Skip to content

Commit ecc3b42

Browse files
authored
Merge branch '8.x' into mergify/bp/8.x/pr-5859
2 parents 7769571 + 64851ba commit ecc3b42

37 files changed

+531
-116
lines changed

.mergify.yml

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,34 @@ pull_request_rules:
1313
git merge upstream/{{base}}
1414
git push upstream {{head}}
1515
```
16+
- name: backport patches to 8.17 branch
17+
conditions:
18+
- merged
19+
- base=main
20+
- label=v8.17.0
21+
actions:
22+
backport:
23+
assignees:
24+
- "{{ author }}"
25+
branches:
26+
- "8.x"
27+
title: "[{{ destination_branch }}] {{ title }} (backport #{{ number }})"
28+
labels:
29+
- backport
30+
- name: backport patches to 8.16 branch
31+
conditions:
32+
- merged
33+
- base=main
34+
- label=v8.16.0
35+
actions:
36+
backport:
37+
assignees:
38+
- "{{ author }}"
39+
branches:
40+
- "8.16"
41+
title: "[{{ destination_branch }}] {{ title }} (backport #{{ number }})"
42+
labels:
43+
- backport
1644
- name: backport patches to 8.15 branch
1745
conditions:
1846
- merged

docs/AI-for-security/connect-to-byo.asciidoc

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -180,10 +180,11 @@ Finally, configure the connector:
180180
1. Log in to your Elastic deployment.
181181
2. Navigate to **Stack Management → Connectors → Create Connector → OpenAI**. The OpenAI connector enables this use case because LM Studio uses the OpenAI SDK.
182182
3. Name your connector to help keep track of the model version you are using.
183-
4. Under **URL**, enter the domain name specified in your Nginx configuration file, followed by `/v1/chat/completions`.
184-
5. Under **Default model**, enter `local-model`.
185-
6. Under **API key**, enter the secret token specified in your Nginx configuration file.
186-
7. Click **Save**.
183+
4. Under **Select an OpenAI provider**, select **Other (OpenAI Compatible Service)**.
184+
5. Under **URL**, enter the domain name specified in your Nginx configuration file, followed by `/v1/chat/completions`.
185+
6. Under **Default model**, enter `local-model`.
186+
7. Under **API key**, enter the secret token specified in your Nginx configuration file.
187+
8. Click **Save**.
187188

188189
image::images/lms-edit-connector.png[The Edit connector page in the {security-app}, with appropriate values populated]
189190

23.7 KB
Loading

docs/advanced-entity-analytics/api/asset-criticality-api-overview.asciidoc

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,4 +2,10 @@
22
[role="xpack"]
33
== Asset criticality API
44

5-
You can manage <<asset-criticality, asset criticality>> records through the API. To use this API, you must first turn on the `securitySolution:enableAssetCriticality` <<enable-asset-criticality, advanced setting>>.
5+
.New API Reference
6+
[sidebar]
7+
--
8+
For the most up-to-date API details, refer to {api-kibana}/group/endpoint-security-entity-analytics-api[Entity Analytics APIs].
9+
--
10+
11+
You can manage <<asset-criticality, asset criticality>> records through the API.

docs/advanced-entity-analytics/asset-criticality.asciidoc

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,7 @@
44
.Requirements
55
[sidebar]
66
--
7-
To view and assign asset criticality, you must:
8-
9-
* Have the appropriate user role.
10-
* Turn on the `securitySolution:enableAssetCriticality` <<enable-asset-criticality, advanced setting>>.
11-
12-
For more information, refer to <<ers-requirements, Entity risk scoring prerequisites>>.
7+
To view and assign asset criticality, you must have the appropriate user role. For more information, refer to <<ers-requirements, Entity risk scoring prerequisites>>.
138
--
149

1510
The asset criticality feature allows you to classify your organization's entities based on various operational factors that are important to your organization. Through this classification, you can improve your threat detection capabilities by focusing your alert triage, threat-hunting, and investigation activities on high-impact entities.
@@ -30,7 +25,7 @@ Entities do not have a default asset criticality level. You can either assign as
3025

3126
When you assign, change, or unassign an individual entity's asset criticality level, that entity's risk score is immediately recalculated.
3227

33-
NOTE: If you assign asset criticality using the file import feature, risk scores are **not** immediately recalculated. The newly assigned or updated asset criticality levels will impact entity risk scores during the next hourly risk scoring calculation.
28+
NOTE: If you assign asset criticality using the file import feature, risk scores are **not** immediately recalculated. However, you can trigger an immediate recalculation by clicking **Recalculate entity risk scores now**. Otherwise, the newly assigned or updated asset criticality levels will be factored in during the next hourly risk scoring calculation.
3429

3530
You can view, assign, change, or unassign asset criticality from the following places in the {elastic-sec} app:
3631

@@ -78,13 +73,15 @@ host,host-001,extreme_impact
7873

7974
To import a file:
8075

81-
. Go to **Manage** → **Asset criticality**.
76+
. Find **Entity Store** in the main menu or by using the {kibana-ref}/introduction.html#kibana-navigation-search[global search field].
8277
. Select or drag and drop the file you want to import.
8378
+
8479
NOTE: The file validation step highlights any lines that don't follow the required file structure. The asset criticality levels for those entities won't be assigned. We recommend that you fix any invalid lines and re-upload the file.
8580
. Click **Assign**.
8681

87-
This process overwrites any previously assigned asset criticality levels for the entities included in the imported file. The newly assigned or updated asset criticality levels are immediately visible within all asset criticality workflows and will impact entity risk scores during the next risk scoring calculation.
82+
This process overwrites any previously assigned asset criticality levels for the entities included in the imported file. The newly assigned or updated asset criticality levels are immediately visible within all asset criticality workflows.
83+
84+
You can trigger an immediate recalculation of entity risk scores by clicking **Recalculate entity risk scores now**. Otherwise, the newly assigned or updated asset criticality levels will be factored in during the next hourly risk scoring calculation.
8885

8986
[discrete]
9087
== Improve your security operations

docs/advanced-entity-analytics/entity-risk-scoring.asciidoc

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,7 @@ Entity risk scores are determined by the following risk inputs:
3030

3131
The resulting entity risk scores are stored in the `risk-score.risk-score-<space-id>` data stream alias.
3232

33-
[NOTE]
34-
======
35-
* Entities without any alerts, or with only `Closed` alerts, are not assigned a risk score.
36-
* To use asset criticality, you must enable the `securitySolution:enableAssetCriticality` <<enable-asset-criticality, advanced setting>>.
37-
======
33+
NOTE: Entities without any alerts, or with only `Closed` alerts, are not assigned a risk score.
3834

3935
[discrete]
4036
[[how-is-risk-score-calculated]]

docs/advanced-entity-analytics/ers-req.asciidoc

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,15 +40,11 @@ Follow these guidelines to ensure clusters have adequate memory to handle data v
4040
[discrete]
4141
=== Known limitations
4242

43-
* You can only enable the risk scoring engine in a single {kib} space within a cluster.
44-
45-
* The risk scoring engine uses an internal user role to score all hosts and users, and doesn't respect privileges applied to custom users or roles. After you turn on the risk scoring engine for a {kib} space, all alerts in the space will contribute to host and user risk scores.
43+
The risk scoring engine uses an internal user role to score all hosts and users, and doesn't respect privileges applied to custom users or roles. After you turn on the risk scoring engine for a {kib} space, all alerts in the space will contribute to host and user risk scores.
4644

4745
[discrete]
4846
== Asset criticality
4947

50-
To use the asset criticality feature, turn on the `securitySolution:enableAssetCriticality` <<enable-asset-criticality, advanced setting>>.
51-
5248
[discrete]
5349
=== Privileges
5450

docs/advanced-entity-analytics/ml-req.asciidoc

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,10 @@ To run and create {ml} jobs and rules, you need all of these:
77
* There must be at least one {ml} node in your cluster
88
* The `machine_learning_admin` user role
99

10+
Additionally, to configure <<alert-suppression,alert suppression>> for {ml} rules, your role needs the following {kibana-ref}/kibana-role-management.html#adding_index_privileges[index privilege]:
11+
12+
* `read` permission for the `.ml-anomalies-*` index
13+
1014
For more information, go to {ml-docs}/setup.html[Set up {ml-features}].
1115

1216
[IMPORTANT]

docs/cloud-native-security/kspm-get-started.asciidoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -128,14 +128,14 @@ If you are using the AWS visual editor to create and modify your IAM Policies, y
128128

129129
Follow AWS's https://aws.github.io/aws-eks-best-practices/security/docs/iam/#iam-roles-for-service-accounts-irsa[EKS Best Practices] documentation to use the https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html[IAM Role to Kubernetes Service-Account] (IRSA) feature to get temporary credentials and scoped permissions.
130130

131-
During setup, do not fill in any option in the "Setup Access" section. Instead click *Save and continue*.
131+
IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.
132132

133133
[discrete]
134134
[[kspm-use-instance-role]]
135135
==== Option 2 - Use default instance role
136136
Follow AWS's https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/iam-roles-for-amazon-ec2.html[IAM roles for Amazon EC2] documentation to create an IAM role using the IAM console, which automatically generates an instance profile.
137137

138-
During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.
138+
IMPORTANT: During setup, do not fill in any option in the "Setup Access" section. Click *Save and continue*.
139139

140140
[discrete]
141141
[[kspm-use-keys-directly]]

docs/dashboards/data-quality-dashboard.asciidoc

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Data does not appear in the dashboard until a user selects indices to check.
3535

3636
IMPORTANT: To customize which indices are checked when you click *Check all*, {security-guide}/data-views-in-sec.html[change the current data view].
3737

38-
* *Check a single index*: To check a single index, expand it using the arrow on the left. Checking a single index is faster than checking all indices.
38+
* *Check a single index*: To check a single index, click the **Check now** button under **Actions**. Checking a single index is faster than checking all indices.
3939

4040
Once checked, an index's data quality results persist indefinitely. You can see when the index was last checked, and generate updated results at any time.
4141

@@ -53,15 +53,24 @@ Click a node in the treemap to expand the corresponding index.
5353

5454
[discrete]
5555
== Learn more about checked index fields
56-
After an index is checked, an X (❌) or a checkmark (✅) appears in its *Result* column. The X (❌) indicates mapping problems in an index. To view index details, including which fields weren't successfully mapped, click the arrow next to the result to expand it.
56+
After an index is checked, a **Pass** or **Fail** status appears. **Fail** indicates mapping problems in an index. To view index check details, including which fields weren't successfully mapped, click the **Check now** button under **Actions**.
5757

5858
[role="screenshot"]
5959
image::images/data-qual-dash-detail.png[An expanded index with some failed results in the Data Quality dashboard]
6060

61-
When you expand a result, the *Summary* tab immediately helps you visualize the status of fields in that index. The other tabs display more details about particular fields, grouped by their mapping status.
61+
The index check flyout provides more information about the status of fields in that index. Each of its tabs describe fields grouped by mapping status.
6262

6363
NOTE: Fields in the *Same family* category have the correct search behavior, but might have different storage or performance characteristics (for example, you can index strings to both `text` and `keyword` fields). To learn more, refer to {ref}/mapping-types.html[Field data types].
6464

65+
[discrete]
66+
== View historical data quality results
67+
68+
You can review an index's data quality history by clicking **View history** under **Actions**, or by clicking the **History** tab in the details flyout. You can filter the results by time and **Pass** / **Fail** status. Click a historical check to expand it and view more details.
69+
70+
image::images/data-qual-dash-history.png[The Data Quality dashboard]
71+
72+
NOTE: Recent historical data includes the **Incompatible fields** and **Same family** views. Legacy historical data only includes the **Incompatible fields** view.
73+
6574
[discrete]
6675
== Export data quality results
6776

@@ -73,8 +82,7 @@ You can share data quality results to help track your team's remediation efforts
7382
. Click *Copy to clipboard* to copy a Markdown report to your clipboard.
7483

7584
* Export results for one index:
76-
. Expand an index that has at least one incompatible field by clicking the arrow to the left of its *Result*.
77-
. From the *Summary* or *Incompatible fields* tab, select *Add to new case* to open a new <<cases-overview,case>>.
78-
. From the *Summary*, *Incompatible fields*, or *Same family* tab, click *Copy to clipboard* to copy a Markdown report to your clipboard.
85+
. View details for a checked index by clicking the **Check now** button under **Actions**.
86+
. From the **Incompatible fields** tab, select **Add to new case** to open a new <<cases-overview,case>>.
7987

8088
NOTE: For more information about how to fix mapping problems, refer to {ref}/mapping.html[Mapping].

0 commit comments

Comments
 (0)