You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/detections/detection-engine-intro.asciidoc
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -86,7 +86,7 @@ Indicator match rules provide a powerful capability to search your security data
86
86
87
87
In addition, the following support restrictions are in place:
88
88
89
-
* {elastic-sec} does not support the use of either cold or frozen {ref}/data-tiers.html[tier data] with indicator match rules.
89
+
* Indicator match rules don't support cold or frozen data. Cold or frozen data in indices queried by indicator match rules must be older than the time range queried by the rule. If your data's timestamps are unreliable, you can exclude cold and frozen tier data using a <<exclude-cold-frozen-data-individual-rules,Query DSL filter>>.
90
90
* Indicator match rules with an additional look-back time value greater than 24 hours are not supported.
Copy file name to clipboardExpand all lines: docs/detections/detections-exclude-cold-frozen-data-tiers.asciidoc
+13-6Lines changed: 13 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,18 +1,25 @@
1
1
[[exclude-cold-frozen-data-individual-rules]]
2
-
== Exclude cold and frozen data from a rule
2
+
== Exclude cold and frozen data from individual rules
3
3
4
4
:frontmatter-description: Configure a rule to ignore cold and frozen data during execution.
5
5
:frontmatter-tags-products: [security]
6
6
:frontmatter-tags-content-type: [how-to]
7
7
:frontmatter-tags-user-goals: [manage]
8
8
9
-
Rules that query cold and frozen data might perform more slowly. To exclude cold and frozen data, add a Query DSL filter that ignores cold and frozen {ref}/data-tiers.html[data tiers] when executing. You can add the filter when creating a new rule or updating an existing one.
9
+
Your rule might perform slower or fail if it queries data from cold or frozen {ref}/data-tiers.html[data tiers]. To help Elasticsearch exclude cold and frozen data more efficiently, apply a Query DSL filter that ignores cold and frozen documents when your rule executes. You can add the filter when creating a new rule or updating an existing one.
10
10
11
-
NOTE: This method is not supported for {esql} and {ml} rules.
11
+
TIP: To ensure that rules in your {kib} space exclude cold and frozen documents when executing, configure the `excludedDataTiersForRuleExecution` <<exclude-cold-frozen-data-rule-executions,advanced setting>>. This setting does not apply to {ml} rules.
12
12
13
-
TIP: To ensure that _all_ rules in a {kib} space exclude cold and frozen data when executing, configure the `excludedDataTiersForRuleExecution` <<exclude-cold-frozen-data-rule-executions,advanced setting>>.
13
+
[IMPORTANT]
14
+
====
14
15
15
-
Here is a sample Query DSL filter that excludes frozen tier data from a rule's execution:
16
+
* This method is not supported for {esql} and {ml} rules.
17
+
* Even when applying this filter, indicator match and event correlation rules may still fail if a frozen or cold shard that matches the rule's specified index pattern is unavailable during rule executions. If failures occur, we recommend modifying the rule's index patterns to only match indices containing hot tier data.
18
+
19
+
20
+
====
21
+
22
+
Here is a sample Query DSL filter that excludes frozen tier documents during rule execution:
16
23
17
24
[source,console]
18
25
----
@@ -29,7 +36,7 @@ Here is a sample Query DSL filter that excludes frozen tier data from a rule's e
29
36
}
30
37
----
31
38
32
-
Here is another sample Query DSL filter that excludes cold and frozen tier data from a rule's execution:
39
+
Here is another sample Query DSL filter that excludes cold and frozen tier documents during rule execution:
Copy file name to clipboardExpand all lines: docs/getting-started/advanced-setting.asciidoc
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -187,15 +187,17 @@ The `securitySolution:maxUnassociatedNotes` field determines the maximum number
187
187
188
188
[discrete]
189
189
[[exclude-cold-frozen-data-rule-executions]]
190
-
== Exclude cold and frozen data from rule executions
190
+
== Exclude cold and frozen data from rules
191
191
192
-
To ensure rules don't search cold and frozen data when executing, specify cold and frozen {ref}/data-tiers.html[data tiers] in the `excludedDataTiersForRuleExecution` field. Multiple data tiers must be separated by commas, for example: `data_frozen`, `data_cold`. This setting is turned off by default; turning it on can improve rule performance and reduce execution time.
192
+
To ensure the rules in your {kib} space exclude query results from cold and frozen tiers when executing, specify cold and frozen {ref}/data-tiers.html[data tiers] in the `excludedDataTiersForRuleExecution` field. Multiple data tiers must be separated by commas, for example: `data_frozen`, `data_cold`. This setting is turned off by default; turning it on can improve rule performance and reduce execution time.
193
193
194
-
This setting does not apply to {ml} rules.
194
+
This setting does not apply to {ml} rules because {ml} anomalies are not stored in cold or frozen data tiers.
195
195
196
196
[TIP]
197
197
====
198
198
199
-
This setting applies to all rules in a {kib} space. To only exclude cold and frozen data from specific rules, add a <<exclude-cold-frozen-data-individual-rules,Query DSL filter>> to the rules you want affected.
199
+
To only exclude cold and frozen data from specific rules, add a <<exclude-cold-frozen-data-individual-rules,Query DSL filter>> to the rules you want affected.
200
200
201
-
====
201
+
====
202
+
203
+
IMPORTANT: Even when the `excludedDataTiersForRuleExecution` advanced setting is enabled, indicator match, event correlation, and {esql} rules may still fail if a frozen or cold shard that matches the rule's specified index pattern is unavailable during rule executions. If failures occur, we recommend modifying the rule's index patterns to only match indices containing hot tier data.
Copy file name to clipboardExpand all lines: docs/management/admin/event-filters.asciidoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,20 +16,20 @@ IMPORTANT: Since an event filter blocks an event from streaming to {es}, be cons
16
16
17
17
By default, event filters are recognized globally across all hosts running {elastic-defend}. If you have a https://www.elastic.co/pricing[Platinum or Enterprise subscription], you can also assign an event filter to a specific {elastic-defend} integration policy, which would filter endpoint events from the hosts assigned to that policy.
18
18
19
-
Create event filters from the Hosts page or the Event filters page.
19
+
Create event filters from the **Hosts** page or the **Event filters** page.
20
20
21
21
. Do one of the following:
22
22
+
23
23
--
24
-
* To create an event filter from the Hosts page:
24
+
* To create an event filter from the **Hosts** page:
25
25
.. Select the *Events* tab to view the Events table.
26
26
+
27
27
.. Find the event to filter, click the *More actions* menu (*...*), then select *Add Endpoint event filter*.
28
28
+
29
29
TIP: Since you can only create filters for endpoint events, be sure to filter the Events table to display events generated by the {elastic-endpoint}. +
30
30
For example, in the KQL search bar, enter the following query to find endpoint network events: `event.dataset : endpoint.events.network`.
31
31
32
-
* To create an event filter from the Event filters page:
32
+
* To create an event filter from the **Event filters** page:
Copy file name to clipboardExpand all lines: docs/release-notes/8.16.asciidoc
+25-1Lines changed: 25 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,6 +56,28 @@ On November 12, 2024, it was discovered that manually running a custom query rul
56
56
====
57
57
// end::known-issue[]
58
58
59
+
// tag::known-issue-53[]
60
+
[discrete]
61
+
.Alerts page crashes if you upgrade to 8.16 and access it in a non-default {kib} space
62
+
[%collapsible]
63
+
====
64
+
*Details* +
65
+
On November 14, 2024, it was discovered that the **Alerts** page would crash and display an `Unable to load` error if you upgraded to 8.16 and accessed the page in a non-default {kib} space.
66
+
67
+
*Workaround* +
68
+
Manually edit your browser's local storage and refresh the **Alerts** page:
69
+
70
+
NOTE: These instructions only apply to the Google Chrome browser. Modify the steps based on the browser you're using.
71
+
72
+
. Right-click anywhere on the **Alerts** page, then select *Inspect* to open Chrome's Developer Tools.
73
+
. Go to *Application -> Storage*, then expand *Local Storage*.
74
+
. Click on the name of your Kibana instance, for example, http://localhost:1234.
75
+
. Search for the `siem.<space_name>.pageFilters` key, right-click on the value, then click *Delete*. If you have multiple non-default spaces, do this for each space.
76
+
. Refresh the **Alerts** page to reload it.
77
+
78
+
====
79
+
// end::known-issue-53[]
80
+
59
81
[discrete]
60
82
[[breaking-changes-8.16.0]]
61
83
==== Breaking changes
@@ -82,7 +104,9 @@ On November 12, 2024, it was discovered that manually running a custom query rul
82
104
* Allows you to view {es} queries that run during rule execution. This option is provided for {esql} and EQL rules only ({kibana-pull}191107[#191107]).
83
105
* Allows you to create and update a rule even when some data-related validation errors are present in the query field ({kibana-pull}191487[#191487]).
84
106
* Introduces a new advanced setting, `securitySolution:enableVisualizationsInFlyout`. When enabled, you can examine alerts and events in the **Visualize** tab, which provides a more detailed view of the event analyzer and Session View ({kibana-pull}194012[#194012], {kibana-pull}192531[#192531], {kibana-pull}192643[#192643]).
85
-
* Creates a new advanced setting `securitySolution:excludedDataTiersForRuleExecution` that allows you to exclude cold and frozen data from rule execution. This setting does not apply to {ml} rules ({kibana-pull}186908[#186908]).
107
+
* Creates a new advanced setting `securitySolution:excludedDataTiersForRuleExecution` that allows you to exclude cold and frozen data from rule executions ({kibana-pull}186908[#186908]).
108
+
+
109
+
IMPORTANT: Even when the `excludedDataTiersForRuleExecution` advanced setting is enabled, indicator match, event correlation, and {esql} rules may still fail if a frozen or cold shard that matches the rule's specified index pattern is unavailable during rule executions. If failures occur, we recommend modifying the rule's index patterns to only match indices containing hot tier data.
86
110
* Enhances the Insights section of the alert and event details flyouts by providing available misconfiguration and vulnerabilities findings ({kibana-pull}195509[#195509]).
87
111
* Turns off the host field size reduction setting on {elastic-defend}'s integration policy by default. To turn it on, configure the `[os].advanced.set_extended_host_information` <<adv-policy-settings,advanced policy setting>>.
88
112
* Allows you to reduce CPU usage, I/O, and event sizes by turning on process event aggregation when configuring your {elastic-defend} integration policy. Related process events that occur in rapid succession are combined into fewer aggregate events. To turn on process event aggregation, configure the `advanced.events.aggregate_process` <<adv-policy-settings,advanced policy setting>>.
Copy file name to clipboardExpand all lines: docs/serverless/edr-manage/event-filters.asciidoc
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,11 +26,11 @@ Since an event filter blocks an event from streaming to {es}, be conscious of ev
26
26
27
27
By default, event filters are recognized globally across all hosts running {elastic-defend}. You can also assign an event filter to a specific {elastic-defend} integration policy, which would filter endpoint events from the hosts assigned to that policy.
28
28
29
-
Create event filters from the Hosts page or the Event filters page.
29
+
Create event filters from the **Hosts** page or the **Event filters** page.
30
30
31
31
. Do one of the following:
32
32
+
33
-
** To create an event filter from the Hosts page:
33
+
** To create an event filter from the **Hosts** page:
34
34
+
35
35
... Select the **Events** tab to view the Events table.
36
36
... Find the event to filter, click the **More actions** menu (image:images/icons/boxesHorizontal.svg[More actions menu icon]), then select **Add Endpoint event filter**.
@@ -40,7 +40,7 @@ Create event filters from the Hosts page or the Event filters page.
40
40
Since you can only create filters for endpoint events, be sure to filter the Events table to display events generated by the {elastic-endpoint}.
41
41
For example, in the KQL search bar, enter the following query to find endpoint network events: `event.dataset : endpoint.events.network`.
42
42
====
43
-
** To create an event filter from the Event filters page:
43
+
** To create an event filter from the **Event filters** page:
44
44
+
45
45
... Click **Add event filter**, which opens a flyout.
Copy file name to clipboardExpand all lines: docs/whats-new.asciidoc
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,9 +85,9 @@ image::whats-new/images/8.16/install-enable-rules.png[Install and enable rules,
85
85
image::whats-new/images/8.16/manual-rule-run-table.png[Manual rule run table]
86
86
87
87
[float]
88
-
=== Exclude cold and frozen data from rule execution
88
+
=== Exclude cold and frozen data from rules
89
89
90
-
Rules that query cold and frozen data tiers might perform more slowly. To {security-guide}/exclude-cold-frozen-data-individual-rules.html[exclude query results from cold and frozen tiers], add a Query DSL filter that ignores cold and frozen documents when executing. This can help {es} excludecold and frozendata more efficiently.
90
+
Rules that query cold and frozen data tiers might perform more slowly or fail. To ensure that the rules in your {kib} space exclude query results from cold and frozen tiers when executing, configure the `excludedDataTiersForRuleExecution` <<exclude-cold-frozen-data-rule-executions,advanced setting>>.
91
91
92
92
[float]
93
93
=== View {es} queries that run during rule execution
0 commit comments