Skip to content

[Bug] Some prebuilt rules match source events in elastic-cloud-logs-* #3225

Closed
@banderror

Description

@banderror

FYI: this bug is SDH-linked.

Summary

One user reported that the Cobalt Strike Command and Control Beacon rule generates alerts based on source events from the elastic-cloud-logs-* index in their ESS environment.

This rule has only the following index patterns that don't match elastic-cloud-logs-*: [packetbeat-*, auditbeat-*, filebeat-*, logs-network_traffic.*]. Despite that, it looks like somehow in ESS Cloud logs-network_traffic.* or filebeat-* index patterns match concrete indices of elastic-cloud-logs-*, presumably via aliases. Specifically, in the user's environment they see alerts generated from source events from indices like this one:

 "signal.ancestors.index": [
      ".ds-elastic-cloud-logs-8-2023.10.17-000376"
    ],

Suggestion

In Security UI, when users create a custom rule, by default we explicitly exclude elastic-cloud-logs-* indices by adding -*elastic-cloud-logs-* to the list of index patterns:

Screenshot 2023-10-24 at 19 13 06

Probably we should add -*elastic-cloud-logs-* to:

  • either just all our prebuilt rules
  • or to prebuilt rules having any index patterns containing logs- or filebeat-?

Metadata

Metadata

Assignees

Labels

bugSomething isn't workingdiscuss

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions