-
Notifications
You must be signed in to change notification settings - Fork 8
Add threat_level field to all detection event structures (Resolves #489) #637
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
|
The semi-supervised and unsupervised engines must first complete the task of adding the |
55e0c90 to
f15f892
Compare
|
Thanks — I looked into this. I rebased the branch onto main and have force-pushed the updated branch. During the rebase I resolved the merge conflicts and made the small follow-up fixes needed to keep the event types consistent (display/formatting fixes and a test expectation fix). After that, all unit and doc tests passed. Because the branch already introduces and wires the new threat_level field across the event types and updates the related code paths, no additional changes were required in this PR to address your comment. If you were referring to external engine implementations (outside this repo) those will still need to populate threat_level on their side — but within this codebase the field has been added and integrated. Acknowledged — I’ve addressed the integration here and force-pushed the rebased branch. Let me know if you want me to hold this until the external engines are updated or open a follow-up issue to track those engine changes. |
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #637 +/- ##
=======================================
Coverage ? 80.82%
=======================================
Files ? 83
Lines ? 23195
Branches ? 0
=======================================
Hits ? 18747
Misses ? 4448
Partials ? 0 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
Hi @syncpark — quick status update and a couple options so we can move this forward. I previously rebased this branch onto main and force-pushed a follow-up with merge-conflict resolutions and small test/display fixes. All CI and tests are passing and the PR is mergeable/clean. codecov posted a patch-coverage note listing some missing lines in a few event files (informational) but the test suite itself passed. Context/reminder: this PR adds threat_level: u8 to all detection event structs and wires it through Match::level(), Display/syslog formatting, and tests. If your earlier "blocked" comment referred to external semi-supervised / unsupervised engines, those implementations (outside this repo) will still need to populate threat_level when they emit events. Within this repository the field has been added and integrated. Please let me know which you prefer:
Which option do you prefer? If you want the follow-up issue, say so and I’ll create it and assign labels/assignees as you direct. Thanks! |
|
Adding the Until then, this PR will remain blocked. |
This pull request addresses issue #489 by implementing a dynamic
threat_levelfield for all detection event structures.Previously, threat levels for detection events used predefined values for each event type. This change introduces a
threat_level: u8field to allow Unsupervised and Supervised engines to directly assign and store the appropriate threat level for each event.Changes Made
threat_level: u8field to 25 detection event structures (e.g.,dns.rs,http.rs,conn.rs,sysmon.rs, etc.).syslog_rfc5424()andDisplayimplementations for these events to include the newthreat_level.Match::level()to return the assignedthreat_levelinstead of predefined values.CHANGELOG.mdto reflect these structural changes.This ensures that the stored and displayed threat level accurately reflects the real-time assessment from the detection engines.
Resolves #489