Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[8.16] [Security Solution] [Attack discovery] Updates default Attack discovery max alerts for users still using legacy models (#196939) #196959

Merged
merged 1 commit into from
Oct 18, 2024

Conversation

kibanamachine
Copy link
Contributor

Backport

This will backport the following commits from main to 8.16:

Questions ?

Please refer to the Backport tool documentation

…ry max alerts for users still using legacy models (elastic#196939)

### [Security Solution] [Attack discovery] Updates default Attack discovery max alerts for users still using legacy models

In consideration of users still using legacy models, (e.g. GPT-4 instead of GPT-4o), this PR updates `DEFAULT_ATTACK_DISCOVERY_MAX_ALERTS` from its previous value `200` in <elastic#195669> to `100`.

This PR also includes additional tests.

## Desk testing

1) Navigate to Security > Attack discovery

2) Click the settings gear

3) Select any value above or below `100` in the Alerts range slider

4) Click `Reset`

**Expected result**

- The range slider resets to `100`

(cherry picked from commit 96585a5)
@kibanamachine kibanamachine merged commit b80bc62 into elastic:8.16 Oct 18, 2024
33 checks passed
@elasticmachine
Copy link
Contributor

💛 Build succeeded, but was flaky

Failed CI Steps

Test Failures

  • [job] [logs] FTR Configs #13 / Spaces app (with solution view) space solution tour solution tour does not show the solution tour after deleting spaces and leave only the default

Metrics [docs]

✅ unchanged

cc @andrew-goldstein

andrew-goldstein added a commit that referenced this pull request Oct 24, 2024
…iscovery max alerts for users still using legacy models (#196939) (#197554)

# Backport

This will backport the following commits from `main` to `8.x`:
- [[Security Solution] [Attack discovery] Updates default Attack
discovery max alerts for users still using legacy models
(#196939)](#196939)

<!--- Backport version: 8.9.8 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sqren/backport)

