Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Upgrade Assistant] Disable UI by default in 8.0 #115782

Merged
merged 7 commits into from
Oct 26, 2021

Conversation

sabarasaba
Copy link
Member

Fixes #115684

Summary

This PR disables Upgrade Assistant UI by default, since for 8.0 it isn't functional yet. I also skipped the associated tests with it since they don't need to run anymore.

How to test

  1. Start up elasticsearch, yarn es snapshot --license=trial
  2. Start up Kibana, yarn start and navigate to Stack Management
  3. Verify that Upgrade Assistant is not visible
  4. Verify that setting xpack.upgrade_assistant.ui.enabled: true in config/kibana.yml enables Upgrade Assistant and the coming soon prompt is shown.

@sabarasaba sabarasaba self-assigned this Oct 20, 2021
@sabarasaba sabarasaba added chore Feature:Upgrade Assistant release_note:skip Skip the PR/issue when compiling release notes Team:Kibana Management Dev Tools, Index Management, Upgrade Assistant, ILM, Ingest Node Pipelines, and more v8.0.0 backport:skip This commit does not require backporting labels Oct 20, 2021
@kibanamachine
Copy link
Contributor

kibanamachine commented Oct 20, 2021

💔 Build Failed

Failed CI Steps


Test Failures

Kibana Pipeline / general / Chrome X-Pack UI Functional Tests.x-pack/test/functional/apps/license_management/feature_controls/license_management_security·ts.License app feature controls security global dashboard read with license_management_user [SkipCloud] global dashboard with license management user: skip cloud should render the "Stack" section with License Management

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has not failed recently on tracked branches

[00:00:00]     │
[00:58:51]       └-: License app
[00:58:51]         └-> "before all" hook in "License app"
[00:58:51]         └-: feature controls
[00:58:51]           └-> "before all" hook in "feature controls"
[00:58:51]           └-: security
[00:58:51]             └-> "before all" hook in "security"
[00:58:51]             └-> "before all" hook in "security"
[00:58:51]               │ info [x-pack/test/functional/es_archives/empty_kibana] Loading "mappings.json"
[00:58:52]               │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.kibana_task_manager_8.0.0_001/Tbn6xPrYRGSQac00CGTjRw] deleting index
[00:58:52]               │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.kibana_8.0.0_001/qcUrISNfQpq4Sbt0Z47nTQ] deleting index
[00:58:52]               │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.kibana_1/-ic2JW5MSeuLdxl0167WhQ] deleting index
[00:58:52]               │ info [x-pack/test/functional/es_archives/empty_kibana] Deleted existing index ".kibana_8.0.0_001"
[00:58:52]               │ info [x-pack/test/functional/es_archives/empty_kibana] Deleted existing index ".kibana_task_manager_8.0.0_001"
[00:58:52]               │ info [x-pack/test/functional/es_archives/empty_kibana] Deleted existing index ".kibana_1"
[00:58:52]               │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.kibana_1] creating index, cause [api], templates [], shards [1]/[1]
[00:58:52]               │ info [x-pack/test/functional/es_archives/empty_kibana] Created index ".kibana_1"
[00:58:52]               │ debg [x-pack/test/functional/es_archives/empty_kibana] ".kibana_1" settings {"index":{"number_of_replicas":"1","number_of_shards":"1"}}
[00:58:52]               │ debg Migrating saved objects
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.543+00:00][INFO ][savedobjects-service] [.kibana_task_manager] INIT -> CREATE_NEW_TARGET. took: 2ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.544+00:00][INFO ][savedobjects-service] [.kibana] INIT -> WAIT_FOR_YELLOW_SOURCE. took: 5ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.545+00:00][INFO ][savedobjects-service] [.kibana] WAIT_FOR_YELLOW_SOURCE -> CHECK_UNKNOWN_DOCUMENTS. took: 1ms.
[00:58:52]               │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.kibana_task_manager_8.0.0_001] creating index, cause [api], templates [], shards [1]/[1]
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.548+00:00][INFO ][savedobjects-service] [.kibana] CHECK_UNKNOWN_DOCUMENTS -> SET_SOURCE_WRITE_BLOCK. took: 3ms.
[00:58:52]               │ info [o.e.c.r.a.AllocationService] [node-01] updating number_of_replicas to [0] for indices [.kibana_task_manager_8.0.0_001]
[00:58:52]               │ info [o.e.c.m.MetadataIndexStateService] [node-01] adding block write to indices [[.kibana_1/gA7mXp_BTg6WG1zrcRVMBQ]]
[00:58:52]               │ info [o.e.c.m.MetadataIndexStateService] [node-01] completed adding block write to indices [.kibana_1]
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.609+00:00][INFO ][savedobjects-service] [.kibana_task_manager] CREATE_NEW_TARGET -> MARK_VERSION_INDEX_READY. took: 66ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.613+00:00][WARN ][environment] Detected an unhandled Promise rejection: Error: Saved object [space/default] not found
[00:58:52]               │ proc [kibana]     at Function.createGenericNotFoundError (/dev/shm/workspace/kibana-build-19/src/core/server/saved_objects/service/lib/errors.js:125:37)
[00:58:52]               │ proc [kibana]     at SavedObjectsRepository.get (/dev/shm/workspace/kibana-build-19/src/core/server/saved_objects/service/lib/repository.js:1124:46)
[00:58:52]               │ proc [kibana]     at runMicrotasks (<anonymous>)
[00:58:52]               │ proc [kibana]     at processTicksAndRejections (node:internal/process/task_queues:96:5)
[00:58:52]               │ proc [kibana]     at SpacesClient.get (/dev/shm/workspace/kibana-build-19/x-pack/plugins/spaces/server/spaces_client/spaces_client.js:64:25)
[00:58:52]               │ proc [kibana]     at checkAccess (/dev/shm/workspace/kibana-build-19/x-pack/plugins/enterprise_search/server/lib/check_access.js:52:21)
[00:58:52]               │ proc [kibana]     at /dev/shm/workspace/kibana-build-19/x-pack/plugins/enterprise_search/server/plugin.js:115:11
[00:58:52]               │ proc [kibana]     at /dev/shm/workspace/kibana-build-19/src/core/server/capabilities/resolve_capabilities.js:31:21
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.614+00:00][WARN ][process] UnhandledPromiseRejectionWarning: Error: Saved object [space/default] not found
[00:58:52]               │ proc [kibana]     at Function.createGenericNotFoundError (/dev/shm/workspace/kibana-build-19/src/core/server/saved_objects/service/lib/errors.js:125:37)
[00:58:52]               │ proc [kibana]     at SavedObjectsRepository.get (/dev/shm/workspace/kibana-build-19/src/core/server/saved_objects/service/lib/repository.js:1124:46)
[00:58:52]               │ proc [kibana]     at runMicrotasks (<anonymous>)
[00:58:52]               │ proc [kibana]     at processTicksAndRejections (node:internal/process/task_queues:96:5)
[00:58:52]               │ proc [kibana]     at SpacesClient.get (/dev/shm/workspace/kibana-build-19/x-pack/plugins/spaces/server/spaces_client/spaces_client.js:64:25)
[00:58:52]               │ proc [kibana]     at checkAccess (/dev/shm/workspace/kibana-build-19/x-pack/plugins/enterprise_search/server/lib/check_access.js:52:21)
[00:58:52]               │ proc [kibana]     at /dev/shm/workspace/kibana-build-19/x-pack/plugins/enterprise_search/server/plugin.js:115:11
[00:58:52]               │ proc [kibana]     at /dev/shm/workspace/kibana-build-19/src/core/server/capabilities/resolve_capabilities.js:31:21
[00:58:52]               │ proc [kibana]     at emitUnhandledRejectionWarning (node:internal/process/promises:190:15)
[00:58:52]               │ proc [kibana]     at processPromiseRejections (node:internal/process/promises:238:9)
[00:58:52]               │ proc [kibana]     at processTicksAndRejections (node:internal/process/task_queues:97:32)
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.614+00:00][WARN ][process] Error: Saved object [space/default] not found
[00:58:52]               │ proc [kibana]     at Function.createGenericNotFoundError (/dev/shm/workspace/kibana-build-19/src/core/server/saved_objects/service/lib/errors.js:125:37)
[00:58:52]               │ proc [kibana]     at SavedObjectsRepository.get (/dev/shm/workspace/kibana-build-19/src/core/server/saved_objects/service/lib/repository.js:1124:46)
[00:58:52]               │ proc [kibana]     at runMicrotasks (<anonymous>)
[00:58:52]               │ proc [kibana]     at processTicksAndRejections (node:internal/process/task_queues:96:5)
[00:58:52]               │ proc [kibana]     at SpacesClient.get (/dev/shm/workspace/kibana-build-19/x-pack/plugins/spaces/server/spaces_client/spaces_client.js:64:25)
[00:58:52]               │ proc [kibana]     at checkAccess (/dev/shm/workspace/kibana-build-19/x-pack/plugins/enterprise_search/server/lib/check_access.js:52:21)
[00:58:52]               │ proc [kibana]     at /dev/shm/workspace/kibana-build-19/x-pack/plugins/enterprise_search/server/plugin.js:115:11
[00:58:52]               │ proc [kibana]     at /dev/shm/workspace/kibana-build-19/src/core/server/capabilities/resolve_capabilities.js:31:21
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.622+00:00][INFO ][savedobjects-service] [.kibana] SET_SOURCE_WRITE_BLOCK -> CALCULATE_EXCLUDE_FILTERS. took: 74ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.625+00:00][INFO ][savedobjects-service] [.kibana] CALCULATE_EXCLUDE_FILTERS -> CREATE_REINDEX_TEMP. took: 3ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.638+00:00][INFO ][savedobjects-service] [.kibana_task_manager] MARK_VERSION_INDEX_READY -> DONE. took: 29ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.639+00:00][INFO ][savedobjects-service] [.kibana_task_manager] Migration completed after 98ms
[00:58:52]               │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.kibana_8.0.0_reindex_temp] creating index, cause [api], templates [], shards [1]/[1]
[00:58:52]               │ info [o.e.c.r.a.AllocationService] [node-01] updating number_of_replicas to [0] for indices [.kibana_8.0.0_reindex_temp]
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.679+00:00][INFO ][savedobjects-service] [.kibana] CREATE_REINDEX_TEMP -> REINDEX_SOURCE_TO_TEMP_OPEN_PIT. took: 54ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.681+00:00][INFO ][savedobjects-service] [.kibana] REINDEX_SOURCE_TO_TEMP_OPEN_PIT -> REINDEX_SOURCE_TO_TEMP_READ. took: 2ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.684+00:00][INFO ][savedobjects-service] [.kibana] REINDEX_SOURCE_TO_TEMP_READ -> REINDEX_SOURCE_TO_TEMP_CLOSE_PIT. took: 3ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.685+00:00][INFO ][savedobjects-service] [.kibana] REINDEX_SOURCE_TO_TEMP_CLOSE_PIT -> SET_TEMP_WRITE_BLOCK. took: 1ms.
[00:58:52]               │ info [o.e.c.m.MetadataIndexStateService] [node-01] adding block write to indices [[.kibana_8.0.0_reindex_temp/x0WHTCtPRuufWYcTSolDhA]]
[00:58:52]               │ info [o.e.c.m.MetadataIndexStateService] [node-01] completed adding block write to indices [.kibana_8.0.0_reindex_temp]
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.722+00:00][INFO ][savedobjects-service] [.kibana] SET_TEMP_WRITE_BLOCK -> CLONE_TEMP_TO_TARGET. took: 37ms.
[00:58:52]               │ info [o.e.c.m.MetadataCreateIndexService] [node-01] applying create index request using existing index [.kibana_8.0.0_reindex_temp] metadata
[00:58:52]               │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.kibana_8.0.0_001] creating index, cause [clone_index], templates [], shards [1]/[1]
[00:58:52]               │ info [o.e.c.r.a.AllocationService] [node-01] updating number_of_replicas to [0] for indices [.kibana_8.0.0_001]
[00:58:52]               │ info [o.e.c.m.MetadataMappingService] [node-01] [.kibana_8.0.0_001/LF3r4p7WTQyOOzgu1NncHw] create_mapping
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.800+00:00][INFO ][savedobjects-service] [.kibana] CLONE_TEMP_TO_TARGET -> REFRESH_TARGET. took: 78ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.802+00:00][INFO ][savedobjects-service] [.kibana] REFRESH_TARGET -> OUTDATED_DOCUMENTS_SEARCH_OPEN_PIT. took: 2ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.804+00:00][INFO ][savedobjects-service] [.kibana] OUTDATED_DOCUMENTS_SEARCH_OPEN_PIT -> OUTDATED_DOCUMENTS_SEARCH_READ. took: 2ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.807+00:00][INFO ][savedobjects-service] [.kibana] OUTDATED_DOCUMENTS_SEARCH_READ -> OUTDATED_DOCUMENTS_SEARCH_CLOSE_PIT. took: 3ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.808+00:00][INFO ][savedobjects-service] [.kibana] OUTDATED_DOCUMENTS_SEARCH_CLOSE_PIT -> UPDATE_TARGET_MAPPINGS. took: 1ms.
[00:58:52]               │ info [o.e.c.m.MetadataMappingService] [node-01] [.kibana_8.0.0_001/LF3r4p7WTQyOOzgu1NncHw] update_mapping [_doc]
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.856+00:00][INFO ][savedobjects-service] [.kibana] UPDATE_TARGET_MAPPINGS -> UPDATE_TARGET_MAPPINGS_WAIT_FOR_TASK. took: 48ms.
[00:58:52]               │ info [o.e.t.LoggingTaskListener] [node-01] 108154 finished with response BulkByScrollResponse[took=1ms,timed_out=false,sliceId=null,updated=0,created=0,deleted=0,batches=0,versionConflicts=0,noops=0,retries=0,throttledUntil=0s,bulk_failures=[],search_failures=[]]
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.959+00:00][INFO ][savedobjects-service] [.kibana] UPDATE_TARGET_MAPPINGS_WAIT_FOR_TASK -> MARK_VERSION_INDEX_READY. took: 103ms.
[00:58:52]               │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.kibana_8.0.0_reindex_temp/x0WHTCtPRuufWYcTSolDhA] deleting index
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.994+00:00][INFO ][savedobjects-service] [.kibana] MARK_VERSION_INDEX_READY -> DONE. took: 35ms.
[00:58:52]               │ proc [kibana] [2021-10-20T16:02:44.995+00:00][INFO ][savedobjects-service] [.kibana] Migration completed after 456ms
[00:58:52]               │ debg [x-pack/test/functional/es_archives/empty_kibana] Migrated Kibana index after loading Kibana data
[00:58:53]               │ debg [x-pack/test/functional/es_archives/empty_kibana] Ensured that default space exists in .kibana
[00:58:53]               │ debg applying update to kibana config: {"accessibility:disableAnimations":true,"dateFormat:tz":"UTC","visualization:visualize:legacyPieChartsLibrary":true}
[00:58:53]               │ info [o.e.c.m.MetadataMappingService] [node-01] [.kibana_8.0.0_001/LF3r4p7WTQyOOzgu1NncHw] update_mapping [_doc]
[00:58:55]               │ debg navigating to home url: http://localhost:61191/app/home#/
[00:58:55]               │ debg navigate to: http://localhost:61191/app/home#/
[00:58:55]               │ debg browser[INFO] http://localhost:61191/app/home?_t=1634745767768#/ 281 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:58:55]               │
[00:58:55]               │ debg browser[INFO] http://localhost:61191/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:58:55]               │ debg ... sleep(700) start
[00:58:56]               │ debg ... sleep(700) end
[00:58:56]               │ debg returned from get, calling refresh
[00:58:56]               │ warn browser[SEVERE] http://localhost:61191/47353/bundles/core/core.entry.js 7:106190 TypeError: Failed to fetch
[00:58:56]               │          at fetch_Fetch.fetchResponse (http://localhost:61191/47353/bundles/core/core.entry.js:8:56515)
[00:58:56]               │          at async http://localhost:61191/47353/bundles/core/core.entry.js:8:55103
[00:58:56]               │          at async http://localhost:61191/47353/bundles/core/core.entry.js:8:55060
[00:58:56]               │ debg browser[INFO] http://localhost:61191/app/home?_t=1634745767768#/ 281 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:58:56]               │
[00:58:56]               │ debg browser[INFO] http://localhost:61191/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:58:57]               │ debg currentUrl = http://localhost:61191/app/home#/
[00:58:57]               │          appUrl = http://localhost:61191/app/home#/
[00:58:57]               │ debg TestSubjects.find(kibanaChrome)
[00:58:57]               │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:58:57]               │ info [o.e.c.m.MetadataMappingService] [node-01] [.kibana_8.0.0_001/LF3r4p7WTQyOOzgu1NncHw] update_mapping [_doc]
[00:58:57]               │ debg ... sleep(501) start
[00:58:57]               │ debg ... sleep(501) end
[00:58:57]               │ debg in navigateTo url = http://localhost:61191/app/home#/
[00:59:09]             └-: global dashboard read with license_management_user
[00:59:09]               └-> "before all" hook for "should show the Stack Management nav link"
[00:59:09]               └-> "before all" hook for "should show the Stack Management nav link"
[00:59:09]                 │ debg set roles = global_dashboard_read,license_management_user
[00:59:09]                 │ debg creating user test_user
[00:59:09]                 │ info [o.e.x.s.a.u.TransportPutUserAction] [node-01] updated user [test_user]
[00:59:09]                 │ debg created user test_user
[00:59:09]                 │ debg TestSubjects.exists(kibanaChrome)
[00:59:09]                 │ debg Find.existsByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=2500
[00:59:09]                 │ debg TestSubjects.find(kibanaChrome)
[00:59:09]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=100000
[00:59:09]                 │ debg browser[INFO] http://localhost:61191/app/management?_t=1634745777274 281 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:59:09]                 │
[00:59:09]                 │ debg browser[INFO] http://localhost:61191/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:59:11]               └-> should show the Stack Management nav link
[00:59:11]                 └-> "before each" hook: global before each for "should show the Stack Management nav link"
[00:59:11]                 │ debg isGlobalLoadingIndicatorVisible
[00:59:11]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:59:11]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:59:12]                 │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:59:13]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:59:13]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:59:13]                 │ debg TestSubjects.exists(collapsibleNav)
[00:59:13]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="collapsibleNav"]') with timeout=2500
[00:59:15]                 │ debg --- retry.tryForTime error: [data-test-subj="collapsibleNav"] is not displayed
[00:59:16]                 │ debg TestSubjects.click(toggleNavButton)
[00:59:16]                 │ debg Find.clickByCssSelector('[data-test-subj="toggleNavButton"]') with timeout=10000
[00:59:16]                 │ debg Find.findByCssSelector('[data-test-subj="toggleNavButton"]') with timeout=10000
[00:59:16]                 │ debg TestSubjects.find(collapsibleNav)
[00:59:16]                 │ debg Find.findByCssSelector('[data-test-subj="collapsibleNav"]') with timeout=10000
[00:59:16]                 │ debg Find.existsByCssSelector('[data-test-subj=collapsibleNav] > button') with timeout=2500
[00:59:16]                 │ debg Find.findByCssSelector('[data-test-subj=collapsibleNav] > button') with timeout=10000
[00:59:16]                 │ debg Find.clickByCssSelector('[data-test-subj=collapsibleNav] > button') with timeout=10000
[00:59:16]                 │ debg Find.findByCssSelector('[data-test-subj=collapsibleNav] > button') with timeout=10000
[00:59:16]                 └- ✓ pass  (5.4s)
[00:59:16]               └-: [SkipCloud] global dashboard with license management user: skip cloud
[00:59:16]                 └-> "before all" hook for "should render the "Stack" section with License Management"
[00:59:16]                 └-> should render the "Stack" section with License Management
[00:59:16]                   └-> "before each" hook: global before each for "should render the "Stack" section with License Management"
[00:59:16]                   │ debg navigating to management url: http://localhost:61191/app/management
[00:59:16]                   │ debg navigate to: http://localhost:61191/app/management
[00:59:16]                   │ debg browser[INFO] http://localhost:61191/app/management?_t=1634745789018 281 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:59:16]                   │
[00:59:16]                   │ debg browser[INFO] http://localhost:61191/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:59:16]                   │ debg ... sleep(700) start
[00:59:17]                   │ debg ... sleep(700) end
[00:59:17]                   │ debg returned from get, calling refresh
[00:59:18]                   │ debg browser[INFO] http://localhost:61191/app/management?_t=1634745789018 281 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:59:18]                   │
[00:59:18]                   │ debg browser[INFO] http://localhost:61191/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:59:18]                   │ debg currentUrl = http://localhost:61191/app/management
[00:59:18]                   │          appUrl = http://localhost:61191/app/management
[00:59:18]                   │ debg TestSubjects.find(kibanaChrome)
[00:59:18]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:59:18]                   │ debg ... sleep(501) start
[00:59:19]                   │ debg ... sleep(501) end
[00:59:19]                   │ debg in navigateTo url = http://localhost:61191/app/management
[00:59:19]                   │ debg Find.allByCssSelector('.kbnPageTemplateSolutionNav .euiSideNavItem--root') with timeout=10000
[00:59:19]                   │ info Taking screenshot "/dev/shm/workspace/parallel/19/kibana/x-pack/test/functional/screenshots/failure/License app feature controls security global dashboard read with license_management_user _SkipCloud_ global dashboard with license management user_ skip cloud should render the _Stack_ section with License Management.png"
[00:59:19]                   │ info Current URL is: http://localhost:61191/app/management
[00:59:19]                   │ info Saving page source to: /dev/shm/workspace/parallel/19/kibana/x-pack/test/functional/failure_debug/html/License app feature controls security global dashboard read with license_management_user _SkipCloud_ global dashboard with license management user_ skip cloud should render the _Stack_ section with License Management.html
[00:59:19]                   └- ✖ fail: License app feature controls security global dashboard read with license_management_user [SkipCloud] global dashboard with license management user: skip cloud should render the "Stack" section with License Management
[00:59:19]                   │       Error: expected { sectionId: 'stack',
[00:59:19]                   │   sectionLinks: [ 'license_management' ] } to sort of equal { sectionId: 'stack',
[00:59:19]                   │   sectionLinks: [ 'license_management', 'upgrade_assistant' ] }
[00:59:19]                   │       + expected - actual
[00:59:19]                   │ 
[00:59:19]                   │        {
[00:59:19]                   │          "sectionId": "stack"
[00:59:19]                   │          "sectionLinks": [
[00:59:19]                   │            "license_management"
[00:59:19]                   │       +    "upgrade_assistant"
[00:59:19]                   │          ]
[00:59:19]                   │        }
[00:59:19]                   │       
[00:59:19]                   │       at Assertion.assert (/dev/shm/workspace/parallel/19/kibana/node_modules/@kbn/expect/expect.js:100:11)
[00:59:19]                   │       at Assertion.eql (/dev/shm/workspace/parallel/19/kibana/node_modules/@kbn/expect/expect.js:244:8)
[00:59:19]                   │       at Context.<anonymous> (test/functional/apps/license_management/feature_controls/license_management_security.ts:69:34)
[00:59:19]                   │       at runMicrotasks (<anonymous>)
[00:59:19]                   │       at processTicksAndRejections (node:internal/process/task_queues:96:5)
[00:59:19]                   │       at Object.apply (/dev/shm/workspace/parallel/19/kibana/node_modules/@kbn/test/target_node/functional_test_runner/lib/mocha/wrap_function.js:87:16)
[00:59:19]                   │ 
[00:59:19]                   │ 

Stack Trace

Error: expected { sectionId: 'stack',
  sectionLinks: [ 'license_management' ] } to sort of equal { sectionId: 'stack',
  sectionLinks: [ 'license_management', 'upgrade_assistant' ] }
    at Assertion.assert (/dev/shm/workspace/parallel/19/kibana/node_modules/@kbn/expect/expect.js:100:11)
    at Assertion.eql (/dev/shm/workspace/parallel/19/kibana/node_modules/@kbn/expect/expect.js:244:8)
    at Context.<anonymous> (test/functional/apps/license_management/feature_controls/license_management_security.ts:69:34)
    at runMicrotasks (<anonymous>)
    at processTicksAndRejections (node:internal/process/task_queues:96:5)
    at Object.apply (/dev/shm/workspace/parallel/19/kibana/node_modules/@kbn/test/target_node/functional_test_runner/lib/mocha/wrap_function.js:87:16) {
  actual: '{\n' +
    '  "sectionId": "stack"\n' +
    '  "sectionLinks": [\n' +
    '    "license_management"\n' +
    '  ]\n' +
    '}',
  expected: '{\n' +
    '  "sectionId": "stack"\n' +
    '  "sectionLinks": [\n' +
    '    "license_management"\n' +
    '    "upgrade_assistant"\n' +
    '  ]\n' +
    '}',
  showDiff: true
}

Kibana Pipeline / general / X-Pack Detection Engine API Integration Tests.x-pack/test/detection_engine_api_integration/security_and_spaces/tests/exception_operators_data_types/ip_array·ts.detection engine api security and spaces enabled Detection exceptions data types and operators Rule exception operators for data type ip "is" operator should filter a CIDR range of "127.0.0.4/31"

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has not failed recently on tracked branches

[00:00:00]     │
[00:00:00]       └-: detection engine api security and spaces enabled
[00:00:00]         └-> "before all" hook in "detection engine api security and spaces enabled"
[00:00:00]         └-: 
[00:00:00]           └-> "before all" hook in ""
[00:00:00]           └-: Detection exceptions data types and operators
[00:00:00]             └-> "before all" hook in "Detection exceptions data types and operators"
[00:00:00]             └-: 
[00:00:00]               └-> "before all" hook in ""
[00:06:43]               └-: Rule exception operators for data type ip
[00:06:43]                 └-> "before all" hook in "Rule exception operators for data type ip"
[00:06:43]                 └-> "before all" hook in "Rule exception operators for data type ip"
[00:06:43]                   │ info [x-pack/test/functional/es_archives/rule_exceptions/ip_as_array] Loading "mappings.json"
[00:06:43]                   │ info [x-pack/test/functional/es_archives/rule_exceptions/ip_as_array] Loading "data.json"
[00:06:43]                   │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [ip_as_array] creating index, cause [api], templates [], shards [1]/[1]
[00:06:43]                   │ info [x-pack/test/functional/es_archives/rule_exceptions/ip_as_array] Created index "ip_as_array"
[00:06:43]                   │ debg [x-pack/test/functional/es_archives/rule_exceptions/ip_as_array] "ip_as_array" settings {"index":{"number_of_replicas":"1","number_of_shards":"1"}}
[00:06:43]                   │ info [x-pack/test/functional/es_archives/rule_exceptions/ip_as_array] Indexed 4 docs into "ip_as_array"
[00:06:43]                 └-: "is" operator
[00:06:43]                   └-> "before all" hook for "should find all the ips from the data set when no exceptions are set on the rule"
[00:06:43]                   └-> should find all the ips from the data set when no exceptions are set on the rule
[00:06:43]                     └-> "before each" hook: global before each for "should find all the ips from the data set when no exceptions are set on the rule"
[00:06:43]                     └-> "before each" hook for "should find all the ips from the data set when no exceptions are set on the rule"
[00:06:43]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.siem-signals-default]
[00:06:43]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding index template [.siem-signals-default] for index patterns [.siem-signals-default-*]
[00:06:43]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.siem-signals-default-000001] creating index, cause [api], templates [.siem-signals-default], shards [1]/[1]
[00:06:43]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.siem-signals-default]
[00:06:44]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.lists-default]
[00:06:44]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.siem-signals-default]
[00:06:44]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.items-default]
[00:06:44]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.siem-signals-default]
[00:06:44]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.lists-default] for index patterns [.lists-default-*]
[00:06:44]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.items-default] for index patterns [.items-default-*]
[00:06:44]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.lists-default-000001] creating index, cause [api], templates [.lists-default], shards [1]/[1]
[00:06:44]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.lists-default]
[00:06:44]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.items-default-000001] creating index, cause [api], templates [.items-default], shards [1]/[1]
[00:06:44]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.lists-default]
[00:06:44]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.items-default]
[00:06:44]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.lists-default]
[00:06:46]                     │ proc [kibana] [2021-10-20T16:01:52.706+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:01:52.704Z","event":{"provider":"alerting","action":"execute-start","kind":"alert","category":["siem"],"start":"2021-10-20T16:01:52.704Z"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"09389360-31bf-11ec-82b1-87a27ac3c962","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T16:01:51.494Z","schedule_delay":1210000000},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"09389360-31bf-11ec-82b1-87a27ac3c962","license":"basic","category":"siem.signals","ruleset":"siem"},"message":"alert execution start: \"09389360-31bf-11ec-82b1-87a27ac3c962\"","ecs":{"version":"1.8.0"}}
[00:06:48]                     │ proc [kibana] [2021-10-20T16:01:54.522+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:01:54.522Z","event":{"provider":"securitySolution.ruleExecution","kind":"event","action":"status-change","sequence":0},"rule":{"id":"09389360-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"kibana":{"alert":{"rule":{"execution":{"status":"going to run","status_order":10}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"09389360-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:06:49]                     │ proc [kibana] [2021-10-20T16:01:55.531+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:01:55.530Z","event":{"provider":"securitySolution.ruleExecution","kind":"event","action":"status-change","sequence":1},"rule":{"id":"09389360-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"message":"succeeded","kibana":{"alert":{"rule":{"execution":{"status":"succeeded","status_order":0}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"09389360-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:06:49]                     │ proc [kibana] [2021-10-20T16:01:55.532+00:00][INFO ][plugins.securitySolution] [+] Finished indexing 4  signals searched between date ranges [
[00:06:49]                     │ proc [kibana]   {
[00:06:49]                     │ proc [kibana]     "to": "2021-10-20T16:01:54.528Z",
[00:06:49]                     │ proc [kibana]     "from": "1900-01-01T00:00:00.000Z",
[00:06:49]                     │ proc [kibana]     "maxSignals": 100
[00:06:49]                     │ proc [kibana]   }
[00:06:49]                     │ proc [kibana] ] name: "Signal Testing Query" id: "09389360-31bf-11ec-82b1-87a27ac3c962" rule id: "rule-1" signals index: ".siem-signals-default"
[00:06:49]                     │ proc [kibana] [2021-10-20T16:01:55.539+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:01:52.704Z","event":{"provider":"alerting","action":"execute","kind":"alert","category":["siem"],"start":"2021-10-20T16:01:52.704Z","outcome":"success","end":"2021-10-20T16:01:55.538Z","duration":2834000000},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"09389360-31bf-11ec-82b1-87a27ac3c962","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T16:01:51.494Z","schedule_delay":1210000000},"alerting":{"status":"ok"},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"09389360-31bf-11ec-82b1-87a27ac3c962","license":"basic","category":"siem.signals","ruleset":"siem","name":"Signal Testing Query"},"message":"alert executed: siem.signals:09389360-31bf-11ec-82b1-87a27ac3c962: 'Signal Testing Query'","ecs":{"version":"1.8.0"}}
[00:06:49]                     └- ✓ pass  (5.2s)
[00:06:49]                   └-> "after each" hook for "should find all the ips from the data set when no exceptions are set on the rule"
[00:06:49]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.siem-signals-default-000001/Si2k6_MaSUeO27LnEKOkMA] deleting index
[00:06:49]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.items-default]
[00:06:49]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.items-default]
[00:06:49]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing index template [.siem-signals-default]
[00:06:50]                     │ proc [kibana] [2021-10-20T16:01:56.542+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:01:56.542Z","event":{"provider":"securitySolution.ruleExecution","kind":"metric","action":"execution-metrics","sequence":2},"rule":{"id":"09389360-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"kibana":{"alert":{"rule":{"execution":{"metrics":{"total_search_duration_ms":6.859999999999999,"total_indexing_duration_ms":5.07}}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"09389360-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:06:52]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.lists-default-000001/NqG8xZ0BRAmViHY7XXNniA] deleting index
[00:06:52]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.items-default-000001/TY_OgJ5XR6y5tpxsQKjbmQ] deleting index
[00:06:52]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing template [.lists-default]
[00:06:52]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing template [.items-default]
[00:06:52]                   └-> should filter 1 single ip if it is set as an exception
[00:06:52]                     └-> "before each" hook: global before each for "should filter 1 single ip if it is set as an exception"
[00:06:52]                     └-> "before each" hook for "should filter 1 single ip if it is set as an exception"
[00:06:52]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.siem-signals-default]
[00:06:52]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding index template [.siem-signals-default] for index patterns [.siem-signals-default-*]
[00:06:52]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.siem-signals-default-000001] creating index, cause [api], templates [.siem-signals-default], shards [1]/[1]
[00:06:52]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.siem-signals-default]
[00:06:52]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.lists-default]
[00:06:52]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.items-default]
[00:06:52]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.lists-default] for index patterns [.lists-default-*]
[00:06:52]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.items-default] for index patterns [.items-default-*]
[00:06:52]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.lists-default-000001] creating index, cause [api], templates [.lists-default], shards [1]/[1]
[00:06:53]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.siem-signals-default]
[00:06:53]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.lists-default]
[00:06:53]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.items-default-000001] creating index, cause [api], templates [.items-default], shards [1]/[1]
[00:06:53]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.siem-signals-default]
[00:06:53]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.lists-default]
[00:06:53]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.items-default]
[00:06:53]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.lists-default]
[00:07:01]                     │ proc [kibana] [2021-10-20T16:02:07.650+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:07.650Z","event":{"provider":"alerting","action":"execute-start","kind":"alert","category":["siem"],"start":"2021-10-20T16:02:07.650Z"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"0fd5d7f0-31bf-11ec-82b1-87a27ac3c962","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T16:02:04.611Z","schedule_delay":3039000000},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"0fd5d7f0-31bf-11ec-82b1-87a27ac3c962","license":"basic","category":"siem.signals","ruleset":"siem"},"message":"alert execution start: \"0fd5d7f0-31bf-11ec-82b1-87a27ac3c962\"","ecs":{"version":"1.8.0"}}
[00:07:03]                     │ proc [kibana] [2021-10-20T16:02:09.639+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:09.639Z","event":{"provider":"securitySolution.ruleExecution","kind":"event","action":"status-change","sequence":0},"rule":{"id":"0fd5d7f0-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"kibana":{"alert":{"rule":{"execution":{"status":"going to run","status_order":10}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"0fd5d7f0-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:07:04]                     │ proc [kibana] [2021-10-20T16:02:10.653+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:10.653Z","event":{"provider":"securitySolution.ruleExecution","kind":"event","action":"status-change","sequence":1},"rule":{"id":"0fd5d7f0-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"message":"succeeded","kibana":{"alert":{"rule":{"execution":{"status":"succeeded","status_order":0}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"0fd5d7f0-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:07:04]                     │ proc [kibana] [2021-10-20T16:02:10.654+00:00][INFO ][plugins.securitySolution] [+] Finished indexing 3  signals searched between date ranges [
[00:07:04]                     │ proc [kibana]   {
[00:07:04]                     │ proc [kibana]     "to": "2021-10-20T16:02:09.645Z",
[00:07:04]                     │ proc [kibana]     "from": "1900-01-01T00:00:00.000Z",
[00:07:04]                     │ proc [kibana]     "maxSignals": 100
[00:07:04]                     │ proc [kibana]   }
[00:07:04]                     │ proc [kibana] ] name: "Signal Testing Query" id: "0fd5d7f0-31bf-11ec-82b1-87a27ac3c962" rule id: "rule-1" signals index: ".siem-signals-default"
[00:07:04]                     │ proc [kibana] [2021-10-20T16:02:10.662+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:07.650Z","event":{"provider":"alerting","action":"execute","kind":"alert","category":["siem"],"start":"2021-10-20T16:02:07.650Z","outcome":"success","end":"2021-10-20T16:02:10.662Z","duration":3012000000},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"0fd5d7f0-31bf-11ec-82b1-87a27ac3c962","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T16:02:04.611Z","schedule_delay":3039000000},"alerting":{"status":"ok"},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"0fd5d7f0-31bf-11ec-82b1-87a27ac3c962","license":"basic","category":"siem.signals","ruleset":"siem","name":"Signal Testing Query"},"message":"alert executed: siem.signals:0fd5d7f0-31bf-11ec-82b1-87a27ac3c962: 'Signal Testing Query'","ecs":{"version":"1.8.0"}}
[00:07:04]                     └- ✓ pass  (11.5s)
[00:07:04]                   └-> "after each" hook for "should filter 1 single ip if it is set as an exception"
[00:07:04]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.siem-signals-default-000001/3AFycBeQSuqlOxilPWSMUA] deleting index
[00:07:04]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.items-default]
[00:07:04]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.items-default]
[00:07:04]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing index template [.siem-signals-default]
[00:07:05]                     │ proc [kibana] [2021-10-20T16:02:11.665+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:11.664Z","event":{"provider":"securitySolution.ruleExecution","kind":"metric","action":"execution-metrics","sequence":2},"rule":{"id":"0fd5d7f0-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"kibana":{"alert":{"rule":{"execution":{"metrics":{"total_search_duration_ms":7.14,"total_indexing_duration_ms":4.29}}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"0fd5d7f0-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:07:07]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.lists-default-000001/m-nWtVgxQJmR6r8CBp7Ciw] deleting index
[00:07:07]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.items-default-000001/ZjxQrYLgRTeEb_Jdv7M2Gw] deleting index
[00:07:07]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing template [.lists-default]
[00:07:07]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing template [.items-default]
[00:07:07]                   └-> should filter 2 ips if both are set as exceptions
[00:07:07]                     └-> "before each" hook: global before each for "should filter 2 ips if both are set as exceptions"
[00:07:07]                     └-> "before each" hook for "should filter 2 ips if both are set as exceptions"
[00:07:07]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.siem-signals-default]
[00:07:07]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding index template [.siem-signals-default] for index patterns [.siem-signals-default-*]
[00:07:07]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.siem-signals-default-000001] creating index, cause [api], templates [.siem-signals-default], shards [1]/[1]
[00:07:07]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.siem-signals-default]
[00:07:08]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.lists-default]
[00:07:08]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.siem-signals-default]
[00:07:08]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.items-default]
[00:07:08]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.siem-signals-default]
[00:07:08]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.lists-default] for index patterns [.lists-default-*]
[00:07:08]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.items-default] for index patterns [.items-default-*]
[00:07:08]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.lists-default-000001] creating index, cause [api], templates [.lists-default], shards [1]/[1]
[00:07:08]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.lists-default]
[00:07:08]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.items-default-000001] creating index, cause [api], templates [.items-default], shards [1]/[1]
[00:07:08]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.lists-default]
[00:07:08]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.items-default]
[00:07:08]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.lists-default]
[00:07:08]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.items-default]
[00:07:08]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.items-default]
[00:07:16]                     │ proc [kibana] [2021-10-20T16:02:22.701+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:22.700Z","event":{"provider":"alerting","action":"execute-start","kind":"alert","category":["siem"],"start":"2021-10-20T16:02:22.700Z"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"18daa6a0-31bf-11ec-82b1-87a27ac3c962","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T16:02:19.743Z","schedule_delay":2957000000},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"18daa6a0-31bf-11ec-82b1-87a27ac3c962","license":"basic","category":"siem.signals","ruleset":"siem"},"message":"alert execution start: \"18daa6a0-31bf-11ec-82b1-87a27ac3c962\"","ecs":{"version":"1.8.0"}}
[00:07:18]                     │ proc [kibana] [2021-10-20T16:02:24.777+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:24.776Z","event":{"provider":"securitySolution.ruleExecution","kind":"event","action":"status-change","sequence":0},"rule":{"id":"18daa6a0-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"kibana":{"alert":{"rule":{"execution":{"status":"going to run","status_order":10}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"18daa6a0-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:07:19]                     │ proc [kibana] [2021-10-20T16:02:25.789+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:25.788Z","event":{"provider":"securitySolution.ruleExecution","kind":"event","action":"status-change","sequence":1},"rule":{"id":"18daa6a0-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"message":"succeeded","kibana":{"alert":{"rule":{"execution":{"status":"succeeded","status_order":0}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"18daa6a0-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:07:19]                     │ proc [kibana] [2021-10-20T16:02:25.790+00:00][INFO ][plugins.securitySolution] [+] Finished indexing 2  signals searched between date ranges [
[00:07:19]                     │ proc [kibana]   {
[00:07:19]                     │ proc [kibana]     "to": "2021-10-20T16:02:24.781Z",
[00:07:19]                     │ proc [kibana]     "from": "1900-01-01T00:00:00.000Z",
[00:07:19]                     │ proc [kibana]     "maxSignals": 100
[00:07:19]                     │ proc [kibana]   }
[00:07:19]                     │ proc [kibana] ] name: "Signal Testing Query" id: "18daa6a0-31bf-11ec-82b1-87a27ac3c962" rule id: "rule-1" signals index: ".siem-signals-default"
[00:07:19]                     │ proc [kibana] [2021-10-20T16:02:25.802+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:22.700Z","event":{"provider":"alerting","action":"execute","kind":"alert","category":["siem"],"start":"2021-10-20T16:02:22.700Z","outcome":"success","end":"2021-10-20T16:02:25.801Z","duration":3101000000},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"18daa6a0-31bf-11ec-82b1-87a27ac3c962","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T16:02:19.743Z","schedule_delay":2957000000},"alerting":{"status":"ok"},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"18daa6a0-31bf-11ec-82b1-87a27ac3c962","license":"basic","category":"siem.signals","ruleset":"siem","name":"Signal Testing Query"},"message":"alert executed: siem.signals:18daa6a0-31bf-11ec-82b1-87a27ac3c962: 'Signal Testing Query'","ecs":{"version":"1.8.0"}}
[00:07:19]                     └- ✓ pass  (11.5s)
[00:07:19]                   └-> "after each" hook for "should filter 2 ips if both are set as exceptions"
[00:07:19]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.siem-signals-default-000001/28bxFMdvS6u7aT3rHvVsBQ] deleting index
[00:07:19]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing index template [.siem-signals-default]
[00:07:20]                     │ proc [kibana] [2021-10-20T16:02:26.801+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:26.800Z","event":{"provider":"securitySolution.ruleExecution","kind":"metric","action":"execution-metrics","sequence":2},"rule":{"id":"18daa6a0-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"kibana":{"alert":{"rule":{"execution":{"metrics":{"total_search_duration_ms":9.23,"total_indexing_duration_ms":4.34}}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"18daa6a0-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:07:22]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.lists-default-000001/NOaZ5UOISW6YQRCr3lt_vw] deleting index
[00:07:22]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.items-default-000001/jhNMcLVIRO-mUjQZ_l0uuQ] deleting index
[00:07:22]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing template [.lists-default]
[00:07:22]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing template [.items-default]
[00:07:22]                   └-> should filter 3 ips if all 3 are set as exceptions
[00:07:22]                     └-> "before each" hook: global before each for "should filter 3 ips if all 3 are set as exceptions"
[00:07:22]                     └-> "before each" hook for "should filter 3 ips if all 3 are set as exceptions"
[00:07:22]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.siem-signals-default]
[00:07:23]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding index template [.siem-signals-default] for index patterns [.siem-signals-default-*]
[00:07:23]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.siem-signals-default-000001] creating index, cause [api], templates [.siem-signals-default], shards [1]/[1]
[00:07:23]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.siem-signals-default]
[00:07:23]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.lists-default]
[00:07:23]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.items-default]
[00:07:23]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.siem-signals-default]
[00:07:23]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.lists-default] for index patterns [.lists-default-*]
[00:07:23]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.siem-signals-default]
[00:07:23]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.items-default] for index patterns [.items-default-*]
[00:07:23]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.lists-default-000001] creating index, cause [api], templates [.lists-default], shards [1]/[1]
[00:07:23]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.lists-default]
[00:07:23]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.items-default-000001] creating index, cause [api], templates [.items-default], shards [1]/[1]
[00:07:23]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.items-default]
[00:07:23]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.lists-default]
[00:07:23]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.items-default]
[00:07:23]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.lists-default]
[00:07:23]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.items-default]
[00:07:31]                     │ proc [kibana] [2021-10-20T16:02:37.656+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:37.655Z","event":{"provider":"alerting","action":"execute-start","kind":"alert","category":["siem"],"start":"2021-10-20T16:02:37.655Z"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"21df2730-31bf-11ec-82b1-87a27ac3c962","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T16:02:34.867Z","schedule_delay":2788000000},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"21df2730-31bf-11ec-82b1-87a27ac3c962","license":"basic","category":"siem.signals","ruleset":"siem"},"message":"alert execution start: \"21df2730-31bf-11ec-82b1-87a27ac3c962\"","ecs":{"version":"1.8.0"}}
[00:07:32]                     │ proc [kibana] [2021-10-20T16:02:38.897+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:38.897Z","event":{"provider":"securitySolution.ruleExecution","kind":"event","action":"status-change","sequence":0},"rule":{"id":"21df2730-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"kibana":{"alert":{"rule":{"execution":{"status":"going to run","status_order":10}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"21df2730-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:07:33]                     │ proc [kibana] [2021-10-20T16:02:39.908+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:39.908Z","event":{"provider":"securitySolution.ruleExecution","kind":"event","action":"status-change","sequence":1},"rule":{"id":"21df2730-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"message":"succeeded","kibana":{"alert":{"rule":{"execution":{"status":"succeeded","status_order":0}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"21df2730-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:07:33]                     │ proc [kibana] [2021-10-20T16:02:39.909+00:00][INFO ][plugins.securitySolution] [+] Finished indexing 1  signals searched between date ranges [
[00:07:33]                     │ proc [kibana]   {
[00:07:33]                     │ proc [kibana]     "to": "2021-10-20T16:02:38.902Z",
[00:07:33]                     │ proc [kibana]     "from": "1900-01-01T00:00:00.000Z",
[00:07:33]                     │ proc [kibana]     "maxSignals": 100
[00:07:33]                     │ proc [kibana]   }
[00:07:33]                     │ proc [kibana] ] name: "Signal Testing Query" id: "21df2730-31bf-11ec-82b1-87a27ac3c962" rule id: "rule-1" signals index: ".siem-signals-default"
[00:07:33]                     │ proc [kibana] [2021-10-20T16:02:39.917+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:37.655Z","event":{"provider":"alerting","action":"execute","kind":"alert","category":["siem"],"start":"2021-10-20T16:02:37.655Z","outcome":"success","end":"2021-10-20T16:02:39.917Z","duration":2262000000},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"21df2730-31bf-11ec-82b1-87a27ac3c962","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T16:02:34.867Z","schedule_delay":2788000000},"alerting":{"status":"ok"},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"21df2730-31bf-11ec-82b1-87a27ac3c962","license":"basic","category":"siem.signals","ruleset":"siem","name":"Signal Testing Query"},"message":"alert executed: siem.signals:21df2730-31bf-11ec-82b1-87a27ac3c962: 'Signal Testing Query'","ecs":{"version":"1.8.0"}}
[00:07:33]                     └- ✓ pass  (10.5s)
[00:07:33]                   └-> "after each" hook for "should filter 3 ips if all 3 are set as exceptions"
[00:07:33]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.siem-signals-default-000001/_9z_z-BxSQu74xWHsRkaIw] deleting index
[00:07:33]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing index template [.siem-signals-default]
[00:07:34]                     │ proc [kibana] [2021-10-20T16:02:40.924+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:40.923Z","event":{"provider":"securitySolution.ruleExecution","kind":"metric","action":"execution-metrics","sequence":2},"rule":{"id":"21df2730-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"kibana":{"alert":{"rule":{"execution":{"metrics":{"total_search_duration_ms":8.17,"total_indexing_duration_ms":5.79}}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"21df2730-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:07:37]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.lists-default-000001/-IO1BwK6TMK7wOlyiLgu4Q] deleting index
[00:07:37]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.items-default-000001/7EUiKC_JQBezfHTCisG46A] deleting index
[00:07:37]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing template [.lists-default]
[00:07:37]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing template [.items-default]
[00:07:37]                   └-> should filter a CIDR range of "127.0.0.1/30"
[00:07:37]                     └-> "before each" hook: global before each for "should filter a CIDR range of "127.0.0.1/30""
[00:07:37]                     └-> "before each" hook for "should filter a CIDR range of "127.0.0.1/30""
[00:07:37]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.siem-signals-default]
[00:07:37]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding index template [.siem-signals-default] for index patterns [.siem-signals-default-*]
[00:07:37]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.siem-signals-default-000001] creating index, cause [api], templates [.siem-signals-default], shards [1]/[1]
[00:07:37]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.siem-signals-default]
[00:07:37]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.lists-default]
[00:07:37]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.siem-signals-default]
[00:07:37]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.items-default]
[00:07:37]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.siem-signals-default]
[00:07:37]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.lists-default] for index patterns [.lists-default-*]
[00:07:37]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.items-default] for index patterns [.items-default-*]
[00:07:37]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.lists-default-000001] creating index, cause [api], templates [.lists-default], shards [1]/[1]
[00:07:38]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.lists-default]
[00:07:38]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.items-default-000001] creating index, cause [api], templates [.items-default], shards [1]/[1]
[00:07:38]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.lists-default]
[00:07:38]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.items-default]
[00:07:38]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.lists-default]
[00:07:38]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.items-default]
[00:07:38]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.items-default]
[00:07:46]                     │ proc [kibana] [2021-10-20T16:02:52.734+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:52.733Z","event":{"provider":"alerting","action":"execute-start","kind":"alert","category":["siem"],"start":"2021-10-20T16:02:52.733Z"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"2ae1fa10-31bf-11ec-82b1-87a27ac3c962","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T16:02:49.985Z","schedule_delay":2748000000},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"2ae1fa10-31bf-11ec-82b1-87a27ac3c962","license":"basic","category":"siem.signals","ruleset":"siem"},"message":"alert execution start: \"2ae1fa10-31bf-11ec-82b1-87a27ac3c962\"","ecs":{"version":"1.8.0"}}
[00:07:47]                     │ proc [kibana] [2021-10-20T16:02:54.014+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:54.013Z","event":{"provider":"securitySolution.ruleExecution","kind":"event","action":"status-change","sequence":0},"rule":{"id":"2ae1fa10-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"kibana":{"alert":{"rule":{"execution":{"status":"going to run","status_order":10}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"2ae1fa10-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:07:48]                     │ proc [kibana] [2021-10-20T16:02:55.022+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:55.021Z","event":{"provider":"securitySolution.ruleExecution","kind":"event","action":"status-change","sequence":1},"rule":{"id":"2ae1fa10-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"message":"succeeded","kibana":{"alert":{"rule":{"execution":{"status":"succeeded","status_order":0}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"2ae1fa10-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:07:48]                     │ proc [kibana] [2021-10-20T16:02:55.022+00:00][INFO ][plugins.securitySolution] [+] Finished indexing 3  signals searched between date ranges [
[00:07:48]                     │ proc [kibana]   {
[00:07:48]                     │ proc [kibana]     "to": "2021-10-20T16:02:54.022Z",
[00:07:48]                     │ proc [kibana]     "from": "1900-01-01T00:00:00.000Z",
[00:07:48]                     │ proc [kibana]     "maxSignals": 100
[00:07:48]                     │ proc [kibana]   }
[00:07:48]                     │ proc [kibana] ] name: "Signal Testing Query" id: "2ae1fa10-31bf-11ec-82b1-87a27ac3c962" rule id: "rule-1" signals index: ".siem-signals-default"
[00:07:48]                     │ proc [kibana] [2021-10-20T16:02:55.032+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:52.733Z","event":{"provider":"alerting","action":"execute","kind":"alert","category":["siem"],"start":"2021-10-20T16:02:52.733Z","outcome":"success","end":"2021-10-20T16:02:55.032Z","duration":2299000000},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"2ae1fa10-31bf-11ec-82b1-87a27ac3c962","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T16:02:49.985Z","schedule_delay":2748000000},"alerting":{"status":"ok"},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"2ae1fa10-31bf-11ec-82b1-87a27ac3c962","license":"basic","category":"siem.signals","ruleset":"siem","name":"Signal Testing Query"},"message":"alert executed: siem.signals:2ae1fa10-31bf-11ec-82b1-87a27ac3c962: 'Signal Testing Query'","ecs":{"version":"1.8.0"}}
[00:07:48]                     └- ✓ pass  (10.9s)
[00:07:48]                   └-> "after each" hook for "should filter a CIDR range of "127.0.0.1/30""
[00:07:49]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.siem-signals-default-000001/XM4QKBYHR7qBIRgXjvQddQ] deleting index
[00:07:49]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing index template [.siem-signals-default]
[00:07:49]                     │ proc [kibana] [2021-10-20T16:02:56.037+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:02:56.036Z","event":{"provider":"securitySolution.ruleExecution","kind":"metric","action":"execution-metrics","sequence":2},"rule":{"id":"2ae1fa10-31bf-11ec-82b1-87a27ac3c962","name":"Signal Testing Query","category":"siem.signals"},"kibana":{"alert":{"rule":{"execution":{"metrics":{"total_search_duration_ms":9.32,"total_indexing_duration_ms":6.95}}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"2ae1fa10-31bf-11ec-82b1-87a27ac3c962"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:07:52]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.lists-default-000001/_DlKWQRtSp2UY_XwDjSJRg] deleting index
[00:07:52]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.items-default-000001/aBjqoR1TRJSZjsFB_oSYzA] deleting index
[00:07:52]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing template [.lists-default]
[00:07:52]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing template [.items-default]
[00:07:52]                   └-> should filter a CIDR range of "127.0.0.4/31"
[00:07:52]                     └-> "before each" hook: global before each for "should filter a CIDR range of "127.0.0.4/31""
[00:07:52]                     └-> "before each" hook for "should filter a CIDR range of "127.0.0.4/31""
[00:07:52]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.siem-signals-default]
[00:07:52]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding index template [.siem-signals-default] for index patterns [.siem-signals-default-*]
[00:07:52]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.siem-signals-default-000001] creating index, cause [api], templates [.siem-signals-default], shards [1]/[1]
[00:07:52]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.siem-signals-default]
[00:07:52]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.siem-signals-default]
[00:07:52]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.lists-default]
[00:07:52]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.siem-signals-default]
[00:07:52]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.items-default]
[00:07:52]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.lists-default] for index patterns [.lists-default-*]
[00:07:52]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.items-default] for index patterns [.items-default-*]
[00:07:52]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.lists-default-000001] creating index, cause [api], templates [.lists-default], shards [1]/[1]
[00:07:52]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.lists-default]
[00:07:52]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.items-default-000001] creating index, cause [api], templates [.items-default], shards [1]/[1]
[00:07:52]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.lists-default]
[00:07:52]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.items-default]
[00:07:52]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.lists-default]
[00:07:58]                     │ proc [kibana] [2021-10-20T16:03:04.731+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T16:03:04.730Z","event":{"provider":"alerting","action":"execute-start","kind":"alert","category":["siem"],"start":"2021-10-20T16:03:04.730Z"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"334caba0-31bf-11ec-82b1-87a27ac3c962","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T16:03:04.108Z","schedule_delay":622000000},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"334caba0-31bf-11ec-82b1-87a27ac3c962","license":"basic","category":"siem.signals","ruleset":"siem"},"message":"alert execution start: \"334caba0-31bf-11ec-82b1-87a27ac3c962\"","ecs":{"version":"1.8.0"}}
[00:07:59]                     └- ✖ fail: detection engine api security and spaces enabled  Detection exceptions data types and operators  Rule exception operators for data type ip "is" operator should filter a CIDR range of "127.0.0.4/31"
[00:07:59]                     │      Error: expected 200 "OK", got 409 "Conflict"
[00:07:59]                     │       at Test._assertStatus (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:268:12)
[00:07:59]                     │       at Test._assertFunction (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:283:11)
[00:07:59]                     │       at Test.assert (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:173:18)
[00:07:59]                     │       at assert (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:131:12)
[00:07:59]                     │       at /dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:128:5
[00:07:59]                     │       at Test.Request.callback (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:718:3)
[00:07:59]                     │       at /dev/shm/workspace/parallel/4/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:906:18
[00:07:59]                     │       at IncomingMessage.<anonymous> (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/node_modules/superagent/lib/node/parsers/json.js:19:7)
[00:07:59]                     │       at IncomingMessage.emit (node:events:402:35)
[00:07:59]                     │       at endReadableNT (node:internal/streams/readable:1343:12)
[00:07:59]                     │       at processTicksAndRejections (node:internal/process/task_queues:83:21)
[00:07:59]                     │ 
[00:07:59]                     │ 

Stack Trace

Error: expected 200 "OK", got 409 "Conflict"
    at Test._assertStatus (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:268:12)
    at Test._assertFunction (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:283:11)
    at Test.assert (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:173:18)
    at assert (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:131:12)
    at /dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:128:5
    at Test.Request.callback (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:718:3)
    at /dev/shm/workspace/parallel/4/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:906:18
    at IncomingMessage.<anonymous> (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/node_modules/superagent/lib/node/parsers/json.js:19:7)
    at IncomingMessage.emit (node:events:402:35)
    at endReadableNT (node:internal/streams/readable:1343:12)
    at processTicksAndRejections (node:internal/process/task_queues:83:21)

Kibana Pipeline / general / X-Pack Detection Engine API Integration Tests.x-pack/test/detection_engine_api_integration/security_and_spaces/tests/exception_operators_data_types/ip·ts.detection engine api security and spaces enabled Detection exceptions data types and operators Rule exception operators for data type ip "is one of" operator should filter 2 ips if both are set as exceptions

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has not failed recently on tracked branches

[00:00:00]     │
[00:00:00]       └-: detection engine api security and spaces enabled
[00:00:00]         └-> "before all" hook in "detection engine api security and spaces enabled"
[00:00:00]         └-: 
[00:00:00]           └-> "before all" hook in ""
[00:00:00]           └-: Detection exceptions data types and operators
[00:00:00]             └-> "before all" hook in "Detection exceptions data types and operators"
[00:00:00]             └-: 
[00:00:00]               └-> "before all" hook in ""
[00:00:00]               └-: Rule exception operators for data type ip
[00:00:00]                 └-> "before all" hook in "Rule exception operators for data type ip"
[00:00:00]                 └-> "before all" hook in "Rule exception operators for data type ip"
[00:00:00]                   │ info [x-pack/test/functional/es_archives/rule_exceptions/ip] Loading "mappings.json"
[00:00:00]                   │ info [x-pack/test/functional/es_archives/rule_exceptions/ip] Loading "data.json"
[00:00:00]                   │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [ip] creating index, cause [api], templates [], shards [1]/[1]
[00:00:00]                   │ info [x-pack/test/functional/es_archives/rule_exceptions/ip] Created index "ip"
[00:00:00]                   │ debg [x-pack/test/functional/es_archives/rule_exceptions/ip] "ip" settings {"index":{"number_of_replicas":"1","number_of_shards":"1"}}
[00:00:00]                   │ info [x-pack/test/functional/es_archives/rule_exceptions/ip] Indexed 4 docs into "ip"
[00:02:11]                 └-: "is one of" operator
[00:02:11]                   └-> "before all" hook for "should filter 1 single ip if it is set as an exception"
[00:02:11]                   └-> should filter 1 single ip if it is set as an exception
[00:02:11]                     └-> "before each" hook: global before each for "should filter 1 single ip if it is set as an exception"
[00:02:11]                     └-> "before each" hook for "should filter 1 single ip if it is set as an exception"
[00:02:11]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.siem-signals-default]
[00:02:11]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding index template [.siem-signals-default] for index patterns [.siem-signals-default-*]
[00:02:11]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.siem-signals-default-000001] creating index, cause [api], templates [.siem-signals-default], shards [1]/[1]
[00:02:11]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.siem-signals-default]
[00:02:11]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.lists-default]
[00:02:11]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.siem-signals-default]
[00:02:11]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.items-default]
[00:02:11]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.siem-signals-default]
[00:02:11]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.lists-default] for index patterns [.lists-default-*]
[00:02:11]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.items-default] for index patterns [.items-default-*]
[00:02:11]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.lists-default-000001] creating index, cause [api], templates [.lists-default], shards [1]/[1]
[00:02:11]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.lists-default]
[00:02:11]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.items-default-000001] creating index, cause [api], templates [.items-default], shards [1]/[1]
[00:02:11]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.items-default]
[00:02:11]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.lists-default]
[00:02:11]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.items-default]
[00:02:11]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.lists-default]
[00:02:11]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.items-default]
[00:02:19]                     │ proc [kibana] [2021-10-20T15:31:11.884+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T15:31:11.883Z","event":{"provider":"alerting","action":"execute-start","kind":"alert","category":["siem"],"start":"2021-10-20T15:31:11.883Z"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T15:31:09.297Z","schedule_delay":2586000000},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee","license":"basic","category":"siem.signals","ruleset":"siem"},"message":"alert execution start: \"bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee\"","ecs":{"version":"1.8.0"}}
[00:02:20]                     │ proc [kibana] [2021-10-20T15:31:13.331+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T15:31:13.330Z","event":{"provider":"securitySolution.ruleExecution","kind":"event","action":"status-change","sequence":0},"rule":{"id":"bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee","name":"Signal Testing Query","category":"siem.signals"},"kibana":{"alert":{"rule":{"execution":{"status":"going to run","status_order":10}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:02:21]                     │ proc [kibana] [2021-10-20T15:31:14.340+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T15:31:14.339Z","event":{"provider":"securitySolution.ruleExecution","kind":"event","action":"status-change","sequence":1},"rule":{"id":"bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee","name":"Signal Testing Query","category":"siem.signals"},"message":"succeeded","kibana":{"alert":{"rule":{"execution":{"status":"succeeded","status_order":0}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:02:21]                     │ proc [kibana] [2021-10-20T15:31:14.340+00:00][INFO ][plugins.securitySolution] [+] Finished indexing 3  signals searched between date ranges [
[00:02:21]                     │ proc [kibana]   {
[00:02:21]                     │ proc [kibana]     "to": "2021-10-20T15:31:13.341Z",
[00:02:21]                     │ proc [kibana]     "from": "1900-01-01T00:00:00.000Z",
[00:02:21]                     │ proc [kibana]     "maxSignals": 100
[00:02:21]                     │ proc [kibana]   }
[00:02:21]                     │ proc [kibana] ] name: "Signal Testing Query" id: "bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee" rule id: "rule-1" signals index: ".siem-signals-default"
[00:02:21]                     │ proc [kibana] [2021-10-20T15:31:14.352+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T15:31:11.883Z","event":{"provider":"alerting","action":"execute","kind":"alert","category":["siem"],"start":"2021-10-20T15:31:11.883Z","outcome":"success","end":"2021-10-20T15:31:14.352Z","duration":2469000000},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T15:31:09.297Z","schedule_delay":2586000000},"alerting":{"status":"ok"},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee","license":"basic","category":"siem.signals","ruleset":"siem","name":"Signal Testing Query"},"message":"alert executed: siem.signals:bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee: 'Signal Testing Query'","ecs":{"version":"1.8.0"}}
[00:02:21]                     └- ✓ pass  (10.3s)
[00:02:21]                   └-> "after each" hook for "should filter 1 single ip if it is set as an exception"
[00:02:21]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.siem-signals-default-000001/NgiyeDsLTwSV-cTep-oUKw] deleting index
[00:02:21]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing index template [.siem-signals-default]
[00:02:22]                     │ proc [kibana] [2021-10-20T15:31:15.357+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T15:31:15.356Z","event":{"provider":"securitySolution.ruleExecution","kind":"metric","action":"execution-metrics","sequence":2},"rule":{"id":"bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee","name":"Signal Testing Query","category":"siem.signals"},"kibana":{"alert":{"rule":{"execution":{"metrics":{"total_search_duration_ms":10.75,"total_indexing_duration_ms":9.7}}}},"space_ids":["default"],"saved_objects":[{"rel":"primary","type":"alert","id":"bdfb8be0-31ba-11ec-88b5-f3cf4c6ccaee"}],"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"ecs":{"version":"1.8.0"}}
[00:02:24]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.lists-default-000001/BSrCfzAnQT6ZDUw40limqg] deleting index
[00:02:24]                     │ info [o.e.c.m.MetadataDeleteIndexService] [node-01] [.items-default-000001/ogL6DmpNSwiuK8N8DlSvsg] deleting index
[00:02:25]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing template [.lists-default]
[00:02:25]                     │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] removing template [.items-default]
[00:02:25]                   └-> should filter 2 ips if both are set as exceptions
[00:02:25]                     └-> "before each" hook: global before each for "should filter 2 ips if both are set as exceptions"
[00:02:25]                     └-> "before each" hook for "should filter 2 ips if both are set as exceptions"
[00:02:25]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.siem-signals-default]
[00:02:25]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding index template [.siem-signals-default] for index patterns [.siem-signals-default-*]
[00:02:25]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.siem-signals-default-000001] creating index, cause [api], templates [.siem-signals-default], shards [1]/[1]
[00:02:25]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.siem-signals-default]
[00:02:25]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.lists-default]
[00:02:25]                       │ info [o.e.x.i.a.TransportPutLifecycleAction] [node-01] adding index lifecycle policy [.items-default]
[00:02:25]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.siem-signals-default]
[00:02:25]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.lists-default] for index patterns [.lists-default-*]
[00:02:25]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.siem-signals-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.siem-signals-default]
[00:02:25]                       │ info [o.e.c.m.MetadataIndexTemplateService] [node-01] adding template [.items-default] for index patterns [.items-default-*]
[00:02:25]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.lists-default-000001] creating index, cause [api], templates [.lists-default], shards [1]/[1]
[00:02:25]                       │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.lists-default]
[00:02:25]                       │ info [o.e.c.m.MetadataCreateIndexService] [node-01] [.items-default-000001] creating index, cause [api], templates [.items-default], shards [1]/[1]
[00:02:25]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [.items-default]
[00:02:25]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.lists-default]
[00:02:25]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [.items-default]
[00:02:25]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.lists-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.lists-default]
[00:02:25]                     │ info [o.e.x.i.IndexLifecycleTransition] [node-01] moving index [.items-default-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [.items-default]
[00:02:31]                     │ proc [kibana] [2021-10-20T15:31:23.882+00:00][INFO ][plugins.eventLog] event logged: {"@timestamp":"2021-10-20T15:31:23.881Z","event":{"provider":"alerting","action":"execute-start","kind":"alert","category":["siem"],"start":"2021-10-20T15:31:23.881Z"},"kibana":{"saved_objects":[{"rel":"primary","type":"alert","id":"c6686050-31ba-11ec-88b5-f3cf4c6ccaee","type_id":"siem.signals"}],"task":{"scheduled":"2021-10-20T15:31:23.433Z","schedule_delay":448000000},"server_uuid":"5b2de169-2785-441b-ae8c-186a1936b17d","version":"8.0.0"},"rule":{"id":"c6686050-31ba-11ec-88b5-f3cf4c6ccaee","license":"basic","category":"siem.signals","ruleset":"siem"},"message":"alert execution start: \"c6686050-31ba-11ec-88b5-f3cf4c6ccaee\"","ecs":{"version":"1.8.0"}}
[00:02:31]                     └- ✖ fail: detection engine api security and spaces enabled  Detection exceptions data types and operators  Rule exception operators for data type ip "is one of" operator should filter 2 ips if both are set as exceptions
[00:02:31]                     │      Error: expected 200 "OK", got 409 "Conflict"
[00:02:31]                     │       at Test._assertStatus (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:268:12)
[00:02:31]                     │       at Test._assertFunction (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:283:11)
[00:02:31]                     │       at Test.assert (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:173:18)
[00:02:31]                     │       at assert (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:131:12)
[00:02:31]                     │       at /dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:128:5
[00:02:31]                     │       at Test.Request.callback (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:718:3)
[00:02:31]                     │       at /dev/shm/workspace/parallel/4/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:906:18
[00:02:31]                     │       at IncomingMessage.<anonymous> (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/node_modules/superagent/lib/node/parsers/json.js:19:7)
[00:02:31]                     │       at IncomingMessage.emit (node:events:402:35)
[00:02:31]                     │       at endReadableNT (node:internal/streams/readable:1343:12)
[00:02:31]                     │       at processTicksAndRejections (node:internal/process/task_queues:83:21)
[00:02:31]                     │ 
[00:02:31]                     │ 

Stack Trace

Error: expected 200 "OK", got 409 "Conflict"
    at Test._assertStatus (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:268:12)
    at Test._assertFunction (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:283:11)
    at Test.assert (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:173:18)
    at assert (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:131:12)
    at /dev/shm/workspace/parallel/4/kibana/node_modules/supertest/lib/test.js:128:5
    at Test.Request.callback (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:718:3)
    at /dev/shm/workspace/parallel/4/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:906:18
    at IncomingMessage.<anonymous> (/dev/shm/workspace/parallel/4/kibana/node_modules/supertest/node_modules/superagent/lib/node/parsers/json.js:19:7)
    at IncomingMessage.emit (node:events:402:35)
    at endReadableNT (node:internal/streams/readable:1343:12)
    at processTicksAndRejections (node:internal/process/task_queues:83:21)

and 1 more failures, only showing the first 3.

Metrics [docs]

✅ unchanged

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

cc @sabarasaba

@@ -13,21 +13,13 @@ export default function ({ getService, getPageObjects }: FtrProviderContext) {
const testSubjects = getService('testSubjects');
const retry = getService('retry');

// Failing: See https://github.com/elastic/kibana/issues/115859
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Removing the comment since the test is meant to be skipped for 8.x

@sabarasaba
Copy link
Member Author

@elasticmachine merge upstream

@sabarasaba sabarasaba marked this pull request as ready for review October 25, 2021 06:44
@sabarasaba sabarasaba requested a review from a team as a code owner October 25, 2021 06:44
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-stack-management (Team:Stack Management)

@sabarasaba
Copy link
Member Author

@elasticmachine merge upstream

@sabarasaba sabarasaba requested a review from yuliacech October 25, 2021 06:44
@kibanamachine
Copy link
Contributor

💚 Build Succeeded

Metrics [docs]

✅ unchanged

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

cc @sabarasaba

Copy link
Contributor

@yuliacech yuliacech left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for working on this, @sabarasaba! Tested locally, code changes LGTM 👍

@sabarasaba sabarasaba added v8.1.0 and removed v8.1.0 labels Oct 26, 2021
@sabarasaba sabarasaba merged commit c50511f into elastic:master Oct 26, 2021
jloleysens added a commit to jloleysens/kibana that referenced this pull request Oct 26, 2021
…-migrate-away-from-injected-css-js

* 'master' of github.com:elastic/kibana: (347 commits)
  [Upgrade Assistant] Disable UI by default in 8.0 (elastic#115782)
  [Uptime] Added permission for new tls alert (elastic#116107)
  [APM] Optimize synthtrace (elastic#116091)
  Fix ux/apm inspector panel (elastic#116188)
  [RAC]: add experimental badge to alerts (elastic#116090)
  Unskip jest handled promise rejections (elastic#116021)
  [Lens] Improve tick placement for binary formatter (elastic#116158)
  chore: rename getApmHref to getLegacyApmHref (elastic#115689)
  [Security Solution] Validate ipv4/CIDR with format x.x.x.x/xx (elastic#116127)
  [Fleet] Use data stream name in query to get data stream info (elastic#115805)
  [Uptime] TLS and TLS legacy alert translation mismatch (elastic#116113)
  New field for integrations field (elastic#116175)
  Set required to false until the input is not visited (elastic#116099)
  Enable interactive setup by default (elastic#116141)
  Add not ready response to interactive setup (elastic#116138)
  Hide or button if needed (elastic#116124)
  [ML] Adding datafeed api tests (elastic#116133)
  Add page title to index advanced page (elastic#116134)
  chore: rename functions in aggregated_transactions helper  (elastic#116001)
  Fix bug where number rendered as date (elastic#116224)
  ...

# Conflicts:
#	x-pack/plugins/reporting/server/lib/screenshots/observable.ts
#	x-pack/plugins/reporting/server/lib/screenshots/open_url.ts
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:skip This commit does not require backporting chore Feature:Upgrade Assistant release_note:skip Skip the PR/issue when compiling release notes Team:Kibana Management Dev Tools, Index Management, Upgrade Assistant, ILM, Ingest Node Pipelines, and more v8.0.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Disable Upgrade Assistant UI by default in 8.0
4 participants