Skip to content

Commit 5173838

Browse files
Merge branch 'main' into issue-6060-bugbash
2 parents 3b2dca0 + cd4f12b commit 5173838

File tree

9 files changed

+68
-35
lines changed

9 files changed

+68
-35
lines changed

docs/detections/detection-engine-intro.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ Indicator match rules provide a powerful capability to search your security data
8686

8787
In addition, the following support restrictions are in place:
8888

89-
* {elastic-sec} does not support the use of either cold or frozen {ref}/data-tiers.html[tier data] with indicator match rules.
89+
* Indicator match rules don't support cold or frozen data. Cold or frozen data in indices queried by indicator match rules must be older than the time range queried by the rule. If your data's timestamps are unreliable, you can exclude cold and frozen tier data using a <<exclude-cold-frozen-data-individual-rules,Query DSL filter>>.
9090
* Indicator match rules with an additional look-back time value greater than 24 hours are not supported.
9191

9292
[float]

docs/detections/detections-exclude-cold-frozen-data-tiers.asciidoc

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,25 @@
11
[[exclude-cold-frozen-data-individual-rules]]
2-
== Exclude cold and frozen data from a rule
2+
== Exclude cold and frozen data from individual rules
33

44
:frontmatter-description: Configure a rule to ignore cold and frozen data during execution.
55
:frontmatter-tags-products: [security]
66
:frontmatter-tags-content-type: [how-to]
77
:frontmatter-tags-user-goals: [manage]
88

9-
Rules that query cold and frozen data might perform more slowly. To exclude cold and frozen data, add a Query DSL filter that ignores cold and frozen {ref}/data-tiers.html[data tiers] when executing. You can add the filter when creating a new rule or updating an existing one.
9+
Your rule might perform slower or fail if it queries data from cold or frozen {ref}/data-tiers.html[data tiers]. To help Elasticsearch exclude cold and frozen data more efficiently, apply a Query DSL filter that ignores cold and frozen documents when your rule executes. You can add the filter when creating a new rule or updating an existing one.
1010

11-
NOTE: This method is not supported for {esql} and {ml} rules.
11+
TIP: To ensure that rules in your {kib} space exclude cold and frozen documents when executing, configure the `excludedDataTiersForRuleExecution` <<exclude-cold-frozen-data-rule-executions,advanced setting>>. This setting does not apply to {ml} rules.
1212

13-
TIP: To ensure that _all_ rules in a {kib} space exclude cold and frozen data when executing, configure the `excludedDataTiersForRuleExecution` <<exclude-cold-frozen-data-rule-executions,advanced setting>>.
13+
[IMPORTANT]
14+
====
1415
15-
Here is a sample Query DSL filter that excludes frozen tier data from a rule's execution:
16+
* This method is not supported for {esql} and {ml} rules.
17+
* Even when applying this filter, indicator match and event correlation rules may still fail if a frozen or cold shard that matches the rule's specified index pattern is unavailable during rule executions. If failures occur, we recommend modifying the rule's index patterns to only match indices containing hot tier data.
18+
19+
20+
====
21+
22+
Here is a sample Query DSL filter that excludes frozen tier documents during rule execution:
1623

1724
[source,console]
1825
----
@@ -29,7 +36,7 @@ Here is a sample Query DSL filter that excludes frozen tier data from a rule's e
2936
}
3037
----
3138

32-
Here is another sample Query DSL filter that excludes cold and frozen tier data from a rule's execution:
39+
Here is another sample Query DSL filter that excludes cold and frozen tier documents during rule execution:
3340

3441
[source,console]
3542
----

docs/getting-started/advanced-setting.asciidoc

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -187,15 +187,17 @@ The `securitySolution:maxUnassociatedNotes` field determines the maximum number
187187

188188
[discrete]
189189
[[exclude-cold-frozen-data-rule-executions]]
190-
== Exclude cold and frozen data from rule executions
190+
== Exclude cold and frozen data from rules
191191

192-
To ensure rules don't search cold and frozen data when executing, specify cold and frozen {ref}/data-tiers.html[data tiers] in the `excludedDataTiersForRuleExecution` field. Multiple data tiers must be separated by commas, for example: `data_frozen`, `data_cold`. This setting is turned off by default; turning it on can improve rule performance and reduce execution time.
192+
To ensure the rules in your {kib} space exclude query results from cold and frozen tiers when executing, specify cold and frozen {ref}/data-tiers.html[data tiers] in the `excludedDataTiersForRuleExecution` field. Multiple data tiers must be separated by commas, for example: `data_frozen`, `data_cold`. This setting is turned off by default; turning it on can improve rule performance and reduce execution time.
193193

194-
This setting does not apply to {ml} rules.
194+
This setting does not apply to {ml} rules because {ml} anomalies are not stored in cold or frozen data tiers.
195195

