-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security][Detections] Create Threshold-based Rule type #68409
Comments
Pinging @elastic/siem (Team:SIEM) |
Hi @spong , This is really encouraging and definitely a required feature. I just had a question on how do we handle data that is coming with a delay? I agree that this is a broad question, and not really something that should concern the log aggregator. But in reality, getting logs in realtime is not always feasible. An obvious workaround would be to increase the timeframe, but then you have to accept a delay in terms of rule triggers! |
Hey there @NerdSec -- thanks for commenting! 🙂 To better handle delayed events we'll be adding the ability to specify a Hope this helps! |
One small input here. In most of the use cases we have implemented, we ended up needing the Some use cases:
I am not sure if it was the correct route, but we implemented a terms agg/cardinality with a bucket selector to choose which events matched our condition! |
Had discussion with @spong @MikePaquette @marrasherrier to answer questions and decrease scope.
|
This is completed and shipping, so closing the ticket now. |
Resolved by #71371! Thanks again @patrykkopycinski |
This issue is for creating a new rule type based on thresholds/aggregations, and can appear as a separate card for selection within the
Define Rule
section of theCreate Rule
flow.There are actually several kinds of aggregation-based rules that could fall in here: # hits, sum, terms, significant terms, etc.
Latest mocks:
cc @marrasherrier
The text was updated successfully, but these errors were encountered: