Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Solution] [Detections] Enabling ML jobs from Security App keeps trying when no ML Nodes Available #93337

Closed
MikePaquette opened this issue Mar 2, 2021 · 6 comments
Labels
bug Fixes for quality problems that affect the customer experience impact:high Addressing this issue will have a high level of impact on the quality/strength of our product. Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. v7.13.0

Comments

@MikePaquette
Copy link

Kibana version: 7.12.0 BC2

Elasticsearch version: 7.12.0 BC2

Server OS version: Elastic Cloud

Browser version: Chrome Version 88.0.4324.192 (Official Build) (x86_64)

Browser OS version: macOS Mojave 10.14.6

Original install method (e.g. download page, yum, from source, etc.): Elastic Cloud

Describe the bug:
When the cluster has no ML nodes, attempting to "Run job" from the ML Job settings drop down at the top of the detections page causes the job to try forever, with the spinner spinning.

image

Steps to reproduce:

  1. Open Kibana
  2. Open Detections page
  3. Open ML Job Settings dropdown
  4. Attempt to "Run job"

Expected Behavior
Some sort of failure message should be shown to the user, perhaps like this one, which is shown in the Machine Learning app overview page:

image

@MikePaquette MikePaquette added bug Fixes for quality problems that affect the customer experience Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! impact:critical This issue should be addressed immediately due to a critical level of impact on the product. v7.12.0 Team:Detections and Resp Security Detection Response Team labels Mar 2, 2021
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detections-response (Team:Detections and Resp)

@spong
Copy link
Member

spong commented Mar 3, 2021

Looks like this is a duplicate of #63155, and there's this related issue as well #54382.

@spong
Copy link
Member

spong commented Mar 4, 2021

@MikePaquette -- reclassifying as impact:high as this has been present for nearly a year now, so we won't have a fix in for 7.12, but can prioritize for a future release.

@spong spong added impact:high Addressing this issue will have a high level of impact on the quality/strength of our product. and removed impact:critical This issue should be addressed immediately due to a critical level of impact on the product. labels Mar 4, 2021
@azasypkin azasypkin removed the Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! label Mar 9, 2021
@MadameSheema MadameSheema added the Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. label Mar 17, 2021
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@MadameSheema
Copy link
Member

Closing since is a duplicate of: #63155

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Fixes for quality problems that affect the customer experience impact:high Addressing this issue will have a high level of impact on the quality/strength of our product. Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. v7.13.0
Projects
None yet
Development

No branches or pull requests

5 participants