },
      {
        "type": "logs",
        "dataset": "vectra_rux.health",
        "title": "Collect Health logs from Vectra RUX"
      },
      {
        "type": "logs",
        "dataset": "vectra_rux.lockdown",
        "title": "Collect Lockdown logs from Vectra RUX"
      }
    ]
  },
  {
    "name": "watchguard_firebox",
    "title": "WatchGuard Firebox",
    "version": "1.6.3",
    "release": "ga",
    "description": "Collect logs from WatchGuard Firebox with Elastic Agent.",
    "type": "integration",
    "download": "/epr/watchguard_firebox/watchguard_firebox-1.6.3.zip",
    "path": "/package/watchguard_firebox/1.6.3",
    "icons": [
      {
        "src": "/img/watchguard-logo.svg",
        "path": "/package/watchguard_firebox/1.6.3/img/watchguard-logo.svg",
        "title": "WatchGuard Firebox logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "watchguard_firebox",
        "title": "WatchGuard Firebox logs",
        "description": "Collect WatchGuard Firebox logs."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.13.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/integration-experience"
    },
    "categories": [
      "security",
      "network",
      "firewall_security",
      "siem"
    ],
    "signature_path": "/epr/watchguard_firebox/watchguard_firebox-1.6.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "watchguard_firebox.log",
        "title": "WatchGuard Firebox logs"
      }
    ]
  },
  {
    "name": "windows",
    "title": "Windows",
    "version": "3.8.3",
    "release": "ga",
    "description": "Collect logs and metrics from Windows OS and services with Elastic Agent.",
    "type": "integration",
    "download": "/epr/windows/windows-3.8.3.zip",
    "path": "/package/windows/3.8.3",
    "icons": [
      {
        "src": "/img/logo_windows.svg",
        "path": "/package/windows/3.8.3/img/logo_windows.svg",
        "title": "logo windows",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "windows",
        "title": "Windows logs and metrics",
        "description": "Collect logs and metrics from Windows instances"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.14.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/elastic-agent-data-plane"
    },
    "categories": [
      "os_system",
      "security",
      "observability"
    ],
    "signature_path": "/epr/windows/windows-3.8.3.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "windows.applocker_exe_and_dll",
        "title": "Windows AppLocker/EXE and DLL logs"
      },
      {
        "type": "logs",
        "dataset": "windows.applocker_msi_and_script",
        "title": "Windows AppLocker/MSI and Script logs"
      },
      {
        "type": "logs",
        "dataset": "windows.applocker_packaged_app_deployment",
        "title": "Windows AppLocker/Packaged app-Deployment logs"
      },
      {
        "type": "logs",
        "dataset": "windows.applocker_packaged_app_execution",
        "title": "Windows AppLocker/Packaged app-Execution logs"
      },
      {
        "type": "logs",
        "dataset": "windows.forwarded",
        "title": "Windows forwarded events"
      },
      {
        "type": "metrics",
        "dataset": "windows.perfmon",
        "title": "Windows perfmon metrics"
      },
      {
        "type": "logs",
        "dataset": "windows.powershell",
        "title": "Windows Powershell logs"
      },
      {
        "type": "logs",
        "dataset": "windows.powershell_operational",
        "title": "Windows Powershell/Operational logs"
      },
      {
        "type": "metrics",
        "dataset": "windows.service",
        "title": "Windows service metrics"
      },
      {
        "type": "logs",
        "dataset": "windows.sysmon_operational",
        "title": "Windows Sysmon/Operational events"
      },
      {
        "type": "logs",
        "dataset": "windows.windows_defender",
        "title": "Windows Defender logs"
      }
    ]
  },
  {
    "name": "wiz",
    "title": "Wiz",
    "version": "4.2.0",
    "release": "ga",
    "description": "Collect logs from Wiz with Elastic Agent.",
    "type": "integration",
    "download": "/epr/wiz/wiz-4.2.0.zip",
    "path": "/package/wiz/4.2.0",
    "icons": [
      {
        "src": "/img/wiz-logo.svg",
        "path": "/package/wiz/4.2.0/img/wiz-logo.svg",
        "title": "Wiz logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "wiz",
        "title": "Wiz logs",
        "description": "Collect Wiz logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "cloudsecurity_cdr",
      "vulnerability_workflow",
      "misconfiguration_workflow",
      "cloud",
      "siem"
    ],
    "signature_path": "/epr/wiz/wiz-4.2.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "wiz.audit",
        "title": "Collect Audit logs from Wiz."
      },
      {
        "type": "logs",
        "dataset": "wiz.cloud_configuration_finding",
        "title": "Collet Cloud Configuration Finding logs from Wiz."
      },
      {
        "type": "logs",
        "dataset": "wiz.cloud_configuration_finding_full_posture",
        "title": "Collect full Cloud Configuration Finding posture from Wiz."
      },
      {
        "type": "logs",
        "dataset": "wiz.defend",
        "title": "Collect Detection events from Wiz Defend."
      },
      {
        "type": "logs",
        "dataset": "wiz.issue",
        "title": "Collect Issue logs from Wiz."
      },
      {
        "type": "logs",
        "dataset": "wiz.vulnerability",
        "title": "Collect Vulnerability logs from Wiz."
      }
    ]
  },
  {
    "name": "zookeeper_otel",
    "title": "Zookeeper OTel Assets",
    "version": "0.1.1",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Zookeeper OTel Assets",
    "type": "content",
    "download": "/epr/zookeeper_otel/zookeeper_otel-0.1.1.zip",
    "path": "/package/zookeeper_otel/0.1.1",
    "icons": [
      {
        "src": "/img/zookeeper-logo.svg",
        "path": "/package/zookeeper_otel/0.1.1/img/zookeeper-logo.svg",
        "title": "Zookeeper OTel logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.3.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "opentelemetry"
    ],
    "signature_path": "/epr/zookeeper_otel/zookeeper_otel-0.1.1.zip.sig"
  },
  {
    "name": "zscaler_zia",
    "title": "Zscaler Internet Access",
    "version": "3.17.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from Zscaler Internet Access (ZIA) with Elastic Agent.",
    "type": "integration",
    "download": "/epr/zscaler_zia/zscaler_zia-3.17.1.zip",
    "path": "/package/zscaler_zia/3.17.1",
    "icons": [
      {
        "src": "/img/zscaler-logo.svg",
        "path": "/package/zscaler_zia/3.17.1/img/zscaler-logo.svg",
        "title": "Zscaler logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "zscaler_zia",
        "title": "Zscaler Internet Access logs",
        "description": "Collect Zscaler Internet Access logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "network",
      "siem"
    ],
    "signature_path": "/epr/zscaler_zia/zscaler_zia-3.17.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "zscaler_zia.alerts",
        "title": "Alerts"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.audit",
        "title": "Audit Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.dns",
        "title": "DNS logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.endpoint_dlp",
        "title": "Endpoint DLP Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.firewall",
        "title": "Firewall Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.sandbox_report",
        "title": "Sandbox Report Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.tunnel",
        "title": "Tunnel Logs"
      },
      {
        "type": "logs",
        "dataset": "zscaler_zia.web",
        "title": "Web Logs"
      }
    ]
  },
  {
    "name": "ti_abusech",
    "title": "abuse.ch",
    "version": "3.6.0",
    "release": "ga",
    "description": "Ingest threat intelligence indicators from URL Haus, Malware Bazaar, and Threat Fox feeds with Elastic Agent.",
    "type": "integration",
    "download": "/epr/ti_abusech/ti_abusech-3.6.0.zip",
    "path": "/package/ti_abusech/3.6.0",
    "icons": [
      {
        "src": "/img/abusech2.svg",
        "path": "/package/ti_abusech/3.6.0/img/abusech2.svg",
        "title": "abuse.ch",
        "size": "512x512",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "ti_abusech",
        "title": "abuse.ch API",
        "description": "Ingest threat intelligence indicators from URL Haus, Malware Bazaar, and Threat Fox feeds with Elastic Agent.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.0 || ^9.1.0"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "threat_intel"
    ],
    "signature_path": "/epr/ti_abusech/ti_abusech-3.6.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "ti_abusech.ja3_fingerprints",
        "title": "JA3 Fingerprints"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.malware",
        "title": "Malware payloads"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.malwarebazaar",
        "title": "MalwareBazaar payloads"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.sslblacklist",
        "title": "SSL Blacklisted Certificates"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.threatfox",
        "title": "ThreatFox threat indicators"
      },
      {
        "type": "logs",
        "dataset": "ti_abusech.url",
        "title": "Malware URLs"
      }
    ]
  },
  {
    "name": "authentik",
    "title": "authentik",
    "version": "1.9.0",
    "release": "ga",
    "description": "Collect logs from authentik with Elastic Agent.",
    "type": "integration",
    "download": "/epr/authentik/authentik-1.9.0.zip",
    "path": "/package/authentik/1.9.0",
    "icons": [
      {
        "src": "/img/authentik-logo.svg",
        "path": "/package/authentik/1.9.0/img/authentik-logo.svg",
        "title": "authentik logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "authentik",
        "title": "authentik logs",
        "description": "Collect authentik logs.",
        "deployment_modes": {
          "default": {
            "enabled": true
          },
          "agentless": {
            "enabled": true
          }
        }
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.2 || ^9.0.5"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "iam"
    ],
    "signature_path": "/epr/authentik/authentik-1.9.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "authentik.event",
        "title": "authentik event logs"
      },
      {
        "type": "logs",
        "dataset": "authentik.group",
        "title": "authentik group logs"
      },
      {
        "type": "logs",
        "dataset": "authentik.user",
        "title": "authentik user logs"
      }
    ]
  },
  {
    "name": "blacklens",
    "title": "blacklens.io",
    "version": "1.0.1",
    "release": "ga",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "Collect logs from blacklens.io with Elastic Agent",
    "type": "integration",
    "download": "/epr/blacklens/blacklens-1.0.1.zip",
    "path": "/package/blacklens/1.0.1",
    "icons": [
      {
        "src": "/img/blacklens-logo.svg",
        "path": "/package/blacklens/1.0.1/img/blacklens-logo.svg",
        "title": "blacklens.io Logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "blacklens",
        "title": "blacklens.io logs",
        "description": "Collect blacklens.io logs"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.19.4 || ~9.0.7 || ^9.1.4"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "community",
      "github": "elastic/security-service-integrations"
    },
    "categories": [
      "security",
      "vulnerability_management"
    ],
    "signature_path": "/epr/blacklens/blacklens-1.0.1.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "blacklens.alerts",
        "title": "Collect blacklens.io Alerts"
      }
    ]
  },
  {
    "name": "etcd_otel",
    "title": "etcd OpenTelemetry Assets",
    "version": "0.1.0",
    "release": "beta",
    "source": {
      "license": "Elastic-2.0"
    },
    "description": "etcd Assets from OpenTelemetry Collector",
    "type": "content",
    "download": "/epr/etcd_otel/etcd_otel-0.1.0.zip",
    "path": "/package/etcd_otel/0.1.0",
    "icons": [
      {
        "src": "/img/etcd_otel.svg",
        "path": "/package/etcd_otel/0.1.0/img/etcd_otel.svg",
        "title": "etcd OpenTelemetry logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^9.2.1"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/obs-infraobs-integrations"
    },
    "categories": [
      "observability",
      "datastore",
      "opentelemetry"
    ],
    "signature_path": "/epr/etcd_otel/etcd_otel-0.1.0.zip.sig",
    "discovery": {
      "datasets": [
        {
          "name": "etcd.otel"
        }
      ]
    }
  },
  {
    "name": "macos",
    "title": "macOS Security Events",
    "version": "1.0.0",
    "release": "ga",
    "description": "Collect logs from macOS with Elastic Agent.",
    "type": "integration",
    "download": "/epr/macos/macos-1.0.0.zip",
    "path": "/package/macos/1.0.0",
    "icons": [
      {
        "src": "/img/macos-logo.svg",
        "path": "/package/macos/1.0.0/img/macos-logo.svg",
        "title": "macOS Security Events logo",
        "size": "32x32",
        "type": "image/svg+xml"
      }
    ],
    "policy_templates": [
      {
        "name": "macos",
        "title": "macOS Security Events",
        "description": "Collect logs from macOS Security Events."
      }
    ],
    "conditions": {
      "kibana": {
        "version": "^8.18.0 || ^9.0.0"
      },
      "elastic": {
        "subscription": "basic"
      }
    },
    "owner": {
      "type": "elastic",
      "github": "elastic/sec-windows-platform"
    },
    "categories": [
      "security"
    ],
    "signature_path": "/epr/macos/macos-1.0.0.zip.sig",
    "data_streams": [
      {
        "type": "logs",
        "dataset": "macos.advanced_monitoring",
        "title": "Advanced Monitoring"
      },
      {
        "type": "logs",
        "dataset": "macos.authentication",
        "title": "Authentication"
      },
      {
        "type": "logs",
        "dataset": "macos.file_read_write",
        "title": "File Read/Write"
      },
      {
        "type": "logs",
        "dataset": "macos.network_activity",
        "title": "Network Activity"
      },
      {
        "type": "logs",
        "dataset": "macos.process_execution_monitoring",
        "title": "Process Execution Monitoring"
      },
      {
        "type": "logs",
        "dataset": "macos.system_change",
        "title": "System Changes"
      },
      {
        "type": "logs",
        "dataset": "macos.user_and_account_management",
        "title": "User and Account Management"
      }
    ]
  }
]
