Skip to content

Commit 76989b1

Browse files
[Serverless]: Security – Monitor and troubleshoot rule executions (#6384)
* Removed outdated content * Fixed conflict
1 parent 42f1798 commit 76989b1

File tree

1 file changed

+1
-75
lines changed

1 file changed

+1
-75
lines changed

docs/serverless/rules/alerts-ui-monitor.asciidoc

Lines changed: 1 addition & 75 deletions
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,6 @@ missing. There are a number of ways to try to resolve this issue:
9797

9898
* <<troubleshoot-gaps,Troubleshoot gaps>>
9999
* <<troubleshoot-ingestion-pipeline-delay,Troubleshoot ingestion pipeline delay>>
100-
* <<ml-job-compatibility,Troubleshoot missing alerts for {ml} jobs>>
101100

102101
You can also use Task Manager in {kib} to troubleshoot background tasks and processes that may be related to missing alerts:
103102

@@ -158,77 +157,4 @@ You can reduce the number of missed alerts due to ingestion pipeline delay by sp
158157
For example, say an event occurred at 10:00 but wasn't ingested into {es} until 10:10 due to an ingestion pipeline delay. If you created a rule to detect that event with an interval + additional look-back time of 6 minutes, and the rule executes at 10:12, it would still detect the event because the `event.ingested` timestamp was from 10:10, only 2 minutes before the rule executed and well within the rule's 6-minute interval + additional look-back time.
159158

160159
[role="screenshot"]
161-
image::images/alerts-ui-monitor/-detections-timestamp-override.png[]
162-
163-
[discrete]
164-
[[ml-job-compatibility]]
165-
=== Troubleshoot missing alerts for {ml} jobs
166-
167-
{ml-cap} detection rules use {ml} jobs that have dependencies on data fields populated by the {beats} and {agent} integrations. In {stack} version 8.3, new {ml} jobs (prefixed with `v3`) were released to operate on the ECS fields available at that time.
168-
169-
If you're using 8.2 or earlier versions of {beats} or {agent} with {stack} version 8.3 or later, you may need to duplicate prebuilt rules or create new custom rules _before_ you update the Elastic prebuilt rules. Once you update the prebuilt rules, they will only use `v3` {ml} jobs. Duplicating the relevant prebuilt rules before updating them ensures continued coverage by allowing you to keep using `v1` or `v2` jobs (in the duplicated rules) while also running the new `v3` jobs (in the updated prebuilt rules).
170-
171-
[IMPORTANT]
172-
====
173-
* Duplicated rules may result in duplicate anomaly detections and alerts.
174-
* Ensure that the relevant `v3` {ml} jobs are running before you update the Elastic prebuilt rules.
175-
====
176-
177-
* If you only have **8.3 or later versions of {beats} and {agent}**: You can download or update your prebuilt rules and use the latest `v3` {ml} jobs. No additional action is required.
178-
* If you only have **8.2 or earlier versions of {beats} or {agent}**, or **a mix of old and new versions**: To continue using the `v1` and `v2` {ml} jobs specified by pre-8.3 prebuilt detection rules, you must duplicate affected prebuilt rules _before_ updating them to the latest rule versions. The duplicated rules can continue using the same `v1` and `v2` {ml} jobs, and the updated prebuilt {ml} rules will use the new `v3` {ml} jobs.
179-
* If you have **a non-Elastic data shipper that gathers ECS-compatible events**: You can use the latest `v3` {ml} jobs with no additional action required, as long as your data shipper uses the latest ECS specifications. However, if you're migrating from {ml} rules using `v1`/`v2` jobs, ensure that you start the relevant `v3` jobs before updating the Elastic prebuilt rules.
180-
181-
The following Elastic prebuilt rules use the new `v3` {ml} jobs to generate alerts. Duplicate their associated `v1`/`v2` prebuilt rules _before_ updating them if you need continued coverage from the `v1`/`v2` {ml} jobs:
182-
183-
////
184-
/* {/* Links to prebuilt rule pages temporarily removed for initial serverless docs. We can renable links once
185-
we add prebuilt rule pages to the serverless docs.*/
186-
////
187-
188-
////
189-
/*
190-
* <DocLink id="serverlessSecurityUnusualLinuxNetworkPortActivity">Unusual Linux Network Port Activity</DocLink>: `v3_linux_anomalous_network_port_activity`
191-
192-
* <DocLink id="serverlessSecurityAnomalousProcessForALinuxPopulation">Anomalous Process For a Linux Population</DocLink>: `v3_linux_anomalous_process_all_hosts`
193-
194-
* <DocLink id="serverlessSecurityUnusualLinuxUsername">Unusual Linux Username</DocLink>: `v3_linux_anomalous_user_name`
195-
196-
* <DocLink id="serverlessSecurityUnusualLinuxProcessCallingTheMetadataService">Unusual Linux Process Calling the Metadata Service</DocLink>: `v3_linux_rare_metadata_process`
197-
198-
* <DocLink id="serverlessSecurityUnusualLinuxUserCallingTheMetadataService">Unusual Linux User Calling the Metadata Service</DocLink>: `v3_linux_rare_metadata_user`
199-
200-
* <DocLink id="serverlessSecurityUnusualProcessForALinuxHost">Unusual Process For a Linux Host</DocLink>: `v3_rare_process_by_host_linux`
201-
202-
* <DocLink id="serverlessSecurityUnusualProcessForAWindowsHost">Unusual Process For a Windows Host</DocLink>: `v3_rare_process_by_host_windows`
203-
204-
* <DocLink id="serverlessSecurityUnusualWindowsNetworkActivity">Unusual Windows Network Activity</DocLink>: `v3_windows_anomalous_network_activity`
205-
206-
* <DocLink id="serverlessSecurityUnusualWindowsPathActivity">Unusual Windows Path Activity</DocLink>: `v3_windows_anomalous_path_activity`
207-
208-
* <DocLink id="serverlessSecurityAnomalousWindowsProcessCreation">Anomalous Windows Process Creation</DocLink>: `v3_windows_anomalous_process_creation`
209-
210-
* <DocLink id="serverlessSecurityAnomalousProcessForAWindowsPopulation">Anomalous Process For a Windows Population</DocLink>: `v3_windows_anomalous_process_all_hosts`
211-
212-
* <DocLink id="serverlessSecurityUnusualWindowsUsername">Unusual Windows Username</DocLink>: `v3_windows_anomalous_user_name`
213-
214-
* <DocLink id="serverlessSecurityUnusualWindowsProcessCallingTheMetadataService">Unusual Windows Process Calling the Metadata Service</DocLink>: `v3_windows_rare_metadata_process`
215-
216-
* <DocLink id="serverlessSecurityUnusualWindowsUserCallingTheMetadataService">Unusual Windows User Calling the Metadata Service</DocLink>: `v3_windows_rare_metadata_user`
217-
*/
218-
////
219-
220-
* Unusual Linux Network Port Activity: `v3_linux_anomalous_network_port_activity`
221-
* Unusual Linux Network Connection Discovery: `v3_linux_anomalous_network_connection_discovery`
222-
* Anomalous Process For a Linux Population: `v3_linux_anomalous_process_all_hosts`
223-
* Unusual Linux Username: `v3_linux_anomalous_user_name`
224-
* Unusual Linux Process Calling the Metadata Service: `v3_linux_rare_metadata_process`
225-
* Unusual Linux User Calling the Metadata Service: `v3_linux_rare_metadata_user`
226-
* Unusual Process For a Linux Host: `v3_rare_process_by_host_linux`
227-
* Unusual Process For a Windows Host: `v3_rare_process_by_host_windows`
228-
* Unusual Windows Network Activity: `v3_windows_anomalous_network_activity`
229-
* Unusual Windows Path Activity: `v3_windows_anomalous_path_activity`
230-
* Anomalous Windows Process Creation: `v3_windows_anomalous_process_creation`
231-
* Anomalous Process For a Windows Population: `v3_windows_anomalous_process_all_hosts`
232-
* Unusual Windows Username: `v3_windows_anomalous_user_name`
233-
* Unusual Windows Process Calling the Metadata Service: `v3_windows_rare_metadata_process`
234-
* Unusual Windows User Calling the Metadata Service: `v3_windows_rare_metadata_user`
160+
image::images/alerts-ui-monitor/-detections-timestamp-override.png[]

0 commit comments

Comments
 (0)