-
Notifications
You must be signed in to change notification settings - Fork 441
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security] Add security detection engine package #797
Conversation
💔 Build Failed
Expand to view the summary
Build stats
Test stats 🧪
Trends 🧪Steps errors
Expand to view the steps failures
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I didn't review JSON files, as I don't have domain knowledge here and can't verify them thoroughly.
Please merge the latest master to load the latest dependency on elastic-package (it should start accepting new Kibana types).
Before merging this PR we need to make sure the PR is green.
…ations into add-detection-rules-pkg
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
go.mod
Outdated
@@ -4,7 +4,7 @@ go 1.12 | |||
|
|||
require ( | |||
github.com/blang/semver v3.5.1+incompatible | |||
github.com/elastic/elastic-package v0.0.0-20210323050956-96ac7e929cae | |||
github.com/elastic/elastic-package v0.0.0-20210324160257-57698a40f3e3 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you pull this go mod change into a speparate PR?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I did it here: #804 (spotted also a different issue). Once it's merged, please rebase this PR against master.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Merged in master and confirmed the go changes are gone.
Thanks @mtojek
Hm... I spotted a weird issue:
Will investigate EDIT: It seems that there are few files that are not aligned with spec, I will fix them and also bump up the dependency on elastic-package. |
@rw-access Please rebase this branch again against the master branch. I merged the update on elastic-package, so above errors should disappear. |
Looking into a few more things first. Might need to change the underlying JSON format. |
* Add security detection engine package * Fix some lint errors * Format the package * Update version in the changelog * Update dependencies * Change the default owner for the detection engine package * Update go deps * Fix package-* dependencies * Change the security_rule structure to match other Kibana assets
What does this PR do?
Added an integration that contains
security_rule
assets to be used by the Detection Engine in Security. The core idea behind this effort is to use Fleet to update rules for the Detection Engine between releases. This way, users can get the latest released rules and package-relevant rules without needing to wait for the next stack release.See the "related issues" section or ping me for more context. I'll be happy to point to additional (internal) design docs and discussions.
Checklist
elastc-package
yet)I have verified that all data streams collect metrics or logs.changelog.yml
file.Author's Checklist
We've had a lot of conversations between teams, so I think we're in alignment. The name of the integration is TBD, and the specifics to install the
security_rule
asset type are also undecided.How to test this PR locally
There is a chicken-and-egg issue here. Since it contains a brand new asset type, Kibana doesn't yet know how to install it. So the package will be published first as a pre-release and once this merges and is added to package-storage, then we can start developing the Kibana side to install the package.
There will be more iteration as we go between all of the repositories.
Related issues
*elastic/package-spec#142: Add
security_rule
asset typeNOTICE.txt
fileScreenshots
None yet