196196
[TIP]
197197
====
198198
199-
This setting applies to all rules in a {kib} space. To only exclude cold and frozen data from specific rules, add a <<exclude-cold-frozen-data-individual-rules,Query DSL filter>> to the rules you want affected.
199+
To only exclude cold and frozen data from specific rules, add a <<exclude-cold-frozen-data-individual-rules,Query DSL filter>> to the rules you want affected.
200200
201-
====
201+
====
202+
203+
IMPORTANT: Even when the `excludedDataTiersForRuleExecution` advanced setting is enabled, indicator match, event correlation, and {esql} rules may still fail if a frozen or cold shard that matches the rule's specified index pattern is unavailable during rule executions. If failures occur, we recommend modifying the rule's index patterns to only match indices containing hot tier data.

docs/management/admin/deploy-with-mdm.asciidoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -71,13 +71,13 @@ image::images/content-filtering-jamf.png[]
7171
. Under **App Name**, enter `Elastic Security.app`.
7272
. Under **Bundle ID**, enter `co.elastic.alert`.
7373
. In the **Settings** section, include these options with the following settings:
74-
.. **Critical Alerts**: **Enable**.
75-
.. **Notifications**: **Enable**.
76-
.. **Banner alert type**: **Persistent**.
77-
.. **Notifications on Lock Screen**: **Display**.
78-
.. **Notifications in Notification Center**: **Display**.
79-
.. **Badge app icon**: **Display**.
80-
.. **Play sound for notifications**: **Enable**.
74+
.. **Critical Alerts**: Enable
75+
.. **Notifications**: Enable
76+
.. **Banner alert type**: Persistent
77+
.. **Notifications on Lock Screen**: Display
78+
.. **Notifications in Notification Center**: Display
79+
.. **Badge app icon**: Display
80+
.. **Play sound for notifications**: Enable
8181
. Save the configuration.
8282

8383
[role="screenshot"]

docs/management/admin/event-filters.asciidoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,20 +16,20 @@ IMPORTANT: Since an event filter blocks an event from streaming to {es}, be cons
1616

1717
By default, event filters are recognized globally across all hosts running {elastic-defend}. If you have a https://www.elastic.co/pricing[Platinum or Enterprise subscription], you can also assign an event filter to a specific {elastic-defend} integration policy, which would filter endpoint events from the hosts assigned to that policy.
1818

19-
Create event filters from the Hosts page or the Event filters page.
19+
Create event filters from the **Hosts** page or the **Event filters** page.
2020

2121
. Do one of the following:
2222
+
2323
--
24-
* To create an event filter from the Hosts page:
24+
* To create an event filter from the **Hosts** page:
2525
.. Select the *Events* tab to view the Events table.
2626
+
2727
.. Find the event to filter, click the *More actions* menu (*...*), then select *Add Endpoint event filter*.
2828
+
2929
TIP: Since you can only create filters for endpoint events, be sure to filter the Events table to display events generated by the {elastic-endpoint}. +
3030
For example, in the KQL search bar, enter the following query to find endpoint network events: `event.dataset : endpoint.events.network`.
3131

32-
* To create an event filter from the Event filters page:
32+
* To create an event filter from the **Event filters** page:
3333
.. Cick *Add event filter*, which opens a flyout.
3434
--
3535
+

docs/release-notes/8.16.asciidoc

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,28 @@ On November 12, 2024, it was discovered that manually running a custom query rul
5656
====
5757
// end::known-issue[]
5858

59+
// tag::known-issue-53[]
60+
[discrete]
61+
.Alerts page crashes if you upgrade to 8.16 and access it in a non-default {kib} space
62+
[%collapsible]
63+
====
64+
*Details* +
65+
On November 14, 2024, it was discovered that the **Alerts** page would crash and display an `Unable to load` error if you upgraded to 8.16 and accessed the page in a non-default {kib} space.
66+
67+
*Workaround* +
68+
Manually edit your browser's local storage and refresh the **Alerts** page:
69+
70+
NOTE: These instructions only apply to the Google Chrome browser. Modify the steps based on the browser you're using.
71+
72+
. Right-click anywhere on the **Alerts** page, then select *Inspect* to open Chrome's Developer Tools.
73+
. Go to *Application -> Storage*, then expand *Local Storage*.
74+
. Click on the name of your Kibana instance, for example, http://localhost:1234.
75+
. Search for the `siem.<space_name>.pageFilters` key, right-click on the value, then click *Delete*. If you have multiple non-default spaces, do this for each space.
76+
. Refresh the **Alerts** page to reload it.
77+
78+
====
79+
// end::known-issue-53[]
80+
5981
[discrete]
6082
[[breaking-changes-8.16.0]]
6183
==== Breaking changes
@@ -82,7 +104,9 @@ On November 12, 2024, it was discovered that manually running a custom query rul
82104
* Allows you to view {es} queries that run during rule execution. This option is provided for {esql} and EQL rules only ({kibana-pull}191107[#191107]).
83105
* Allows you to create and update a rule even when some data-related validation errors are present in the query field ({kibana-pull}191487[#191487]).
84106
* Introduces a new advanced setting, `securitySolution:enableVisualizationsInFlyout`. When enabled, you can examine alerts and events in the **Visualize** tab, which provides a more detailed view of the event analyzer and Session View ({kibana-pull}194012[#194012], {kibana-pull}192531[#192531], {kibana-pull}192643[#192643]).
85-
* Creates a new advanced setting `securitySolution:excludedDataTiersForRuleExecution` that allows you to exclude cold and frozen data from rule execution. This setting does not apply to {ml} rules ({kibana-pull}186908[#186908]).
107+
* Creates a new advanced setting `securitySolution:excludedDataTiersForRuleExecution` that allows you to exclude cold and frozen data from rule executions ({kibana-pull}186908[#186908]).
108+
+
109+
IMPORTANT: Even when the `excludedDataTiersForRuleExecution` advanced setting is enabled, indicator match, event correlation, and {esql} rules may still fail if a frozen or cold shard that matches the rule's specified index pattern is unavailable during rule executions. If failures occur, we recommend modifying the rule's index patterns to only match indices containing hot tier data.
86110
* Enhances the Insights section of the alert and event details flyouts by providing available misconfiguration and vulnerabilities findings ({kibana-pull}195509[#195509]).
87111
* Turns off the host field size reduction setting on {elastic-defend}'s integration policy by default. To turn it on, configure the `[os].advanced.set_extended_host_information` <<adv-policy-settings,advanced policy setting>>.
88112
* Allows you to reduce CPU usage, I/O, and event sizes by turning on process event aggregation when configuring your {elastic-defend} integration policy. Related process events that occur in rapid succession are combined into fewer aggregate events. To turn on process event aggregation, configure the `advanced.events.aggregate_process` <<adv-policy-settings,advanced policy setting>>.

docs/serverless/edr-install-config/deploy-with-mdm.asciidoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -81,13 +81,13 @@ image::images/deploy-with-mdm/content-filtering-jamf.png[]
8181
. Under **Bundle ID**, enter `co.elastic.alert`.
8282
. In the **Settings** section, include these options with the following settings:
8383
+
84-
.. **Critical Alerts**: **Enable**.
85-
.. **Notifications**: **Enable**.
86-
.. **Banner alert type**: **Persistent**.
87-
.. **Notifications on Lock Screen**: **Display**.
88-
.. **Notifications in Notification Center**: **Display**.
89-
.. **Badge app icon**: **Display**.
90-
.. **Play sound for notifications**: **Enable**.
84+
.. **Critical Alerts**: Enable
85+
.. **Notifications**: Enable
86+
.. **Banner alert type**: Persistent
87+
.. **Notifications on Lock Screen**: Display
88+
.. **Notifications in Notification Center**: Display
89+
.. **Badge app icon**: Display
90+
.. **Play sound for notifications**: Enable
9191
. Save the configuration.
9292

9393
[role="screenshot"]

docs/serverless/edr-manage/event-filters.asciidoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,11 +26,11 @@ Since an event filter blocks an event from streaming to {es}, be conscious of ev
2626

2727
By default, event filters are recognized globally across all hosts running {elastic-defend}. You can also assign an event filter to a specific {elastic-defend} integration policy, which would filter endpoint events from the hosts assigned to that policy.
2828

29-
Create event filters from the Hosts page or the Event filters page.
29+
Create event filters from the **Hosts** page or the **Event filters** page.
3030

3131
. Do one of the following:
3232
+
33-
** To create an event filter from the Hosts page:
33+
** To create an event filter from the **Hosts** page:
3434
+
3535
... Select the **Events** tab to view the Events table.
3636
... Find the event to filter, click the **More actions** menu (image:images/icons/boxesHorizontal.svg[More actions menu icon]), then select **Add Endpoint event filter**.
@@ -40,7 +40,7 @@ Create event filters from the Hosts page or the Event filters page.
4040
Since you can only create filters for endpoint events, be sure to filter the Events table to display events generated by the {elastic-endpoint}.
4141
For example, in the KQL search bar, enter the following query to find endpoint network events: `event.dataset : endpoint.events.network`.
4242
====
43-
** To create an event filter from the Event filters page:
43+
** To create an event filter from the **Event filters** page:
4444
+
4545
... Click **Add event filter**, which opens a flyout.
4646
+

docs/whats-new.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -85,9 +85,9 @@ image::whats-new/images/8.16/install-enable-rules.png[Install and enable rules,
8585
image::whats-new/images/8.16/manual-rule-run-table.png[Manual rule run table]
8686

8787
[float]
88-
=== Exclude cold and frozen data from rule execution
88+
=== Exclude cold and frozen data from rules
8989

90-
Rules that query cold and frozen data tiers might perform more slowly. To {security-guide}/exclude-cold-frozen-data-individual-rules.html[exclude query results from cold and frozen tiers], add a Query DSL filter that ignores cold and frozen documents when executing. This can help {es} exclude cold and frozen data more efficiently.
90+
Rules that query cold and frozen data tiers might perform more slowly or fail. To ensure that the rules in your {kib} space exclude query results from cold and frozen tiers when executing, configure the `excludedDataTiersForRuleExecution` <<exclude-cold-frozen-data-rule-executions,advanced setting>>.
9191

9292
[float]
9393
=== View {es} queries that run during rule execution

0 commit comments

Comments
 (0)