Skip to content

[Security Solution] Rule Execution Log - technical debt #118324

Open

Description

Related to: #101013

Summary

As part of #101013 we implemented simple rule execution logging to .kibana-event-log-* indices via the event_log plugin. There is still a lot to do from the tech standpoint, and this ticket tries to capture all the outstanding technical issues.

To do

New data model

Stability and performance

Features

Misc

  • Encapsulate the current space id in the instance of IRuleExecutionLogClient. Remove it from parameters of its methods. (PR)
  • Implement a Rule Execution Logger scoped to a particular rule instance. (comment)
    • It would scope common parameters like rule itself, space id etc, and would provide a cleaner and simpler API for rule executors (PR)
    • It would be writing Kibana logs to the system logger in addition to logging execution events to Event Log. Rule executors would be using it instead of the system logger directly. (PR)
  • Add test coverage.
  • Improve Event Log's index bootstrapping logic to simplify development. Currently, in dev mode, if you update mappings of .kibana-event-log* indices, you won't easily get these updates in ES. If we look at x-pack/plugins/event_log/server/es/init.ts, seems like in order to propagate changes in the event log mappings to ES, we need to at least delete the index template, and then either delete the concrete indices or do a manual rollover after KIbana startup. Probably this could be solved via a "force upgrade index" setting of the event_log plugin that would be set to true locally.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions