Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Solution] [Detections] EQL rule cannot be created #80126

Closed
MadameSheema opened this issue Oct 12, 2020 · 7 comments
Closed

[Security Solution] [Detections] EQL rule cannot be created #80126

MadameSheema opened this issue Oct 12, 2020 · 7 comments
Assignees
Labels
bug Fixes for quality problems that affect the customer experience fixed impact:critical This issue should be addressed immediately due to a critical level of impact on the product. Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:SIEM v7.10.0

Comments

@MadameSheema
Copy link
Member

Kibana version:

  • 7.10.0 BC1

Elasticsearch version:

  • 7.10.0 BC1

Describe the bug:
EQL rule cannot be created because of a problem with the validator.

Steps to reproduce:

  1. Navigate to Security > Detections
  2. Click on Manage detection rules
  3. Click on Create new rule
  4. Select "Event Correlation"
  5. Enter a valid EQL query, i.e. process where process.name == "smss.exe"

Current behaviour:
Screenshot 2020-10-12 at 11 52 27

Screenshot 2020-10-12 at 11 52 54

Expected behavior:

  • No error is displayed
  • The rule can be created
@MadameSheema MadameSheema added bug Fixes for quality problems that affect the customer experience Team:SIEM impact:critical This issue should be addressed immediately due to a critical level of impact on the product. v7.10.0 Team:Detections and Resp Security Detection Response Team labels Oct 12, 2020
@elasticmachine
Copy link
Contributor

Pinging @elastic/siem (Team:SIEM)

@rylnd
Copy link
Contributor

rylnd commented Oct 12, 2020

This is caused by the behavior described in elastic/elasticsearch#63295. While we were previously able to use allow_no_indices=true as a workaround, elastic/elasticsearch#63192 made the use of this option invalid.

@rylnd
Copy link
Contributor

rylnd commented Oct 13, 2020

elastic/elasticsearch#63573 should be the fix, here, with no modifications necessary on the kibana side. However, it looks like that was not backported to the 7.10 branch, so I've opened that backport here: elastic/elasticsearch#63645

@rylnd
Copy link
Contributor

rylnd commented Oct 14, 2020

elastic/elasticsearch#63645 has been merged, and I've got #80440 ready in anticipation of the next ES snapshot. This should be fixed in the upcoming BC2, and on master whenever the snapshot is released.

@MindyRS MindyRS added the Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. label Oct 15, 2020
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security Solution)

@rylnd
Copy link
Contributor

rylnd commented Oct 16, 2020

I've verified this fix in BC2; labeling this as such and assigning to @MadameSheema for verification/closure. However, another bug prevents a majority of rule executions from succeeding, and is tracked in #80924.

@ghost
Copy link

ghost commented Nov 24, 2020

Bug Conversion:

Updated 01 Test-Case for this Ticket

Thanks

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Fixes for quality problems that affect the customer experience fixed impact:critical This issue should be addressed immediately due to a critical level of impact on the product. Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:SIEM v7.10.0
Projects
None yet
Development

No branches or pull requests

4 participants