And this is part of the output I get when I run the code in the previous reply:
Response Status Code: 200
Response Headers: {'elastic-api-version': '2023-10-31', 'x-content-type-options': 'nosniff', 'referrer-policy': 'strict-origin-when-cross-origin', 'permissions-policy': 'camera=(), display-capture=(), fullscreen=(self), geolocation=(), microphone=(), web-share=()', 'cross-origin-opener-policy': 'same-origin', 'content-security-policy': "script-src 'report-sample' 'self'; worker-src 'report-sample' 'self' blob:; style-src 'report-sample' 'self' 'unsafe-inline'", 'content-security-policy-report-only': "form-action 'report-sample' 'self'", 'kbn-name': 'ELK', 'kbn-license-sig': '5ae299c31b5c858a983f4c0f88424dceb65af842a09815eed2126b7702005236', 'content-type': 'application/json; charset=utf-8', 'cache-control': 'private, no-cache, no-store, must-revalidate', 'content-length': '794', 'Date': 'Wed, 24 Jul 2024 20:04:48 GMT', 'Connection': 'keep-alive', 'Keep-Alive': 'timeout=120'}
Response Text: {"name":"Test Custom Query Rule","description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","version":1,"tags":[],"enabled":true,"risk_score_mapping":[],"severity_mapping":[],"interval":"5m","from":"now-6m","to":"now","actions":[],"exceptions_list":[],"author":[],"false_positives":[],"references":[],"max_signals":100,"threat":[],"setup":"","id":"f289f429-94c2-41fa-9525-904159b94588","rule_id":"70690b3c-c4bc-4539-8edf-b6b555f38ca9","immutable":false,"updated_at":"2024-07-24T20:04:46.681Z","updated_by":"elastic","created_at":"2024-07-24T20:04:46.681Z","created_by":"elastic","revision":0,"related_integrations":[],"required_fields":[],"type":"query","index":["logs-*"],"query":"process.name: \"malicious.exe\"","language":"kuery"}
Response Status Code: 200
Response Headers: {'elastic-api-version': '2023-10-31', 'x-content-type-options': 'nosniff', 'referrer-policy': 'strict-origin-when-cross-origin', 'permissions-policy': 'camera=(), display-capture=(), fullscreen=(self), geolocation=(), microphone=(), web-share=()', 'cross-origin-opener-policy': 'same-origin', 'content-security-policy': "script-src 'report-sample' 'self'; worker-src 'report-sample' 'self' blob:; style-src 'report-sample' 'self' 'unsafe-inline'", 'content-security-policy-report-only': "form-action 'report-sample' 'self'", 'kbn-name': 'ELK', 'kbn-license-sig': '5ae299c31b5c858a983f4c0f88424dceb65af842a09815eed2126b7702005236', 'content-type': 'application/json; charset=utf-8', 'cache-control': 'private, no-cache, no-store, must-revalidate', 'vary': 'accept-encoding', 'content-encoding': 'gzip', 'Date': 'Wed, 24 Jul 2024 20:04:48 GMT', 'Connection': 'keep-alive', 'Keep-Alive': 'timeout=120', 'Transfer-Encoding': 'chunked'}
Response Text: {"page":1,"perPage":20,"total":16,"data":[{"id":"790af310-94e3-4996-916d-6c5b2c3e4c4e","updated_at":"2024-07-19T13:51:51.491Z","updated_by":"elastic","created_at":"2024-07-17T16:06:21.003Z","created_by":"elastic","name":"Test Custom Query Rule [Duplicate]","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"397c6715-53bf-47ba-abc4-bcbf5562f55f","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.989Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"43ea88e7-6f69-4d4e-917c-d91d952f6caa","updated_at":"2024-07-19T13:51:48.853Z","updated_by":"elastic","created_at":"2024-07-12T21:03:07.357Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"33bf4870-0091-4548-a46d-ac5dac913557","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.989Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"cdfd0434-f633-4c58-86f2-1fb1764ca423","updated_at":"2024-07-11T21:09:35.371Z","updated_by":"elastic","created_at":"2024-07-11T21:09:35.371Z","created_by":"elastic","name":"Test Custom Query Rule Two","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"713ff16f-fcca-4ffb-8a84-c8b88179adf3","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.990Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"7a4c2f24-20ac-4ead-90ed-7d09324a2596","updated_at":"2024-07-11T20:54:57.717Z","updated_by":"elastic","created_at":"2024-07-11T20:54:57.717Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"f2af7829-1fd8-4dfe-bdf0-e74316f12526","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.988Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"fcc1c99c-1e0e-4998-896e-541cd0b855c6","updated_at":"2024-07-11T20:57:50.811Z","updated_by":"elastic","created_at":"2024-07-11T20:57:50.811Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"f652c302-673c-4b74-a220-4621ad3e4da5","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.986Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39708}}}},{"id":"d8e6c0a8-3142-4715-b180-982bc79cf523","updated_at":"2024-07-17T15:59:28.052Z","updated_by":"elastic","created_at":"2024-07-17T15:59:28.052Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"4ebb2130-6e77-4f66-b35e-d2aa87370d37","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.988Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"2a4714de-f6b2-497f-b000-8a5f8fa4a7e5","updated_at":"2024-07-12T20:34:55.170Z","updated_by":"elastic","created_at":"2024-07-12T20:34:55.170Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"08a4a98c-f3b9-4e39-8464-cb736325c78a","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.987Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"d34e284c-0914-44c8-b7b2-659797aa1b0f","updated_at":"2024-07-12T20:33:10.014Z","updated_by":"elastic","created_at":"2024-07-12T20:33:10.014Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"0f3eaa19-03e3-462e-831d-71b58d231444","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.991Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39708}}}},{"id":"9c3e97ab-c4bb-4d98-a7a8-df5528da73a5","updated_at":"2024-07-11T21:08:57.119Z","updated_by":"elastic","created_at":"2024-07-11T21:08:57.119Z","created_by":"elastic","name":"Test Custom Query Rule Two","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"62995514-34fe-4a29-8a04-585b12ff209e","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.986Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"11bc109e-094d-436c-9142-a442c35cf20a","updated_at":"2024-07-14T08:13:15.517Z","updated_by":"elastic","created_at":"2024-07-14T08:13:15.517Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"71c32e3c-40b5-446d-b638-fefcd82e9478","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:31.009Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39710}}}},{"id":"0bd477ae-e1f7-4893-b6e4-88048c6ce8c6","updated_at":"2024-07-17T15:52:40.162Z","updated_by":"elastic","created_at":"2024-07-17T15:52:40.162Z","created_by":"elastic","name":"Test Custom Query Rule Two","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"d9fee890-9d78-4fe1-a323-056ddfec5c91","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:31.007Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39710}}}},{"id":"637615b9-2e4a-4fb1-8a5b-6db01a83c064","updated_at":"2024-07-18T15:52:57.257Z","updated_by":"elastic","created_at":"2024-07-18T15:52:57.257Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"04972245-a681-406b-9432-43abce22701e","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:31.004Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39710}}}},{"id":"2dac9f24-f623-4697-8e72-60f463893e8d","updated_at":"2024-07-12T20:36:41.508Z","updated_by":"elastic","created_at":"2024-07-12T20:36:41.508Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"b3516ea6-c785-461b-ad3b-6b91aa017d83","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:31.009Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39710}}}},{"id":"c5d0f760-a299-40f4-ba00-f0448dc6f1ef","updated_at":"2024-07-14T08:52:15.140Z","updated_by":"elastic","created_at":"2024-07-14T08:52:15.140Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"67550e19-7d41-4e67-b53d-6a8066d9fad5","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:31.010Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39710}}}},{"id":"bda76709-d0f8-4461-b5b6-b88518f74daf","updated_at":"2024-07-17T15:55:41.721Z","updated_by":"elastic","created_at":"2024-07-17T15:55:41.721Z","created_by":"elastic","name":"Test Custom Query Rule Two","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"cde491da-154e-4bb4-a948-0f44f42b30e5","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:31.010Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39710}}}},{"id":"f289f429-94c2-41fa-9525-904159b94588","updated_at":"2024-07-24T20:04:46.681Z","updated_by":"elastic","created_at":"2024-07-24T20:04:46.681Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"70690b3c-c4bc-4539-8edf-b6b555f38ca9","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[]}]}
And then this:
Attempting to delete rule with ID: 11bc109e-094d-436c-9142-a442c35cf20a
Response Status Code: 404
Response Headers: {'X-Content-Type-Options': 'nosniff', 'Referrer-Policy': 'strict-origin-when-cross-origin', 'Permissions-Policy': 'camera=(), display-capture=(), fullscreen=(self), geolocation=(), microphone=(), web-share=()', 'Cross-Origin-Opener-Policy': 'same-origin', 'Content-Security-Policy': "script-src 'report-sample' 'self'; worker-src 'report-sample' 'self' blob:; style-src 'report-sample' 'self' 'unsafe-inline'", 'Content-Security-Policy-Report-Only': "form-action 'report-sample' 'self'", 'kbn-name': 'ELK', 'kbn-license-sig': '5ae299c31b5c858a983f4c0f88424dceb65af842a09815eed2126b7702005236', 'content-type': 'application/json; charset=utf-8', 'cache-control': 'private, no-cache, no-store, must-revalidate', 'content-length': '60', 'Date': 'Wed, 24 Jul 2024 20:04:48 GMT', 'Connection': 'keep-alive', 'Keep-Alive': 'timeout=120'}
Response Text: {"statusCode":404,"error":"Not Found","message":"Not Found"}
Failed to delete rule with ID: 11bc109e-094d-436c-9142-a442c35cf20a, verifying existence...
Response Status Code: 200
Response Headers: {'elastic-api-version': '2023-10-31', 'x-content-type-options': 'nosniff', 'referrer-policy': 'strict-origin-when-cross-origin', 'permissions-policy': 'camera=(), display-capture=(), fullscreen=(self), geolocation=(), microphone=(), web-share=()', 'cross-origin-opener-policy': 'same-origin', 'content-security-policy': "script-src 'report-sample' 'self'; worker-src 'report-sample' 'self' blob:; style-src 'report-sample' 'self' 'unsafe-inline'", 'content-security-policy-report-only': "form-action 'report-sample' 'self'", 'kbn-name': 'ELK', 'kbn-license-sig': '5ae299c31b5c858a983f4c0f88424dceb65af842a09815eed2126b7702005236', 'content-type': 'application/json; charset=utf-8', 'cache-control': 'private, no-cache, no-store, must-revalidate', 'vary': 'accept-encoding', 'content-encoding': 'gzip', 'Date': 'Wed, 24 Jul 2024 20:04:49 GMT', 'Connection': 'keep-alive', 'Keep-Alive': 'timeout=120', 'Transfer-Encoding': 'chunked'}
Response Text: {"page":1,"perPage":20,"total":16,"data":[{"id":"790af310-94e3-4996-916d-6c5b2c3e4c4e","updated_at":"2024-07-19T13:51:51.491Z","updated_by":"elastic","created_at":"2024-07-17T16:06:21.003Z","created_by":"elastic","name":"Test Custom Query Rule [Duplicate]","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"397c6715-53bf-47ba-abc4-bcbf5562f55f","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.989Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"43ea88e7-6f69-4d4e-917c-d91d952f6caa","updated_at":"2024-07-19T13:51:48.853Z","updated_by":"elastic","created_at":"2024-07-12T21:03:07.357Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"33bf4870-0091-4548-a46d-ac5dac913557","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.989Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"cdfd0434-f633-4c58-86f2-1fb1764ca423","updated_at":"2024-07-11T21:09:35.371Z","updated_by":"elastic","created_at":"2024-07-11T21:09:35.371Z","created_by":"elastic","name":"Test Custom Query Rule Two","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"713ff16f-fcca-4ffb-8a84-c8b88179adf3","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.990Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"7a4c2f24-20ac-4ead-90ed-7d09324a2596","updated_at":"2024-07-11T20:54:57.717Z","updated_by":"elastic","created_at":"2024-07-11T20:54:57.717Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"f2af7829-1fd8-4dfe-bdf0-e74316f12526","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.988Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"fcc1c99c-1e0e-4998-896e-541cd0b855c6","updated_at":"2024-07-11T20:57:50.811Z","updated_by":"elastic","created_at":"2024-07-11T20:57:50.811Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"f652c302-673c-4b74-a220-4621ad3e4da5","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.986Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39708}}}},{"id":"d8e6c0a8-3142-4715-b180-982bc79cf523","updated_at":"2024-07-17T15:59:28.052Z","updated_by":"elastic","created_at":"2024-07-17T15:59:28.052Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"4ebb2130-6e77-4f66-b35e-d2aa87370d37","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.988Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"2a4714de-f6b2-497f-b000-8a5f8fa4a7e5","updated_at":"2024-07-12T20:34:55.170Z","updated_by":"elastic","created_at":"2024-07-12T20:34:55.170Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"08a4a98c-f3b9-4e39-8464-cb736325c78a","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.987Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"d34e284c-0914-44c8-b7b2-659797aa1b0f","updated_at":"2024-07-12T20:33:10.014Z","updated_by":"elastic","created_at":"2024-07-12T20:33:10.014Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"0f3eaa19-03e3-462e-831d-71b58d231444","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.991Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39708}}}},{"id":"9c3e97ab-c4bb-4d98-a7a8-df5528da73a5","updated_at":"2024-07-11T21:08:57.119Z","updated_by":"elastic","created_at":"2024-07-11T21:08:57.119Z","created_by":"elastic","name":"Test Custom Query Rule Two","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"62995514-34fe-4a29-8a04-585b12ff209e","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:36.986Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39711}}}},{"id":"11bc109e-094d-436c-9142-a442c35cf20a","updated_at":"2024-07-14T08:13:15.517Z","updated_by":"elastic","created_at":"2024-07-14T08:13:15.517Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"71c32e3c-40b5-446d-b638-fefcd82e9478","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:31.009Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39710}}}},{"id":"0bd477ae-e1f7-4893-b6e4-88048c6ce8c6","updated_at":"2024-07-17T15:52:40.162Z","updated_by":"elastic","created_at":"2024-07-17T15:52:40.162Z","created_by":"elastic","name":"Test Custom Query Rule Two","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"d9fee890-9d78-4fe1-a323-056ddfec5c91","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:31.007Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39710}}}},{"id":"637615b9-2e4a-4fb1-8a5b-6db01a83c064","updated_at":"2024-07-18T15:52:57.257Z","updated_by":"elastic","created_at":"2024-07-18T15:52:57.257Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"04972245-a681-406b-9432-43abce22701e","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:31.004Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39710}}}},{"id":"2dac9f24-f623-4697-8e72-60f463893e8d","updated_at":"2024-07-12T20:36:41.508Z","updated_by":"elastic","created_at":"2024-07-12T20:36:41.508Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"b3516ea6-c785-461b-ad3b-6b91aa017d83","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:31.009Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39710}}}},{"id":"c5d0f760-a299-40f4-ba00-f0448dc6f1ef","updated_at":"2024-07-14T08:52:15.140Z","updated_by":"elastic","created_at":"2024-07-14T08:52:15.140Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"67550e19-7d41-4e67-b53d-6a8066d9fad5","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:31.010Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39710}}}},{"id":"bda76709-d0f8-4461-b5b6-b88518f74daf","updated_at":"2024-07-17T15:55:41.721Z","updated_by":"elastic","created_at":"2024-07-17T15:55:41.721Z","created_by":"elastic","name":"Test Custom Query Rule Two","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"cde491da-154e-4bb4-a948-0f44f42b30e5","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[],"execution_summary":{"last_execution":{"date":"2024-07-24T20:03:31.010Z","status":"partial failure","status_order":20,"message":"This rule is attempting to query data from Elasticsearch indices listed in the \"Index patterns\" section of the rule definition, however no index matching: [\"logs-*\"] was found. This warning will continue to appear until a matching index is created or this rule is disabled.","metrics":{"execution_gap_duration_s":39710}}}},{"id":"f289f429-94c2-41fa-9525-904159b94588","updated_at":"2024-07-24T20:04:46.681Z","updated_by":"elastic","created_at":"2024-07-24T20:04:46.681Z","created_by":"elastic","name":"Test Custom Query Rule","tags":[],"interval":"5m","enabled":true,"revision":0,"description":"This is a test rule to detect suspicious activity.","risk_score":50,"severity":"high","output_index":"","author":[],"false_positives":[],"from":"now-6m","rule_id":"70690b3c-c4bc-4539-8edf-b6b555f38ca9","max_signals":100,"risk_score_mapping":[],"severity_mapping":[],"threat":[],"to":"now","references":[],"version":1,"exceptions_list":[],"immutable":false,"related_integrations":[],"required_fields":[],"setup":"","type":"query","language":"kuery","index":["logs-*"],"query":"process.name: \"malicious.exe\"","actions":[]}]}
Attempting to delete rule with ID: 2a4714de-f6b2-497f-b000-8a5f8fa4a7e5
Response Status Code: 404 ..... and so forth