-
Notifications
You must be signed in to change notification settings - Fork 8.5k
[Attack discovery] Enable the Attack discovery and Attack discovery schedules public API feature flag by default #239024
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
andrew-goldstein
wants to merge
3
commits into
elastic:main
Choose a base branch
from
andrew-goldstein:enable_attack_discovery_public_api_feature_flag
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
+16
−10
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
…y schedules public APIs feature flag by default This PR enables the feature flag for the [Attack discovery and Attack discovery schedules public APIs](elastic#236736) by default. - The `securitySolution.attackDiscoveryPublicApiEnabled`, feature flag now defaults to `true`; it may be overridden in `config/kibana.yml`: ```yaml feature_flags.overrides: securitySolution.attackDiscoveryPublicApiEnabled: true ``` In addition to the above: - The `compressed={true}` style is applied to the `EuiSuperDatePicker` in the `Attack discovery settings` and `Create new schedule` flyout - The `GET` `/api/attack_discovery/generations` route now includes a default for the size parameter ### Desk testing 1) _Remove_ any references to the `securitySolution.attackDiscoveryPublicApiEnabled` in the `feature_flags.overrides` in section of your local `config/kibana.dev.yml` or `config/kibana.yml`. **Expected result** - The feature flag is **NOT** present in `config/kibana.dev.yml` or `config/kibana.yml` 2) Navigate to Security > Attack discovery 3) Open the browser's dev tools, and click the Network tab 4) Filter the network tab by `_generate` 5) In the header of the Attack discovery page, click the `Run` button **Expected result** - A `POST` request is made to the public API route: `/api/attack_discovery/_generate` 6) In the header of the Attack discovery page, click the `Settings` button **Expected results** - The `Attack discovery settings` flyout appears - The `Custom query` KQL bar and date picker appear to have the same height, as illustrated by the following screenshot:  7) Click `Cancel` to close the `Attack discovery settings` flyout 8) In the header of the Attack discovery page, click the `Schedule` button 9) Click the `Create new schedule` button **Expected results** - The `Create new schedule` flyout appears - The `Custom query` KQL bar and date picker appear to have the same height 10) Navigate to the Dev Tools > Console page 11) Execute the following query: ```sh GET kbn:/api/attack_discovery/generations ``` **Expected result** - The API returns previous generation results - The API does NOT return an error 12) Disable the `securitySolution.attackDiscoveryPublicApiEnabled` feature flag in your local `config/kibana.dev.yml` or `config/kibana.yml`, like the following example: ```yaml feature_flags.overrides: securitySolution.attackDiscoveryPublicApiEnabled: false ``` 13) **After Kibana server finishes restarting**, do a full page refresh of your browser 14) Navigate to Security > Attack discovery 15) Once again, in the header of the Attack discovery page, click the `Run` button **Expected result** - In the browsers dev tools, the network tab is still filtered by `_generate` - A `POST` request is NOT made to the public API route: `/api/attack_discovery/_generate` 16) In the browsers dev tools, filter the network tab by `/internal/elastic_assistant/attack_discovery` **Expected result** - A `POST` request was made to `/internal/elastic_assistant/attack_discovery` 17) Once again, Navigate to the Dev Tools > Console page 18) Execute the following query: ```sh GET kbn:/api/attack_discovery/generations ``` **Expected result** - The API returns results an error indicating the public API is disabled ```json { "message": "Attack discovery public API is disabled", "status_code": 403 } ```
Pinging @elastic/security-solution (Team: SecuritySolution) |
> | ||
<EuiSuperDatePicker | ||
commonlyUsedRanges={commonlyUsedRanges} | ||
compressed={true} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
benironside
approved these changes
Oct 14, 2025
💚 Build Succeeded
Metrics [docs]Async chunks
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
backport:version
Backport to applied version labels
release_note:skip
Skip the PR/issue when compiling release notes
Team:Security Generative AI
Security Generative AI
Team: SecuritySolution
Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.
v9.2.0
v9.3.0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
[Attack discovery] Enable the Attack discovery and Attack discovery schedules public API feature flag by default
This PR enables the feature flag for the Attack discovery and Attack discovery schedules public APIs by default.
securitySolution.attackDiscoveryPublicApiEnabled
, feature flag now defaults totrue
; it may be overridden inconfig/kibana.yml
:In addition to the above:
compressed={true}
style is applied to theEuiSuperDatePicker
in theAttack discovery settings
andCreate new schedule
flyoutGET
/api/attack_discovery/generations
route now includes a default for the size parameterDesk testing
securitySolution.attackDiscoveryPublicApiEnabled
in thefeature_flags.overrides
in section of your localconfig/kibana.dev.yml
orconfig/kibana.yml
.Expected result
config/kibana.dev.yml
orconfig/kibana.yml
Navigate to Security > Attack discovery
Open the browser's dev tools, and click the Network tab
Filter the network tab by
_generate
In the header of the Attack discovery page, click the
Run
buttonExpected result
POST
request is made to the public API route:/api/attack_discovery/_generate
Settings
buttonExpected results
Attack discovery settings
flyout appearsCustom query
KQL bar and date picker appear to have the same height, as illustrated by the following screenshot:Click
Cancel
to close theAttack discovery settings
flyoutIn the header of the Attack discovery page, click the
Schedule
buttonClick the
Create new schedule
buttonExpected results
Create new schedule
flyout appearsCustom query
KQL bar and date picker appear to have the same heightNavigate to the Dev Tools > Console page
Execute the following query:
Expected result
securitySolution.attackDiscoveryPublicApiEnabled
feature flag in your localconfig/kibana.dev.yml
orconfig/kibana.yml
, like the following example:After Kibana server finishes restarting, do a full page refresh of your browser
Navigate to Security > Attack discovery
Once again, in the header of the Attack discovery page, click the
Run
buttonExpected result
_generate
POST
request is NOT made to the public API route:/api/attack_discovery/_generate
/internal/elastic_assistant/attack_discovery
Expected result
POST
request was made to/internal/elastic_assistant/attack_discovery
Once again, Navigate to the Dev Tools > Console page
Execute the following query:
Expected result