Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Solution] [Detections] [Platform] Expose _tier in the Security Solution #130517

Open
2 tasks
Tracked by #165878
dhurley14 opened this issue Apr 19, 2022 · 5 comments
Open
2 tasks
Tracked by #165878
Labels
8.10 candidate 8.15 candidate consider-next enhancement New value added to drive a business result Feature:Detection Rules Security Solution rules and Detection Engine Feature:Hosts Security Solution Hosts feature Feature:Network Security Solutions Network feature Feature:SecurityOverview Security Solution Overview feature Feature:Timeline Security Solution Timeline feature Team:Detection Engine Security Solution Detection Engine Area Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.

Comments

@dhurley14
Copy link
Contributor

Currently (versions <= 8.1), if users want to segment data in the security solution between the different data tiers they have to rely on index aliases. By exposing the _tier field in queries executed in the security solution, we can better provide users with finer-grained controls when searching for alerts and associated source events from hot,warm,cold,frozen nodes.

This issue will serve as a reference as work progresses towards this goal.

TODO:

  1. Update the UI for rules to accept tiers from which to include in the given rules execution
  2. Update sourcerer to include a tier selection for queries executed against a given data view.
@dhurley14 dhurley14 added triage_needed enhancement New value added to drive a business result Feature:Detection Rules Security Solution rules and Detection Engine Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Feature:Timeline Security Solution Timeline feature Feature:Hosts Security Solution Hosts feature Feature:Network Security Solutions Network feature Feature:SecurityOverview Security Solution Overview feature Team:Security Solution Platform Security Solution Platform Team labels Apr 19, 2022
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@dhurley14 dhurley14 added the Team:Detection Alerts Security Detection Alerts Area Team label Oct 5, 2022
@yctercero yctercero added Team:Detection Engine Security Solution Detection Engine Area and removed Team:Detection Alerts Security Detection Alerts Area Team Team:Security Solution Platform Security Solution Platform Team labels May 13, 2023
@yctercero
Copy link
Contributor

Note that @banderror mentioned this issue here #158495

Closed that one as duplicate.

@s-abdelwahhab
Copy link

Any updates about this please?

@yctercero
Copy link
Contributor

Hi @s-abdelwahhab ! When we were initially discussing this issue we were trying to figure out if adding a _tier filter could help avoid EQL query rules from querying frozen tiers during the pre-search phase. It was determined that such a filter, even if exposed, would not be applied in that instance.

If you're able to, would love to understand your use case here.

@marshallmain
Copy link
Contributor

Customer in https://discuss.elastic.co/t/coordinating-nodes-high-circuit-breaker-tripped-counts/344161/11 also suggested an option to filter on _tier to deal with queries hitting the frozen tier due to future timestamps. In the thread, a number of prebuilt new terms and EQL sequence rules time out due to frozen tier nodes and future timestamps. Disabling fallback to @timestamp fixes the issue, but a filter on _tier also improves performance without having to disable fallback.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
8.10 candidate 8.15 candidate consider-next enhancement New value added to drive a business result Feature:Detection Rules Security Solution rules and Detection Engine Feature:Hosts Security Solution Hosts feature Feature:Network Security Solutions Network feature Feature:SecurityOverview Security Solution Overview feature Feature:Timeline Security Solution Timeline feature Team:Detection Engine Security Solution Detection Engine Area Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.
Projects
None yet
Development

No branches or pull requests

5 participants