-
Notifications
You must be signed in to change notification settings - Fork 8.6k
[Security][Fleet] Install the security_detection_engine package automatically #97191
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
rw-access
merged 21 commits into
elastic:master
from
rw-access:autoinstall-security-detection-pkg
Apr 20, 2021
Merged
Changes from all commits
Commits
Show all changes
21 commits
Select commit
Hold shift + click to select a range
124bdc5
Automatically install the security_detection_engine package via fleet
rw-access 35ff135
Merge branch 'master' into autoinstall-security-detection-pkg
kibanamachine 43b52a3
Update dockerImage to include the security_detection_engine package
rw-access 5610c81
Merge branch 'autoinstall-security-detection-pkg' of github.com:rw-ac…
rw-access c2501a9
Merge branch 'master' into autoinstall-security-detection-pkg
kibanamachine 51147f8
Update api/fleet/setup install test
rw-access 9c48e96
Merge branch 'autoinstall-security-detection-pkg' of github.com:rw-ac…
rw-access 7e21c86
Merge branch 'master' into autoinstall-security-detection-pkg
kibanamachine 340ab0a
Merge remote-tracking branch 'origin/master' into autoinstall-securit…
rw-access 820ef5c
Merge branch 'master' into autoinstall-security-detection-pkg
kibanamachine 287828e
Merge branch 'master' into autoinstall-security-detection-pkg
kibanamachine 6501dad
Merge branch 'master' into autoinstall-security-detection-pkg
kibanamachine 39264b8
Update test data for Endpoint package
rw-access 5d19234
Fix JSON token
rw-access 2dd2fc6
Updae firist json enry in destination_index
rw-access 5515757
Update destination_index structure
rw-access d95a0ef
Update destination_index structure
rw-access 61057aa
Merge branch 'autoinstall-security-detection-pkg' of github.com:rw-ac…
rw-access acaa76a
Change KQL query to unblock testing
rw-access 4a06e1f
Restore KQL and fix JSON instead
rw-access d425a8a
update timestamps to pass tests
kevinlog File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What happens if this dependency is removed in the future -- is the package just gracefully uninstalled and SO's removed on upgrade?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yeah you got it.
fleet manages all the SOs, so they will be removed during an upgrade/uninstall gracefully. the detection engine will then just use the rules compiled in
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe I misunderstood the question but if
security_detection_engineis removed from this list of required packages in the future, Fleet will not automatically uninstall the package if it's already installedThere was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ahhh, so we can have lingering SO's from this package then? This would result in the rules installing from these SO's still, or would the fact the package is no-longer present short circuit that logic?
How can they be manually removed -- will it still show up in fleet until it's un-installed, or is there another way to perform this cleanup?