[APM] Adds APM data stream 'traces-apm*' to apm rules (#105334) (#1335)

This commit is contained in:
Oliver Gupte
2021-07-13 09:04:58 -04:00
committed by GitHub
parent 1e6e5ef0a0
commit 7ec97e622f
6 changed files with 12 additions and 11 deletions
+2 -2
View File
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2020/02/18"
maturity = "production"
updated_date = "2021/03/03"
updated_date = "2021/07/13"
[rule]
author = ["Elastic"]
@@ -16,7 +16,7 @@ false_positives = [
suspicious or malicious activity.
""",
]
index = ["apm-*-transaction*"]
index = ["apm-*-transaction*", "traces-apm*"]
language = "kuery"
license = "Elastic License v2"
name = "Web Application Suspicious Activity: POST Request Declined"
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2020/02/18"
maturity = "production"
updated_date = "2021/03/03"
updated_date = "2021/07/13"
[rule]
author = ["Elastic"]
@@ -16,7 +16,7 @@ false_positives = [
suspicious or malicious activity.
""",
]
index = ["apm-*-transaction*"]
index = ["apm-*-transaction*", "traces-apm*"]
language = "kuery"
license = "Elastic License v2"
name = "Web Application Suspicious Activity: Unauthorized Method"
+2 -2
View File
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2020/02/18"
maturity = "production"
updated_date = "2021/03/03"
updated_date = "2021/07/13"
[rule]
author = ["Elastic"]
@@ -13,7 +13,7 @@ false_positives = [
unexpected, the user unauthorized, or the request unusual, these may indicate suspicious or malicious activity.
""",
]
index = ["apm-*-transaction*"]
index = ["apm-*-transaction*", "traces-apm*"]
language = "kuery"
license = "Elastic License v2"
name = "Web Application Suspicious Activity: No User Agent"
+2 -2
View File
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2020/02/18"
maturity = "production"
updated_date = "2021/03/03"
updated_date = "2021/07/13"
[rule]
author = ["Elastic"]
@@ -16,7 +16,7 @@ false_positives = [
suspicious or malicious activity.
""",
]
index = ["apm-*-transaction*"]
index = ["apm-*-transaction*", "traces-apm*"]
language = "kuery"
license = "Elastic License v2"
name = "Web Application Suspicious Activity: sqlmap User Agent"
+2 -2
View File
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2020/07/08"
maturity = "production"
updated_date = "2021/03/03"
updated_date = "2021/07/13"
[rule]
author = ["Elastic"]
@@ -9,7 +9,7 @@ description = """
Generates a detection alert for each external alert written to the configured indices. Enabling this rule allows you to
immediately begin investigating external alerts in the app.
"""
index = ["apm-*-transaction*", "auditbeat-*", "filebeat-*", "logs-*", "packetbeat-*", "winlogbeat-*"]
index = ["apm-*-transaction*", "traces-apm*", "auditbeat-*", "filebeat-*", "logs-*", "packetbeat-*", "winlogbeat-*"]
language = "kuery"
license = "Elastic License v2"
max_signals = 10000
+2 -1
View File
@@ -205,11 +205,12 @@ class TestRuleTags(BaseRuleTest):
def test_required_tags(self):
"""Test that expected tags are present within rules."""
# indexes considered; only those with obvious relationships included
# 'apm-*-transaction*', 'auditbeat-*', 'endgame-*', 'filebeat-*', 'logs-*', 'logs-aws*',
# 'apm-*-transaction*', 'traces-apm*', 'auditbeat-*', 'endgame-*', 'filebeat-*', 'logs-*', 'logs-aws*',
# 'logs-endpoint.alerts-*', 'logs-endpoint.events.*', 'logs-okta*', 'packetbeat-*', 'winlogbeat-*'
required_tags_map = {
'apm-*-transaction*': {'all': ['APM']},
'traces-apm*': {'all': ['APM']},
'auditbeat-*': {'any': ['Windows', 'macOS', 'Linux']},
'endgame-*': {'all': ['Elastic Endgame']},
'logs-aws*': {'all': ['AWS']},