<!--BACKPORT [{"author":{"name":"Andrew
Macri","email":"[email protected]"},"sourceCommit":{"committedDate":"2024-10-18T21:06:55Z","message":"[Security
Solution] [Attack discovery] Updates default Attack discovery max alerts
for users still using legacy models (#196939)\n\n### [Security Solution]
[Attack discovery] Updates default Attack discovery max alerts for users
still using legacy models\r\n\r\nIn consideration of users still using
legacy models, (e.g. GPT-4 instead of GPT-4o), this PR updates
`DEFAULT_ATTACK_DISCOVERY_MAX_ALERTS` from its previous value `200` in
<#195669> to `100`.\r\n\r\nThis PR
also includes additional tests.\r\n\r\n## Desk testing\r\n\r\n1)
Navigate to Security > Attack discovery\r\n\r\n2) Click the settings
gear\r\n\r\n3) Select any value above or below `100` in the Alerts range
slider\r\n\r\n4) Click `Reset`\r\n\r\n**Expected result**\r\n\r\n- The
range slider resets to
`100`","sha":"96585a540b2c5c717ecaf1f71cc2f6f69b4378f5","branchLabelMapping":{"^v9.0.0$":"main","^v8.17.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","v9.0.0","Team:
SecuritySolution","Team:Security Generative
AI","v8.16.0","backport:version"],"number":196939,"url":"https://github.com/elastic/kibana/pull/196939","mergeCommit":{"message":"[Security
Solution] [Attack discovery] Updates default Attack discovery max alerts
for users still using legacy models (#196939)\n\n### [Security Solution]
[Attack discovery] Updates default Attack discovery max alerts for users
still using legacy models\r\n\r\nIn consideration of users still using
legacy models, (e.g. GPT-4 instead of GPT-4o), this PR updates
`DEFAULT_ATTACK_DISCOVERY_MAX_ALERTS` from its previous value `200` in
<#195669> to `100`.\r\n\r\nThis PR
also includes additional tests.\r\n\r\n## Desk testing\r\n\r\n1)
Navigate to Security > Attack discovery\r\n\r\n2) Click the settings
gear\r\n\r\n3) Select any value above or below `100` in the Alerts range
slider\r\n\r\n4) Click `Reset`\r\n\r\n**Expected result**\r\n\r\n- The
range slider resets to
`100`","sha":"96585a540b2c5c717ecaf1f71cc2f6f69b4378f5"}},"sourceBranch":"main","suggestedTargetBranches":[],"targetPullRequestStates":[{"branch":"main","label":"v9.0.0","labelRegex":"^v9.0.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/196939","number":196939,"mergeCommit":{"message":"[Security
Solution] [Attack discovery] Updates default Attack discovery max alerts
for users still using legacy models (#196939)\n\n### [Security Solution]
[Attack discovery] Updates default Attack discovery max alerts for users
still using legacy models\r\n\r\nIn consideration of users still using
legacy models, (e.g. GPT-4 instead of GPT-4o), this PR updates
`DEFAULT_ATTACK_DISCOVERY_MAX_ALERTS` from its previous value `200` in
<#195669> to `100`.\r\n\r\nThis PR
also includes additional tests.\r\n\r\n## Desk testing\r\n\r\n1)
Navigate to Security > Attack discovery\r\n\r\n2) Click the settings
gear\r\n\r\n3) Select any value above or below `100` in the Alerts range
slider\r\n\r\n4) Click `Reset`\r\n\r\n**Expected result**\r\n\r\n- The
range slider resets to
`100`","sha":"96585a540b2c5c717ecaf1f71cc2f6f69b4378f5"}},{"branch":"8.16","label":"v8.16.0","labelRegex":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"url":"https://github.com/elastic/kibana/pull/196959","number":196959,"state":"MERGED","mergeCommit":{"sha":"b80bc6235d28d0ff88b8defa80754e26a65169b5","message":"[8.16]
[Security Solution] [Attack discovery] Updates default Attack discovery
max alerts for users still using legacy models (#196939) (#196959)\n\n#
Backport\n\nThis will backport the following commits from `main` to
`8.16`:\n- [[Security Solution] [Attack discovery] Updates default
Attack\ndiscovery max alerts for users still using legacy
models\n(#196939)](https://github.com/elastic/kibana/pull/196939)\n\n<!---
Backport version: 9.4.3 -->\n\n### Questions ?\nPlease refer to the
[Backport
tool\ndocumentation](https://github.com/sqren/backport)\n\n<!--BACKPORT
[{\"author\":{\"name\":\"Andrew\nMacri\",\"email\":\"[email protected]\"},\"sourceCommit\":{\"committedDate\":\"2024-10-18T21:06:55Z\",\"message\":\"[Security\nSolution]
[Attack discovery] Updates default Attack discovery max alerts\nfor
users still using legacy models (#196939)\\n\\n### [Security
Solution]\n[Attack discovery] Updates default Attack discovery max
alerts for users\nstill using legacy models\\r\\n\\r\\nIn consideration
of users still using\nlegacy models, (e.g. GPT-4 instead of GPT-4o),
this PR updates\n`DEFAULT_ATTACK_DISCOVERY_MAX_ALERTS` from its previous
value `200` in\n<#195669> to
`100`.\\r\\n\\r\\nThis PR\nalso includes additional tests.\\r\\n\\r\\n##
Desk testing\\r\\n\\r\\n1)\nNavigate to Security > Attack
discovery\\r\\n\\r\\n2) Click the settings\ngear\\r\\n\\r\\n3) Select
any value above or below `100` in the Alerts range\nslider\\r\\n\\r\\n4)
Click `Reset`\\r\\n\\r\\n**Expected result**\\r\\n\\r\\n- The\nrange
slider resets
to\n`100`\",\"sha\":\"96585a540b2c5c717ecaf1f71cc2f6f69b4378f5\",\"branchLabelMapping\":{\"^v9.0.0$\":\"main\",\"^v8.17.0$\":\"8.x\",\"^v(\\\\d+).(\\\\d+).\\\\d+$\":\"$1.$2\"}},\"sourcePullRequest\":{\"labels\":[\"release_note:skip\",\"v9.0.0\",\"Team:\nSecuritySolution\",\"Team:Security
Generative\nAI\",\"v8.16.0\",\"backport:version\"],\"title\":\"[Security
Solution] [Attack\ndiscovery] Updates default Attack discovery max
alerts for users still\nusing
legacy\nmodels\",\"number\":196939,\"url\":\"https://github.com/elastic/kibana/pull/196939\",\"mergeCommit\":{\"message\":\"[Security\nSolution]
[Attack discovery] Updates default Attack discovery max alerts\nfor
users still using legacy models (#196939)\\n\\n### [Security
Solution]\n[Attack discovery] Updates default Attack discovery max
alerts for users\nstill using legacy models\\r\\n\\r\\nIn consideration
of users still using\nlegacy models, (e.g. GPT-4 instead of GPT-4o),
this PR updates\n`DEFAULT_ATTACK_DISCOVERY_MAX_ALERTS` from its previous
value `200` in\n<#195669> to
`100`.\\r\\n\\r\\nThis PR\nalso includes additional tests.\\r\\n\\r\\n##
Desk testing\\r\\n\\r\\n1)\nNavigate to Security > Attack
discovery\\r\\n\\r\\n2) Click the settings\ngear\\r\\n\\r\\n3) Select
any value above or below `100` in the Alerts range\nslider\\r\\n\\r\\n4)
Click `Reset`\\r\\n\\r\\n**Expected result**\\r\\n\\r\\n- The\nrange
slider resets
to\n`100`\",\"sha\":\"96585a540b2c5c717ecaf1f71cc2f6f69b4378f5\"}},\"sourceBranch\":\"main\",\"suggestedTargetBranches\":[\"8.16\"],\"targetPullRequestStates\":[{\"branch\":\"main\",\"label\":\"v9.0.0\",\"branchLabelMappingKey\":\"^v9.0.0$\",\"isSourceBranch\":true,\"state\":\"MERGED\",\"url\":\"https://github.com/elastic/kibana/pull/196939\",\"number\":196939,\"mergeCommit\":{\"message\":\"[Security\nSolution]
[Attack discovery] Updates default Attack discovery max alerts\nfor
users still using legacy models (#196939)\\n\\n### [Security
Solution]\n[Attack discovery] Updates default Attack discovery max
alerts for users\nstill using legacy models\\r\\n\\r\\nIn consideration
of users still using\nlegacy models, (e.g. GPT-4 instead of GPT-4o),
this PR updates\n`DEFAULT_ATTACK_DISCOVERY_MAX_ALERTS` from its previous
value `200` in\n<#195669> to
`100`.\\r\\n\\r\\nThis PR\nalso includes additional tests.\\r\\n\\r\\n##
Desk testing\\r\\n\\r\\n1)\nNavigate to Security > Attack
discovery\\r\\n\\r\\n2) Click the settings\ngear\\r\\n\\r\\n3) Select
any value above or below `100` in the Alerts range\nslider\\r\\n\\r\\n4)
Click `Reset`\\r\\n\\r\\n**Expected result**\\r\\n\\r\\n- The\nrange
slider resets
to\n`100`\",\"sha\":\"96585a540b2c5c717ecaf1f71cc2f6f69b4378f5\"}},{\"branch\":\"8.16\",\"label\":\"v8.16.0\",\"branchLabelMappingKey\":\"^v(\\\\d+).(\\\\d+).\\\\d+$\",\"isSourceBranch\":false,\"state\":\"NOT_CREATED\"}]}]\nBACKPORT-->\n\nCo-authored-by:
Andrew Macri <[email protected]>"}}]}] BACKPORT-->
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants