Commit graph

85780 commits

Author SHA1 Message Date
Catherine Liu
5dda37e53f
[Serialized State Only] Book embeddable (#218343)
## Summary

This removes runtime state from the book example embeddable.

*Note: This PR does not need to be reviewed by external teams, only
presentation team. This PR merges into a feature branch that Kibana
presentation team is working on to convert the embeddable framework to
only expose serialized state. Your team will be pinged for review once
the work is complete and the [final
PR](https://github.com/elastic/kibana/pull/217239) opens that merges the
feature branch into main

### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...
2025-04-18 17:17:33 -07:00
Nick Peihl
236fb0ce5d
[Serialized State Only] Alerts embeddable serialized state only (#218684)
_This PR does not need to be reviewed by external teams. This PR merges
into a feature branch that Kibana presentation team is working on to
convert the embeddable framework to only expose serialized state. Your
team will be pinged for review once the work is complete and the final
PR opens that merges the feature branch into main._

## Summary

Converts the Alerts embeddable table to serialized state only

This embeddable is not in use yet. Testing requires uncommenting [this
line](f1eb019b7b/x-pack/platform/plugins/shared/embeddable_alerts_table/public/plugin.ts (L36))
in the embeddable alerts table plugin.
2025-04-18 17:01:46 -04:00
Nick Peihl
55a8c7ff96
[Serialized State Only] [SLO] Convert SLO Error Budget embeddable to serialized state only (#218464)
_This PR does not need to be reviewed by external teams. This PR merges
into a feature branch that Kibana presentation team is working on to
convert the embeddable framework to only expose serialized state. Your
team will be pinged for review once the work is complete and the final
PR opens that merges the feature branch into main._

## Summary

Convert SLO Error Budget embeddable to serialized state only

## Testing this PR

Create an SLO using the "How to Test" section in the description of
[this PR](https://github.com/elastic/kibana/pull/179147).
2025-04-18 15:11:34 -04:00
Nathan Reese
6deb95d780
convert traces embeddable to serialized state only (#218667) 2025-04-18 12:17:08 -06:00
Elastic Machine
d5e57af9ab
Merge branch 'main' into embeddable-serialized-state 2025-04-18 18:48:15 +02:00
Nathan Reese
1e2d7d6859
Convert control group embeddable to serialized state only (#218370) 2025-04-18 10:45:17 -06:00
Kylie Meli
bb38af57f7
[Fleet][AI4DSOC] Adding new config to enable prerelease integrations by default (#218489)
## Summary

Introduces a new fleet config variable to be able to set the default the
fleet setting for `prerelease_integrations_enabled`.

This is to be used in the new search_ai_lake tier for the ai4dsoc
project as we want to enable pre-release versions by default.

## How to test

1. Set `xpack.fleet.prereleaseEnabledByDefault: true` in your
`kibana.dev.yml`
2. Start up elasticsearch and kibana
3. Navigate to the integrations page and the toggle to enable should be
on
<img width="750" alt="Screenshot 2025-04-16 at 3 25 50 PM"
src="https://github.com/user-attachments/assets/17d14630-94f5-4f2a-ab32-d733d0b36d48"
/>

OR

1. Add the following to `serverless.security.dev.yml`:
```
xpack.securitySolutionServerless.productTypes:
[
  { product_line: 'ai_soc', product_tier: 'search_ai_lake' },
]
```
2. Restart Kibana serverless for security
3. Navigate to the Configurations -> Integrations page
4. Click on the 'Splunk' integration and verify it loads the page
<img width="750" alt="Screenshot 2025-04-16 at 5 15 28 PM"
src="https://github.com/user-attachments/assets/ba4bf986-1b47-4703-9f33-9a0a7a437539"
/>

___ 
Relates: https://github.com/elastic/security-team/issues/11789
2025-04-18 12:18:32 -04:00
Ievgen Sorokopud
2a97766b9d
[Attack Discovery][Scheduling] Revert removed AD scheduling route registration (#218649)
## Summary

These changes revert accidentally removed attack discovery scheduling
routes registration by this PR
https://github.com/elastic/kibana/pull/218018/files#diff-fc08114e3940ca525cd8a2b7d746786ddabf8d27f8595438cdfc19371ee23831L44

Since the changes from that PR did not go into the `8.19`, we would not
need the backport to that branch.

## NOTES

The feature is hidden behind the feature flag (in `kibana.dev.yml`):

```
feature_flags.overrides:
  securitySolution.assistantAttackDiscoverySchedulingEnabled: true
```
2025-04-18 17:57:38 +02:00
christineweng
095ee417e8
[Security Solution] Replace sourcerer in analyzer (#218183)
## Summary

Replace sourcerer in analyzer to use dataview picker when
`newDataViewPickerEnabled` is on.


![image](https://github.com/user-attachments/assets/077329ce-2510-4d6f-bc55-89b6b636df4f)


### Checklist

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
2025-04-18 10:09:14 -05:00
elastic-renovate-prod[bot]
b1887104c1
Update dependency @launchdarkly/node-server-sdk to ^9.8.0 (main) (#218366)
This PR contains the following updates:

| Package | Type | Update | Change |
|---|---|---|---|
|
[@launchdarkly/node-server-sdk](https://redirect.github.com/launchdarkly/js-core/tree/main/packages/sdk/server-node)
([source](https://redirect.github.com/launchdarkly/js-core)) |
dependencies | minor | [`^9.7.7` ->
`^9.8.0`](https://renovatebot.com/diffs/npm/@launchdarkly%2fnode-server-sdk/9.7.7/9.8.0)
|

---

### Configuration

📅 **Schedule**: Branch creation - At any time (no schedule defined),
Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you
are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the
rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update
again.

---

- [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check
this box

---

This PR has been generated by [Renovate
Bot](https://redirect.github.com/renovatebot/renovate).

<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzOS4xMDcuMCIsInVwZGF0ZWRJblZlciI6IjM5LjEwNy4wIiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6WyJUZWFtOkNvcmUiLCJUZWFtOlNlY3VyaXR5IiwiYmFja3BvcnQ6cHJldi1taW5vciIsInJlbGVhc2Vfbm90ZTpza2lwIl19-->

Co-authored-by: elastic-renovate-prod[bot] <174716857+elastic-renovate-prod[bot]@users.noreply.github.com>
Co-authored-by: Jean-Louis Leysens <jeanlouis.leysens@elastic.co>
2025-04-18 14:21:32 +02:00
Kibana Machine
235d661809
[api-docs] 2025-04-18 Daily api_docs build (#218635)
Generated by
https://buildkite.com/elastic/kibana-api-docs-daily/builds/1046
2025-04-18 08:29:47 +02:00
Yuliia Naumenko
221c199ed1
[Search Connectors][Serverless] Add Search Connectors UI to the Stack Management data Section (#213509)
**!!MAJORITY OF THE CHANGED FILES ARE MOVED OR COPIED!!**

### Vision

According to the product vision we will build a new simple UI/UX in the
future https://github.com/elastic/security-team/issues/11790

This PR is a first iteration on enabling Content Connectors Management
UI in Serverless Kibana Stack Management.
Elastic Managed content connectors will be available only for Security
and Observability projects.
### Current PR scope

1. Used initial search_connectors plugin and renamed it to
content_connectors + moved from `x-pack/solutions/search` to
`x-pack/platform/plugins/shared`
2. Copy relevant connectors UI and routes from enterprise_search plugin.
3. Introduce the new Stack Management card/navigation option under the
Data section.
4. Enabled this plugin only in Serverless for Security and Observability
projects.
5. For making PR smaller Pipelines tab was not moved. And according to
Search team vision this functionality should be dropped anyway soon.
6. Extended fleet package logic to include elastic_connectors for
security and o11y serverless projects
7. Added back `search:agentless-connectors-manager` task

In Stack Management navigation:
<img width="2062" alt="Screenshot 2025-04-15 at 3 51 43 PM"
src="https://github.com/user-attachments/assets/5c93ba01-9a6a-4eac-a21d-1370f03b8f35"
/>

Stack Management cards:
<img width="2081" alt="Screenshot 2025-04-10 at 8 41 43 PM"
src="https://github.com/user-attachments/assets/3def1c12-561b-4a84-8241-4dd61cd9313d"
/>


Create Elastic Managed Connector UI (on Agentless):

<img width="1822" alt="Screenshot 2025-04-15 at 3 55 29 PM"
src="https://github.com/user-attachments/assets/6e9fea48-85e7-43df-919d-0e5492d0e704"
/>

Create Self Managed Connector UI:

<img width="2064" alt="Screenshot 2025-04-15 at 3 55 49 PM"
src="https://github.com/user-attachments/assets/d5051898-c8fa-4e41-b9ea-b41d4ed4a0d5"
/>

### Next steps

- [ ] Remove duplicated code between content_connectors,
enterprise_search and serverless_search
- [ ] Extract [common server
libs](https://github.com/elastic/kibana/tree/main/x-pack/solutions/search/plugins/enterprise_search/server/lib)
to the shared package `kbn-search-connectors`

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
Co-authored-by: Steph Milovic <stephanie.milovic@elastic.co>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
Co-authored-by: Artem Shelkovnikov <artem.shelkovnikov@elastic.co>
Co-authored-by: Artem Shelkovnikov <lavatroublebubble@gmail.com>
Co-authored-by: Kyle Pollich <kyle.pollich@elastic.co>
2025-04-18 04:50:56 +02:00
Tiago Costa
a8bdab815b
chore(NA): remove 8.16 from renovate 2025-04-18 03:35:46 +01:00
Steph Milovic
ba0894daa6
[AI4DSOC] Alert Flyout (#218018)
## Summary

Alert flyout for AI for the SOC. 
<img width="600" alt="Screenshot 2025-04-11 at 12 15 22 PM"
src="https://github.com/user-attachments/assets/fea2f7fb-7424-46b5-b9c2-5cafa336b0a9"
/>

### The flyout sections include:
- New header highlighting the integration source
<img width="596" alt="Screenshot 2025-04-11 at 12 16 00 PM"
src="https://github.com/user-attachments/assets/13033225-9e41-431f-8061-5df96a981665"
/>

- AI generated alert summary generated by button (Generate or
Regenerate). Stored in a new data stream
(`.kibana-elastic-ai-assistant-alert-summary-*`)
<img width="595" alt="Screenshot 2025-04-11 at 12 15 55 PM"
src="https://github.com/user-attachments/assets/ac835db2-2cbb-4a59-9e71-f1a9616a777f"
/>
- Anonymization toggle for the alert summary is located in the flyout
gear settings menu
<img width="270" alt="Screenshot 2025-04-11 at 12 32 45 PM"
src="https://github.com/user-attachments/assets/952936b9-571b-48e5-bd57-ecfd33855df3"
/>
- Highlighted fields
<img width="600" alt="Screenshot 2025-04-11 at 12 15 52 PM"
src="https://github.com/user-attachments/assets/3fccfab2-3e8b-4edc-adaf-3f320d9a5d20"
/>
- Attack discovery `MiniAttackChain` (currently hardcoded to a
preconfigured connector, waiting for further work from @andrew-goldstein
to hook up to actual alert related AD)
<img width="597" alt="Screenshot 2025-04-11 at 12 15 36 PM"
src="https://github.com/user-attachments/assets/d181f68d-5b77-4df4-a316-54e84d655a4c"
/>
- Conversations dropdown that show any conversations this alert is
referenced
<img width="601" alt="Screenshot 2025-04-11 at 12 18 03 PM"
src="https://github.com/user-attachments/assets/71d533d3-99b4-49c4-b336-05152fd64ed4"
/>
- Suggested prompts that create a new conversation with the alert as
context (_copy pending_)
<img width="594" alt="Screenshot 2025-04-11 at 12 18 09 PM"
src="https://github.com/user-attachments/assets/bca58f5a-f05c-4cdf-a466-0926c99e0ad6"
/>
- The connector used in the alert summary generation is selected in
Stack Management > Advanced Settings > Security Solution > Default AI
Connector (_copy pending_)
<img width="1163" alt="Screenshot 2025-04-11 at 12 34 15 PM"
src="https://github.com/user-attachments/assets/d2128497-22e4-4c14-b08c-991dc8287391"
/>

### New prompts
This PR adds 2 new prompts under a new `promptGroupId.aiForSoc`:
    - `promptDictionary.alertSummarySystemPrompt`
    - `promptDictionary.alertSummary`
In order to access these prompts in the proper spots, the new find alert
summary route returns the "user" prompt
(`promptDictionary.alertSummary`). In order to get the system prompt in
place, we pass a `promptIds` object to the
`POST_ACTIONS_CONNECTOR_EXECUTE` which is appended to the main system
prompt

## Testing

This needs to be ran in Serverless:
- `yarn es serverless --projectType security`
- `yarn serverless-security --no-base-path`

You also need to enable the AI for SOC tier, by adding the following to
your `serverless.security.dev.yml` file:
```
xpack.securitySolutionServerless.productTypes:
  [
    { product_line: 'ai_soc', product_tier: 'search_ai_lake' },
  ]
```

Use one of these Serverless users:
- `platform_engineer`
- `endpoint_operations_analyst`
- `endpoint_policy_manager`
- `admin`
- `system_indices_superuser`

Then:
- generate data: `yarn test:generate:serverless-dev`
- create 4 catch all rules, each with a name of a AI for SOC integration
(`google_secops`, `microsoft_sentinel`,, `sentinel_one` and
`crowdstrike`) => to do that you'll need to temporary comment the
`serverless.security.dev.yaml` config changes as the rules page is not
accessible in AI for SOC.
- change [this
line](https://github.com/elastic/kibana/blob/main/x-pack/solutions/security/plugins/security_solution/public/detections/hooks/alert_summary/use_fetch_integrations.ts#L73)
to `installedPackages: availablePackages` to force having some packages
installed
- change [this
line](https://github.com/elastic/kibana/blob/main/x-pack/solutions/security/plugins/security_solution/public/detections/hooks/alert_summary/use_integrations.ts#L63)
to `r.name === p.name` to make sure there will be matches between
integrations and rules

With this alerts data, you should be able to test each section of the
flyout _except_ the attack discovery widget, instructions for that are
below.

#### Attack discovery widget

As I am waiting for updates from Andrew, currently the attack discovery
widget looks up attack discoveries from a particular preconfigured
connector. In order to test:
1. Add preconfigured connector to your `kibana.dev.yml`:
https://p.elstc.co/paste/J2qmGMeQ#GKSPhlggX4F93aUSKJsKpsqtCcyTepCkfJOEVxlZyfB
2. Generate attack discovery with this connector
3. Open the new flyout, you will see the attack discovery widget

## Outstanding TODOs

These are all noted in the code
1. Attack discovery widget is hardcoded to the preconfigured connector
id. The widget should instead look up discoveries by alert ID, pending
work from @andrew-goldstein
2. Update copy for suggested prompts
3. Update copy for ai connector UI setting
4. Update AI connector UI setting to default to Elastic Managed LLM once
it is fully available in serverless

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
Co-authored-by: PhilippeOberti <philippe.oberti@elastic.co>
Co-authored-by: Angela Chuang <yi-chun.chuang@elastic.co>
2025-04-18 01:08:23 +00:00
Philippe Oberti
add6e303d2
[AI4DSOC] Alert summary table and flyout ai assistant (#217744)
## Summary

This PR builds up on the previous
https://github.com/elastic/kibana/pull/216744 and the AI assistant in 2
places in the AI for SOC alert summary page:
- in each row of the alert table as a row action
- in the footer of the alert details flyout


https://github.com/user-attachments/assets/65fb10f1-c22b-4796-9109-3b7dbdba6313

To keep consistency between the alert summary and the alerts page, this
PR also removes the Chat icon button in the header of the alert details
flyout and adds a `Ask AI Assistant` button in the footer.

| Before  | After |
| ------------- | ------------- |
| ![Screenshot 2025-04-15 at 11 54
36 PM](https://github.com/user-attachments/assets/b6039081-d5b8-4bf7-ada1-af3844e17bad)
| ![Screenshot 2025-04-15 at 11 54
09 PM](https://github.com/user-attachments/assets/6833a89c-931e-4eb3-be93-4fc1e2ed96e2)
|

## How to test

This needs to be ran in Serverless:
- `yarn es serverless --projectType security`
- `yarn serverless-security --no-base-path`

You also need to enable the AI for SOC tier, by adding the following to
your `serverless.security.dev.yaml` file:
```
xpack.securitySolutionServerless.productTypes:
  [
    { product_line: 'ai_soc', product_tier: 'search_ai_lake' },
  ]
```

Use one of these Serverless users:
- `platform_engineer`
- `endpoint_operations_analyst`
- `endpoint_policy_manager`
- `admin`
- `system_indices_superuser`

Then:
- generate data: `yarn test:generate:serverless-dev`
- create 4 catch all rules, each with a name of a AI for SOC integration
(`google_secops`, `microsoft_sentinel`,, `sentinel_one` and
`crowdstrike`)
- change [this
line](https://github.com/elastic/kibana/blob/main/x-pack/solutions/security/plugins/security_solution/public/detections/hooks/alert_summary/use_fetch_integrations.ts#L73)
to `installedPackages: availablePackages` to force having some packages
installed
- change [this
line](https://github.com/elastic/kibana/blob/main/x-pack/solutions/security/plugins/security_solution/public/detections/hooks/alert_summary/use_integrations.ts#L63)
to `r.name === p.name` to make sure there will be matches between
integrations and rules

### Checklist

- [x] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios

https://github.com/elastic/security-team/issues/11973
2025-04-18 00:37:06 +00:00
Saikat Sarkar
da5e8cc6e9
[Onboarding] Make navigation consistent on stack (#218364)
## Summary

The navigation differs slightly between Serverless and Stack. To ensure
consistency, this PR introduces the following changes to Stack.

- `Dev Tools` has been moved to `Build` on top of Playground
- `Content` has been updated to `Data`
- `Kibana` has been renamed to `Analyze`
-  Reorder the sections in Serverless to match the order used in Stack

### Stack
<img width="1024" alt="Screenshot 2025-04-16 at 4 58 41 PM"
src="https://github.com/user-attachments/assets/6eaac498-b423-4cc3-a524-2dfd586f1b04"
/>


### Serverless 
<img width="935" alt="Screenshot 2025-04-16 at 2 21 44 PM"
src="https://github.com/user-attachments/assets/5c3a2fc4-d277-4d47-92ab-d97850b79978"
/>




### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [x] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...
2025-04-18 02:18:30 +02:00
Alexi Doak
5667c6cc43
[ResponseOps] Schema changes for ES|QL rule type improvements - adding grouping per row (#217898)
Related to https://github.com/elastic/response-ops-team/issues/201

## Summary

Schema changes for intermediate release related to this PR,
https://github.com/elastic/kibana/pull/212135.

This PR adds a new `row` option and validation for the ES query rule
`groupBy` field.


### Checklist

- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
2025-04-17 14:15:54 -07:00
elastic-renovate-prod[bot]
5454ce5bbd
Update docker.elastic.co/wolfi/chainguard-base-fips:latest Docker digest to 88dc781 (main) (#218590)
This PR contains the following updates:

| Package | Update | Change |
|---|---|---|
| docker.elastic.co/wolfi/chainguard-base-fips | digest | `b6d3d24` ->
`88dc781` |

---

### Configuration

📅 **Schedule**: Branch creation - At any time (no schedule defined),
Automerge - At any time (no schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you
are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the
rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update
again.

---

- [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check
this box

---

This PR has been generated by [Renovate
Bot](https://redirect.github.com/renovatebot/renovate).

<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzOS4xMDcuMCIsInVwZGF0ZWRJblZlciI6IjM5LjEwNy4wIiwidGFyZ2V0QnJhbmNoIjoibWFpbiIsImxhYmVscyI6WyJUZWFtOk9wZXJhdGlvbnMiLCJiYWNrcG9ydDpza2lwIiwiY2k6YnVpbGQtZG9ja2VyLWZpcHMiLCJyZWxlYXNlX25vdGU6c2tpcCJdfQ==-->

Co-authored-by: elastic-renovate-prod[bot] <174716857+elastic-renovate-prod[bot]@users.noreply.github.com>
2025-04-17 13:42:06 -06:00
Ievgen Sorokopud
85093e5de7
[Attack Discovery][Scheduling] UI: Schedule details and editing flows (#12006) (#218572)
## Summary

Main ticket ([Internal
link](https://github.com/elastic/security-team/issues/12006))

These changes add Schedule Details and Editing workflows allowing users
to see schedule information in a separate flyout and/or update the
schedule parameters within it.

## NOTES

The feature is hidden behind the feature flag (in `kibana.dev.yml`):

```
feature_flags.overrides:
  securitySolution.assistantAttackDiscoverySchedulingEnabled: true
```

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
2025-04-17 21:19:22 +02:00
Gabriel Landau
906c8978e7
Advanced policy opt-out for scan-on-event (#218354)
## Summary

Allow users to opt out of scan-on-event to help troubleshoot and resolve
performance issues.

## Release note

{elastic-defend} users can now opt out of event-driven Memory Protection
scanning via advanced policy.

### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [x] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

---------

Co-authored-by: Konrad Szwarc <konrad.szwarc@elastic.co>
2025-04-17 15:00:15 -04:00
Alexey Antonov
78bf949dbf
fix: [Platform:StackManagement:Kibana:Spaces] Assign roles to a space flyout announced incorrectly (#218576)
Closes: #218351

**Description**
When user clicks on assign new roles to a space button, the resulting
flyout gets announced incorrectly as "you are in a modal dialog..."
which doesn't give any context to non-sighted user.

**Changes made:**
1. added 'aria-labelledby' attribute

**Screen:**
<img width="1323" alt="image"
src="https://github.com/user-attachments/assets/63ffdcca-2139-4302-9dce-ded3a4d3b9a2"
/>
2025-04-17 21:52:56 +03:00
Philippe Oberti
a7be37e1cd
[Security Solution][Expandable flyout] minor performance improvements (#218503)
## Summary

This PR performs some very minor performance improvements to the
`expandable-flyout` package:
- prevent unnecessary re-renders by extracting styles to const
- better use of `useCallback`

No UI or behavior changes are introduced.


https://github.com/user-attachments/assets/c7f55a4e-7f98-4c18-bb22-f8b81a11e626
2025-04-17 20:07:46 +02:00
Sebastián Zaffarano
c9b3a3e27b
[Security Solution][Telemetry] Add index metadata EBT event (#218546)
## Summary



- Fix https://github.com/elastic/kibana/issues/216044
- Add a new EBT event collecting index template info
    ```typescript
    export interface IndexTemplateInfo {
      template_name: string;
      index_mode: Nullable<string>;
      datastream: boolean;
      package_name: Nullable<string>;
      managed_by: Nullable<string>;
      beat: Nullable<string>;
      is_managed: Nullable<boolean>;
      composed_of: string[];
      source_enabled: Nullable<boolean>;
      source_includes: string[];
      source_excludes: string[];
    }
    ```

### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
2025-04-17 20:00:26 +02:00
Philippe Oberti
7160b360c7
[AI4DSOC] Alert summary table custom cell renderers (#217124)
## Summary

This PR builds up on the previous [table setup
PR](https://github.com/elastic/kibana/pull/216744) and add custom cell
renderers for the alert summary table:
- we show the package's icon for the Integration column (pointing to the
`kibana.alert.rule.parameters` field)
- we show an EuiBadge for the severity column (pointing to the
`kibana.alert.severity` field)

All the other fields remain unchanged.

| Before  | After |
| ------------- | ------------- |
| ![Screenshot 2025-04-15 at 3 01
01 PM](https://github.com/user-attachments/assets/047c7fd1-3da2-40fd-a0f4-792177454c00)
| ![Screenshot 2025-04-15 at 2 59
20 PM](https://github.com/user-attachments/assets/643510a7-5f12-4084-8101-4f027ea04099)
|

### Checklist

- [x] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios

https://github.com/elastic/security-team/issues/11973
2025-04-17 19:30:05 +02:00
Nikita Indik
40a9159435
[Security Solution] Show banner to promote prebuilt rule customization in both Serverless and ESS (#218540)
**Resolves: https://github.com/elastic/kibana/issues/209000**
**Related PR: https://github.com/elastic/kibana/pull/213750**

## Summary

This PR updates the code to show a promo banner in the rules table. With
this change, this banner will be shown in both ESS (8.18+) and
Serverless. Previously it was shown only in ESS. In both ESS and
Serverless the blog link is the same – this is expected and correct.

We couldn't add a banner for Serverless earlier, because the blog post
was published on the 8.18/9.0 release day. If we would have added it
earlier, Serverless users would click on a link at get a 404 page.

Expected behaviour for both ESS and Serverless:
 - Banner is visible above the rules table
- The link leads to
https://www.elastic.co/blog/security-prebuilt-rules-editing

<img width="1006" alt="Scherm­afbeelding 2025-03-11 om 12 25 45"
src="https://github.com/user-attachments/assets/41d83db9-4bc4-433e-a7e2-c5ef1049a20c"
/>

**Changes:**
- Adds a rule management table banner to promote prebuilt rule
customization in Serverless. Previously this banner was only shown in
ESS. Banner is dismissible. Its state is stored in localStorage.
- Tweaks banner wording a bit as per docs suggestion
([comment](https://github.com/elastic/kibana/pull/213750/files#r1989313701))
2025-04-17 19:11:47 +02:00
Dzmitry Lemechko
2cc56f827b
[ftr] split x-pack discover config (#217483)
## Summary

Split `x-pack/test/functional/apps/discover/config.ts: 41.1 minutes`
into:

  - x-pack/test/functional/apps/discover/group1/config.ts
  - x-pack/test/functional/apps/discover/group2/config.ts
  - x-pack/test/functional/apps/discover/group3/config.ts
2025-04-17 13:51:17 -03:00
Lukas Olson
2f4f3cae4f
[data.search] Collect telemetry when search times out (#218187)
## Summary

Adds EBT collection when a search request times out (due to the
`search:timeout` advanced setting).

### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...
2025-04-17 09:38:06 -07:00
elastic-renovate-prod[bot]
7a5b5534f8
Update dependency @redocly/cli to ^1.34.2 (main) (#218400)
Co-authored-by: elastic-renovate-prod[bot] <174716857+elastic-renovate-prod[bot]@users.noreply.github.com>
2025-04-17 11:46:38 -04:00
Eleonora
7de4a24a86
Change path to observability_ai_assistant_management following reloca… (#218571)
## Summary

Closes https://github.com/elastic/kibana/issues/213996

Following the merge of https://github.com/elastic/kibana/pull/218129,
observability_ai_assistant_management package was relocated. Therefore,
this PR updates its path in the `paths_labeller` file to reflect the
relocation.

### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
2025-04-17 16:41:55 +01:00
Dima Arnautov
b1958da5d1
[ML] Fix vCPU usage message in the Start deployment dialog (#218557)
## Summary

Fixes the info callout message in the “Start model deployment” dialog by
replacing the ELSER name with a generic model reference.

### Checklist

- [x] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
2025-04-17 17:23:20 +02:00
Cauê Marcondes
822aef361c
[APM]Embeddable Trace Waterfall Enhancements (#217679)
For the embeddable waterfall to be successful, we want to remove
unnecessary information and be able to select which records should be
displayed.

We need to remove:
- Accordions
- Services Legend

We want to display (or hide anything that isn't):
- root,
- direct parent,
- current span or transaction (highlighted)
- up to 2 children.
- Errors will be represented with an icon in the embeddable form of the
waterfall and the badge in the regular form


https://github.com/user-attachments/assets/bf8d34d7-173c-4a1a-8ccf-2f98f43fc625

## Using the embeddable:

1: Loads standard trace waterfall (like the one on APM UI)
```
<ReactEmbeddableRenderer
    type="APM_TRACE_WATERFALL_EMBEDDABLE"
    getParentApi={() => ({
      getSerializedStateForChild: () => ({
        rawState: {
          serviceName: 'foo',
          traceId: 'e7b9d541fae0e25106291f7ac0947acd',
          entryTransactionId: '2d94d9d4fda31c18',
          rangeFrom: '2025-03-26T00:00:00.513Z',
          rangeTo: '2025-03-26T20:52:42.513Z',
          displayLimit: 5, //optional param when omitted it renders the entire waterfall
        },
      }),
    })}
    hidePanelChrome={true}
  />
```

2: Loads focused trace waterfall (some trace events are hidden and a
summary is available)
```
<ReactEmbeddableRenderer
    type="APM_TRACE_WATERFALL_EMBEDDABLE"
    getParentApi={() => ({
      getSerializedStateForChild: () => ({
        rawState: {
          traceId: 'e7b9d541fae0e25106291f7ac0947acd',
          rangeFrom: '2025-03-26T00:00:00.513Z',
          rangeTo: '2025-03-26T20:52:42.513Z',
          docId: SPAN_OR_TRANSACTION_ID
        },
      }),
    })}
    hidePanelChrome={true}
  />
```
2025-04-17 12:10:31 -03:00
Viduni Wickramarachchi
e5851e44e6
[Obs AI Assistant] Skip summarize tests (#218498)
Closes https://github.com/elastic/kibana/issues/218327

## Problem
2 tests related to the summarize function is failing. One is the API
test, the other is a functional test. Haven't found the root cause yet.
Skipping the tests in order to unblock the pipelines


### Checklist

- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
2025-04-17 10:48:15 -04:00
Eleonora
0afdd17916
Add kbn-ai-assistant folder to paths-labeller (#218547)
## Summary

Closes https://github.com/elastic/kibana/issues/213996

Add `x-pack/platform/packages/shared/kbn-ai-assistant` path to
paths-labeller which was not added in the previous PR
(https://github.com/elastic/kibana/pull/218450)


### Checklist

- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
2025-04-17 15:25:25 +01:00
Vitalii Dmyterko
3d7aac1a44
[Security Solution][Detection Engine] adds async ES|QL query (#216667)
## Summary

- addresses https://github.com/elastic/security-team/issues/11116 (list
item 2)

Introducing async query would allow to overcome ES request timeout for
long running rules and queries.

Timeout for ES request is [defined in alerting
framework](https://github.com/elastic/kibana/blob/8.18/x-pack/platform/plugins/shared/alerting/server/lib/get_es_request_timeout.ts#L21)
and is smaller value out of rule execution timeout or default ES request
timeout(which is 5m and hardcoded
[here](https://github.com/elastic/kibana/blob/8.18/x-pack/platform/plugins/shared/alerting/server/lib/get_rule_task_timeout.ts)).

If ES|QL rule performs a single long-running ES query, it can time out
after 5m due to this ES request timeout. This value can't be changed,
unlike rule execution timeout. It can be overwritten in Kibana config

```
xpack.alerting.rules.run:
  timeout: '10m'
  ruleTypeOverrides:
    - id:  'siem.esqlRule'
      timeout: '15m'
```
So, we can encounter situations when rule fails execution after 5m due
to ES request timeout, despite a fact it configured with longer timeout
of 15m

By using async query, we can overcome this limitation and can poll async
query results until it completes or rule timeouts

More details in internal
[issue](https://github.com/elastic/sdh-security-team/issues/1224)

---------

Co-authored-by: Ryland Herrick <ryalnd@gmail.com>
2025-04-17 15:23:07 +01:00
Umberto Pepato
c44efc52f6
[ResponseOps][Alerts] Implement alerts filters form (#214982)
## Summary

Implements the alerts filters form that will be used to pre-filter the
alerts table embeddable.

<img width="1004" alt="image"
src="https://github.com/user-attachments/assets/b51ce051-40d2-42d0-a9c1-0fba3fd919af"
/>

> [!NOTE]
> I'm using the terminology "form" to distinguish this from the alert
filter _controls_ or other type of more KQL-bar-like filters. Other
alternatives that came to mind were `alerts-boolean-filters-...` or
`alerts-filters-builder`.

<details>
<summary>

## Implementation details

</summary>

### Filters expression state

I opted for a tree state representation of the form's boolean expression
to accommodate potential future requirements such as more complex
boolean expressions (negation, parenthesized subexpressions to manually
control operators precedence):

```ts
{
  operator: 'or',
  operands: [
    {
      operator: 'or',
      operands: [
        { type: 'ruleTags', value: ['tag-1'] },
        { type: 'ruleTags', value: ['tag-2'] },
        {
          operator: 'and',
          operands: [{ type: 'ruleTypes', value: ['type-1'] }, { type: 'ruleTypes', value: ['type-2'] }],
        },
      ],
    },
    { type: 'ruleTags', value: ['tag-3'] },
  ],
}
```

This state is saved in the embeddable panel state and represents the
editor form. The embeddable alerts table wrapper component will then
transform this to an actual ES query.

To simplify interactions inside the form, an intermediate equivalent
flattened state is used:

```ts
[
  { filter: { type: 'ruleTags', value: ['tag-1'] } },
  { operator: 'or' },
  { filter: { type: 'ruleTags', value: ['tag-2'] } },
  { operator: 'or' },
  { filter: { type: 'ruleTypes', value: ['type-1'] }},
  { operator: 'and' },
  { filter: { type: 'ruleTypes', value: ['type-2'] } },
  { operator: 'or' },
  { filter: { type: 'ruleTags', value: ['tag-3'] } },
]
```

### Filters model

Each filter is described by an `AlertsFilterMetadata<T>` object, where
`T` is the type of the filter value:

```tsx
export const filterMetadata: AlertsFilterMetadata<string[]> = {
  id: 'ruleTags',
  displayName: RULE_TAGS_FILTER_LABEL,
  component: AlertsFilterByRuleTags,
  // Filter-specific empty check
  isEmpty: (value?: string[]) => !value?.length,
  // Conversion to ES query DSL
  toEsQuery: (value: string[]) => {
    return {
      terms: {
        [ALERT_RULE_TAGS]: value,
      },
    };
  },
};
```

</details>

## Verification steps

1. Run Kibana with examples (`yarn start --run-examples`)
2. Create rules in different solutions with tags
3. Navigate to `/app/triggersActionsUiExample/alerts_filters_form`
4. Check that the solution selector options are coherent with the rule
types the user can access
5. Select a solution
6. Build filters expressions, checking that the rule tags and rule types
are coherent with the solution selection and the rules created
previously
7. Repeat steps 3-6 with different roles:
7.1. having access to rule types from just one solution (in this case
the solution selector shouldn't appear at all),
7.2. having access just to Observability and Stack but not Security (in
this case the solution selector shouldn't appear at all),
8. Repeat steps 3-6 in the three serverless project types:
    ```shell
    $ yarn es serverless —ssl --projectType <es|oblt|security>
    $ yarn serverless-<es|oblt|security> --ssl --run-examples
    ```
(If the authentication fails when switching between project types, use a
clean session)
8.1. ES project types should have access only to Stack rules (no
selector)
8.2. Observability project types should have access only to
Observability and Stack rules (no selector)
8.3. Security project types should have access only to Security and
Stack rules (selector shows Stack instead of Observability)

## References

Depends on #214187
Closes #213061

### Checklist

- [x] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
Co-authored-by: Christos Nasikas <xristosnasikas@gmail.com>
2025-04-17 16:18:24 +02:00
Elastic Machine
331f37db43
Merge branch 'main' into embeddable-serialized-state 2025-04-17 15:57:45 +02:00
Jedr Blaszyk
c5ff7aa155
feat: workchat assistant list/details/edit page (#217984)
## Summary

### UI changes
- assistant UI 
  - list view
  - details view
  - modals: edit info, edit prompt, create 
- rename routes from `agents` to `assistatns`

### Server changes
- Add `avatar` object to agent/assistnat saved object schema
- changed schema from dynamic `strict` to `false`

### Recording 



https://github.com/user-attachments/assets/df689d87-2c0e-4e82-8dc1-46de4a9ab9d8



### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [x] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2025-04-17 15:34:08 +02:00
Gonçalo Rica Pais da Silva
821f74ea5d
[Discover][APM] Span/Transaction name titles and id subtitles for doc overview tab (#218311)
## Summary

This PR changes the Span/Transaction overview tab title to being the
Name/ID title/subtitle pair. The span/transaction name is the title,
with the id is being a subdued text section. The title components for
Span/Transaction will fallback if the name field is not present to
showing just the id, or for the case of Transactions, the service name
if neither name nor id is available.

|   |  Screenshot example  |
| - | - |
| Transaction | ![Span title 4 Screenshot 2025-04-15
182149](https://github.com/user-attachments/assets/1435d5d6-b543-48ca-be9b-9fb7102d0c8a)
|
| Span | ![Span title 3 Screenshot 2025-04-15
182149](https://github.com/user-attachments/assets/be970bbf-e679-41e4-a0d8-7429e65a2559)
|




Closes #216861

## How to test

* Enable traces for discover by adding the following to
`kibana.dev.yaml`:
```yaml
discover.experimental.enabledProfiles:
  - observability-traces-data-source-profile
  - observability-traces-transaction-document-profile
  - observability-traces-span-document-profile
 ```
* Ensure you are on an Observability root profile space
* Go to Discover, use or create a Data View profiles targetting traces-* (such as remote_cluster:traces-*).
* Click on a span/transaction to expand the doc viewer
* The title should be the span title/id or the transaction title/id with the transaction title being a link.
2025-04-17 15:13:32 +02:00
Marco Liberati
e21bec3f31
[chore] Reuse bundled lodash and lodash/fp dependency (#217467)
## Summary

After #217202 and #217034 this the another attempt with `lodash` and
`lodash/fp`.

In short:
`lodash` and `lodash/fp` have a special webpack treatment as they are
imported within the shared bundle.
Now webpack is not smart enough to understand that `import camelCase
from 'lodash/camelCase';` is still pointing to `lodash` and it thinks
that `lodash/camelCase` is a different package, de-optimizing the
bundling caching system.
So I’ve tweaked the import to make it point to the shared bundle and
save few kbs here and there
2025-04-17 14:54:25 +02:00
Paulina Shakirova
ea3dead452
Fix placeholder in monaco editor dissapear when value is set (#217828)
## Summary

This PR fixes [[Bug] Setting text in the placeholder property does not
clear when value is set with onChange
action](https://github.com/elastic/kibana/issues/149882) issue.
2025-04-17 14:49:05 +02:00
Ash
499f11d54e
[Ai4Soc] Hide Siem Migrations on search_ai_lake tier (#217996)
> [!CAUTION]
> Merge after https://github.com/elastic/kibana/pull/217210


## Summary

Hides SIEM Migrations feature for `ai4soc/search_ai_lake` tier.

![Screenshot 2025-04-11 at 15 44
16](https://github.com/user-attachments/assets/fa1415e4-ffcd-4d9e-9072-6cf19b00f93e)

## How to Test

1. While on the Kibana root directory, run ES/Kibana on serverless mode
with:

```bash
yarn es serverless --kill --projectType security --kibanaUrl=http://0.0.0.0:5601
```
and on a new window
```bash
yarn serverless-security --no-base-path
```

Enable the AI for SOC tier, by adding the following to your
`serverless.security.dev.yaml` file:

```json5
xpack.securitySolutionServerless.productTypes:
  [
    { product_line: 'ai_soc', product_tier: 'search_ai_lake' },
  ]
```

2. Once Kibana is up and running login in with the `admin` role using
the role dropdown.
3. Navigate to `app/management/roles/edit`
4. Click on `Assign to space` button and assign a space to that role on
the `Assign role to spaces` flyout.
6. Expand the `Security` category and verify that `SIEM Migrations` is
not visible in the list.

### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...
2025-04-17 14:33:56 +02:00
Stratoula Kalafateli
de213f6344
[ES|QL] Selects the variables correctly when typing a ? first (#218284)
## Summary

When typing ? and there is already a value type variable should only add
the value and not the value with ? (because it will result in 2
questionmarks)


![meow](https://github.com/user-attachments/assets/08b4d66e-dc48-4066-af3e-a5574365bca5)


### Checklist

- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
2025-04-17 14:12:39 +02:00
Francesco Fagnani
ec939b6718
[Synthetics] Changed embeddable view when only one monitor in one location is selected (#218402)
This PR closes #208981 by adding a new action to the Monitor card to
view only that monitor in the dashboard.



https://github.com/user-attachments/assets/f500d220-b57f-4c43-a632-b2383e33988e

---------

Co-authored-by: Shahzad <shahzad31comp@gmail.com>
2025-04-17 14:03:40 +02:00
Anton Dosov
431116a33a
Fix tagging listing integration test (#218431)
## Summary

close https://github.com/elastic/kibana/issues/211256
close https://github.com/elastic/kibana/issues/144057
close https://github.com/elastic/kibana/issues/195623
close https://github.com/elastic/kibana/issues/212262
close https://github.com/elastic/kibana/issues/211575
close https://github.com/elastic/kibana/issues/144058
2025-04-17 13:56:18 +02:00
Gerard Soldevila
cf94c2fe0f
SKA: Relocate ai assistant management (#218129)
## Summary

Pre-requisite for https://github.com/elastic/kibana/pull/216088, as the
`AI Assistant Management` configuration settings should be available for
Search too.

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
2025-04-17 13:55:02 +02:00
Dario Gieselaar
ead7426c6d
[Profiler] Make sure grep pattern includes all node processes (#218430)
previously we only matched processes that looked like:
`000 node scripts/`

but we should actually match:

`000 /.../node/v20.18.2/bin/node scripts/`
2025-04-17 13:30:49 +02:00
Mykola Harmash
35407c9240
[Oblt Onboarding][K8S OTel] Override docker image in values.yml for serverless (#218527)
The current `values.yml` on serverless uses
`docker.elastic.co/beats/elastic-agent:9.0.0` which doesn't exist. [The
actual fix](https://github.com/elastic/elastic-agent/pull/7882) will be
in v9.0.1 but in the meantime we have to do a workaround on the Kibana
side and override the broken value in the code snippet.

![CleanShot 2025-04-17 at 09 25
18@2x](https://github.com/user-attachments/assets/134af691-0417-4a46-86d7-1efbac75f02a)
2025-04-17 12:17:53 +02:00
Elena Stoeva
5ce6ce575f
[Console] Fix test for opening documentation (#218318)
Fixes https://github.com/elastic/kibana/issues/218255

## Summary

This PR fixes the Console tests for opening documentation which were
failing because the doc link
https://www.elastic.co/guide/en/elasticsearch/reference/current/search-search.html
is now redirecting to
https://www.elastic.co/docs/api/doc/elasticsearch/operation/operation-search.
2025-04-17 10:28:01 +01:00
Alejandro García Parrondo
41ccdb70da
[Discover] Stop keydown event propagation when unified doc tabs are focused (#218131) (#218300)
## Summary

When a tab was focused and the right or left arrow keys were used it was
changing the focused tab and the selected document, it should only
change the selected tab.

Fixes https://github.com/elastic/kibana/issues/218131


![chrome-capture-2025-4-15](https://github.com/user-attachments/assets/052313e1-aa1e-4d60-9b48-2a22f9b0d90b)

### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...
2025-04-17 11:02:50 +02:00
Eleonora
4b4268dcda
Add missing paths for observability ai assistant to paths-labeller (#218450)
## Summary
Closes https://github.com/elastic/kibana/issues/213996

Add missing observability ai assistant paths to the
`ci:project-deploy-observability` section of the `paths-labeller.yml`
file.

### Checklist

- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
2025-04-17 10:00:15 +01:00