-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security Solution][Detections][Meta] Modularize the Detection Engine #93550
Labels
Feature:Detection Alerts
Security Solution Detection Alerts Feature
Meta
refactoring
Team:Detections and Resp
Security Detection Response Team
Team: SecuritySolution
Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.
Theme: rac
label obsolete
v7.13.0
Comments
spong
added
refactoring
Team:Detections and Resp
Security Detection Response Team
Team: SecuritySolution
Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.
Feature:Detection Alerts
Security Solution Detection Alerts Feature
v7.13.0
Theme: rac
label obsolete
labels
Mar 4, 2021
Pinging @elastic/security-solution (Team: SecuritySolution) |
Pinging @elastic/security-detections-response (Team:Detections and Resp) |
19 tasks
Merged
4 tasks
Next refactoring steps:
|
Additional step:
|
Gap remediation working branch: https://github.com/elastic/kibana/compare/master...madirey:rac-gap-remediation?expand=1 |
Next steps:
|
11 tasks
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Feature:Detection Alerts
Security Solution Detection Alerts Feature
Meta
refactoring
Team:Detections and Resp
Security Detection Response Team
Team: SecuritySolution
Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.
Theme: rac
label obsolete
v7.13.0
This is the meta ticket for tracking the modularization of the Detection Engine. The below is our first steps in supporting RAC (Rules/Alerts/Cases) everywhere, and all efforts are still open for discussion. 🙂
High level feature-sets
Exceptions
Within the main executor, the exceptions logic can be specific to certain rule types (e.g.
createThreatSignals()
&buildEqlSearchRequest()
), added generically as anesFilter
pre-query (threshold rules), or applied as a post-filter (e.g.filterEventsAgainstList()
for ML rules).Alert De-duplication
The alert de-duplication logic currently lives within single_bulk_create, and signal_rule_alert_type for EQL rules.
Gap Detection Remediation
Lives within signal_rule_alert_type and is injected into each rule type logic so they can perform the desired searches over the calculated gaps.
Monitoring Efforts
Removal of side-car SO for Rule Execution monitoring in favor of leveraging the Alerting
Event Log
#94143Task Breakdown
Potential additional efforts:
Move eventsTelemetry logic out of searchAfterBulkCreate and up to top level so we get telemetry for all rule types(low priority)Reference docs (internal):
The text was updated successfully, but these errors were encountered: