a4a0bc6a7e
* Move test case to separate file --------- Co-authored-by: Mika Ayenson <Mikaayenson@users.noreply.github.com> Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
69 lines
2.6 KiB
Python
69 lines
2.6 KiB
Python
# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
|
|
# or more contributor license agreements. Licensed under the Elastic License
|
|
# 2.0; you may not use this file except in compliance with the Elastic License
|
|
# 2.0.
|
|
|
|
from detection_rules.rule_loader import RuleCollection
|
|
|
|
from .base import BaseRuleTest
|
|
|
|
|
|
class TestEQLInSet(BaseRuleTest):
|
|
"""Test EQL rule query in set override."""
|
|
|
|
def test_eql_in_set(self):
|
|
"""Test that the query validation is working correctly."""
|
|
rc = RuleCollection()
|
|
eql_rule = {
|
|
"metadata": {
|
|
"creation_date": "2020/12/15",
|
|
"integration": ["endpoint", "windows"],
|
|
"maturity": "production",
|
|
"min_stack_comments": "New fields added: required_fields, related_integrations, setup",
|
|
"min_stack_version": "8.3.0",
|
|
"updated_date": "2024/03/26",
|
|
},
|
|
"rule": {
|
|
"author": ["Elastic"],
|
|
"description": """
|
|
Test Rule.
|
|
""",
|
|
"false_positives": ["Fake."],
|
|
"from": "now-9m",
|
|
"index": ["winlogbeat-*", "logs-endpoint.events.*", "logs-windows.sysmon_operational-*"],
|
|
"language": "eql",
|
|
"license": "Elastic License v2",
|
|
"name": "Fake Test Rule",
|
|
"references": [
|
|
"https://example.com",
|
|
],
|
|
"risk_score": 47,
|
|
"rule_id": "4fffae5d-8b7d-4e48-88b1-979ed42fd9a3",
|
|
"severity": "medium",
|
|
"tags": [
|
|
"Domain: Endpoint",
|
|
"OS: Windows",
|
|
"Use Case: Threat Detection",
|
|
"Tactic: Execution",
|
|
"Data Source: Elastic Defend",
|
|
"Data Source: Sysmon",
|
|
],
|
|
"type": "eql",
|
|
"query": """
|
|
sequence by host.id, process.entity_id with maxspan = 5s
|
|
[network where destination.ip in ("127.0.0.1", "::1")]
|
|
""",
|
|
},
|
|
}
|
|
expected_error_message = r"Error in both stack and integrations checks:.*Unable to compare ip to string.*"
|
|
with self.assertRaisesRegex(ValueError, expected_error_message):
|
|
rc.load_dict(eql_rule)
|
|
# Change to appropriate destination.address field
|
|
eql_rule["rule"][
|
|
"query"
|
|
] = """
|
|
sequence by host.id, process.entity_id with maxspan = 10s
|
|
[network where destination.address in ("192.168.1.1", "::1")]
|
|
"""
|
|
rc.load_dict(eql_rule)
|