-
Hello ! First of all, thank you for continuing the project for all of those years. We use it daily and it's very useful that you are taking care of it. I recently discovered a wrong behavior with the version 2.18.0 of Elastalert on Docker. We used it for Security purpose so I won't be able to share much information but here is what I can share. We are basically monitoring suspicious network actions from some source IP and each action match a signature that has an unique ID. Our rule is quiet basic:
alert_id is a numeric type and src_ip_addr is a keyword type. We tested some scenarios to validate our detection and I was surprised to find that there is a mismatch of the number of matches that the rule returns:
In this case, only one match was returned even if several "src_ip_addr" were different. However, if I change
I confirmed the behavior by replacing the alert_id field by another numeric type field and the result is only 1 match again. In the documentation, there is no mention that the query_key fields should be keyword typed in order to work with realert. Let me know if you need more information. Thanks in advance for your help. Best regards, Daniel |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Hello ! After testing a few other scenarios, I finally found out what it was rather an issue of comprehension. I didn't fully understand the query_key logic in this scenario. In this case, I wanted to detect a source making multiple attempts and then silence based on both fields. But not multiple attempts by source IP AND signature. It wasn't behaving as it was logically thought in the first place so that's why the confusion about it. But it works with numeric field type. If someone steps into this, you may want to check thoroughly the documentation ! Best regards, Daniel |
Beta Was this translation helpful? Give feedback.
Hello !
After testing a few other scenarios, I finally found out what it was rather an issue of comprehension.
I didn't fully understand the query_key logic in this scenario.
In this case, I wanted to detect a source making multiple attempts and then silence based on both fields. But not multiple attempts by source IP AND signature.
It wasn't behaving as it was logically thought in the first place so that's why the confusion about it. But it works with numeric field type.
If someone steps into this, you may want to check thoroughly the documentation !
Best regards,
Daniel