Skip to content

Commit

Permalink
[SecuritySolution][Detections] Fixes rule status migration when alert…
Browse files Browse the repository at this point in the history
…Id is not a string (elastic#117962)

## Summary

Resolves elastic#116423, and adds an e2e test catching this behavior as we can't test via the migration test harness since the `siem-detection-engine-rule-status` SO isn't exposed within the SO Manager UI.

Also adds note with regards to changes necessary once core issue elastic#115153 is resolved. See https://github.com/elastic/kibana/pull/114585/files#r729620927. Note: existing `find_statuses`/`find_rules` integration tests will fail once fixed, so no additional tests necessary. 



### Checklist

Delete any items that are not applicable to this PR.

- [X] [Unit or functional tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html) were updated or added to match the most common scenarios
  • Loading branch information
spong authored and kibanamachine committed Nov 9, 2021
1 parent 0751c78 commit e1cbfe2
Show file tree
Hide file tree
Showing 5 changed files with 71 additions and 3 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -136,7 +136,6 @@ describe.each([

describe('mergeStatuses', () => {
it('merges statuses and converts from camelCase saved object to snake_case HTTP response', () => {
//
const statusOne = exampleRuleStatus();
statusOne.attributes.status = RuleExecutionStatus.failed;
const statusTwo = exampleRuleStatus();
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -67,6 +67,9 @@ export const ruleStatusSavedObjectsClientFactory = (
type: 'alert',
}));
const order: 'desc' = 'desc';
// NOTE: Once https://github.com/elastic/kibana/issues/115153 is resolved
// ${legacyRuleStatusSavedObjectType}.statusDate will need to be updated to
// ${legacyRuleStatusSavedObjectType}.attributes.statusDate
const aggs = {
references: {
nested: {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -50,9 +50,13 @@ export const legacyMigrateRuleAlertIdSOReferences = (
const { alertId, ...otherAttributes } = doc.attributes;
const existingReferences = doc.references ?? [];

// early return if alertId is not a string as expected
// early return if alertId is not a string as expected, still removing alertId as the mapping no longer exists
if (!isString(alertId)) {
return { ...doc, references: existingReferences };
return {
...doc,
attributes: otherAttributes,
references: existingReferences,
};
}

const alertReferences = legacyMigrateAlertId({
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -154,6 +154,37 @@ export default ({ getService }: FtrProviderContext): void => {
lastLookBackDate: null,
});
});

// If alertId is not a string/null ensure it is removed as the mapping was removed and so the migration would fail.
// Specific test for this as e2e tests will not catch the mismatch and we can't use the migration test harness
// since this SO is not importable/exportable via the SOM.
// For details see: https://github.com/elastic/kibana/issues/116423
it('migrates legacy siem-detection-engine-rule-status and removes alertId when not a string', async () => {
const response = await es.get<{
'siem-detection-engine-rule-status': IRuleStatusSOAttributes;
}>(
{
index: '.kibana',
id: 'siem-detection-engine-rule-status:d62d2980-27c4-11ec-92b0-f7b47106bb36',
},
{ meta: true }
);
expect(response.statusCode).to.eql(200);

expect(response.body._source?.['siem-detection-engine-rule-status']).to.eql({
statusDate: '2021-10-11T20:51:26.622Z',
status: 'succeeded',
lastFailureAt: '2021-10-11T18:10:08.982Z',
lastSuccessAt: '2021-10-11T20:51:26.622Z',
lastFailureMessage:
'4 days (323690920ms) were not queried between this rule execution and the last execution, so signals may have been missed. Consider increasing your look behind time or adding more Kibana instances. name: "Threshy" id: "fb1046a0-0452-11ec-9b15-d13d79d162f3" rule id: "b789c80f-f6d8-41f1-8b4f-b4a23342cde2" signals index: ".siem-signals-spong-default"',
lastSuccessMessage: 'succeeded',
gap: '4 days',
bulkCreateTimeDurations: ['34.49'],
searchAfterTimeDurations: ['62.58'],
lastLookBackDate: null,
});
});
});
});
};
Original file line number Diff line number Diff line change
Expand Up @@ -61,3 +61,34 @@
}
}

{
"type": "doc",
"value": {
"id": "siem-detection-engine-rule-status:d62d2980-27c4-11ec-92b0-f7b47106bb36",
"index": ".kibana_1",
"source": {
"siem-detection-engine-rule-status": {
"alertId": 1337,
"statusDate": "2021-10-11T20:51:26.622Z",
"status": "succeeded",
"lastFailureAt": "2021-10-11T18:10:08.982Z",
"lastSuccessAt": "2021-10-11T20:51:26.622Z",
"lastFailureMessage": "4 days (323690920ms) were not queried between this rule execution and the last execution, so signals may have been missed. Consider increasing your look behind time or adding more Kibana instances. name: \"Threshy\" id: \"fb1046a0-0452-11ec-9b15-d13d79d162f3\" rule id: \"b789c80f-f6d8-41f1-8b4f-b4a23342cde2\" signals index: \".siem-signals-spong-default\"",
"lastSuccessMessage": "succeeded",
"gap": "4 days",
"bulkCreateTimeDurations": [
"34.49"
],
"searchAfterTimeDurations": [
"62.58"
],
"lastLookBackDate": null
},
"type": "siem-detection-engine-rule-status",
"references": [],
"coreMigrationVersion": "7.14.0",
"updated_at": "2021-10-11T20:51:26.657Z"
}
}
}

0 comments on commit e1cbfe2

Please sign in to comment.