[SecruitySolution][Endpoint][ResponseActions] Capture response actions usage on all rule types#225081
Conversation
|
Pinging @elastic/security-defend-workflows (Team:Defend Workflows) |
705d651 to
5a15e0e
Compare
Bamieh
left a comment
There was a problem hiding this comment.
telemetry schema changes lgtm (only new additional fields)
…ditya/kibana into task/edr-rules-snapshot-telemetry
💚 Build Succeeded
Metrics [docs]
History
cc @ashokaditya |
rylnd
left a comment
There was a problem hiding this comment.
Detection engine changes (addition of these new usage fields in a few files) LGTM. I didn't check this out to verify, but the updated integration tests demonstrate the default values being generated.
rylnd
left a comment
There was a problem hiding this comment.
Detection engine changes (addition of these new usage fields in a few files) LGTM. I didn't check this out to verify, but the updated integration tests demonstrate the default values being generated.
|
Starting backport for target branches: 8.17, 8.18, 8.19, 9.0 https://github.com/elastic/kibana/actions/runs/15859898252 |
…s usage on all rule types (elastic#225081) ## Summary This PR is adding additional (snapshot) telemetry to detection rules to capture response actions usage. - Mapping PR elastic/telemetry#4878 ## Testing 1. Create rules with response actions (Osquery or Elastic Defend). 2. Make sure the rule has excuted and alerts triggered. 3. Test snapshot telemetry by: - using the API call on Kibana dev console or, <details><summary>API call</summary> <code> POST kbn:/internal/telemetry/clusters/_stats?apiVersion=2 { "unencrypted": true, "refreshCache": true } </code> </details> - navigating to `app/management/kibana/settings`, click on `cluster data` under `Usage collection` section. Snapshot data should show up in a flyout. ### Checklist Check the PR satisfies following conditions. Reviewers should verify this PR satisfies this list as well. - [ ] Any text added follows [EUI's writing guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses sentence case text and includes [i18n support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md) - [ ] [Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html) was added for features that require explanation or tutorials - [x] [Unit or functional tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html) were updated or added to match the most common scenarios - [ ] If a plugin configuration key changed, check if it needs to be allowlisted in the cloud and added to the [docker list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker) - [ ] This was checked for breaking HTTP API changes, and any breaking changes have been approved by the breaking-change committee. The `release_note:breaking` label should be applied in these situations. - [ ] [Flaky Test Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was used on any tests changed - [ ] The PR description includes the appropriate Release Notes section, and the correct `release_note:*` label is applied per the [guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process) ### Identify risks Does this PR introduce any risks? For example, consider risks like hard to test bugs, performance regression, potential of data loss. Describe the risk, its severity, and mitigation for each identified risk. Invite stakeholders and evaluate how to proceed before merging. - [ ] [See some risk examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx) - [ ] ... (cherry picked from commit a3ff2f7)
…s usage on all rule types (elastic#225081) ## Summary This PR is adding additional (snapshot) telemetry to detection rules to capture response actions usage. - Mapping PR elastic/telemetry#4878 ## Testing 1. Create rules with response actions (Osquery or Elastic Defend). 2. Make sure the rule has excuted and alerts triggered. 3. Test snapshot telemetry by: - using the API call on Kibana dev console or, <details><summary>API call</summary> <code> POST kbn:/internal/telemetry/clusters/_stats?apiVersion=2 { "unencrypted": true, "refreshCache": true } </code> </details> - navigating to `app/management/kibana/settings`, click on `cluster data` under `Usage collection` section. Snapshot data should show up in a flyout. ### Checklist Check the PR satisfies following conditions. Reviewers should verify this PR satisfies this list as well. - [ ] Any text added follows [EUI's writing guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses sentence case text and includes [i18n support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md) - [ ] [Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html) was added for features that require explanation or tutorials - [x] [Unit or functional tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html) were updated or added to match the most common scenarios - [ ] If a plugin configuration key changed, check if it needs to be allowlisted in the cloud and added to the [docker list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker) - [ ] This was checked for breaking HTTP API changes, and any breaking changes have been approved by the breaking-change committee. The `release_note:breaking` label should be applied in these situations. - [ ] [Flaky Test Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was used on any tests changed - [ ] The PR description includes the appropriate Release Notes section, and the correct `release_note:*` label is applied per the [guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process) ### Identify risks Does this PR introduce any risks? For example, consider risks like hard to test bugs, performance regression, potential of data loss. Describe the risk, its severity, and mitigation for each identified risk. Invite stakeholders and evaluate how to proceed before merging. - [ ] [See some risk examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx) - [ ] ... (cherry picked from commit a3ff2f7)
💔 Some backports could not be created
Note: Successful backport PRs will be merged automatically after passing CI. Manual backportTo create the backport manually run: Questions ?Please refer to the Backport tool documentation |
… actions usage on all rule types (#225081) (#225158) # Backport This will backport the following commits from `main` to `8.19`: - [[SecruitySolution][Endpoint][ResponseActions] Capture response actions usage on all rule types (#225081)](#225081) <!--- Backport version: 9.6.6 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sorenlouv/backport) <!--BACKPORT [{"author":{"name":"Ash","email":"1849116+ashokaditya@users.noreply.github.com"},"sourceCommit":{"committedDate":"2025-06-24T19:39:19Z","message":"[SecruitySolution][Endpoint][ResponseActions] Capture response actions usage on all rule types (#225081)\n\n## Summary\n\nThis PR is adding additional (snapshot) telemetry to detection rules to\ncapture response actions usage.\n\n- Mapping PR https://github.com/elastic/telemetry/pull/4878\n\n## Testing\n1. Create rules with response actions (Osquery or Elastic Defend). \n2. Make sure the rule has excuted and alerts triggered.\n3. Test snapshot telemetry by:\n - using the API call on Kibana dev console or,\n <details><summary>API call</summary>\n <code>\n POST kbn:/internal/telemetry/clusters/_stats?apiVersion=2\n { \"unencrypted\": true, \"refreshCache\": true }\n </code>\n </details> \n- navigating to `app/management/kibana/settings`, click on `cluster\ndata` under `Usage collection` section. Snapshot data should show up in\na flyout.\n\n### Checklist\n\nCheck the PR satisfies following conditions. \n\nReviewers should verify this PR satisfies this list as well.\n\n- [ ] Any text added follows [EUI's writing\nguidelines](https://elastic.github.io/eui/#/guidelines/writing), uses\nsentence case text and includes [i18n\nsupport](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)\n- [ ]\n[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)\nwas added for features that require explanation or tutorials\n- [x] [Unit or functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere updated or added to match the most common scenarios\n- [ ] If a plugin configuration key changed, check if it needs to be\nallowlisted in the cloud and added to the [docker\nlist](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)\n- [ ] This was checked for breaking HTTP API changes, and any breaking\nchanges have been approved by the breaking-change committee. The\n`release_note:breaking` label should be applied in these situations.\n- [ ] [Flaky Test\nRunner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was\nused on any tests changed\n- [ ] The PR description includes the appropriate Release Notes section,\nand the correct `release_note:*` label is applied per the\n[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)\n\n### Identify risks\n\nDoes this PR introduce any risks? For example, consider risks like hard\nto test bugs, performance regression, potential of data loss.\n\nDescribe the risk, its severity, and mitigation for each identified\nrisk. Invite stakeholders and evaluate how to proceed before merging.\n\n- [ ] [See some risk\nexamples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)\n- [ ] ...","sha":"a3ff2f7b6b1ca22e4c5b29e8d684660a81700224","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:Defend Workflows","OLM Sprint","backport:prev-minor","backport:prev-major","backport:all-open","backport:version","v9.1.0"],"title":"[SecruitySolution][Endpoint][ResponseActions] Capture response actions usage on all rule types","number":225081,"url":"https://github.com/elastic/kibana/pull/225081","mergeCommit":{"message":"[SecruitySolution][Endpoint][ResponseActions] Capture response actions usage on all rule types (#225081)\n\n## Summary\n\nThis PR is adding additional (snapshot) telemetry to detection rules to\ncapture response actions usage.\n\n- Mapping PR https://github.com/elastic/telemetry/pull/4878\n\n## Testing\n1. Create rules with response actions (Osquery or Elastic Defend). \n2. Make sure the rule has excuted and alerts triggered.\n3. Test snapshot telemetry by:\n - using the API call on Kibana dev console or,\n <details><summary>API call</summary>\n <code>\n POST kbn:/internal/telemetry/clusters/_stats?apiVersion=2\n { \"unencrypted\": true, \"refreshCache\": true }\n </code>\n </details> \n- navigating to `app/management/kibana/settings`, click on `cluster\ndata` under `Usage collection` section. Snapshot data should show up in\na flyout.\n\n### Checklist\n\nCheck the PR satisfies following conditions. \n\nReviewers should verify this PR satisfies this list as well.\n\n- [ ] Any text added follows [EUI's writing\nguidelines](https://elastic.github.io/eui/#/guidelines/writing), uses\nsentence case text and includes [i18n\nsupport](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)\n- [ ]\n[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)\nwas added for features that require explanation or tutorials\n- [x] [Unit or functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere updated or added to match the most common scenarios\n- [ ] If a plugin configuration key changed, check if it needs to be\nallowlisted in the cloud and added to the [docker\nlist](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)\n- [ ] This was checked for breaking HTTP API changes, and any breaking\nchanges have been approved by the breaking-change committee. The\n`release_note:breaking` label should be applied in these situations.\n- [ ] [Flaky Test\nRunner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was\nused on any tests changed\n- [ ] The PR description includes the appropriate Release Notes section,\nand the correct `release_note:*` label is applied per the\n[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)\n\n### Identify risks\n\nDoes this PR introduce any risks? For example, consider risks like hard\nto test bugs, performance regression, potential of data loss.\n\nDescribe the risk, its severity, and mitigation for each identified\nrisk. Invite stakeholders and evaluate how to proceed before merging.\n\n- [ ] [See some risk\nexamples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)\n- [ ] ...","sha":"a3ff2f7b6b1ca22e4c5b29e8d684660a81700224"}},"sourceBranch":"main","suggestedTargetBranches":[],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/225081","number":225081,"mergeCommit":{"message":"[SecruitySolution][Endpoint][ResponseActions] Capture response actions usage on all rule types (#225081)\n\n## Summary\n\nThis PR is adding additional (snapshot) telemetry to detection rules to\ncapture response actions usage.\n\n- Mapping PR https://github.com/elastic/telemetry/pull/4878\n\n## Testing\n1. Create rules with response actions (Osquery or Elastic Defend). \n2. Make sure the rule has excuted and alerts triggered.\n3. Test snapshot telemetry by:\n - using the API call on Kibana dev console or,\n <details><summary>API call</summary>\n <code>\n POST kbn:/internal/telemetry/clusters/_stats?apiVersion=2\n { \"unencrypted\": true, \"refreshCache\": true }\n </code>\n </details> \n- navigating to `app/management/kibana/settings`, click on `cluster\ndata` under `Usage collection` section. Snapshot data should show up in\na flyout.\n\n### Checklist\n\nCheck the PR satisfies following conditions. \n\nReviewers should verify this PR satisfies this list as well.\n\n- [ ] Any text added follows [EUI's writing\nguidelines](https://elastic.github.io/eui/#/guidelines/writing), uses\nsentence case text and includes [i18n\nsupport](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)\n- [ ]\n[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)\nwas added for features that require explanation or tutorials\n- [x] [Unit or functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere updated or added to match the most common scenarios\n- [ ] If a plugin configuration key changed, check if it needs to be\nallowlisted in the cloud and added to the [docker\nlist](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)\n- [ ] This was checked for breaking HTTP API changes, and any breaking\nchanges have been approved by the breaking-change committee. The\n`release_note:breaking` label should be applied in these situations.\n- [ ] [Flaky Test\nRunner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was\nused on any tests changed\n- [ ] The PR description includes the appropriate Release Notes section,\nand the correct `release_note:*` label is applied per the\n[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)\n\n### Identify risks\n\nDoes this PR introduce any risks? For example, consider risks like hard\nto test bugs, performance regression, potential of data loss.\n\nDescribe the risk, its severity, and mitigation for each identified\nrisk. Invite stakeholders and evaluate how to proceed before merging.\n\n- [ ] [See some risk\nexamples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)\n- [ ] ...","sha":"a3ff2f7b6b1ca22e4c5b29e8d684660a81700224"}}]}] BACKPORT--> Co-authored-by: Ash <1849116+ashokaditya@users.noreply.github.com>
…actions usage on all rule types (#225081) (#225159) # Backport This will backport the following commits from `main` to `9.0`: - [[SecruitySolution][Endpoint][ResponseActions] Capture response actions usage on all rule types (#225081)](#225081) <!--- Backport version: 9.6.6 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sorenlouv/backport) <!--BACKPORT [{"author":{"name":"Ash","email":"1849116+ashokaditya@users.noreply.github.com"},"sourceCommit":{"committedDate":"2025-06-24T19:39:19Z","message":"[SecruitySolution][Endpoint][ResponseActions] Capture response actions usage on all rule types (#225081)\n\n## Summary\n\nThis PR is adding additional (snapshot) telemetry to detection rules to\ncapture response actions usage.\n\n- Mapping PR https://github.com/elastic/telemetry/pull/4878\n\n## Testing\n1. Create rules with response actions (Osquery or Elastic Defend). \n2. Make sure the rule has excuted and alerts triggered.\n3. Test snapshot telemetry by:\n - using the API call on Kibana dev console or,\n <details><summary>API call</summary>\n <code>\n POST kbn:/internal/telemetry/clusters/_stats?apiVersion=2\n { \"unencrypted\": true, \"refreshCache\": true }\n </code>\n </details> \n- navigating to `app/management/kibana/settings`, click on `cluster\ndata` under `Usage collection` section. Snapshot data should show up in\na flyout.\n\n### Checklist\n\nCheck the PR satisfies following conditions. \n\nReviewers should verify this PR satisfies this list as well.\n\n- [ ] Any text added follows [EUI's writing\nguidelines](https://elastic.github.io/eui/#/guidelines/writing), uses\nsentence case text and includes [i18n\nsupport](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)\n- [ ]\n[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)\nwas added for features that require explanation or tutorials\n- [x] [Unit or functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere updated or added to match the most common scenarios\n- [ ] If a plugin configuration key changed, check if it needs to be\nallowlisted in the cloud and added to the [docker\nlist](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)\n- [ ] This was checked for breaking HTTP API changes, and any breaking\nchanges have been approved by the breaking-change committee. The\n`release_note:breaking` label should be applied in these situations.\n- [ ] [Flaky Test\nRunner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was\nused on any tests changed\n- [ ] The PR description includes the appropriate Release Notes section,\nand the correct `release_note:*` label is applied per the\n[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)\n\n### Identify risks\n\nDoes this PR introduce any risks? For example, consider risks like hard\nto test bugs, performance regression, potential of data loss.\n\nDescribe the risk, its severity, and mitigation for each identified\nrisk. Invite stakeholders and evaluate how to proceed before merging.\n\n- [ ] [See some risk\nexamples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)\n- [ ] ...","sha":"a3ff2f7b6b1ca22e4c5b29e8d684660a81700224","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:Defend Workflows","OLM Sprint","backport:prev-minor","backport:prev-major","backport:all-open","backport:version","v9.1.0"],"title":"[SecruitySolution][Endpoint][ResponseActions] Capture response actions usage on all rule types","number":225081,"url":"https://github.com/elastic/kibana/pull/225081","mergeCommit":{"message":"[SecruitySolution][Endpoint][ResponseActions] Capture response actions usage on all rule types (#225081)\n\n## Summary\n\nThis PR is adding additional (snapshot) telemetry to detection rules to\ncapture response actions usage.\n\n- Mapping PR https://github.com/elastic/telemetry/pull/4878\n\n## Testing\n1. Create rules with response actions (Osquery or Elastic Defend). \n2. Make sure the rule has excuted and alerts triggered.\n3. Test snapshot telemetry by:\n - using the API call on Kibana dev console or,\n <details><summary>API call</summary>\n <code>\n POST kbn:/internal/telemetry/clusters/_stats?apiVersion=2\n { \"unencrypted\": true, \"refreshCache\": true }\n </code>\n </details> \n- navigating to `app/management/kibana/settings`, click on `cluster\ndata` under `Usage collection` section. Snapshot data should show up in\na flyout.\n\n### Checklist\n\nCheck the PR satisfies following conditions. \n\nReviewers should verify this PR satisfies this list as well.\n\n- [ ] Any text added follows [EUI's writing\nguidelines](https://elastic.github.io/eui/#/guidelines/writing), uses\nsentence case text and includes [i18n\nsupport](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)\n- [ ]\n[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)\nwas added for features that require explanation or tutorials\n- [x] [Unit or functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere updated or added to match the most common scenarios\n- [ ] If a plugin configuration key changed, check if it needs to be\nallowlisted in the cloud and added to the [docker\nlist](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)\n- [ ] This was checked for breaking HTTP API changes, and any breaking\nchanges have been approved by the breaking-change committee. The\n`release_note:breaking` label should be applied in these situations.\n- [ ] [Flaky Test\nRunner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was\nused on any tests changed\n- [ ] The PR description includes the appropriate Release Notes section,\nand the correct `release_note:*` label is applied per the\n[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)\n\n### Identify risks\n\nDoes this PR introduce any risks? For example, consider risks like hard\nto test bugs, performance regression, potential of data loss.\n\nDescribe the risk, its severity, and mitigation for each identified\nrisk. Invite stakeholders and evaluate how to proceed before merging.\n\n- [ ] [See some risk\nexamples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)\n- [ ] ...","sha":"a3ff2f7b6b1ca22e4c5b29e8d684660a81700224"}},"sourceBranch":"main","suggestedTargetBranches":[],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/225081","number":225081,"mergeCommit":{"message":"[SecruitySolution][Endpoint][ResponseActions] Capture response actions usage on all rule types (#225081)\n\n## Summary\n\nThis PR is adding additional (snapshot) telemetry to detection rules to\ncapture response actions usage.\n\n- Mapping PR https://github.com/elastic/telemetry/pull/4878\n\n## Testing\n1. Create rules with response actions (Osquery or Elastic Defend). \n2. Make sure the rule has excuted and alerts triggered.\n3. Test snapshot telemetry by:\n - using the API call on Kibana dev console or,\n <details><summary>API call</summary>\n <code>\n POST kbn:/internal/telemetry/clusters/_stats?apiVersion=2\n { \"unencrypted\": true, \"refreshCache\": true }\n </code>\n </details> \n- navigating to `app/management/kibana/settings`, click on `cluster\ndata` under `Usage collection` section. Snapshot data should show up in\na flyout.\n\n### Checklist\n\nCheck the PR satisfies following conditions. \n\nReviewers should verify this PR satisfies this list as well.\n\n- [ ] Any text added follows [EUI's writing\nguidelines](https://elastic.github.io/eui/#/guidelines/writing), uses\nsentence case text and includes [i18n\nsupport](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)\n- [ ]\n[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)\nwas added for features that require explanation or tutorials\n- [x] [Unit or functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere updated or added to match the most common scenarios\n- [ ] If a plugin configuration key changed, check if it needs to be\nallowlisted in the cloud and added to the [docker\nlist](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)\n- [ ] This was checked for breaking HTTP API changes, and any breaking\nchanges have been approved by the breaking-change committee. The\n`release_note:breaking` label should be applied in these situations.\n- [ ] [Flaky Test\nRunner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was\nused on any tests changed\n- [ ] The PR description includes the appropriate Release Notes section,\nand the correct `release_note:*` label is applied per the\n[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)\n\n### Identify risks\n\nDoes this PR introduce any risks? For example, consider risks like hard\nto test bugs, performance regression, potential of data loss.\n\nDescribe the risk, its severity, and mitigation for each identified\nrisk. Invite stakeholders and evaluate how to proceed before merging.\n\n- [ ] [See some risk\nexamples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)\n- [ ] ...","sha":"a3ff2f7b6b1ca22e4c5b29e8d684660a81700224"}}]}] BACKPORT--> Co-authored-by: Ash <1849116+ashokaditya@users.noreply.github.com>
…esponse actions usage on all rule types (elastic#225081) (elastic#225159)" This reverts commit d19f92f.
…esponse actions usage on all rule types (elastic#225081) (elastic#225159)" This reverts commit d19f92f.
…s usage on all rule types (elastic#225081) ## Summary This PR is adding additional (snapshot) telemetry to detection rules to capture response actions usage. - Mapping PR elastic/telemetry#4878 ## Testing 1. Create rules with response actions (Osquery or Elastic Defend). 2. Make sure the rule has excuted and alerts triggered. 3. Test snapshot telemetry by: - using the API call on Kibana dev console or, <details><summary>API call</summary> <code> POST kbn:/internal/telemetry/clusters/_stats?apiVersion=2 { "unencrypted": true, "refreshCache": true } </code> </details> - navigating to `app/management/kibana/settings`, click on `cluster data` under `Usage collection` section. Snapshot data should show up in a flyout. ### Checklist Check the PR satisfies following conditions. Reviewers should verify this PR satisfies this list as well. - [ ] Any text added follows [EUI's writing guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses sentence case text and includes [i18n support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md) - [ ] [Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html) was added for features that require explanation or tutorials - [x] [Unit or functional tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html) were updated or added to match the most common scenarios - [ ] If a plugin configuration key changed, check if it needs to be allowlisted in the cloud and added to the [docker list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker) - [ ] This was checked for breaking HTTP API changes, and any breaking changes have been approved by the breaking-change committee. The `release_note:breaking` label should be applied in these situations. - [ ] [Flaky Test Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was used on any tests changed - [ ] The PR description includes the appropriate Release Notes section, and the correct `release_note:*` label is applied per the [guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process) ### Identify risks Does this PR introduce any risks? For example, consider risks like hard to test bugs, performance regression, potential of data loss. Describe the risk, its severity, and mitigation for each identified risk. Invite stakeholders and evaluate how to proceed before merging. - [ ] [See some risk examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx) - [ ] ...
Summary
This PR is adding additional (snapshot) telemetry to detection rules to capture response actions usage.
Testing
API call
POST kbn:/internal/telemetry/clusters/_stats?apiVersion=2 { "unencrypted": true, "refreshCache": true }app/management/kibana/settings, click oncluster dataunderUsage collectionsection. Snapshot data should show up in a flyout.Checklist
Check the PR satisfies following conditions.
Reviewers should verify this PR satisfies this list as well.
release_note:breakinglabel should be applied in these situations.release_note:*label is applied per the guidelinesIdentify risks
Does this PR introduce any risks? For example, consider risks like hard to test bugs, performance regression, potential of data loss.
Describe the risk, its severity, and mitigation for each identified risk. Invite stakeholders and evaluate how to proceed before merging.