Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[8.x] [Security Solution] add defend insights elastic assistant tool (#…
…198676) (#201104) # Backport This will backport the following commits from `main` to `8.x`: - [[Security Solution] add defend insights elastic assistant tool (#198676)](#198676) <!--- Backport version: 8.9.8 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) <!--BACKPORT [{"author":{"name":"Joey F. Poon","email":"[email protected]"},"sourceCommit":{"committedDate":"2024-11-19T10:07:42Z","message":"[Security Solution] add defend insights elastic assistant tool (#198676)\n\n### Summary\r\nAdds the new Defend Insights Elastic Assistant tool. This assistant tool\r\nprovides Elastic Defend configuration insights. For this initial PR,\r\nonly incompatible antivirus detection is supported. Telemetry is\r\ncollected for success and error events.\r\n\r\nFor incompatible antivirus detection, Defend Insights will review the\r\nlast 200 file events for the given endpoint and output suspected\r\nantiviruses. Improvements such as customizable event count and date\r\nrange will come in the future.\r\n\r\nThis PR does not include any UI, that will come in a separate PR. 3\r\ninternal APIs for interacting with Defend Insights are provided here:\r\n- `POST /defend_insights` for creating a new Defend Insight\r\n- `GET /defend_insights/{id}` for getting a Defend Insight\r\n- `GET /defend_insights` for getting multiple Defend Insights\r\n\t- available optional query params:\r\n\t\t- `size` - default 10\r\n\t\t- `ids`\r\n\t\t- `connector_id`\r\n\t\t- `type` - `incompatible_antivirus`\r\n\t\t- `status` - `running`, `completed`, `failed`, `canceled`\r\n\t\t- `endpoint_ids`\r\n\r\nThis initial implementation does not include the LangGraph/output\r\nchunking upgrades seen in Attack Discovery due to time constraints.\r\nWe'll look to make this upgrade in a future PR.\r\n\r\n### Checklist\r\n\r\n- [x] [Unit or functional\r\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\r\nwere updated or added to match the most common scenarios\r\n\r\n\r\n### For maintainers\r\n\r\n- [x] This was checked for breaking API changes and was [labeled\r\nappropriately](https://www.elastic.co/guide/en/kibana/master/contributing.html#_add_your_labels)","sha":"efc0568e014105637332533e37491f074ec8fe2b","branchLabelMapping":{"^v9.0.0$":"main","^v8.17.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","v9.0.0","Team:Defend Workflows","backport:all-open","v8.18.0"],"number":198676,"url":"https://github.com/elastic/kibana/pull/198676","mergeCommit":{"message":"[Security Solution] add defend insights elastic assistant tool (#198676)\n\n### Summary\r\nAdds the new Defend Insights Elastic Assistant tool. This assistant tool\r\nprovides Elastic Defend configuration insights. For this initial PR,\r\nonly incompatible antivirus detection is supported. Telemetry is\r\ncollected for success and error events.\r\n\r\nFor incompatible antivirus detection, Defend Insights will review the\r\nlast 200 file events for the given endpoint and output suspected\r\nantiviruses. Improvements such as customizable event count and date\r\nrange will come in the future.\r\n\r\nThis PR does not include any UI, that will come in a separate PR. 3\r\ninternal APIs for interacting with Defend Insights are provided here:\r\n- `POST /defend_insights` for creating a new Defend Insight\r\n- `GET /defend_insights/{id}` for getting a Defend Insight\r\n- `GET /defend_insights` for getting multiple Defend Insights\r\n\t- available optional query params:\r\n\t\t- `size` - default 10\r\n\t\t- `ids`\r\n\t\t- `connector_id`\r\n\t\t- `type` - `incompatible_antivirus`\r\n\t\t- `status` - `running`, `completed`, `failed`, `canceled`\r\n\t\t- `endpoint_ids`\r\n\r\nThis initial implementation does not include the LangGraph/output\r\nchunking upgrades seen in Attack Discovery due to time constraints.\r\nWe'll look to make this upgrade in a future PR.\r\n\r\n### Checklist\r\n\r\n- [x] [Unit or functional\r\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\r\nwere updated or added to match the most common scenarios\r\n\r\n\r\n### For maintainers\r\n\r\n- [x] This was checked for breaking API changes and was [labeled\r\nappropriately](https://www.elastic.co/guide/en/kibana/master/contributing.html#_add_your_labels)","sha":"efc0568e014105637332533e37491f074ec8fe2b"}},"sourceBranch":"main","suggestedTargetBranches":["8.x"],"targetPullRequestStates":[{"branch":"main","label":"v9.0.0","labelRegex":"^v9.0.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/198676","number":198676,"mergeCommit":{"message":"[Security Solution] add defend insights elastic assistant tool (#198676)\n\n### Summary\r\nAdds the new Defend Insights Elastic Assistant tool. This assistant tool\r\nprovides Elastic Defend configuration insights. For this initial PR,\r\nonly incompatible antivirus detection is supported. Telemetry is\r\ncollected for success and error events.\r\n\r\nFor incompatible antivirus detection, Defend Insights will review the\r\nlast 200 file events for the given endpoint and output suspected\r\nantiviruses. Improvements such as customizable event count and date\r\nrange will come in the future.\r\n\r\nThis PR does not include any UI, that will come in a separate PR. 3\r\ninternal APIs for interacting with Defend Insights are provided here:\r\n- `POST /defend_insights` for creating a new Defend Insight\r\n- `GET /defend_insights/{id}` for getting a Defend Insight\r\n- `GET /defend_insights` for getting multiple Defend Insights\r\n\t- available optional query params:\r\n\t\t- `size` - default 10\r\n\t\t- `ids`\r\n\t\t- `connector_id`\r\n\t\t- `type` - `incompatible_antivirus`\r\n\t\t- `status` - `running`, `completed`, `failed`, `canceled`\r\n\t\t- `endpoint_ids`\r\n\r\nThis initial implementation does not include the LangGraph/output\r\nchunking upgrades seen in Attack Discovery due to time constraints.\r\nWe'll look to make this upgrade in a future PR.\r\n\r\n### Checklist\r\n\r\n- [x] [Unit or functional\r\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\r\nwere updated or added to match the most common scenarios\r\n\r\n\r\n### For maintainers\r\n\r\n- [x] This was checked for breaking API changes and was [labeled\r\nappropriately](https://www.elastic.co/guide/en/kibana/master/contributing.html#_add_your_labels)","sha":"efc0568e014105637332533e37491f074ec8fe2b"}},{"branch":"8.18","label":"v8.18.0","labelRegex":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}] BACKPORT-->
- Loading branch information