Commit graph

83530 commits

Author SHA1 Message Date
Mykola Harmash
5af4d370c7
[Observability Onboarding] Add OTel tech preview badges on Serverless (#209302)
Closes #209083

This adds `Technical Preview` badges for Host OTel and K8S OTel flows on
Serverless

**Host OTel**
| Home | Flow |
|----|-----|
| ![CleanShot 2025-02-03 at 14 53
13@2x](https://github.com/user-attachments/assets/a984d2e6-834b-40e4-91f5-46f9b3076e83)
| ![CleanShot 2025-02-03 at 14 53
21@2x](https://github.com/user-attachments/assets/e056bfa8-4a7f-4094-bdde-06ae134c60e3)
|

**K8S OTel**
| Home | Flow |
|----|-----|
| ![CleanShot 2025-02-03 at 14 52
58@2x](https://github.com/user-attachments/assets/e7324192-88c9-46d8-a5cd-4c30f600fc86)
| ![CleanShot 2025-02-03 at 14 53
29@2x](https://github.com/user-attachments/assets/1d8850dd-1953-49e4-998a-93b784750b40)
|
2025-02-05 16:24:38 +01:00
Yngrid Coello
c56d7ea24a
[Synthtrace] Introducing teardown for scenarios (#209739)
### Background

In some scenarios we need to perform some setup at bootstrap time, this
setup could affect following scenarios.
Take for example
[failed_logs](https://github.com/elastic/kibana/blob/main/packages/kbn-apm-synthtrace/src/scenarios/failed_logs.ts)
scenario where we create a pipeline that will do some checks in
`log.level` property, if we try to run an scenario after that one we
will enter into some issues.

### Changes

This PR aims to introduce a `teardown` setup for scenarios where we
could undo the changes done at `bootstrap` time.
2025-02-05 15:57:50 +01:00
Faisal Kanout
bc5bff8cc3
[OBX-UX-MGMT] - Add a lik to Advanced settings for the Logs Threshold rule creation form to update log views (#209747)
## Summary

It fixes #209098

<img width="692" alt="Screenshot 2025-02-05 at 12 58 53"
src="https://github.com/user-attachments/assets/bd02260a-f3b6-4752-a174-bffb2f6672dc"
/>
2025-02-05 15:57:31 +01:00
Meghan Murphy
1cac82fdf5
[Connectors] depend Sharepoint secret_value on auth_method (#209656)
## Summary

Only have secret_value box when configuring a Sharepoint online
connector when auth_method is 'secret'.

#### Closes https://github.com/elastic/search-team/issues/9196
### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
2025-02-05 09:55:27 -05:00
Elena Shostak
8a26cf6f94
[CSP] Added object-src to Content-Security-Policy-Report-Only header (#209306)
## Summary

Added support for `object_src` directive in reporting mode.

## How to test

- Add in your `kibana.dev.yml`.
```
server.customResponseHeaders.Reporting-Endpoints: violations-endpoint="https://localhost:5601/kibana/internal/security/analytics/_record_violations"
csp.report_to: [violations-endpoint]
```
- Make sure you have [dev tools configured for Reporting
API](https://developer.chrome.com/docs/capabilities/web-apis/reporting-api#use_devtools).
- Add `<embed src="https://not-example.com/flash"/>` anywhere in the
page body in
`src/platform/plugins/shared/home/public/application/components/home.tsx`
and go to Home page
- Open Dev Tools -> Console
You should be able to see the violation
<img width="1023" alt="Screenshot 2025-02-03 at 14 30 03"
src="https://github.com/user-attachments/assets/b2e5f957-4403-4b2b-a3dd-c0109fff6306"
/>


> [!NOTE]
> Hopefully, you should be able to see the violation in the Dev Tools ->
Application -> Reporting, but it's sometimes hard to catch. My recent
Chrome `132.0.6834.160` shows only CSP reports with disposition
`enforce`, not `report`.

### Checklist

- [x]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [x] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

### Release Notes

Added `object_src` directive to `Content-Security-Policy-Report-Only`
header.

__Closes: https://github.com/elastic/kibana/issues/208590__

---------

Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2025-02-05 15:18:06 +01:00
Milton Hultgren
3c4694e1dd
🌊 Make client check for hierarchy conflicts before creating streams (#208914)
## Summary

If you enable streams (which creates `logs`) and then try to create
`logs.child.grandchild` but `logs.child` already exists as either an
index or an unwired (Classic) stream, then we end up in a weird state
where `logs.child.grandchild` gets created as a wired child but then the
request fails as it tries to turn the unwired stream into a wired
stream.

This PR adds a step that asserts that there are no such conflicts in the
hierarchy before proceeding.
It also adds a check to ensure Streams are enabled before allowing the
creation of any streams, as well as blocking the creation of a root
stream that isn't `logs`.
Finally, there is some minor improvements to error handling for when a
data stream isn't found and error messages.
2025-02-05 15:01:47 +01:00
Christiane (Tina) Heiligers
1c4d0e99b4
Update archives for migrations multiple nodes test (#209667)
fix https://github.com/elastic/kibana/issues/167676 for 9.0 promotion

steps taken:
1. Start Node01: 
`yarn es snapshot --version=8.19.0 --data-archive
src/core/server/integration_tests/saved_objects/migrations/archives/7.13.0_5k_so_node_01.zip
--base-path .es/node01`

2. Start Node02: 
`yarn es snapshot --version=8.19.0 --data-archive
src/core/server/integration_tests/saved_objects/migrations/archives/7.13.0_5k_so_node_02.zip
--base-path .es/node02`

3. Wait for both nodes to start and be ready

4. Stop both ES nodes

5. change into the directory for node01:
`cd .es/node01/8.19.0`

6. Remove (or move) the outdated archive:
`rm
../../../src/core/server/integration_tests/saved_objects/migrations/archives/7.13.0_5k_so_node_01.zip`

7. zip the updated data and store as the original test filename in the
test directory:
`zip -r
../../../src/core/server/integration_tests/saved_objects/migrations/archives/7.13.0_5k_so_node_01.zip
data -x "*/\.*"`

Repeat these steps for node02:

8. `cd ../../../`
9. `cd .es/node02/8.19.0`
10. `rm
../../../src/core/server/integration_tests/saved_objects/migrations/archives/7.13.0_5k_so_node_02.zip`
11. `zip -r
../../../src/core/server/integration_tests/saved_objects/migrations/archives/7.13.0_5k_so_node_02.zip
data -x "*/\.*"`

12. `cd ../../../`
13. `git commit -m "Updated archives" && git push`

### Identify risks

Data archives have to be updated for every major.last before a new major
is released.
Should updating the archives not resolve test failures, there may be a
bug elsewhere in the stack. If so, carefully inspect the error logs to
determine the cause.
2025-02-05 06:57:52 -07:00
Marius Iversen
06f3c30f60
[Rule Migration] Add audit logging for SIEM Migration tasks. (#207831)
## Summary

Adds audit logging for successful calls to these API routes:
- Start/Stop migration
- Create migration
- Update Rule
- Install Rule
- Retrieve migration results.
- Uploaded Macro/Lookup
- Retrieved Macro/Lookup

Tested it manually by going through the workflow with audit logging
enabled:

Enable:
`xpack.security.audit.enabled: true`

Results:
```
{"event":{"action":"siem_migration_created","category":["database"],"type":["creation"],"outcome":"success"},"user":{"name":"elastic","roles":["superuser"]},"kibana":{"space_id":"default"},"trace":{"id":"00885dd4-7fd9-45fe-9a0b-2173adcac4ad"},"client":{"ip":"127.0.0.1"},"service":{"node":{"roles":["background_tasks","ui"]}},"ecs":{"version":"8.11.0"},"@timestamp":"2025-01-22T15:05:12.875+01:00","message":"User created a new SIEM migration with [id=cd9552ce-05c8-4893-b659-b5a5ed9325d9","log":{"level":"INFO","logger":"plugins.security.audit.ecs"},"process":{"pid":91324,"uptime":540.063456227},"transaction":{"id":"ee4606116856393c"}}
{"event":{"action":"siem_migration_started","category":["database"],"type":["start"],"outcome":"success"},"user":{"name":"elastic","roles":["superuser"]},"kibana":{"space_id":"default"},"trace":{"id":"e852b328-9e53-4c4d-b8ca-b8fa2b76383d"},"client":{"ip":"127.0.0.1"},"service":{"node":{"roles":["background_tasks","ui"]}},"ecs":{"version":"8.11.0"},"@timestamp":"2025-01-22T15:11:36.569+01:00","message":"User started an existing SIEM migration with [id=3805f79e-123c-4962-b22b-8ddf365cdd89]","log":{"level":"INFO","logger":"plugins.security.audit.ecs"},"process":{"pid":5438,"uptime":62.828177986},"transaction":{"id":"0ac652c8f722f1c4"}}
{"event":{"action":"siem_migration_stopped","category":["database"],"type":["end"],"outcome":"success"},"user":{"name":"elastic","roles":["superuser"]},"kibana":{"space_id":"default"},"trace":{"id":"136f3a38-d47d-455d-bca2-aaf38559b20a"},"client":{"ip":"127.0.0.1"},"service":{"node":{"roles":["background_tasks","ui"]}},"ecs":{"version":"8.11.0"},"@timestamp":"2025-01-22T15:11:05.871+01:00","message":"User stopped an existing SIEM migration with [id=3805f79e-123c-4962-b22b-8ddf365cdd89]","log":{"level":"INFO","logger":"plugins.security.audit.ecs"},"process":{"pid":5438,"uptime":32.12840553},"transaction":{"id":"be379686654f4bdf"}}
{"event":{"action":"siem_migration_updated_rule","category":["database"],"type":["change"],"outcome":"success"},"user":{"id":"u_mGBROF_q5bmFCATbLXAcCwKa0k8JvONAwSruelyKA5E_0","name":"elastic","roles":["superuser"]},"kibana":{"space_id":"default","session_id":"IPgQ3+R8DW9uxx4RQqUx9eZj+D5Es7SGQdcDoM/02l4="},"trace":{"id":"368b31e7-812d-464b-83d8-0e635c7fe5ed"},"client":{"ip":"127.0.0.1"},"service":{"node":{"roles":["background_tasks","ui"]}},"ecs":{"version":"8.11.0"},"@timestamp":"2025-01-22T15:13:15.827+01:00","message":"User updated a translated detection rule with [id=29pWjpQB_LGnD_bEV66u]","log":{"level":"INFO","logger":"plugins.security.audit.ecs"},"process":{"pid":5438,"uptime":162.09338085},"transaction":{"id":"404b3cb31be3c94f"}}
{"event":{"action":"siem_migration_installed_rule","category":["database"],"type":["creation"],"outcome":"success"},"user":{"id":"u_mGBROF_q5bmFCATbLXAcCwKa0k8JvONAwSruelyKA5E_0","name":"elastic","roles":["superuser"]},"kibana":{"space_id":"default","session_id":"IPgQ3+R8DW9uxx4RQqUx9eZj+D5Es7SGQdcDoM/02l4="},"trace":{"id":"d90396dc-a0d3-4308-b07e-54761b562803"},"client":{"ip":"127.0.0.1"},"service":{"node":{"roles":["background_tasks","ui"]}},"ecs":{"version":"8.11.0"},"@timestamp":"2025-01-22T15:13:46.709+01:00","message":"User installed a new detection rule through SIEM migration with [id=3805f79e-123c-4962-b22b-8ddf365cdd89]","log":{"level":"INFO","logger":"plugins.security.audit.ecs"},"process":{"pid":5438,"uptime":192.977728866},"transaction":{"id":"4b17bafb9fbf48a4"}}
{"event":{"action":"siem_migration_uploaded_macro","category":["database"],"type":["creation"],"outcome":"success"},"user":{"name":"elastic","roles":["superuser"]},"kibana":{"space_id":"default"},"trace":{"id":"e5fcb9cc-9d27-41cf-a171-13b9faf6078e"},"client":{"ip":"127.0.0.1"},"service":{"node":{"roles":["background_tasks","ui"]}},"ecs":{"version":"8.11.0"},"@timestamp":"2025-01-23T13:45:18.639+01:00","message":"User uploaded a new macro through SIEM migration with [id=2fc199ef-5bc7-4d87-a349-baeaea662273]","log":{"level":"INFO","logger":"plugins.security.audit.ecs"},"process":{"pid":89625,"uptime":106.911700803},"transaction":{"id":"fc95c131e86b0284"}}
```
2025-02-05 14:43:13 +01:00
Alex Szabo
aa4ce832f8 skip failing suite (#206396) 2025-02-05 14:12:07 +01:00
Bharat Pasupula
8181858385
[Automatic Import] Fix Structured log template to use single quotes (#209736)
## Release Note

Fix Structured log template to use single quotes

### Summary

Currently with a single backslash as escape character the template is
setting up a double quote surrounding it and it causes YAML Exception
```
 1 |   - kv:
 2 |       field: message
 3 |       field_split: "\|"
--------------------------^

YAMLException: unknown escape sequence (3:22)
```

This PR fixes to use single quotes to not break YAML parsing.
2025-02-05 13:52:04 +01:00
Jon
70989af677
[ci] Temporarily remove build_plugin_list_docs from Quick Checks (#209687)
While docs are undergoing migration. See
https://elastic.github.io/docs-builder/migration/freeze/index.html

Follow up tracked at https://github.com/elastic/kibana/issues/209686
2025-02-05 13:39:44 +01:00
Kibana Machine
dfc62e4a3e skip failing test suite (#203508) 2025-02-05 23:36:58 +11:00
Sonia Sanz Vivas
f398ef877c
[Snapshot and restore] Scape especial chars in snapshot searchbar (#208573)
Fixes https://github.com/elastic/kibana/issues/174039
2025-02-05 12:47:21 +01:00
Marco Antonio Ghiani
8d0f3544f1
[Streams 🌊] Enrichment UX redesign (#208141)
## 📓 Summary

Closes https://github.com/elastic/streams-program/issues/67
Closes https://github.com/elastic/streams-program/issues/69
Closes https://github.com/elastic/streams-program/issues/93
Closes https://github.com/elastic/streams-program/issues/75

This work heavily changes the initial prototype of the stream enrichment
section.
- Update the design into a unified split view.
- Introduce auto-simulation for real-time changes
- Differentiate between saved and staged processors, with
multi-processor simulation for the draft ones.

A downgrade versus the previous experience is the removal of the field
mapping selectors and simulation.
This is a temporary change, as we want to set a detected fields tab in
the simulation panel that embeds the schema editor, which is not ready
for this yet.


https://github.com/user-attachments/assets/6ea172b1-087f-4fd0-a850-b6dddc5ca311
2025-02-05 12:27:50 +01:00
Marco Liberati
0d9ce86d0b
[Aggs] Force return 0 on empty buckets on count if null flag is disabled (#207308)
## Summary

Fixes #206555 

This PR is an attempt to address the `null` bucket issue with `count` in
Lens formula via the `emptyAsNull` flag.

### Checklist

* [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios

### Risks

This PR introduces potentially some breaking changes, as count `null`
values, in particular coming from shifted computations, as now converted
to `0` if the flag has been enabled.
This change is not news in the code base as other aggs like
`distinct_count` or `value_count` already implements it, but not
`count`.
Apparently no test failed with this change, I've also added new unit
ones to freeze the current behaviour and detect future changes.

---------

Co-authored-by: Marco Vettorello <vettorello.marco@gmail.com>
Co-authored-by: Peter Pisljar <peter.pisljar@gmail.com>
2025-02-05 12:04:09 +01:00
Ignacio Rivas
86497d5e7f
[Console] Refactor flaky test (#209516) 2025-02-05 11:28:46 +01:00
Shahzad
22a015bb46
Update dependency form-data to ^4.0.1 !! (#209533)
## Summary

Update dependency form-data to ^4.0.1 !!

Minor changes https://github.com/form-data/form-data/releases/tag/v4.0.1

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
2025-02-05 11:22:35 +01:00
Shahzad
0f5a523deb
[Synthetics] E2e test update test logic to remove flakiness !! (#209554)
## Summary

 E2e test update test logic to remove flakiness !!
2025-02-05 11:22:12 +01:00
elastic-vault-github-plugin-prod[bot]
dd21a92ab9
[main] Sync bundled packages with Package Storage (#209332)
Automated by
https://buildkite.com/elastic/package-storage-infra-kibana-discover-release-branches/builds/2176

Co-authored-by: elasticmachine <elasticmachine@elastic.co>
Co-authored-by: Julia Bardi <90178898+juliaElastic@users.noreply.github.com>
2025-02-05 09:37:41 +00:00
jennypavlova
2e84285a32
[APM] Skip flaky test (Service map) (#209510)
Closes #207005 

## Summary

This PR skips flaky tests - 2 of the flaky tests were already skipped so
I skipped the test on the top level (as all the tests will be skipped
anyway it makes more sense to have the whole test skipped)
I tried to fix it and managed to reproduce the flaky behavior only once
out of many runs (the input was not filled but the next check failed -
which was not an expected behavior as it should fail on the previous
step or retry it) - It's super hard to reproduce it. I followed the
steps locally and it worked as expected so it's not an actual issue:



https://github.com/user-attachments/assets/d0d33622-c186-4b31-bcf7-b2c27df330ac



As we plan to refactor the test anyway we should not spend more time on
it so I skipped it for now.
2025-02-05 10:23:44 +01:00
Arturo Lidueña
3924e095c5
[Observability AI Assistant] rule connector - handle multiple prompt (#209221)
Intermediate releases to change rule or connector schemas in serverless
for #185032

## Summary

An Observability AI Assistant connector is available to be set as action
for Observability rules. When an alert is triggered, a conversation with
the AI assistant will be created sending the initial prompt set by the
user in the rule action. The conversation is then stored and can be
retrieved from the AI Assistant interface. the action is triggered on
any status change of the alert (active, recovered, untracked), creating
a new conversation for each of them using the same initial prompt which
may not be suitable for the 3 cases.

Improvement
The user is able to choose in when the action should be run (active,
recovered, untracked, all),. That would allow the user to specify more
than one AI Assistant action, with a different and more suitable prompt
in each case.
2025-02-05 10:16:42 +01:00
Stratoula Kalafateli
05b1cf2962
[ES|QL] Fixes the emotion bug (#209567)
## Summary

Closes https://github.com/elastic/kibana/issues/209679

When I removed the scss in favor of emotion I used this function
wrongly. This PR is fixing it
2025-02-05 10:13:37 +01:00
Mykola Harmash
015a4ac618
[Observability Onboarding] Make custom cards always appear in search results (#208913)
Closes #207734

This PR:
* Changes the behavior of the search form to always include quickstart
flows in search results even when a category is not selected
* Refactors and cleans up the code a bit


https://github.com/user-attachments/assets/e5de7092-2d9f-41be-8d69-25954e5e4bff

## How to test

Make sure that the search works as expected and when clicking on the
cards it leads to the right places.
2025-02-05 09:47:08 +01:00
Julia Rechkunova
b1b28c3258
[Discover] Some cleanups for the new in-table search (#208980)
- Addresses https://github.com/elastic/kibana/issues/208939

## Summary

This PR makes some cleanups to the code introduced in
https://github.com/elastic/kibana/pull/206454 and adds more tests.


### Checklist

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
2025-02-05 08:48:46 +01:00
Yara Tercero
d4199dcac1
[Detection Engine][Docs] Updating examples to meet old ascii docs (#207558)
# Summary

As part of the effort to add missing content for Security APIs, this PR
introduces a few missing request, response, and parameter examples for
Detection Engine Alert and migration APIs.
2025-02-05 08:02:48 +01:00
Nick Partridge
a93aaeee97
[Lens][Datatable] Fix color mapping of transposed datatables (#208623)
## Summary

In #189895 we added logic to the `getColorCategories` util function to
handle transpose columns. This mistakenly assumed the first row of the
datatable would include all transposed column ids (i.e.
`${value}---${columnId}`). After closer analysis this case is only
present the in datatable rendering (i.e. `table_basic.tsx`), but in this
context we also have the original non-transposed datatable.

So to simplify this we revert this logic to not care about transposed
datatables. Now the color mappings are correctly assigned across **split
by** columns.

<img width="720" alt="image"
src="https://github.com/user-attachments/assets/c588930e-53b9-409f-a257-2c5be35aaa38"
/>

Fixes #208555

### Checklist

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

## Release note

Fixes an issue in Lens (#208555) Table where a split-by metric on a
terms rendered incorrect colors in table cells.

---------

Co-authored-by: Marta Bondyra <4283304+mbondyra@users.noreply.github.com>
Co-authored-by: Marco Liberati <dej611@users.noreply.github.com>
2025-02-05 07:07:26 +01:00
Ryland Herrick
39ec0a012f
[Security Solution][Detection Engine] EUI Tech Debt - Removes references to static EuiTheme variables (#208820)
## Summary

This PR is a followup to #205990, which removed references to all of the
deprecated/renamed EUI vars in preparation for 9.0. Here, we address
some of the non-critical tech debt related to the EUI refresh, namely
the [removal of static EUI
tokens](https://github.com/elastic/kibana/issues/199715#json-tokens)
from our codebase.

I made every attempt not to change any styles in this PR, except to
simplify CSS to produce an equivalent design. A common example of this
was removing a static `margin` or `padding` declaration referencing
`euiThemeVars.size*`, and swapping it with an equivalent `gutterSize`
prop on the `EuiFlexGroup` container, or with an `align-self` or other
equivalent flexbox directive.

## Screenshots of Areas Affected
The majority of changes here involved the Exception List/Item pages.
I've attached screenshots of their current layout for comparison/review:


<details>
  <summary>
    <h3>Rule Exceptions Tab</h3>
  </summary>
  <kbd>
    <h3>Before</h3>
<img width="1395" alt="Rule exceptions tab - before"
src="https://github.com/user-attachments/assets/db7a5487-7df3-4a5f-b88e-90ab34784970"
/>

  </kbd>
  <kbd>
    <h3>After</h3>
<img width="1421" alt="Rule exceptions tab - after"
src="https://github.com/user-attachments/assets/77cbdefc-cbec-4b9e-8436-197f2f2f6677"
/>

  </kbd>
</details>

<details>
  <summary>
    <h3>Shared Exception Lists</h3>
  </summary>
  <kbd>
<img width="1517" alt="Shared Exception Lists"
src="https://github.com/user-attachments/assets/5448dd65-60f7-470c-bf7a-7af75bb914fa"
/>

  </kbd>
</details>

<details>
  <summary>
    <h3>Shared Exception List Details</h3>
  </summary>
  <kbd>
<img width="1517" alt="Shared Exception List Details"
src="https://github.com/user-attachments/assets/6e03fef6-af58-40bb-98c5-188651a584cc"
/>

  </kbd>
</details>

<details>
  <summary>
    <h3>Threshold Input</h3>
  </summary>
  <kbd>
<img width="1046" alt="Threshold Input"
src="https://github.com/user-attachments/assets/28738857-6bdf-404f-a790-a9f4e66ff27a"
/>

  </kbd>
</details>



### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.


- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [x] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
2025-02-04 19:58:26 -06:00
Philippe Oberti
99aa76d7bc
[Timelines] remove ColumnToggle, Overflow and LoadingPanel deprecated and unused code (#206323)
## Summary

While working on replacing all `styled-components`with `@emotion/react`
I realized that there is some dead code in the Timelines plugin. Both
the `Overflow` and `ColumnToggle` components used in the `HoverActions`
code exported to other plugins are not used anywhere.

Moreover that `HoverConfig` logic has been deprecated for years now...

I thought about removing all the other hover action components
(`AddToTimeline`, `Copy`, `FilterIn` and `FilterOut`) but these are
currently in used in other plugins (`threat_intelligence` and
`kubernetes_security`) so the effort to replace these are a bit more
involved and will be done in a separate PR

This PR also removes an unused LoadingPanel component.

**No changes to the application are introduced in this PR!**
2025-02-04 16:46:24 -06:00
Tiago Costa
3efb101622
skip flaky suite (#208415) 2025-02-04 21:35:53 +00:00
Tiago Costa
1afe5ce2dd
skip flaky suite (#209010) 2025-02-04 21:32:30 +00:00
Tiago Costa
7c3f074e45
skip flaky suite (#208459) 2025-02-04 21:22:01 +00:00
Kibana Machine
7389b05690 skip failing test suite (#209008) 2025-02-05 08:18:32 +11:00
Kibana Machine
3e147d5908 skip failing test suite (#196462) 2025-02-05 08:17:31 +11:00
Nathan L Smith
6552b08638
Remove APM team from cypress ownership (#209666)
...in renovate.json
2025-02-04 21:05:32 +00:00
Bena Kansara
551d31b0ff
[Custom threshold/Metric threshold] Display No Data in Threshold breached component (#209561)
Resolves https://github.com/elastic/kibana/issues/196062
Fixes https://github.com/elastic/kibana/issues/209515

Displays "Alert when No Data" in Threshold breached component for no
data alerts

- ### Custom threshold alert details page
<img width="1643" alt="Screenshot 2025-02-04 at 3 55 32 PM"
src="https://github.com/user-attachments/assets/5fbf27d2-dcb5-40d1-b466-c8bcc2d700c9"
/>

- ### Metric threshold alert details page
<img width="1645" alt="Screenshot 2025-02-04 at 3 54 58 PM"
src="https://github.com/user-attachments/assets/8968c803-ff73-4f7d-8501-f6a1e7e16e8c"
/>
2025-02-04 21:03:48 +01:00
Julia
07557b686c
[ResponseOps] Move custom threshold rule params to the package (#208686)
Fixes: https://github.com/elastic/kibana/issues/195191

Move log threshold rule type params to the new package.

P.S.: I've moved function `validateKQLStringFilter` and test for it in
my previous PR: https://github.com/elastic/kibana/pull/205507

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2025-02-04 21:01:05 +01:00
Matthew Scherer
3d7ccc5544
Added max_file_size_bytes advanced option to malware for all OSs. (#209541)
## Summary

This adds an advanced option 

### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [x]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [x] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)

### Identify risks
This is an advanced option. No risks. 


### Release notes
[os].advanced.malware.max_file_size_bytes key was added to control the
maximum file size the endpoint will scan for malware.

---------

Co-authored-by: Daniel Ferullo <56368752+ferullo@users.noreply.github.com>
2025-02-04 14:49:35 -05:00
Davis Plumlee
6f55501a75
[Security Solution] Fixes threat field appearing as modified when reset to base version value (#208530)
**Fixes https://github.com/elastic/kibana/issues/208251**

## Summary

This bug was caused by the local generated MITRE data we have stored in
`x-pack/solutions/security/plugins/security_solution/public/detections/mitre/mitre_tactics_techniques.ts`
having an inconsistency in the way its reference urls were written
compared to the TRADE team's prebuilt rule packages. The trailing
backslash was present in the prebuilt rule packages (and added by
browsers) but not in the url field from the `.json` file we scrape the
MITRE data from in our script.

For example, this is the url from the script: 

```
https://attack.mitre.org/techniques/T1078/004
```

and this is the url directly from the rule package:

```
https://attack.mitre.org/techniques/T1078/004/
```

This PR adds a normalization function that adds a trailing backslash to
the comparison string for the diff algorithm if it doesn't already
exist.

### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
2025-02-04 20:32:42 +01:00
Rodney Norris
5a18f66ed6
search: remove test log from indices plugin setup (#209342)
## Summary

remove test log from indices plugin setup
2025-02-04 14:23:25 -05:00
Nick Partridge
595406176f
[Charts] Fix borealis theme overrides (#209595)
## Summary

This removes an override that was applied to the charts theme prior to
updating the `Theme` in `@elastic/charts`. This is no longer needed and
is now using the wrong color.

## Release note

Fixes issue with `Amsterdam` theme where charts render with the
incorrect background color.
2025-02-04 19:54:19 +01:00
Christiane (Tina) Heiligers
bdc3470658
[UA] Update UI copy for batch reindex API (#209403)
fix https://github.com/elastic/kibana/issues/209081

Updates UI copy for the batch reindexing API only supporting indices.

Note to reviewers: There wasn't an entry for the translation id for
French.

---------

Co-authored-by: Jean-Louis Leysens <jloleysens@gmail.com>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2025-02-04 18:27:55 +00:00
Alexi Doak
64936f504d
[Response Ops][Alerting] Get summary alert query returns hard-coded 100 alerts (#209025)
Resolves https://github.com/elastic/kibana/issues/208750

## Summary

Removes the hard-coded value in the summarized alerts query, and uses
the max alerts config instead.

### Checklist

- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios

### To verify

1. Set `xpack.alerting.rules.run.alerts.max` in kibana.yml and start
Kibana
2. Create a summary alerting rule
3. Verify that the size in the summary alert query is the same value as
the max alerts config
2025-02-04 09:57:29 -08:00
Julia Rechkunova
c53140036a
[Discover] Unskip Edit field flyout tests (#209271)
- Closes https://github.com/elastic/kibana/issues/193102

### Checklist

- [x] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
2025-02-04 18:32:49 +01:00
Miriam
8fee85d841
[ObsUX] Skip flaky tests (#209500)
## Summary

Processes and Logs tabs test has been flaky for some time, after
different and numerous attempts to fix them we want to consider removing
them and convert them to component test.

This PR skips Processes tab as Logs tab was already skipped, and we
opened an issue make them component tests.
https://github.com/elastic/kibana/issues/209497

Closes: https://github.com/elastic/kibana/issues/192891 &
https://github.com/elastic/kibana/issues/203656
2025-02-04 17:26:10 +00:00
jennypavlova
eed02b930a
[Infra] Node details tests fix: wait for chart loading (#209544)
Closes #209227 

## Summary

This PR fixes a failed test: It was not possible to reproduce it locally
but I saw in the failed build that the page (chart) was still loading
when it failed so I added `waitForChartsToLoad` in the places where we
check the charts in the Overview tab.

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
2025-02-04 17:39:21 +01:00
Stratoula Kalafateli
48ed125d63
[ES|QL][Lens] Loads only one panel when the associated variables change (#208897)
## Summary

Closes https://github.com/elastic/kibana/issues/206558


![meow](https://github.com/user-attachments/assets/a61c6f1e-fc13-4324-adc7-1a9b30d29df4)

### Checklist

- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
2025-02-04 17:34:39 +01:00
Dima Arnautov
878ab41525
[ML] Fix flaky tests for cases attachments (#209143)
## Summary

Increases the timeout for the Cases model assertion to prevent flaky
behavior. The flaky tests runner passed 200/200 —hopefully, it is
stable now.

Closes https://github.com/elastic/kibana/issues/203675
Closes https://github.com/elastic/kibana/issues/202342
Closes https://github.com/elastic/kibana/issues/200836
Closes https://github.com/elastic/kibana/issues/196307
Closes https://github.com/elastic/kibana/issues/194168

### Checklist

- [x] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
2025-02-04 16:58:07 +01:00
Jean-Louis Leysens
b8742125f5
[main] [UA] Preserve hidden status of original index during reindexing (#209512) (#209540)
Close https://github.com/elastic/kibana/issues/209471

# Backport

This will backport the following commits from `8.18` to `main`:
- [[UA] Preserve hidden status of original index during reindexing
(#209512)](https://github.com/elastic/kibana/pull/209512)

<!--- Backport version: 9.6.4 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Jean-Louis
Leysens","email":"jeanlouis.leysens@elastic.co"},"sourceCommit":{"committedDate":"2025-02-04T13:20:51Z","message":"[UA]
Preserve hidden status of original index during reindexing
(#209512)","sha":"ed5b521cb491ccb4e1491190f221209de1c2a90f","branchLabelMapping":{"^v8.16.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["Team:Core","release_note:skip","Feature:Upgrade
Assistant","backport:skip"],"title":"[UA] Preserve hidden status of
original index during
reindexing","number":209512,"url":"https://github.com/elastic/kibana/pull/209512","mergeCommit":{"message":"[UA]
Preserve hidden status of original index during reindexing
(#209512)","sha":"ed5b521cb491ccb4e1491190f221209de1c2a90f"}},"sourceBranch":"8.18","suggestedTargetBranches":[],"targetPullRequestStates":[]}]
BACKPORT-->
2025-02-04 16:34:50 +01:00
Sergi Romeu
23d926f096
[Performance] Track performance telemetry in APM (#208561)
## Summary

Closes https://github.com/elastic/kibana/issues/205396

This PR adds performance telemetry to the missing APM pages
2025-02-04 16:30:47 +01:00
Bailey Cash
df573d7596
[SLO]: require instance id in slo details schema (#209020)
## Summary

Resolves #180590

Since SLO instanceId is provided in all APIs, it will be made required
for sloWithDataResponseSchema and the SLOWithSummaryResponse type.
Checks for the existence of instanceId have either been removed or
changed to check for ALL_VALUE (`*`)

---------

Co-authored-by: Kevin Delemme <kevin.delemme@elastic.co>
Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
2025-02-04 10:20:03 -05:00