[Security] Add security detection engine package#797
[Security] Add security detection engine package#797rw-access merged 14 commits intoelastic:masterfrom rw-access:add-detection-rules-pkg
Conversation
💔 Build Failed
Expand to view the summary
Build stats
Test stats 🧪
Trends 🧪Steps errors
Expand to view the steps failures
|
mtojek
left a comment
There was a problem hiding this comment.
I didn't review JSON files, as I don't have domain knowledge here and can't verify them thoroughly.
Please merge the latest master to load the latest dependency on elastic-package (it should start accepting new Kibana types).
Before merging this PR we need to make sure the PR is green.
…ations into add-detection-rules-pkg
| require ( | ||
| github.com/blang/semver v3.5.1+incompatible | ||
| github.com/elastic/elastic-package v0.0.0-20210323050956-96ac7e929cae | ||
| github.com/elastic/elastic-package v0.0.0-20210324160257-57698a40f3e3 |
There was a problem hiding this comment.
Could you pull this go mod change into a speparate PR?
There was a problem hiding this comment.
I did it here: #804 (spotted also a different issue). Once it's merged, please rebase this PR against master.
There was a problem hiding this comment.
Merged in master and confirmed the go changes are gone.
Thanks @mtojek
|
Hm... I spotted a weird issue: Will investigate EDIT: It seems that there are few files that are not aligned with spec, I will fix them and also bump up the dependency on elastic-package. |
|
@rw-access Please rebase this branch again against the master branch. I merged the update on elastic-package, so above errors should disappear. |
|
Looking into a few more things first. Might need to change the underlying JSON format. |
What does this PR do?
Added an integration that contains
security_ruleassets to be used by the Detection Engine in Security. The core idea behind this effort is to use Fleet to update rules for the Detection Engine between releases. This way, users can get the latest released rules and package-relevant rules without needing to wait for the next stack release.See the "related issues" section or ping me for more context. I'll be happy to point to additional (internal) design docs and discussions.
Checklist
elastc-packageyet)I have verified that all data streams collect metrics or logs.changelog.ymlfile.Author's Checklist
We've had a lot of conversations between teams, so I think we're in alignment. The name of the integration is TBD, and the specifics to install the
security_ruleasset type are also undecided.How to test this PR locally
There is a chicken-and-egg issue here. Since it contains a brand new asset type, Kibana doesn't yet know how to install it. So the package will be published first as a pre-release and once this merges and is added to package-storage, then we can start developing the Kibana side to install the package.
There will be more iteration as we go between all of the repositories.
Related issues
*elastic/package-spec#142: Add
security_ruleasset typeNOTICE.txtfileScreenshots
None yet