Skip to content

[Security Solution] Rule run is failing for a CCS EQL with event absence due to the kibana.alert.ancestors.index value multiplication in the alerts #190201

Open

Description

Describe the bug:
Rule run is failing for a CCS EQL with event absence due to the kibana.alert.ancestors.index value multiplication in the alerts

Kibana/Elasticsearch Stack version:
8.15

Server OS version:

Browser and Browser OS versions:

Elastic Endpoint version:

Original install method (e.g. download page, yum, from source, etc.):

Functional Area (e.g. Endpoint management, timelines, resolver, etc.):

Pre-requisites:

  1. Have 2 clusters connected
  2. Have multiple documents indexed on remote cluster within the maxspan of 60 seconds
    e.g: 5000 documents with initial timestamp and 5000 documents with timestamp +30s
{
    "@timestamp": "2024-08-08T23:15:30.000Z",
    "host": {
      "name": "paulas-macbook-pro.local"
    },
    "agent": {
      "name": "Paulas-MacBook-Pro.local"
    }
  }

Steps to reproduce:

  1. In the primary cluster, create an EQL rule with the index pattern from the remote cluster and containing event absence in the query

e.g:

index pattern: paula_eql_2:my_index_eql_1

EQL query:

sequence by host.name with maxspan=60s
[ any where agent.name == "Paulas-MacBook-Pro.local" ]
![ any where agent.name == "host-test"]
image

Current behavior:
When the rule runs and alerts are genetared, kibana.alert.ancestors.index value is being multiplied repeatedly and it's causing a parse error and run failure.

It can be observed that the value of _index field when the query is directly ran is multiplied repeatedly:

image

From .internal.alerts-security.alerts-default-* index:
image

Expected behavior:
kibana.alert.ancestors.index value should NOT be multiplied

Screenshots (if relevant):

image
Screen.Recording.2024-08-08.at.4.26.23.PM.mov

Errors in browser console (if relevant):

Provide logs and/or server output (if relevant):

Any additional context (logs, chat logs, magical formulas, etc.):

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Metadata

Assignees

No one assigned

    Labels

    Team: SecuritySolutionSecurity Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.Team:Detection EngineSecurity Solution Detection Engine AreaTeam:Detections and RespSecurity Detection Response TeambugFixes for quality problems that affect the customer experienceimpact:mediumAddressing this issue will have a medium level of impact on the quality/strength of our product.

    Type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions