Commit graph

780 commits

Author SHA1 Message Date
Lisa Cawley
c5a1d6b5f4
[DOCS] Conditional actions in Kibana alerting summary (#158045) 2023-05-23 10:50:17 -07:00
Lisa Cawley
1b71d2ca3c
[DOCS] Maintenance window column in alerts tables (#158125) 2023-05-23 10:49:18 -07:00
Kaarina Tungseth
06a800fbad
[DOCS] Adds 8.8 Viz docs (#157215)
## Summary

Adds the 8.8 documentation for the following:

- Enable report sharing: https://github.com/elastic/kibana/pull/153429
Docs preview:
https://kibana_157215.docs-preview.app.elstc.co/guide/en/kibana/master/reporting-getting-started.html

- Random sampling feature: https://github.com/elastic/kibana/pull/143221
Docs preview:
https://kibana_157215.docs-preview.app.elstc.co/guide/en/kibana/master/lens.html#improve-visualization-loading-time

- Improve Ignore global filters UI:
https://github.com/elastic/kibana/pull/154441 and
https://github.com/elastic/kibana/pull/155280
Docs preview:
https://kibana_157215.docs-preview.app.elstc.co/guide/en/kibana/master/lens.html#add-annotations

---------

Co-authored-by: Tim Sullivan <tsullivan@users.noreply.github.com>
2023-05-23 10:41:42 -05:00
István Zoltán Szabó
a3c940f0cd
[DOCS] Adds log pattern analysis in Discover docs (#158059)
Co-authored-by: gchaps <33642766+gchaps@users.noreply.github.com>
2023-05-22 12:34:15 +02:00
Lisa Cawley
93b15b14e5
[DOCS] Maintenance windows (#157806) 2023-05-17 11:01:40 -07:00
gchaps
7cab4edab7
[DOCS] Adds drag & drop to Discover (#157340)
## Summary

This PR adds documentation for:

- Drag and drop from Available Fields list
- Wildcards in field searches
- All sources and matching sources in Create Data View
2023-05-16 15:35:47 -07:00
Kaarina Tungseth
0689c638d3
[DOCS] Adds the presentation 8.8 docs (#157765)
## Summary

Adds the docs for the following 8.8 Presentation docs:

- Unified dashboard settings:
https://github.com/elastic/kibana/pull/153862
Docs preview:
https://kibana_157765.docs-preview.app.elstc.co/guide/en/kibana/master/dashboard.html#add-dashboard-settings

- Add reset button: https://github.com/elastic/kibana/pull/154872
Docs preview:
https://kibana_157765.docs-preview.app.elstc.co/guide/en/kibana/master/dashboard.html#reset-the-dashboard

---------

Co-authored-by: Nick Peihl <nickpeihl@gmail.com>
Co-authored-by: Hannah Mudge <Heenawter@users.noreply.github.com>
2023-05-16 14:21:01 -05:00
István Zoltán Szabó
e6bec5b669
[DOCS] Documents AIOps Labs enhancements (#157716)
Co-authored-by: Dima Arnautov <arnautov.dima@gmail.com>
2023-05-15 17:22:16 +02:00
Patrick Mueller
120fa44afd
[ResponseOps][docs] add docs for new mustache lambdas and asJSON for array (#155417)
resolves: https://github.com/elastic/kibana/issues/155408

## Summary

adds doc for function added in [adds mustache lambdas and
array.asJSON](https://github.com/elastic/kibana/pull/150572)
2023-05-14 14:39:25 -04:00
Mike Côté
cb2e28d1e4
Fix task manager polling flow controls (#153491)
Fixes https://github.com/elastic/kibana/issues/151938

In this PR, I'm re-writing the Task Manager poller so it doesn't run
concurrently when timeouts occur while also fixing the issue where
polling requests would pile up when polling takes time. To support this,
I've also made the following changes:
- Removed the observable monitor and the
`xpack.task_manager.max_poll_inactivity_cycles` setting
- Make the task store `search` and `updateByQuery` functions have no
retries. This prevents the request from retrying 5x whenever a timeout
occurs, causing each call taking up to 2 1/2 minutes before Kibana sees
the error (now down to 30s each). We have polling to manage retries in
these situations.
- Switch the task poller tests to use `sinon` for faking timers
- Removing the `assertStillInSetup` checks on plugin setup. Felt like a
maintenance burden that wasn't necessary to fix with my code changes.

The main code changes are within these files (to review thoroughly so
the polling cycle doesn't suddenly stop):
- x-pack/plugins/task_manager/server/polling/task_poller.ts
- x-pack/plugins/task_manager/server/polling_lifecycle.ts (easier to
review if you disregard whitespace `?w=1`)

## To verify
1. Tasks run normally (create a rule or something that goes through task
manager regularly).
2. When the update by query takes a while, the request is cancelled
after 30s or the time manually configured.
4. When the search for claimed tasks query takes a while, the request is
cancelled after 30s or the time manually configured.

**Tips:**
<details><summary>how to slowdown search for claimed task
queries</summary>

```
diff --git a/x-pack/plugins/task_manager/server/queries/task_claiming.ts b/x-pack/plugins/task_manager/server/queries/task_claiming.ts
index 07042650a37..2caefd63672 100644
--- a/x-pack/plugins/task_manager/server/queries/task_claiming.ts
+++ b/x-pack/plugins/task_manager/server/queries/task_claiming.ts
@@ -247,7 +247,7 @@ export class TaskClaiming {
         taskTypes,
       });

-    const docs = tasksUpdated > 0 ? await this.sweepForClaimedTasks(taskTypes, size) : [];
+    const docs = await this.sweepForClaimedTasks(taskTypes, size);

     this.emitEvents(docs.map((doc) => asTaskClaimEvent(doc.id, asOk(doc))));

@@ -346,6 +346,13 @@ export class TaskClaiming {
       size,
       sort: SortByRunAtAndRetryAt,
       seq_no_primary_term: true,
+      aggs: {
+        delay: {
+          shard_delay: {
+            value: '40s',
+          },
+        },
+      },
     });

     return docs;
```
</details>

<details><summary>how to slow down update by queries</summary>
Not the cleanest way but you'll see occasional request timeouts from the
updateByQuery calls. I had more luck creating rules running every 1s.

```
diff --git a/x-pack/plugins/task_manager/server/task_store.ts b/x-pack/plugins/task_manager/server/task_store.ts
index a06ee7b918a..07aa81e5388 100644
--- a/x-pack/plugins/task_manager/server/task_store.ts
+++ b/x-pack/plugins/task_manager/server/task_store.ts
@@ -126,6 +126,7 @@ export class TaskStore {
       // Timeouts are retried and make requests timeout after (requestTimeout * (1 + maxRetries))
       // The poller doesn't need retry logic because it will try again at the next polling cycle
       maxRetries: 0,
+      requestTimeout: 900,
     });
   }

@@ -458,6 +459,7 @@ export class TaskStore {
           ignore_unavailable: true,
           refresh: true,
           conflicts: 'proceed',
+          requests_per_second: 1,
           body: {
             ...opts,
             max_docs,
```
</details>

---------

Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
2023-05-03 09:33:10 -04:00
Lisa Cawley
fb68f2075a
[DOCS] Automate two rule management screenshots (#155566) 2023-04-25 08:11:22 -07:00
Lisa Cawley
a0aae1aa23
[DOCS] Automate rule-flyout-rule-conditions.png (#155461) 2023-04-21 07:51:28 -07:00
Patrick Mueller
cd727fa190
[ResponseOps] move alert UUID generation from rule registry to the alerting framework (#143489)
resolves https://github.com/elastic/kibana/issues/142874

The alerting framework now generates an alert UUID for every alert it
creates. The UUID will be reused for alerts which continue to be active
on subsequent runs, until the alert recovers. When the same alert (alert
instance id) becomes active again, a new UUID will be generated. These
UUIDs then identify a "span" of events for a single alert.

The rule registry plugin was already adding these UUIDs to it's own
alerts-as-data indices, and that code has now been changed to make use
of the new UUID the alerting framework generates.

- adds property in the rule task state
`alertInstances[alertInstanceId].meta.uuid`; this is where the alert
UUID is persisted across runs
- adds a new `Alert` method getUuid(): string` that can be used by rule
executors to obtain the UUID of the alert they just retrieved from the
factory; the rule registry uses this to get the UUID generated by the
alerting framework
- for the event log, adds the property `kibana.alert.uuid` to
`*-instance` event log events; this is the same field the rule registry
writes into the alerts-as-data indices
- various changes to tests to accommodate new UUID data / methods
- migrates the UUID previous stored with lifecycle alerts in the alert
state, via the rule registry *INTO* the new `meta.uuid` field in the
existing alert state.
2023-04-03 09:19:48 -04:00
Nick Peihl
b692e347f4
[Dashboard Usability] Unified dashboard settings (#153862)
## Summary

Adds flyout for changing individual dashboard settings such as title,
description, tags, and save time with dashboard. This also moves the
existing dashboard options (show panel titles, sync colors, use margins,
sync cursor, and sync tooltips) into the flyout.

Fixes #144532

[Flaky test
runner](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/2055)

### Checklist

Delete any items that are not applicable to this PR.

- [x] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/packages/kbn-i18n/README.md)
- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [x] Any UI touched in this PR is usable by keyboard only (learn more
about [keyboard accessibility](https://webaim.org/techniques/keyboard/))
- [x] Any UI touched in this PR does not create any new axe failures
(run axe in browser:
[FF](https://addons.mozilla.org/en-US/firefox/addon/axe-devtools/),
[Chrome](https://chrome.google.com/webstore/detail/axe-web-accessibility-tes/lhdoppojpmngadmnindnejefpokejbdd?hl=en-US))
- [x] This was checked for [cross-browser
compatibility](https://www.elastic.co/support/matrix#matrix_browsers)


### For maintainers

- [ ] This was checked for breaking API changes and was [labeled
appropriately](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
2023-03-31 09:52:51 -04:00
Lisa Cawley
2b9be70f84
[DOCS] Refresh rule detail screenshots (#153705) 2023-03-28 12:08:15 -07:00
Lisa Cawley
bd50903109
[DOCS] Add alert flapping and rule setting details (#153605) 2023-03-24 09:22:20 -07:00
DeDe Morton
9ff847dec7
[DOCS] Describe how to use Elastic Agent to monitor Kibana (#152634)
## Summary

Add Elastic Agent as another way to collect monitoring data.

This work is tracked by
https://github.com/elastic/observability-docs/issues/2602.

There will be additional PRs to address changes required to monitoring
docs for other stack components. TBH, it pains me a bit to see how many
places users need to go to find info about stack monitoring, but fixing
that problem is not in scope for these updates unfortunately. :-/

Please respond to questions addressed to reviewers.

### Checklist

Delete any items that are not applicable to this PR.

- [x] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/packages/kbn-i18n/README.md)

### To Do before merging

- [x] Remove questions to reviewers.

---------

Co-authored-by: Kevin Lacabane <klacabane@gmail.com>
2023-03-23 11:00:13 -07:00
Lisa Cawley
cc11df727f
[DOCS] Automate screenshots in tracking containment rule (#153406) 2023-03-22 07:51:16 -07:00
Jeramy Soucy
ba6058c147
Uses refresh=false for creating, updating, and invalidating user sessions (#151800)
closes #149338

## Summary
Sets refresh parameter to false in session create, update, and
invalidate. Previously refresh was set to 'wait_for' (or 'true' in the
case of invalidating by query).

### Tests
Several unit tests and functional tests have been updated to reflect the
change in test snapshots and to manually refresh the session index in
order to complete testing. The bulk of the test changes reside in the
[concurrent session limit
suite](66a43be28c/x-pack/test/security_api_integration/tests/session_concurrent_limit/global_limit.ts).

Flaky Test Runner for relevant test suites:
https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/1984

### Documentation
Adds a note to the session-management ascii doc to document a known
limitation of enforcing the concurrent sessions limit...
```
NOTE: Due to the rate at which session information is refreshed, there might be a few seconds where the concurrent session limit is not enforced.
This is something to consider for use cases where it is common to create multiple sessions simultaneously.
```

---------

Co-authored-by: gchaps <33642766+gchaps@users.noreply.github.com>
2023-03-10 13:18:09 -05:00
Kaarina Tungseth
e57883f3be
[DOCS] 8.7 Presentation docs (#151797)
## Summary

- #148331: [Updated
screenshots](https://kibana_151797.docs-preview.app.elstc.co/guide/en/kibana/master/add-controls.html)
- #146335:
[Docs](https://kibana_151797.docs-preview.app.elstc.co/guide/en/kibana/master/dashboard.html#search-or-filter-your-data)
- #146363:
[Docs](https://kibana_151797.docs-preview.app.elstc.co/guide/en/kibana/master/dashboard.html#edit-panels)
- #144867:
[Docs](https://kibana_151797.docs-preview.app.elstc.co/guide/en/kibana/master/add-controls.html#edit-controls)
2023-03-08 16:09:43 -06:00
gchaps
8d6c63472c
[DOCS] Updates Discover docs (#151953)
## Summary

This PR updates the Discover docs for 8.7.
2023-03-08 07:05:25 -08:00
Lisa Cawley
b6cff1ad72
[DOCS] Automate rule-types-index-threshold-example-alerts.png (#152618) 2023-03-07 11:43:49 -05:00
Lisa Cawley
0c60d8edb7
[DOCS] Refresh index threshold rule screenshots (#152310) 2023-03-02 07:46:19 -08:00
Kaarina Tungseth
3de0009dd1
[DOCS] Adds Visualizations features for 8.7 (#151045)
## Summary

Adds the 8.7 docs for:

- #149388
- #148829
- Closes #144590
- Replaces #144551
2023-03-01 14:28:19 -06:00
Lisa Cawley
130d2a7a7c
[DOCS] Add alert summaries to overview (#151817) 2023-02-27 12:51:15 -05:00
Lisa Cawley
b37258e19c
[DOCS] Create and manage rule action frequencies (#150957) 2023-02-23 13:16:46 -08:00
Thomas Watson
e7ebb0cf40
[docs] Document new maxSessions config option (#151268) 2023-02-16 13:00:13 -05:00
István Zoltán Szabó
b6d2c5e683
[DOCS] Adds change point detection docs to AIOps Labs (#151337)
Co-authored-by: Tom Veasey <tveasey@users.noreply.github.com>
2023-02-16 17:05:01 +01:00
Jeramy Soucy
5de13d49ac
[Saved Objects] Migrates authorization logic from repository to security extension (#148165)
Closes #147049
Closes #149897

Migrates authorization and audit logic from the Saved Objects Repository
to the Saved Objects Security Extension. This is achieved by
implementing action-specific authorization methods within the security
extension. The SO repository is no longer responsible for making any
authorization decisions, but It is still responsible to know how to call
the extension methods. I've tried to make this as straightforward as
possible such that there is a clear ownership delineation between the
repository and the extension, by keeping the interface simple and
(hopefully) obvious.

### Security Extension Interface
New Public Extension Methods:
- authorizeCreate
- authorizeBulkCreate
- authorizeUpdate
- authorizeBulkUpdate
- authorizeDelete
- authorizeBulkDelete
- authorizeGet
- authorizeBulkGet
- authorizeCheckConflicts
- authorizeRemoveReferences
- authorizeOpenPointInTime
- auditClosePointInTime
- authorizeAndRedactMultiNamespaceReferences
- authorizeAndRedactInternalBulkResolve
- authorizeUpdateSpaces
- authorizeFind
- getFindRedactTypeMap
- authorizeDisableLegacyUrlAliases (for secure spaces client)
- auditObjectsForSpaceDeletion (for secure spaces client)

Removed from public interface:
- authorize
- enforceAuthorization
- addAuditEvent

### Tests
- Most test coverage moved from `repository.security_extension.test.ts`
to `saved_objects_security_extension.test.ts`
- `repository.security_extension.test.ts` tests extension call,
parameters, and return
- Updates repository unit tests to check that all security extension
calls are made with the current space when the spaces extension is also
enabled

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
Co-authored-by: gchaps <33642766+gchaps@users.noreply.github.com>
2023-02-15 10:25:05 -05:00
Lisa Cawley
ff312c9f04
[DOCS] Clarify alerting security (#150653) 2023-02-14 09:14:05 -08:00
Ersin Erdal
9bbb1f759a
Add summary action variables (#150221)
Resolves: #150209

This PR intends to add the available `Action variables` of the new
`Summary of alerts` actions.

Note: Alert-as-data exposes more data. Please let me know if any needs
to be added/removed.

A better list of available fields:

https://github.com/elastic/kibana/blob/main/x-pack/plugins/rule_registry/README.md

---------

Co-authored-by: lcawl <lcawley@elastic.co>
2023-02-10 13:29:52 +01:00
Nick Peihl
ace2c30c29
[Dashboard Usability] Unified panel options pane (#148301) 2023-02-02 16:30:31 -05:00
Jeramy Soucy
1418d753ea
[Docs] Adds authentication providers sync to load balancing documentation (#149961)
Closes #113928

## Summary

- Adds 'xpack.security.authc.providers' to the list of settings that
must be the same across all Kibana instances behind a load balancer.
- Adds a warning block explaining why the authentication providers need
to match, and an additional configuration case where this applies
(Kibana instances that are backed by the same ES instance and share the
same kibana.index).
2023-02-02 11:11:35 -05:00
Jonathan Buttner
bd8e62e45c
[Cases] Add bulk get attachments API (#149269)
This PR adds a new bulk get attachments API.

```
POST internal/cases/<case_id>/attachments/_bulk_get
{
    "ids": ["02441860-9b66-11ed-a8df-f1edb375c327", "2"]
}
```

<details><summary>Example request and response</summary>


Request
```
POST http://localhost:5601/internal/cases/attachments/_bulk_get
{
    "ids": ["283a4600-9cfd-11ed-9e3d-c96d764b0e39", "2", "382e97f0-9cfd-11ed-9e3d-c96d764b0e39"]
}
```

Response
```
{
    "attachments": [
        {
            "id": "283a4600-9cfd-11ed-9e3d-c96d764b0e39",
            "version": "WzI2MiwxXQ==",
            "comment": "Stack comment",
            "type": "user",
            "owner": "cases",
            "created_at": "2023-01-25T22:11:03.398Z",
            "created_by": {
                "email": null,
                "full_name": null,
                "username": "elastic",
                "profile_uid": "u_mGBROF_q5bmFCATbLXAcCwKa0k8JvONAwSruelyKA5E_0"
            },
            "pushed_at": null,
            "pushed_by": null,
            "updated_at": null,
            "updated_by": null
        }
    ],
    "errors": [
        {
            "error": "Not Found",
            "message": "Saved object [cases-comments/2] not found",
            "status": 404,
            "attachmentId": "2"
        },
        {
            "error": "Bad Request",
            "message": "Attachment is not attached to case id=248d6aa0-9cfd-11ed-9e3d-c96d764b0e39",
            "status": 400,
            "attachmentId": "382e97f0-9cfd-11ed-9e3d-c96d764b0e39"
        }
    ]
}
```
</details>

<details><summary>Unauthorized example response</summary>

```
{
    "attachments": [],
    "errors": [
        {
            "error": "Forbidden",
            "message": "Unauthorized to access attachment with owner: \"securitySolution\"",
            "status": 403,
            "attachmentId": "382e97f0-9cfd-11ed-9e3d-c96d764b0e39"
        }
    ]
}

```

</details>

## Notable changes
- Created a new internal route for retrieving attachments
- Refactored the attachments service to take the saved object client in
the constructor instead of each method
- Refactored attachments service by moving the get style operations to
their own class
- Refactored the integration utilities file to move the attachment
operations to their own file
- The API will return a 400 if more than 10k ids are requested

---------

Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
2023-01-31 08:55:50 -05:00
Jonathan Buttner
aba0b3037c
[Cases] Adding new bulk create attachments operation for auditing (#149744)
This PR adds a new authorization log operation for the bulk create
attachments API.

Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
2023-01-30 13:35:08 -05:00
Jonathan Buttner
a78fece18b
[Cases] Adding _find API for user actions (#148861)
This PR adds a new find API for retrieving a subset of the user actions
for a case.

Issue: https://github.com/elastic/kibana/issues/134344

```
GET /api/cases/<case_id>/user_actions/_find
Query Paramaters
{
  types?: Array of "assignees" | "comment" | "connector" | "description" | "pushed" | "tags" | "title" | "status" | "settings" | "severity" | "create_case" | "delete_case" | "action" | "alert" | "user" | "attachment"
  sortOrder?: "asc" | "desc"
  page?: number as a string
  perPage?: number as a string
}
```

<details><summary>Example request and response</summary>

Request
```
curl --location --request GET 'http://localhost:5601/api/cases/8df5fe00-96b1-11ed-9341-471c9630b5ec/user_actions/_find?types=create_case&sortOrder=asc' \
--header 'kbn-xsrf: hello' \
--header 'Authorization: Basic ZWxhc3RpYzpjaGFuZ2VtZQ==' \
--data-raw ''
```


Response
```
{
    "userActions": [
        {
            "created_at": "2023-01-17T21:54:45.527Z",
            "created_by": {
                "username": "elastic",
                "full_name": null,
                "email": null,
                "profile_uid": "u_mGBROF_q5bmFCATbLXAcCwKa0k8JvONAwSruelyKA5E_0"
            },
            "owner": "cases",
            "action": "create",
            "payload": {
                "title": "Awesome case",
                "tags": [],
                "severity": "low",
                "description": "super",
                "assignees": [],
                "connector": {
                    "name": "none",
                    "type": ".none",
                    "fields": null,
                    "id": "none"
                },
                "settings": {
                    "syncAlerts": false
                },
                "owner": "cases",
                "status": "open"
            },
            "type": "create_case",
            "id": "8e121180-96b1-11ed-9341-471c9630b5ec",
            "case_id": "8df5fe00-96b1-11ed-9341-471c9630b5ec",
            "comment_id": null
        }
    ],
    "page": 1,
    "perPage": 20,
    "total": 1
}
```

</details>

## Notable Changes
- Created the new `_find` route
- Created a new `UserActionFinder` class and moved the find* methods
from the `index.ts` file into there as well as the new find logic
- Extracted the transform logic to its own file since its shared between
multiple files now
- Extracted the user action related integration test functions to the
`user_action.ts` utility file

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
Co-authored-by: lcawl <lcawley@elastic.co>
2023-01-23 13:25:41 -05:00
Christos Nasikas
a8902e1b6e
[Cases] Create Bulk get cases internal API (#147674)
## Summary

This PR creates the bulk get cases internal API. The endpoint is needed
for the alerts table to be able to get all cases the alerts are attached
to with one call.

Reference: https://github.com/elastic/kibana/issues/146864

### Request

- ids: (Required, array) An array of IDs of the retrieved cases.
- fields: (Optional, array) The fields to return in the attributes key
of the object response.

```
POST <kibana host>:<port>/internal/cases/_bulk_get
{
    "ids": ["case-id-1", "case-id-2", "123", "not-authorized"],
    "fields": ["title"]
}
```

### Response
```
{
    "cases": [
     {
        "title": "case1",
        "owner": "securitySolution",
        "id": "case-id-1",
        "version": "WzIzMTU0NSwxNV0="
     },
     {
        "title": "case2",
        "owner": "observability",
        "id": "case-id-2",
        "version": "WzIzMTU0NSwxNV0="
      }
    ],
    "errors": [
        {
            "error": "Not Found",
            "message": "Saved object [cases/123] not found",
            "status": 404,
            "caseId": "123"
        },
        {
            "error": "Forbidden",
            "message": "Unauthorized to access case with owner: \"cases\"",
            "status": 403,
            "caseId": "not-authorized"
        }
    ]
}
```

### Checklist

Delete any items that are not applicable to this PR.

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios


### For maintainers

- [x] This was checked for breaking API changes and was [labeled
appropriately](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
2023-01-11 16:32:42 +02:00
Jeramy Soucy
aab8cf1302
[DOCS] Update 'xpack.screenshotting.browser.chromium.disableSandbox` documentation (#148425)
- Adds CentOS to the list of exceptions to the default value. CentOS,
Debian, and Red Hat Linux use `true`, but all other OS use `false`.
Previously, CentOS was not documented.

- Adds note regarding Chrome crash in the troubleshooting doc.
2023-01-10 09:26:57 -05:00
Jonathan Buttner
9cbe45c42a
[Cases][Security] Updating audit log (#147260)
This PR updates the audit logger docs to reflect the cases audit log
messages. We had not added the RBAC authorization messages so I added
those as well as the user action messages from this PR:
https://github.com/elastic/kibana/pull/145632

I also noticed a discrepancy in the `event.type` for the RBAC message
for a case being pushed and the user action one recently. So changed the
user action to match the RBAC `event.type: change`.

The audit log messages come from these files:
- User actions
-
https://github.com/elastic/kibana/blob/main/x-pack/plugins/cases/server/services/user_actions/audit_logger.ts
-
https://github.com/elastic/kibana/blob/main/x-pack/plugins/cases/server/services/user_actions/builders/*
-
https://github.com/elastic/kibana/blob/main/x-pack/plugins/cases/server/services/user_actions/index.ts
- RBAC
-
https://github.com/elastic/kibana/blob/main/x-pack/plugins/cases/server/authorization/audit_logger.ts
-
https://github.com/elastic/kibana/blob/main/x-pack/plugins/cases/server/authorization/index.ts
2023-01-04 12:47:24 -05:00
Anton Dosov
72268e1b0e
[Docs][Image Embeddable] Add user-facing docs for image panel (#148054)
## Summary

Adding user-facing docs about new image panel -
https://github.com/elastic/kibana/issues/81345

Adding an inline sub-section of the main dashboard doc page similar to
text panel -
https://www.elastic.co/guide/en/kibana/master/dashboard.html#add-text
2023-01-04 16:01:49 +01:00
Lisa Cawley
4e11ef1b6b
[ResponseOps] Automate screenshots for new rule statuses (#147492)
Co-authored-by: Brandon Kobel <brandon.kobel@gmail.com>
2023-01-04 07:21:00 -05:00
Thom Heymann
2ca590e006
Clarify outcome: unknown in audit logging docs (#148153)
Resolves #127507

## Summary

Clarify outcome: `unknown` in audit logging docs
2023-01-03 20:12:00 +00:00
Thom Heymann
ee6170be7a
Include client IP address in audit log (#148055)
Follow up to #147526 which had to be reverted.

Resolves #127481

## Release notes

Include IP address in audit log

## Testing

1. Start Elasticsearch with trial license: `yarn es snapshot --license
trial`
2. Update `kibana.dev.yaml`:

```yaml
xpack.security.audit.enabled: true
xpack.security.audit.appender:
  type: console
  layout:
    type: json
```

3. Observe audit logs in console when interacting with Kibana:

```json
{
  "@timestamp": "2022-12-13T15:50:42.236+00:00",
  "message": "User is requesting [/dev/internal/security/me] endpoint",
  "client": {
    "ip": "127.0.0.1"
  },
  "http": {
    "request": {
      "headers": {
        "x-forwarded-for": "1.1.1.1, 127.0.0.1"
      }
    }
  }
}
```

Note: You will see the `x-forwarded-for` field populated when running
Kibana in development mode (`yarn start`) since Kibana runs behind a
development proxy.

Co-authored-by: gchaps <33642766+gchaps@users.noreply.github.com>
Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
2023-01-03 10:17:33 -07:00
Kaarina Tungseth
226dabfc10
[DOCS] Update create-panels-with-editors.asciidoc Bucket Script supported with TSVB (#148315)
## Summary

Opens #147692 in `main`.
2023-01-03 11:35:50 -05:00
Christiane (Tina) Heiligers
049d8021eb
Updates upgrade assistant doclinks to point to current rather than hard-coded 7.17 (#147585)
Co-authored-by: Lisa Cawley <lcawley@elastic.co>
Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
Fix https://github.com/elastic/kibana/issues/145092
2022-12-19 09:19:26 -07:00
Thom Heymann
5f21dbe618
Revert "Include client IP address in audit log" (#147747)
Reverts elastic/kibana#147526

Reverting due to errors when using `FakeRequest`:

```
TypeError: Cannot read properties of undefined (reading 'remoteAddress')
    at KibanaSocket.get remoteAddress [as remoteAddress] (/Users/shahzad-16/elastic/kibana/node_modules/@kbn/core-http-router-server-internal/target_node/src/socket.js:25:24)
    at Object.log (/Users/shahzad-16/elastic/kibana/x-pack/plugins/security/server/audit/audit_service.ts:95:32)
    at runMicrotasks (<anonymous>)
    at processTicksAndRejections (node:internal/process/task_queues:96:5)

Terminating process...
 server crashed  with status code 1
```
2022-12-19 12:33:21 +01:00
Thom Heymann
a02c7dce50
Include client IP address in audit log (#147526)
Resolves #127481

## Release notes

Include IP address in audit log

## Testing

1. Update `kibana.dev.yaml`:

```yaml
xpack.security.audit.enabled: true
xpack.security.audit.appender:
  type: console
  layout:
    type: json
```

2. Observe audit logs in console when interacting with Kibana:

```json
{
  "@timestamp": "2022-12-13T15:50:42.236+00:00",
  "message": "User is requesting [/dev/internal/security/me] endpoint",
  "client": {
    "ip": "127.0.0.1"
  },
  "http": {
    "request": {
      "headers": {
        "x-forwarded-for": "1.1.1.1, 127.0.0.1"
      }
    }
  }
}
```

Note: You will see the `x-forwarded-for` field populated when running
Kibana in development mode (`yarn start`) since Kibana runs behind a
development proxy.

Co-authored-by: gchaps <33642766+gchaps@users.noreply.github.com>
2022-12-16 15:54:38 -07:00
Lisa Cawley
c99f40f4b2
[DOCS] Refresh alerting troubleshooting (#147633) 2022-12-15 15:15:33 -08:00
Ying Mao
fdf4dea9bd
[Response Ops][Alerting] Adding group by options to ES query rule type (#144689)
Resolves https://github.com/elastic/kibana/issues/89481

## Summary

Adds group by options to the ES query rule type, both DSL and KQL
options. This is the same limited group by options that are offered in
the index threshold rule type so I used the same UI components and rule
parameter names. I moved some aggregation building code to `common` so
they could be reused. All existing ES query rules are migrated to be
`count over all` rules.

## To Verify

* Create the following types of rules and verify they work as expected.
Verify for both DSL query and KQL query
* `count over all` rule - this should run the same as before, where it
counts the number of documents that matches the query and applies the
threshold condition to that value. `{{context.hits}}` is all the
documents that match the query if the threshold condition is met.
* `<metric> over all` rule - this calculates the specific aggregation
metric and applies the threshold condition to the aggregated metric (for
example, `avg event.duration`). `{{context.hits}}` is all the documents
that match the query if the threshold condition is met.
* `count over top N terms` - this will apply a term aggregation to the
query and matches the threshold condition to each term bucket (for
example, `count over top 10 event.action` will apply the threshold
condition to the count of documents within each `event.action` bucket).
`{{context.hits}}` is the result of the top hits aggregation within each
term bucket if the threshold condition is met for that bucket.
* `<metric> over top N terms` - this will apply a term aggregation and a
metric sub-aggregation to the query and matches the threshold condition
to the metric value within each term bucket (for example, `avg
event.duration over top 10 event.action` will apply the threshold
condition to the average value of `event.duration` within each
`event.action` bucket). `{{context.hits}}` is the result of the top hits
aggregation within each term bucket if the threshold condition is met
for that bucket.
* Verify the migration by creating a DSL and KQL query in an older
version of Kibana and then upgrading to this PR. The rules should still
continue running successfully.


### Checklist

- [x]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios

Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
Co-authored-by: Lisa Cawley <lcawley@elastic.co>
2022-12-15 11:03:58 -05:00
Alexi Doak
b65ded0c8a
[ResponseOps][Flapping] add flapping state to alert context for action parameters (#147136)
Resolves https://github.com/elastic/kibana/issues/146613

## Summary
Makes flapping indicator for an alert available in the context variables
for action mustache templates under `alert.flapping`
Let me know if we want to change this to be something else

### Checklist

- [x]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios

### To verify

- Create a new rule with a connector
- Add the new field Add `{{alert.flapping}}` to the your alert message,
and verify that it is in the alert output.
2022-12-14 11:01:56 -07:00