-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security Solution][Detections] Support querying with multiple timestamps in Detection Rules #75382
Comments
Pinging @elastic/siem (Team:SIEM) |
I have a working solution for this here. However, I could use some input / ideas on how to communicate this logic to the end user. Specifically regarding the following situation: If I as a customer have a rule defined to query two indices named |
With the introduction of the Timestamp Override feature to Detection Rules in
7.9
, we added the ability for users to select another timestamp field (other than@timestamp
) to be used when querying for data during Rule execution. This functionality is key to minimizing gaps when data is delayed (endpoint offline for multiple days) as we can now ensure Detection Rules will use the timestamp closest to ingest time likeevent.ingested
.While this helps minimize gaps, support for
event.ingested
is still sparse, and so in effort to support the transition to using this new timestamp field, the Detection Engine will need the ability to search using multiple timestamp fields in case some data is missing the specified timestamp override field.For example, a certain rule may query against the
winlogbeat-*
index, but only a subset of winlogbeat modules may supportevent.ingested
. So if thetimestamp override
is configured to useevent.ingested
, the rule will now only fire against the data from these updated modules, which could very well result in missed alerts.One potential solution as @tsg mentioned:
Following this direction, we'll want ensure that the query also sorts the timestamps accordingly such that it conforms with our gap detection mitigation efforts, and also that our de-duplication logic is not affected by these changes (should be good here as we use the index+id to create a unique composite key, and not the timestamp).
The text was updated successfully, but these errors were encountered: