-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Fleet] handle multiple policies in edit package policy extension view #187334
Conversation
Pinging @elastic/fleet (Team:Fleet) |
🤖 GitHub commentsExpand to view the GitHub comments
Just comment with:
|
@julia To run agentless I followed this guide https://docs.elastic.dev/security-solution/cloud-security/serverless/develop-for-kibana#agentless-local-set-up The agentless policy can be preconfigured with
and feature flag is |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fleet code LGTM
I'm trying to debug the failing test locally, but it doesn't seem to start kibana.
It logs something about not finding |
@juliaElastic Thanks for taking care of agentless in CSPM! Couple of notes:
|
Thanks for the response, I think I found the cause of the failing tests. I think it's probably best to hide the ability to change agent policies on the agentless CSPM integration policies. |
💚 Build Succeeded
Metrics [docs]Async chunks
History
To update your PR or re-run it, just comment with: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
one nit comment, otherwise lgtm! tested, works as expected, though I found what it seems like a bug, but it's not related to this PR as I can reproduce it on main branch as well. Checking if it's actually the same on the real serverless env
screencast-localhost_5601-2024.07.03-09_52_35.webm
if (agentPolicyId && agentPolicyId !== agentlessPolicyId) { | ||
if ( | ||
agentPolicyIds.length > 0 && | ||
(!agentlessPolicyId || !agentPolicyIds.includes(agentlessPolicyId)) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: the condition becomes a bit cluttered, wdyt about moving the parts to own vars and have smth like hasAgentPolicies && agentlessPolicyIsAbsent
in the condition?
💛 Build succeeded, but was flaky
Failed CI StepsMetrics [docs]Async chunks
|
Summary
Related to #75867
Handling multiple policies in package policy edit extension view, made changes in CSP.
@elastic/kibana-cloud-security-posture Hey, could you help me how can I create an agentless policy to test with?
Checklist