Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Solution] Alternative mechanism for distributing prebuilt rules #187649

Open
Tracked by #179907
banderror opened this issue Jul 5, 2024 · 3 comments
Open
Tracked by #179907
Labels
Feature:Prebuilt Detection Rules Security Solution Prebuilt Detection Rules area needs product Team:Detection Rule Management Security Detection Rule Management Team Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.

Comments

@banderror
Copy link
Contributor

banderror commented Jul 5, 2024

Epics: https://github.com/elastic/security-team/issues/1974 (internal), #174168

NOTE: This might be converted to an epic when we have more understanding of the scope and requirements.

Summary

Recently we had an incident in Serverless where Kibana instances would crash with an OOM because of an installation of the security_detection_engine Fleet package that Security Solution uses to distribute prebuilt detection rules. Fleet loads whole packages into memory before installing their assets, and this package had become too big for that. The incident has been mitigated by temporarily decreasing the number of assets in the package by ~50%.

Mid-term measures for the 8.16 release cycle will be stream-based package installation and smart limits for it.

As a long-term measure, we should consider moving away from Fleet as a mechanism for distributing prebuilt rules. Such a mechanism should support Out-Of-Band rule updates decoupled from Kibana releases.

Ideas

  • A dedicated microservice for publishing and serving rule versions.
  • Git as a storage.
  • Git as a service.
  • Should be used by the TRADE team in https://github.com/elastic/detection-rules
  • Should be integrated with Detections as Code
  • We'll need to keep the Fleet-based mechanism in Kibana for backward compatibility
  • How do we support air-gapped environments?
@banderror banderror added triage_needed Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Detection Rule Management Security Detection Rule Management Team Feature:Prebuilt Detection Rules Security Solution Prebuilt Detection Rules area labels Jul 5, 2024
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detections-response (Team:Detections and Resp)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detection-rule-management (Team:Detection Rule Management)

@banderror banderror changed the title [Security Solution] Alternative mechanism for distributing prebuilt rules [Security Solution] Alternative mechanism for distributing prebuilt rules (DRAFT) Jul 5, 2024
@banderror banderror changed the title [Security Solution] Alternative mechanism for distributing prebuilt rules (DRAFT) [Security Solution] Alternative mechanism for distributing prebuilt rules Jul 5, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Feature:Prebuilt Detection Rules Security Solution Prebuilt Detection Rules area needs product Team:Detection Rule Management Security Detection Rule Management Team Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.
Projects
None yet
Development

No branches or pull requests

2 participants