-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add a tool to support detection engine developers #130
Comments
@spong please describe your flow and how this tool could improve it. |
Of course! 🙂 So as detailed a bit over in #128 (comment), one of the most frequent and basic workflows for us on the dev side is triggering a specific Detection Rule. We'll need to do this when developing new features, debugging rules, or digging deeper into SDH's. This often needs to be done locally on the dev machine (against a local kibana/es), but support for cloud clusters would be great too as this is often the quickest way to test previous stack versions (and of course is a more accurate representation of a customer deployment). Let's go through what this might look like... Deployment setupDevs will usually either be running both ES ( Current WorkflowWith the above deployments, our current workflow is to either setup beats locally, configure to the specified deployment, then perform some actions that may create the necessary source events to trigger the desired rule, or to configure an agent/endpoint and then trigger within the agent env (now a bit easier with the Endpoint CLI introduced in elastic/kibana#149903). Note that index/mapping configuration happens as part of beat, integration, and/or agent setup, so this is handled as part those steps. Automated WorkflowIdeally, it would be great to interact with At minimum, this tooling would take a Detection Rule geneve trigger-rule "Persistence via Update Orchestrator Service Hijack" Which would perform the following:
And with additional simple configuration to modify the flow: geneve trigger-rule "Persistence via Update Orchestrator Service Hijack" --replay 5 --interval 3m --variable host.name=geneve Which would do the same as above, but re-ingest the source documents 5 times, every 3 minutes, and replace the And then of course some flags for choosing additional deployments: Explicit localgeneve trigger-rule "Persistence via Update Orchestrator Service Hijack" --es http://elastic:[email protected]:9200 --kibana http://elastic:[email protected]:5601/kbn Cloudgeneve trigger-rule "Persistence via Update Orchestrator Service Hijack" --es https://cloudy.es.europe-west1.gcp.cloud.es.io --kibana https://cloudy.kb.europe-west1.gcp.cloud.es.io:9243 --cloudID abcxyz Hopefully this outlines this frequent use case from detection engineers, but let me know if you have any questions and happy to pair or expand further. Outside generating relevant source events, the mapping/index configuration is the next largest point of friction as we usually have to hunt down a specific mapping, either installing beats locally, specific endpoint integrations (that might not be easily configured), or a full agent. |
Would be nice to have a tool based on Geneve that can help detection engine developers iterate on their works.
The text was updated successfully, but these errors were encountered: