No description
Find a file
Kibana Machine 3e3ca30aff
[Security Solution][CTI] Update legacy CTI signals to latest ECS threat fields (#107988) (#108628)
* WIP: Adding integration test

* Replace threat.indicator mappings with threat.enrichments mappings

The nested threat.indicator mappings were experimental, and replaced by
threat.enrichmentsin ECS 1.10. While these fields are also experimental,
they fix the conflict between CTI data's normal threat.indicator
mappings.

* Add threat.enrichments mappings to our signals template mappings

event.* is no longer nested within here; it was determined that event
fields were not relevant to enrichment. All relevant ECS fieldsets
(file, pe, etc) are now nested under threat.enrichments.

* Update snapshot with newest threat.enrichments mappings

This test is a snapshot of the actual mappings applied by our templates. Looks good to me!

* Update ECS types to match latest

We now have two threat fields we care about for CTI, for legacy and
official ECS.

* Add a basic test for behavior of legacy enriched signals.

They're still queryable by threat.indicator, meaning that any existing
dashboards will still work.

* WIP: First pass at a data migration for CTI signals

* Defines reindex script to move things around
* Adds integration tests to make sure the migration and new mappings
  work
* Need to test a few more things and verify corner cases
* Need to extract some helpers from tests

* Bump our template version to ensure devs roll over

Marshall bumped to 55, giving us 10 versions for 7.14.x updates.
However, devs would not otherwise roll over and get my mapping updates
without destroying their signals index and rebuilding (which is also not
the same thing, exactly), so this trades having one higher signals
version for a more streamlined dev workflow.

* More robust guard against data migration

We only attempt to migrate legacy enrichments if the document:

* is a signal from an indicator match rule
* has a `threat.indicator` field
* does not have a `threat.enrichments` field

* Minor reorder of operations to make logic clearer

* Add more assertions around our signals data migration

Tests a few more pieces of the resulting document, giving more
confidence that it's the correct transformation (and mappings).

This also modifies/anonymizes the data that was originally generated on
a work machine.

* Remove outdated note

This was for when these tests were driven via the UI; the API is more
responsive and now synchronization is currently needed here, beyond the
200 responses.

* Fix typo in comment

These fields are in ECS 1.11.

* Update snapshot test

We bumped the version previously, causing this test to become outdated.

* Update ECS typings in timelines plugin

These were copied from the security_solution plugin. I updated those,
but neglected to update these.

Until there's a better mechanism for deduplication here, I'm going to
kick the can and update both for now.

* Update enrichments logic to read/write from threat.enrichments

* indicator match rule logic
  * we now simply copy from the specified indicator path, and place that
    in `threat.enrichments.indicator`
* event enrichment API logic
  * We were previously returning fields from `indicator.*`, we now
    include the `indicator.*` suffix in order to be more consistent with
    the sibling `matched.*` fields
* row renderer logic
  * removal of dataset
  * updates relevant to API changes above

* Fix logical error in generating links from indicator fields

We want to link the reference field, not a `first_seen` field.

* Always include the indicator prefix in first-party indicator fields

Prior to this change we would display e.g. `threatintel.indicator.foo`
for investigation enrichment fields. Now that the structure has changed
slightly and we return both `indicator.*` and `matched.*` fields for
existing enrichents, we want to display investigation enrichment
similarly.

* Update indicator match rule integration tests

Now that we've updated our enrichment logic, we need to update our
enrichment tests.

* Remove unused translation

* Update example row renderer data for enriched alerts

* Update parallel CTI constants to get our CTI row renderer working

We were not requesting the necessary fields for our row renderer, since
these constants (specifically CTI_ROW_RENDERER_FIELDS) now exist in both
security_solution and the timelines plugin. I had updated the former,
but only the latter is actually used.

* Update CTI enrichment UI tests

* Update prepackaged threat timeline template with new threat fields

Also bumps the timelineTemplateVersion.

* Update Indicator Match rule tests

These needed three things:

* Update to timeline template (see previous commit)
* Changing expectations from `threat.indicator` to `threat.enrichments`
* Update row renderer expectation to exclude dataset

* Update mock data with newest CTI enrichment fields

* Fix assertion on our threat details

These fields are prefixed with `indicator` now because:

1. This data pertains to the indicator, not the match per se
2. The actual field is prefixed with indicator (or, it at least
   specifies an indicator in the case of a custom threat index (via
   threat_indicator_path))

* Update test data and tests for our field parsing helpers

* Update more event-parsing tests

Ths one involved updating a mock in another package.

* Modify our helper function to support old filebeat indicators

When we query indicators for enrichment matches, the current expectation
is that we'll be querying 7.14 filebeat modules, which have an indicator
path of 'threatintel.indicator'. The only place that matters on the UI
is on the threat intel panel, where these indicators come back with such
a prefix.

This change has one behavior: it brings back the `provider` field on the
Alert summary tab for queried enrichments from filebeat modules.

* Update variable and method names to be more consistent with internal terminology

Indicators come from a CTI index. Enrichments are the application of
indicator data to other documents, and contain both indicator fields and
matched context.

Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>

Co-authored-by: Ryland Herrick <ryalnd@gmail.com>
2021-08-14 18:25:57 +00:00
.buildkite [api-docs] raise memory limit again (#107065) (#107092) 2021-07-28 19:03:57 -04:00
.ci Bump Node.js from version 14.17.3 to 14.17.5. (#108324) (#108489) 2021-08-13 09:13:19 -04:00
api_docs [Data cleanup] unify serializable state (#107745) (#108020) 2021-08-10 13:33:44 +00:00
config Support authenticating to Elasticsearch via service account tokens (#102121) (#105286) 2021-07-12 16:34:44 -04:00
dev_docs [KibanaPageTemplate] Adding a noDataConfig for templated add data screens (#108293) (#108474) 2021-08-13 01:04:47 -04:00
docs [Index pattern field editor] Add preview for runtime fields (#100198) (#108611) 2021-08-13 21:31:21 -04:00
examples [Data][Es Query] Use ES types instead of DslQuery (#108290) (#108447) 2021-08-12 23:25:46 +00:00
licenses
packages [Security Solution][CTI] Update legacy CTI signals to latest ECS threat fields (#107988) (#108628) 2021-08-14 18:25:57 +00:00
plugins
rfcs RFC: URL Service (TTL: expired) (#95416) (#97432) 2021-04-19 06:09:18 -04:00
scripts [build_ts_refs] improve caches, allow building a subset of projects (#107981) (#108139) 2021-08-11 05:08:54 -04:00
src Add EuiCodeEditor to ES UI Shared. (#108318) (#108617) 2021-08-13 22:14:31 -04:00
tasks/config Revert "[i18n] [7.x] Integrate 7.14.0 Translations (#106359)" 2021-07-22 13:47:56 -07:00
test [Index pattern field editor] Add preview for runtime fields (#100198) (#108611) 2021-08-13 21:31:21 -04:00
typings [Fleet] Replace usages of EuiCodeEditor by CodeEditor (#107434) (#107778) 2021-08-05 14:56:50 -04:00
utilities
vars [perf-testing] send detailed APM data from report generation (#107592) (#108257) 2021-08-11 17:12:00 -04:00
x-pack [Security Solution][CTI] Update legacy CTI signals to latest ECS threat fields (#107988) (#108628) 2021-08-14 18:25:57 +00:00
.backportrc.json chore(NA): adds 7.14 branch and bumps 7.x on backportrc (#103914) (#103956) 2021-06-30 13:51:22 -04:00
.bazelignore
.bazeliskversion
.bazelrc
.bazelrc.common chore(NA): enable exports_directories_only on rules nodejs to improve performance (#104180) (#104234) 2021-07-01 21:26:22 -04:00
.bazelversion
.browserslistrc
.editorconfig .editorconfig MDX files should follow the same rules as MD (#96942) (#97079) 2021-04-14 05:34:57 -04:00
.eslintignore [Reporting] Create reports with full state required to generate the report (#101048) (#108404) 2021-08-13 10:10:14 +02:00
.eslintrc.js Allow optional OSS to X-Pack dependencies (#107432) (#107794) 2021-08-05 16:20:05 -04:00
.fossa.yml
.gitattributes
.gitignore [build_ts_refs] improve caches, allow building a subset of projects (#107981) (#108139) 2021-08-11 05:08:54 -04:00
.i18nrc.json [7.x] [index patterns] index pattern create modal (#101853) (#107823) 2021-08-09 12:02:25 -04:00
.node-version Bump Node.js from version 14.17.3 to 14.17.5. (#108324) (#108489) 2021-08-13 09:13:19 -04:00
.npmrc
.nvmrc Bump Node.js from version 14.17.3 to 14.17.5. (#108324) (#108489) 2021-08-13 09:13:19 -04:00
.prettierignore
.prettierrc
.stylelintignore
.stylelintrc
.telemetryrc.json [Usage collection] Collect non-default kibana configs (#97368) (#97653) 2021-04-20 13:04:54 -04:00
.yarnrc
api-documenter.json
BUILD.bazel [build_ts_refs] improve caches, allow building a subset of projects (#107981) (#108139) 2021-08-11 05:08:54 -04:00
CONTRIBUTING.md
FAQ.md
github_checks_reporter.json
Gruntfile.js
Jenkinsfile chore(NA): remove KBN_ES_SNAPSHOT_USE_UNVERIFIED var from Jenkinsfile 2021-07-14 19:48:47 +01:00
jest.config.integration.js chore(NA): introduce preset for jest-integration tests on @kbn/test (#105144) (#105667) 2021-07-14 22:05:07 +00:00
jest.config.js
kibana.d.ts
LICENSE.txt
NOTICE.txt [Detections] Adds automatic updating for Prebuilt Security Detection Rules package (#101846) (#103366) 2021-06-28 17:13:25 +00:00
package.json Add EuiCodeEditor to ES UI Shared. (#108318) (#108617) 2021-08-13 22:14:31 -04:00
preinstall_check.js
README.md STYLEGUIDE reference .md => .mdx (#107440) (#107456) 2021-08-02 15:17:17 -04:00
renovate.json5
STYLEGUIDE.mdx Syntax in styleguide.mdx is breaking docs build (#99840) (#99859) 2021-05-11 20:12:01 -04:00
tsconfig.base.json [build_ts_refs] improve caches, allow building a subset of projects (#107981) (#108139) 2021-08-11 05:08:54 -04:00
tsconfig.bazel.json [build_ts_refs] improve caches, allow building a subset of projects (#107981) (#108139) 2021-08-11 05:08:54 -04:00
tsconfig.browser.json
tsconfig.browser_bazel.json [build_ts_refs] improve caches, allow building a subset of projects (#107981) (#108139) 2021-08-11 05:08:54 -04:00
tsconfig.json [build_ts_refs] improve caches, allow building a subset of projects (#107981) (#108139) 2021-08-11 05:08:54 -04:00
tsconfig.types.json [build_ts_refs] improve caches, allow building a subset of projects (#107981) (#108139) 2021-08-11 05:08:54 -04:00
TYPESCRIPT.md
WORKSPACE.bazel chore(NA): upgrades bazel rules nodejs into v3.8.0 (#108471) (#108545) 2021-08-13 12:50:43 -04:00
yarn.lock Add EuiCodeEditor to ES UI Shared. (#108318) (#108617) 2021-08-13 22:14:31 -04:00

Kibana

Kibana is your window into the Elastic Stack. Specifically, it's a browser-based analytics and search dashboard for Elasticsearch.

Getting Started

If you just want to try Kibana out, check out the Elastic Stack Getting Started Page to give it a whirl.

If you're interested in diving a bit deeper and getting a taste of Kibana's capabilities, head over to the Kibana Getting Started Page.

Using a Kibana Release

If you want to use a Kibana release in production, give it a test run, or just play around:

Building and Running Kibana, and/or Contributing Code

You might want to build Kibana locally to contribute some code, test out the latest features, or try out an open PR:

Documentation

Visit Elastic.co for the full Kibana documentation.

For information about building the documentation, see the README in elastic/docs.

Version Compatibility with Elasticsearch

Ideally, you should be running Elasticsearch and Kibana with matching version numbers. If your Elasticsearch has an older version number or a newer major number than Kibana, then Kibana will fail to run. If Elasticsearch has a newer minor or patch number than Kibana, then the Kibana Server will log a warning.

Note: The version numbers below are only examples, meant to illustrate the relationships between different types of version numbers.

Situation Example Kibana version Example ES version Outcome
Versions are the same. 5.1.2 5.1.2 💚 OK
ES patch number is newer. 5.1.2 5.1.5 ⚠️ Logged warning
ES minor number is newer. 5.1.2 5.5.0 ⚠️ Logged warning
ES major number is newer. 5.1.2 6.0.0 🚫 Fatal error
ES patch number is older. 5.1.2 5.1.0 ⚠️ Logged warning
ES minor number is older. 5.1.2 5.0.0 🚫 Fatal error
ES major number is older. 5.1.2 4.0.0 🚫 Fatal error

Questions? Problems? Suggestions?

  • If you've found a bug or want to request a feature, please create a GitHub Issue. Please check to make sure someone else hasn't already created an issue for the same topic.
  • Need help using Kibana? Ask away on our Kibana Discuss Forum and a fellow community member or Elastic engineer will be glad to help you out.