Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Attack Discovery][Scheduling] Attack Discovery scheduling rule management (#12003) #216656

Open
wants to merge 4 commits into
base: main
Choose a base branch
from

Conversation

e40pud
Copy link
Contributor

@e40pud e40pud commented Apr 1, 2025

Summary

Main ticket (Internal link)

To allow users to schedule Attack Discovery generations, we will use either Alerting Framework. These changes add functionality to manage new alerts type - Attack Discovery Schedule.

Introduced endpoints

  • Create AD scheduling rule route: POST /internal/elastic_assistant/attack_discovery/schedules
  • Read/Get AD scheduling rule by id route: GET /internal/elastic_assistant/attack_discovery/schedules/{id}
  • Update AD scheduling rule by id route: PUT /internal/elastic_assistant/attack_discovery/schedules/{id}
  • Delete AD scheduling rule by id route: DELETE /internal/elastic_assistant/attack_discovery/schedules/{id}
  • Enable AD scheduling rule by id route: PUT /internal/elastic_assistant/attack_discovery/schedules/{id}/_enable
  • Disable AD scheduling rule by id route: PUT /internal/elastic_assistant/attack_discovery/schedules/{id}/_disable
  • Find all existing AD scheduling rules route: GET /internal/elastic_assistant/attack_discovery/schedules/_find

NOTES

The feature is hidden behind the feature flag:

xpack.securitySolution.enableExperimental: ['assistantAttackDiscoverySchedulingEnabled']

cURL examples

Create AD scheduling rule route
curl --location 'http://localhost:5601/internal/elastic_assistant/attack_discovery/schedules' \
--header 'kbn-xsrf: true' \
--header 'elastic-api-version: 1' \
--header 'x-elastic-internal-origin: security-solution' \
--header 'Content-Type: application/json' \
--data '{
    "name": "Test Schedule",
    "schedule": {
        "interval": "10m"
    },
    "params": {
        "alertsIndexPattern": ".alerts-security.alerts-default",
        "apiConfig": {
            "connectorId": "gpt-4o",
            "actionTypeId": ".gen-ai"
        },
        "end": "now",
        "size": 100,
        "start": "now-24h"
    }
}'
Read/Get AD scheduling rule by id route
curl --location 'http://localhost:5601/internal/elastic_assistant/attack_discovery/schedules/{id}' \
--header 'kbn-xsrf: true' \
--header 'elastic-api-version: 1' \
--header 'x-elastic-internal-origin: security-solution'
Update AD scheduling rule by id route
curl --location --request PUT 'http://localhost:5601/internal/elastic_assistant/attack_discovery/schedules/{id}' \
--header 'kbn-xsrf: true' \
--header 'elastic-api-version: 1' \
--header 'x-elastic-internal-origin: security-solution' \
--header 'Content-Type: application/json' \
--data '{
    "name": "Test Schedule - Updated",
    "schedule": {
        "interval": "123m"
    },
    "params": {
        "alertsIndexPattern": ".alerts-security.alerts-default",
        "apiConfig": {
            "connectorId": "gpt-4o",
            "actionTypeId": ".gen-ai"
        },
        "end": "now",
        "size": 35,
        "start": "now-24h"
    },
    "actions": []
}'
Delete AD scheduling rule by id route
curl --location --request DELETE 'http://localhost:5601/internal/elastic_assistant/attack_discovery/schedules/{id}' \
--header 'kbn-xsrf: true' \
--header 'elastic-api-version: 1' \
--header 'x-elastic-internal-origin: security-solution'
Enable AD scheduling rule by id route
curl --location --request PUT 'http://localhost:5601/internal/elastic_assistant/attack_discovery/schedules/{id}/_enable' \
--header 'kbn-xsrf: true' \
--header 'elastic-api-version: 1' \
--header 'x-elastic-internal-origin: security-solution'
Disable AD scheduling rule by id route
curl --location --request PUT 'http://localhost:5601/internal/elastic_assistant/attack_discovery/schedules/{id}/_disable' \
--header 'kbn-xsrf: true' \
--header 'elastic-api-version: 1' \
--header 'x-elastic-internal-origin: security-solution'
Find all existing AD scheduling rules route
curl --location 'http://localhost:5601/internal/elastic_assistant/attack_discovery/schedules/_find' \
--header 'kbn-xsrf: true' \
--header 'elastic-api-version: 1' \
--header 'x-elastic-internal-origin: security-solution'

@e40pud e40pud added release_note:skip Skip the PR/issue when compiling release notes Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Security Generative AI Security Generative AI backport:version Backport to applied version labels v9.1.0 v8.19.0 labels Apr 1, 2025
@e40pud e40pud requested a review from andrew-goldstein April 1, 2025 13:52
@e40pud e40pud self-assigned this Apr 1, 2025
@e40pud e40pud marked this pull request as ready for review April 1, 2025 13:52
@e40pud e40pud requested review from a team as code owners April 1, 2025 13:52
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@@ -35,6 +43,10 @@ export const getAttackDiscoveryBaseKibanaFeature = (): BaseKibanaFeatureConfig =
all: [],
read: [],
},
alerting: {
Copy link
Contributor Author

@e40pud e40pud Apr 1, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@e40pud e40pud requested a review from a team as a code owner April 1, 2025 15:40
@e40pud e40pud requested a review from a team as a code owner April 1, 2025 18:34
expect(geoPointFieldStats.count).to.be(55);
expect(geoPointFieldStats.index_count).to.be(12);
expect(geoPointFieldStats.count).to.be(63);
expect(geoPointFieldStats.index_count).to.be(13);
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Updated because we added a new attack discovery alerts aad index that maps the ecs fields. Similarly to this https://github.com/elastic/kibana/pull/194322/files#r1781620194 and this https://github.com/elastic/kibana/pull/184541/files#r1628183656.

Copy link
Contributor

@nreese nreese left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

kibana-presentation integration test assertion update changes LGTM
code review only

@elasticmachine
Copy link
Contributor

💛 Build succeeded, but was flaky

Failed CI Steps

Test Failures

  • [job] [logs] Jest Tests #16 / Event filter form Details and Conditions should change description

Metrics [docs]

Module Count

Fewer modules leads to a faster build time

id before after diff
automaticImport 726 729 +3
securitySolution 7170 7173 +3
total +6

Public APIs missing comments

Total count of every public API that lacks a comment. Target amount is 0. Run node scripts/build_api_docs --plugin [yourplugin] --stats comments for more detailed information.

id before after diff
@kbn/elastic-assistant-common 437 493 +56
elasticAssistant 44 46 +2
total +58
Unknown metric groups

API count

id before after diff
@kbn/elastic-assistant-common 510 578 +68
elasticAssistant 60 62 +2
total +70

History

cc @e40pud

@@ -89,6 +90,13 @@ export class ElasticAssistantPlugin

registerRoutes(router, this.logger, this.getElserId);

// Register Attack Discovery Schedule type
plugins.alerting.registerType(
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider migrating to the featureFlags service. It's available in the plugin setup lifecycle (with a little bit of 🪄 ):

  public setup(
    core: ElasticAssistantPluginCoreSetupDependencies,
    plugins: ElasticAssistantPluginSetupDependencies
  ) {
    this.logger.debug('elasticAssistant: Setup');

    // The featureFlags service is not available in the core setup, so we need
    // to wait for the start services to be available to read the feature flags.
    // This can take a while, but the plugin setup phase cannot run for a long time.
    // As a workaround, this promise does not block the setup phase.
    core
      .getStartServices()
      .then(([{ featureFlags }]) => {
        // read all feature flags:
        void Promise.all([
          featureFlags.getBooleanValue(SAVED_ATTACK_DISCOVERIES_ENABLED_FEATURE_FLAG, false),
          // add more feature flags here
        ]).then(([savedAttackDiscoveriesFeatureFlag]) => {
          this.logger.debug(`feature flags are:
        - ${SAVED_ATTACK_DISCOVERIES_ENABLED_FEATURE_FLAG}: ${savedAttackDiscoveriesFeatureFlag}
        `);

// ...

router: IRouter<ElasticAssistantRequestHandlerContext>
): void => {
router.versioned
.put({
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider put -> post, because this route has side effects

router: IRouter<ElasticAssistantRequestHandlerContext>
): void => {
router.versioned
.put({
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider put -> post, because this route has side effects

x-labels: [ess, serverless]
operationId: GetAttackDiscoverySchedules
description: Gets attack discovery schedule
summary: Gets attack discovery schedule via the Elastic Assistant
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Gets attack discovery schedule via the Elastic Assistant

nit: I'm wondering if via the Elastic Assistant is applicable in this summary (and the others in this route)

});
});

it('should handle `dataClient.createSchedule` error', async () => {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: Consider createSchedule -> findSchedules

});
});

it('should handle `dataClient.createSchedule` error', async () => {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: Consider createSchedule -> updateSchedule

Copy link
Contributor

@andrew-goldstein andrew-goldstein left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @e40pud for the new scheduling APIs!
✅ Desk tested locally
LGTM 🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:version Backport to applied version labels release_note:skip Skip the PR/issue when compiling release notes Team:Security Generative AI Security Generative AI Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. v8.19.0 v9.1.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants