-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security Solution] Detection rule migration mechanism #187651
Comments
Pinging @elastic/response-ops (Team:ResponseOps) |
Pinging @elastic/security-solution (Team: SecuritySolution) |
Pinging @elastic/security-detections-response (Team:Detections and Resp) |
Pinging @elastic/security-detection-rule-management (Team:Detection Rule Management) |
Pinging @elastic/security-detection-engine (Team:Detection Engine) |
After discussing with @approksiu we see 3 potential new fields that we might want to add to rules soon (exact parameter names tbd):
As these 3 are net new fields and we do not see a near term use case where rule migrations are a hard blocker, I think it's appropriate to prioritize cc @kobelb - in summary, I'm comfortable giving rule migrations lower priority than |
@marshallmain thank you for tracking down the product needs so quickly. |
Epics: https://github.com/elastic/security-team/issues/1974 (internal), #174168
Blocker for: #184113
Related to: #50216
Summary
This is our own ticket to track the development of a mechanism for migrating rules in the Alerting Framework. The ResponseOps team tracks it in #50216.
In Security Solution, we can use this ticket to plan our own work on the mechanism, e.g. we can contribute to its design, propose any solutions, or open an RFC.
The text was updated successfully, but these errors were encountered: