-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
adds an 'owner' field to the siem-signals mapping, working authz get for security solution, need to work through rule registry changes #98746
Conversation
… include space id in constructor rather than parameter as a part of the get since the spaceId will be available to us in the start phase of the plugin
… and adds some rac client functions to be implemented (#3) * wip - ignore * adds rac client initialization to plugin setup / startup and adds scaffolding for CRUD client functions Co-authored-by: Yara Tercero <[email protected]>
…g from alerts to rac
…, used no-verify for this commit
…ed to rac feature in plugin feature registry
…ould be able to query for data but getting back 403 for internal user
…adds an audit logger mock
…e log statements, added security as a required plugin to rule_registry plugin without which, the rac authorization class was receiving an undefined security client so our calls to shouldCheckAuthorization were failing silently. Added some routes and scripts to test authz functionality. To test please see the README in the rule_registry/scripts.
…for security solution, need to work through rule registry changes
💔 Build Failed
Failed CI Steps
Test FailuresKibana Pipeline / jest / Jest Tests.x-pack/plugins/security_solution/server/lib/detection_engine/signals.searchAfterAndBulkCreate should return success with number of searches less than max signalsStandard Out
Stack Trace
Kibana Pipeline / jest / Jest Tests.x-pack/plugins/security_solution/server/lib/detection_engine/signals.searchAfterAndBulkCreate should return success with number of searches less than max signals with gapStandard Out
Stack Trace
Kibana Pipeline / jest / Jest Tests.x-pack/plugins/security_solution/server/lib/detection_engine/signals.searchAfterAndBulkCreate should return success when no search results are in the allowlistStandard Out
Stack Trace
and 39 more failures, only showing the first 3. Metrics [docs]Public APIs missing comments
Async chunks
Public APIs missing exports
Page load bundle
Unknown metric groupsAPI count
To update your PR or re-run it, just comment with: |
adds an 'owner' field to the siem-signals mapping, working authz get for security solution, need to work through rule registry changes
Summary
Pull down this branch and run ES locally using the following steps..
Running ES locally
gradle/run.gradle
and add setting'xpack.security.authc.api_key.enabled', 'true'
after line 24kibana_elastic
userkibana.dev.yml
to usekibana_elastic
as the userStart up kibana
You should now be able to create a rule which generates alerts and then "find" those alerts (using the kibana system user) using the scripts located in
x-pack/plugins/rule_registry/server/scripts/get_security_solution_alert.sh