Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Solution] Exclude frozen tier nodes from detection rule queries #158495

Closed
banderror opened this issue May 25, 2023 · 3 comments
Closed
Assignees
Labels
discuss Feature:Detection Rules Security Solution rules and Detection Engine needs product Team:Detection Engine Security Solution Detection Engine Area Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. triage_needed

Comments

@banderror
Copy link
Contributor

Summary

Some of our users have had issues with detection rules hitting data_frozen Elasticsearch nodes. This is usually accompanied by spikes in CPU usage and rule execution duration (rules become slow).

We should explicitly disallow rules to query frozen tier nodes, or explicitly allow to query only hot (+ maybe warm) tier. This can be achieved by including a filter by the _tier field into all queries initiated by any detection rules:

https://www.elastic.co/guide/en/elasticsearch/reference/current/mapping-tier-field.html

Options

Option 1: non-configurable behavior

One option is to implement this filtering under the hood without letting the user change this behavior.

Option 2: configurable behavior

Another option would be to introduce a new tiers rule parameter which could be shown in the "advanced rule settings" section on the Creation and Editing pages. This would be an array of strings with the following allowed values: data_hot, data_warm, data_cold, and data_frozen. The default value would be ['data_hot'] or ['data_hot', 'data_warm']. The user would be able to change this setting per rule.

In addition, we could have an advanced Kibana setting for letting the user change this default value. Changing it would allow them to have a different default value when a new rule gets created.

cc @yctercero @marshallmain @peluja1012 @approksiu

@banderror banderror added discuss triage_needed Feature:Detection Rules Security Solution rules and Detection Engine Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. needs product Team:Detection Engine Security Solution Detection Engine Area labels May 25, 2023
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detections-response (Team:Detections and Resp)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@yctercero
Copy link
Contributor

Closing this as a duplicate of #130517

Definitely worth discussing to at least get designs and requirements going.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
discuss Feature:Detection Rules Security Solution rules and Detection Engine needs product Team:Detection Engine Security Solution Detection Engine Area Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. triage_needed
Projects
None yet
Development

No branches or pull requests

3 participants