-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Alerting] POC for stack rules to use rule registry #98319
Comments
General thoughts after creating a POC for writing out alerts as data for stack rules using the rule registry: Solution level vs rule type level Cross-solution access to alerts Rule type factories Framework vs library |
Alerting framework possible improvements The |
Pinging @elastic/kibana-alerting-services (Team:Alerting Services) |
The way I see it, technical fields (e.g. alert id, uuid, rule id, duration, threshold, value, building block, etc) should be in the common schema. In some cases, solutions know the shape of the source data, so they can add mappings where they think it'll be useful. Mapped fields are easier to work with than runtime fields. For stack rules, but also for some solution rule types, we don't know upfront what the shape of the data is. I don't see another solution there currently but to use runtime fields. Ideally users can configure write targets at some point (e.g. write alert data from this rule into the security solution index, or into my own index), but that is not something we can easily do (RBAC, potential mapping conflicts).
Totally agree, hope we can figure out over the next few weeks what utilities should be shared and what is better off being handled by specific teams. |
Closing as POC for rules registry V1 is complete. Will open new issue for actually migrating stack rules to the rule data service. |
With the merging of the rules registry plugin, Alerting would like to explore how stack rules might work with the rules registry.
The text was updated successfully, but these errors were encountered: