-
Notifications
You must be signed in to change notification settings - Fork 8.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security Solution] Exploratory testing of prebuilt rule customization workflows #180398
Comments
Pinging @elastic/security-detection-rule-management (Team:Detection Rule Management) |
Pinging @elastic/security-solution (Team: SecuritySolution) |
Pinging @elastic/security-detections-response (Team:Detections and Resp) |
prebuiltRulesCustomizationEnabled
feature flag turned onprebuiltRulesCustomizationEnabled
feature flag turned on (DRAFT)
prebuiltRulesCustomizationEnabled
feature flag turned on (DRAFT)
@MadameSheema please reassign to someone from QA Source when you know who could help us with this. |
Prebuilt Rule Customization Test Plan
2.2 Out-of-Scope
|
@pborgonovi Great work, and thank you for this initiative. The plan for exploratory testing looks good so far 👍 A few suggestions:
|
Thank you so much for the feedback @banderror I'll be working on it. |
Epics: https://github.com/elastic/security-team/issues/1974 (internal), #174168
Summary
Do comprehensive exploratory testing of the app with the
prebuiltRulesCustomizationEnabled
feature flag turned on.Workflows to test that were directly affected by the prebuilt rule customization functionality:
Workflows to test for regressions:
Advanced testing:
prebuiltRulesCustomizationEnabled
feature flag after using the app with the flag enabled. Test that the app works without issues and errors, even there are some customized prebuilt rules that were created when the flag was turned on.The text was updated successfully, but these errors were encountered: