-
Notifications
You must be signed in to change notification settings - Fork 443
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[PAD] Add new advanced analytical security integration Privileged Access Detection #12864
Conversation
💚 Build Succeeded
History
|
|
@@ -0,0 +1,5 @@ | |||
- version: "0.0.1" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I feel that even if this is an experimental release it's still maybe worth of 0.5.0?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@susan-shu-c Do you know what difference would it make? Also, we've always shipped experimental as 0.0.1
, so I'm a bit reluctant.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
minor thing, but can we check if inputString is not null before iterating.
if (inputString != null) {
....
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mgarzon The if condition on line 20 is checking for the same.
I did one more test of the readme instructions and install on 9.0.0-SNAPSHOT locally, with test data from the applied ML cluster. The only thing I was not able to check were the component pipeline mappings, as I'm not sure how to test them outside of connecting Elastic Defend. I'm including my full test process. First I installed the PAD integration. Then I verified that the document I was using to test could be processed with the pipeline:
This output a value for
Then I added a custom ingest pipeline (and also verified this produced the same results through the GUI):
And a component template (same here, verified the same results through the GUI):
Then I rollover the data stream to create a new index:
The index then rolls over:
Finally when I put my document into the data stream:
I get an "all good":
But when I query the index or the data stream, I do not see a value for
|
@jmcarlock Thanks, Gus, for thoroughly testing the ingest pipeline. I'll run this step again on my end to investigate what's happening. |
@sodhikirti07 I think it's just an index issue since I am not enrolling an agent using Elastic Defend. Thanks for taking this up! Also, for some reason I wasn't able to get the mappings to work either. Here was the test command.
I had this issue testing with 8.17.2 and 9.0.0-SNAPSHOT. With both I do not have the default component template, which I think is only created when an agent is first enrolled and starts sending data. ![]() |
@jmcarlock I followed the above steps and can confirm that I can see the The custom index and component template are configured: ![]() ![]() The ![]() |
@elastic/ml-ui Can anyone from the ML UI team take a look at this PR? This is the initial release of our new security capability to detect privileged access. |
ML changes LGTM 🎉 |
Package pad - 0.0.1 containing this change is available at https://epr.elastic.co/package/pad/0.0.1/ |
Proposed commit message
Added new advanced analytical package to detect Privileged access in your environment.
Checklist
changelog.yml
file.Author's Checklist
How to test this PR locally
Related issues
Screenshots