From f5384cfd0e8354f9e4b94db814655570b872d7ea Mon Sep 17 00:00:00 2001 From: Riya Saxena Date: Mon, 18 Mar 2024 15:39:43 -0700 Subject: [PATCH] removing threatIntel related code Signed-off-by: Riya Saxena --- .../opensearch/securityanalytics/mapper/MapperRestApiIT.java | 2 -- 1 file changed, 2 deletions(-) diff --git a/src/test/java/org/opensearch/securityanalytics/mapper/MapperRestApiIT.java b/src/test/java/org/opensearch/securityanalytics/mapper/MapperRestApiIT.java index d7566a1da..4279e5e59 100644 --- a/src/test/java/org/opensearch/securityanalytics/mapper/MapperRestApiIT.java +++ b/src/test/java/org/opensearch/securityanalytics/mapper/MapperRestApiIT.java @@ -425,8 +425,6 @@ public void testGetMappingsViewWindowsSuccess() throws IOException { assert(!filteredUnmappedFieldAliases.contains("winlog.event_data.LogonType")); assert(!filteredUnmappedFieldAliases.contains("winlog.provider_name")); assert(!filteredUnmappedFieldAliases.contains("host.hostname")); - List> iocFieldsList = (List>) respMap.get(GetMappingsViewResponse.THREAT_INTEL_FIELD_ALIASES); - assertEquals(iocFieldsList.size(), 1); // Index a doc for a field with multiple raw fields corresponding to one ecs field indexDoc(testIndexName, "1", "{ \"EventID\": 1 }");