Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Solution] Resolver, revert to default data view #121711

Merged
merged 2 commits into from
Dec 21, 2021

Conversation

stephmilovic
Copy link
Contributor

Summary

Resolves #120859

In the 8.0 sourcerer upgrade, we started getting the Resolver data view from the sourcerer.sourcererScopes.timeline.selectedPatterns and this introduced a bug. We used to get it from a mix of the default index patterns and the signals index. This is what the value of sourcerer.defaultDataView.patternList is. Therefore, in non-timeline Resolver views when the Timeline data view is changed to something like metrics-* that would not match any Resolver events, these views would break.

I added logic to only use the sourcerer.sourcererScopes.timeline.selectedPatterns when GraphOverlay isInTimeline=true and use the default data view patternList otherwise. However, there will still be a bug if a user makes an Endpoint rule for indices not in the default pattern. This bug existed prior to the 8.0 sourcerer upgrade, and due to holidays/feature freeze I will only be fixing the new bug introduced by the 8.0 sourcerer upgrade upgrade.

Checklist

Delete any items that are not applicable to this PR.

@stephmilovic stephmilovic added v8.0.0 release_note:skip Skip the PR/issue when compiling release notes Team:Threat Hunting Security Solution Threat Hunting Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. auto-backport Deprecated - use backport:version if exact versions are needed v8.1.0 Team:Threat Hunting:Explore labels Dec 20, 2021
@stephmilovic stephmilovic requested a review from a team as a code owner December 20, 2021 21:57
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-threat-hunting (Team:Threat Hunting)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@stephmilovic stephmilovic requested a review from a team December 20, 2021 21:57
Copy link
Contributor

@kqualters-elastic kqualters-elastic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

tested locally, works as before. lgtm 👍

@stephmilovic
Copy link
Contributor Author

@elasticmachine merge upstream

@kibana-ci
Copy link
Collaborator

💚 Build Succeeded

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
securitySolution 4.6MB 4.6MB +150.0B

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@kibanamachine
Copy link
Contributor

💚 Backport successful

Status Branch Result
8.0

This backport PR will be merged automatically after passing CI.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auto-backport Deprecated - use backport:version if exact versions are needed release_note:skip Skip the PR/issue when compiling release notes Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Threat Hunting:Explore Team:Threat Hunting Security Solution Threat Hunting Team v8.0.0 v8.1.0
Projects
None yet
5 participants