[7.17] [ML] Removing use of re2 library (#186104) #188372
+3
−6
Merged
checks-reporter / X-Pack Chrome Functional tests / Group 21
succeeded
Jul 15, 2024 in 22m 33s
node scripts/functional_tests --bail --kibana-install-dir /opt/local-ssd/buildkite/builds/bk-agent-prod-gcp-1721078118384721941/elastic/kibana-pull-request/kibana-build-xpack --include-tag ciGroup21
Details
[truncated]
mponent template [metrics-mappings]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding component template [logs-settings]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding component template [metrics-settings]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding component template [synthetics-mappings]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding component template [synthetics-settings]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding index template [.watch-history-13] for index patterns [.watcher-history-13*]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding index template [ilm-history] for index patterns [ilm-history-5*]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding index template [.slm-history] for index patterns [.slm-history-5*]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding component template [.deprecation-indexing-mappings]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding component template [.deprecation-indexing-settings]
│ info [o.e.c.m.MetadataCreateIndexService] [ftr] [.security-7] creating index, cause [api], templates [], shards [1]/[0]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding index template [logs] for index patterns [logs-*-*]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding index template [metrics] for index patterns [metrics-*-*]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding index template [synthetics] for index patterns [synthetics-*-*]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding index template [.deprecation-indexing-template] for index patterns [.logs-deprecation.*]
│ info [o.e.c.r.a.AllocationService] [ftr] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.security-7][0]]]).
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [ml-size-based-ilm-policy]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [logs]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [metrics]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [synthetics]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [7-days-default]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [30-days-default]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [90-days-default]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [180-days-default]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [365-days-default]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [watch-history-ilm-policy]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [ilm-history-ilm-policy]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [slm-history-ilm-policy]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [.deprecation-indexing-ilm-policy]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [.fleet-actions-results-ilm-policy]
│ info [o.e.l.LicenseService] [ftr] license [1d734e6b-cf3c-4d21-8ff6-8a33bc35a459] mode [basic] - valid
│ info [o.e.x.s.a.Realms] [ftr] license mode is [basic], currently licensed security realms are [reserved/reserved,file/default_file,native/default_native]
│ info [o.e.x.s.s.SecurityStatusChangeListener] [ftr] Active license is now [BASIC]; Security is enabled
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [system_indices_superuser]
│ info [o.e.x.s.a.u.TransportPutUserAction] [ftr] added user [system_indices_superuser]
│ info starting [kibana] > /opt/local-ssd/buildkite/builds/bk-agent-prod-gcp-1721078118384721941/elastic/kibana-pull-request/kibana-build-xpack/bin/kibana --logging.json=false --server.port=5620 --elasticsearch.hosts=http://localhost:9220 --elasticsearch.username=kibana_system --elasticsearch.password=changeme --data.search.aggs.shardDelay.enabled=true --security.showInsecureClusterWarning=false --telemetry.banner=false --telemetry.optIn=false --telemetry.sendUsageTo=staging --server.maxPayload=1679958 --plugin-path=/opt/local-ssd/buildkite/builds/bk-agent-prod-gcp-1721078118384721941/elastic/kibana-pull-request/kibana/test/common/fixtures/plugins/newsfeed --newsfeed.service.urlRoot=http://localhost:5620 --newsfeed.service.pathTemplate=/api/_newsfeed-FTS-external-service-simulators/kibana/v{VERSION}.json --logging.appenders.deprecation.type=console --logging.appenders.deprecation.layout.type=json --logging.loggers[0].name=elasticsearch.deprecation --logging.loggers[0].level=all --logging.loggers[0].appenders[0]=deprecation --status.allowAnonymous=true --server.uuid=5b2de169-2785-441b-ae8c-186a1936b17d --xpack.maps.showMapsInspectorAdapter=true --xpack.maps.preserveDrawingBuffer=true --xpack.security.encryptionKey="wuGNaIhoMpk5sO4UBxgr3NyW1sFcLgIf" --xpack.encryptedSavedObjects.encryptionKey="DkdXazszSCYexXqz4YktBGHCRkV6hyNK" --xpack.discoverEnhanced.actions.exploreDataInContextMenu.enabled=true --savedObjects.maxImportPayloadBytes=10485760 --xpack.siem.enabled=true
│ proc [kibana] Kibana is currently running with legacy OpenSSL providers enabled! For details and instructions on how to disable see https://www.elastic.co/guide/en/kibana/7.17/production.html#openssl-legacy-provider
│ proc [kibana] log [21:32:28.958] [info][plugins-service] Plugin "metricsEntities" is disabled.
│ proc [kibana] log [21:32:29.041] [info][server][Preboot][http] http server running at http://localhost:5620
│ proc [kibana] log [21:32:29.089] [warning][config][deprecation] Starting in 8.0, the Kibana logging format will be changing. This may affect you if you are doing any special handling of your Kibana logs, such as ingesting logs into Elasticsearch for further analysis. If you are using the new logging configuration, you are already receiving logs in both old and new formats, and the old format will simply be going away. If you are not yet using the new logging configuration, the log format will change upon upgrade to 8.0. Beginning in 8.0, the format of JSON logs will be ECS-compatible JSON, and the default pattern log format will be configurable with our new logging system. Please refer to the documentation for more information about the new logging format.
│ proc [kibana] log [21:32:29.089] [warning][config][deprecation] The default mechanism for Reporting privileges will work differently in future versions, which will affect the behavior of this cluster. Set "xpack.reporting.roles.enabled" to "false" to adopt the future behavior before upgrading.
│ proc [kibana] log [21:32:29.090] [warning][config][deprecation] Setting "security.showInsecureClusterWarning" has been replaced by "xpack.security.showInsecureClusterWarning"
│ proc [kibana] log [21:32:29.090] [warning][config][deprecation] User sessions will automatically time out after 8 hours of inactivity starting in 8.0. Override this value to change the timeout.
│ proc [kibana] log [21:32:29.091] [warning][config][deprecation] Users are automatically required to log in again after 30 days starting in 8.0. Override this value to change the timeout.
│ proc [kibana] log [21:32:29.091] [warning][config][deprecation] Setting "xpack.siem.enabled" has been replaced by "xpack.securitySolution.enabled"
│ proc [kibana] log [21:32:29.237] [info][plugins-system][standard] Setting up [114] plugins: [newsfeedFixtures,translations,licensing,globalSearch,globalSearchProviders,features,licenseApiGuard,code,usageCollection,xpackLegacy,taskManager,telemetryCollectionManager,telemetryCollectionXpack,kibanaUsageCollection,share,embeddable,uiActionsEnhanced,screenshotMode,banners,telemetry,newsfeed,mapsEms,mapsLegacy,kibanaLegacy,fieldFormats,expressions,dataViews,charts,esUiShared,bfetch,data,savedObjects,presentationUtil,expressionShape,expressionRevealImage,expressionRepeatImage,expressionMetric,expressionImage,customIntegrations,home,searchprofiler,painlessLab,grokdebugger,management,watcher,licenseManagement,advancedSettings,spaces,security,savedObjectsTagging,reporting,canvas,lists,ingestPipelines,fileUpload,encryptedSavedObjects,dataEnhanced,cloud,snapshotRestore,eventLog,actions,alerting,triggersActionsUi,transform,stackAlerts,ruleRegistry,visualizations,visTypeXy,visTypeVislib,visTypeVega,visTypeTimelion,visTypeTagcloud,visTypeTable,visTypePie,visTypeMetric,visTypeMarkdown,tileMap,regionMap,expressionTagcloud,expressionMetricVis,console,graph,fleet,indexManagement,remoteClusters,crossClusterReplication,indexLifecycleManagement,dashboard,maps,dashboardMode,dashboardEnhanced,visualize,visTypeTimeseries,rollup,indexPatternFieldEditor,lens,cases,timelines,discover,osquery,observability,discoverEnhanced,dataVisualizer,ml,uptime,securitySolution,infra,upgradeAssistant,monitoring,logstash,enterpriseSearch,apm,savedObjectsManagement,indexPatternManagement]
│ proc [kibana] log [21:32:29.256] [info][plugins][taskManager] TaskManager is identified by the Kibana UUID: 5b2de169-2785-441b-ae8c-186a1936b17d
│ proc [kibana] log [21:32:29.376] [warning][config][plugins][security] Session cookies will be transmitted over insecure connections. This is not recommended.
│ proc [kibana] log [21:32:29.405] [warning][config][plugins][security] Session cookies will be transmitted over insecure connections. This is not recommended.
│ proc [kibana] log [21:32:29.421] [warning][config][plugins][reporting] Generating a random key for xpack.reporting.encryptionKey. To prevent sessions from being invalidated on restart, please set xpack.reporting.encryptionKey in the kibana.yml or use the bin/kibana-encryption-keys command.
│ proc [kibana] log [21:32:29.437] [info][encryptedSavedObjects][plugins] Hashed 'xpack.encryptedSavedObjects.encryptionKey' for this instance: nnkvE7kjGgidcjXzmLYBbIh4THhRWI1/7fUjAEaJWug=
│ proc [kibana] log [21:32:29.483] [info][plugins][ruleRegistry] Installing common resources shared between all indices
│ proc [kibana] log [21:32:29.963] [info][config][plugins][reporting] Chromium sandbox provides an additional layer of protection, and is supported for Linux Ubuntu 20.04 OS. Automatically enabling Chromium sandbox.
│ proc [kibana] log [21:32:30.226] [info][savedobjects-service] Waiting until all Elasticsearch nodes are compatible with Kibana before starting saved objects migrations...
│ proc [kibana] log [21:32:30.227] [info][savedobjects-service] Starting saved objects migrations
│ proc [kibana] log [21:32:30.291] [info][savedobjects-service] [.kibana_task_manager] INIT -> CREATE_NEW_TARGET. took: 19ms.
│ proc [kibana] log [21:32:30.298] [info][savedobjects-service] [.kibana] INIT -> CREATE_NEW_TARGET. took: 30ms.
│ info [o.e.c.m.MetadataCreateIndexService] [ftr] [.kibana_task_manager_7.17.23_001] creating index, cause [api], templates [], shards [1]/[1]
│ info [o.e.c.r.a.AllocationService] [ftr] updating number_of_replicas to [0] for indices [.kibana_task_manager_7.17.23_001]
│ info [o.e.c.m.MetadataCreateIndexService] [ftr] [.kibana_7.17.23_001] creating index, cause [api], templates [], shards [1]/[1]
│ info [o.e.c.r.a.AllocationService] [ftr] updating number_of_replicas to [0] for indices [.kibana_7.17.23_001]
│ info [o.e.c.r.a.AllocationService] [ftr] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.kibana_task_manager_7.17.23_001][0], [.kibana_7.17.23_001][0]]]).
│ proc [kibana] log [21:32:30.549] [info][savedobjects-service] [.kibana_task_manager] CREATE_NEW_TARGET -> MARK_VERSION_INDEX_READY. took: 258ms.
│ proc [kibana] log [21:32:30.552] [info][savedobjects-service] [.kibana] CREATE_NEW_TARGET -> MARK_VERSION_INDEX_READY. took: 254ms.
│ proc [kibana] log [21:32:30.672] [info][savedobjects-service] [.kibana_task_manager] MARK_VERSION_INDEX_READY -> DONE. took: 123ms.
│ proc [kibana] log [21:32:30.673] [info][savedobjects-service] [.kibana_task_manager] Migration completed after 401ms
│ proc [kibana] log [21:32:30.707] [info][savedobjects-service] [.kibana] MARK_VERSION_INDEX_READY -> DONE. took: 155ms.
│ proc [kibana] log [21:32:30.708] [info][savedobjects-service] [.kibana] Migration completed after 440ms
│ proc [kibana] log [21:32:30.716] [info][plugins-system][standard] Starting [114] plugins: [newsfeedFixtures,translations,licensing,globalSearch,globalSearchProviders,features,licenseApiGuard,code,usageCollection,xpackLegacy,taskManager,telemetryCollectionManager,telemetryCollectionXpack,kibanaUsageCollection,share,embeddable,uiActionsEnhanced,screenshotMode,banners,telemetry,newsfeed,mapsEms,mapsLegacy,kibanaLegacy,fieldFormats,expressions,dataViews,charts,esUiShared,bfetch,data,savedObjects,presentationUtil,expressionShape,expressionRevealImage,expressionRepeatImage,expressionMetric,expressionImage,customIntegrations,home,searchprofiler,painlessLab,grokdebugger,management,watcher,licenseManagement,advancedSettings,spaces,security,savedObjectsTagging,reporting,canvas,lists,ingestPipelines,fileUpload,encryptedSavedObjects,dataEnhanced,cloud,snapshotRestore,eventLog,actions,alerting,triggersActionsUi,transform,stackAlerts,ruleRegistry,visualizations,visTypeXy,visTypeVislib,visTypeVega,visTypeTimelion,visTypeTagcloud,visTypeTable,visTypePie,visTypeMetric,visTypeMarkdown,tileMap,regionMap,expressionTagcloud,expressionMetricVis,console,graph,fleet,indexManagement,remoteClusters,crossClusterReplication,indexLifecycleManagement,dashboard,maps,dashboardMode,dashboardEnhanced,visualize,visTypeTimeseries,rollup,indexPatternFieldEditor,lens,cases,timelines,discover,osquery,observability,discoverEnhanced,dataVisualizer,ml,uptime,securitySolution,infra,upgradeAssistant,monitoring,logstash,enterpriseSearch,apm,savedObjectsManagement,indexPatternManagement]
│ proc [kibana] log [21:32:31.829] [info][monitoring][monitoring][plugins] config sourced from: production cluster
│ proc [kibana] log [21:32:33.175] [info][server][Kibana][http] http server running at http://localhost:5620
│ proc [kibana] log [21:32:33.250] [info][status] Kibana is now degraded
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding component template [.alerts-ecs-mappings]
│ proc [kibana] log [21:32:33.485] [info][kibana-monitoring][monitoring][monitoring][plugins] Starting monitoring stats collection
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding component template [.alerts-technical-mappings]
│ info [o.e.c.m.MetadataCreateIndexService] [ftr] [.apm-custom-link] creating index, cause [api], templates [], shards [1]/[1]
│ info [o.e.c.r.a.AllocationService] [ftr] updating number_of_replicas to [0] for indices [.apm-custom-link]
│ info [o.e.c.m.MetadataCreateIndexService] [ftr] [.apm-agent-configuration] creating index, cause [api], templates [], shards [1]/[1]
│ info [o.e.c.r.a.AllocationService] [ftr] updating number_of_replicas to [0] for indices [.apm-agent-configuration]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding index template [.kibana_security_session_index_template_1] for index patterns [.kibana_security_session_1]
│ info [o.e.c.r.a.AllocationService] [ftr] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.apm-custom-link][0], [.apm-agent-configuration][0]]]).
│ info [o.e.c.m.MetadataCreateIndexService] [ftr] [.kibana_security_session_1] creating index, cause [api], templates [.kibana_security_session_index_template_1], shards [1]/[0]
│ info [o.e.c.r.a.AllocationService] [ftr] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.kibana_security_session_1][0]]]).
│ info [o.e.c.m.MetadataMappingService] [ftr] [.kibana_task_manager_7.17.23_001/aqpNLwqvRiCQZRuRTnep5Q] update_mapping [_doc]
│ info [o.e.c.m.MetadataMappingService] [ftr] [.kibana_7.17.23_001/kgSbqlpQR9Gyx_TAKzwMIA] update_mapping [_doc]
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [.alerts-ilm-policy]
│ proc [kibana] log [21:32:34.412] [info][plugins][ruleRegistry] Installed common resources shared between all indices
│ proc [kibana] log [21:32:34.413] [info][plugins][ruleRegistry] Installing resources for index .alerts-observability.uptime.alerts
│ proc [kibana] log [21:32:34.414] [info][plugins][ruleRegistry] Installing resources for index .alerts-observability.logs.alerts
│ proc [kibana] log [21:32:34.414] [info][plugins][ruleRegistry] Installing resources for index .alerts-observability.metrics.alerts
│ proc [kibana] log [21:32:34.415] [info][plugins][ruleRegistry] Installing resources for index .alerts-observability.apm.alerts
│ info [o.e.c.m.MetadataMappingService] [ftr] [.kibana_7.17.23_001/kgSbqlpQR9Gyx_TAKzwMIA] update_mapping [_doc]
│ info [o.e.c.m.MetadataMappingService] [ftr] [.kibana_7.17.23_001/kgSbqlpQR9Gyx_TAKzwMIA] update_mapping [_doc]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding component template [.alerts-observability.apm.alerts-mappings]
│ proc [kibana] log [21:32:34.804] [info][plugins][ruleRegistry] Installed resources for index .alerts-observability.apm.alerts
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding component template [.alerts-observability.uptime.alerts-mappings]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding component template [.alerts-observability.metrics.alerts-mappings]
│ proc [kibana] log [21:32:34.860] [info][plugins][ruleRegistry] Installed resources for index .alerts-observability.uptime.alerts
│ proc [kibana] log [21:32:34.909] [info][plugins][ruleRegistry] Installed resources for index .alerts-observability.metrics.alerts
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding component template [.alerts-observability.logs.alerts-mappings]
│ proc [kibana] log [21:32:34.965] [info][plugins][ruleRegistry] Installed resources for index .alerts-observability.logs.alerts
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [kibana-event-log-policy]
│ info [o.e.c.m.MetadataIndexTemplateService] [ftr] adding index template [.kibana-event-log-7.17.23-snapshot-template] for index patterns [.kibana-event-log-7.17.23-snapshot-*]
│ info [o.e.c.m.MetadataCreateIndexService] [ftr] [.kibana-event-log-7.17.23-snapshot-000001] creating index, cause [api], templates [.kibana-event-log-7.17.23-snapshot-template], shards [1]/[1]
│ info [o.e.c.r.a.AllocationService] [ftr] updating number_of_replicas to [0] for indices [.kibana-event-log-7.17.23-snapshot-000001]
│ info [o.e.c.r.a.AllocationService] [ftr] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.kibana-event-log-7.17.23-snapshot-000001][0]]]).
│ info [o.e.x.i.IndexLifecycleTransition] [ftr] moving index [.kibana-event-log-7.17.23-snapshot-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [kibana-event-log-policy]
│ proc [kibana] log [21:32:35.544] [info][chromium][plugins][reporting] Browser executable: /opt/local-ssd/buildkite/builds/bk-agent-prod-gcp-1721078118384721941/elastic/kibana-pull-request/kibana-build-xpack/x-pack/plugins/reporting/chromium/headless_shell-linux_x64/headless_shell
│ proc [kibana] log [21:32:35.564] [info][plugins][reporting][store] Creating ILM policy for managing reporting indices: kibana-reporting
│ info [o.e.x.i.a.TransportPutLifecycleAction] [ftr] adding index lifecycle policy [kibana-reporting]
│ info [o.e.x.i.IndexLifecycleTransition] [ftr] moving index [.kibana-event-log-7.17.23-snapshot-000001] from [{"phase":"new","action":"complete","name":"complete"}] to [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] in policy [kibana-event-log-policy]
│ info [o.e.x.i.IndexLifecycleTransition] [ftr] moving index [.kibana-event-log-7.17.23-snapshot-000001] from [{"phase":"hot","action":"unfollow","name":"branch-check-unfollow-prerequisites"}] to [{"phase":"hot","action":"rollover","name":"check-rollover-ready"}] in policy [kibana-event-log-policy]
│ proc [kibana] log [21:32:35.822] [info][plugins][securitySolution] Dependent plugin setup complete - Starting ManifestTask
│ proc [kibana] log [21:32:36.534] [info][0][1][endpoint:metadata-check-transforms-task:0][plugins][securitySolution] no endpoint metadata transforms found
│ info [o.e.c.m.MetadataCreateIndexService] [ftr] [.ds-ilm-history-5-2024.07.15-000001] creating index, cause [initialize_data_stream], templates [ilm-history], shards [1]/[0]
│ info [o.e.c.m.MetadataCreateDataStreamService] [ftr] adding data stream [ilm-history-5] with write index [.ds-ilm-history-5-2024.07.15-000001], backing indices [], and aliases []
│ info [o.e.c.r.a.AllocationService] [ftr] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.ds-ilm-history-5-2024.07.15-000001][0]]]).
│ info [o.e.x.i.IndexLifecycleTransition] [ftr] moving index [.ds-ilm-history-5-2024.07.15-000001] from [null] to [{"phase":"new","action":"complete","name":"complete"}] in policy [ilm-history-ilm-policy]
│ proc [kibana] log [21:32:42.267] [info][status] Kibana is now available (was degraded)
│ info Only running suites which are compatible with ES version 7.17.23
│ info Only running suites (and their sub-suites) if they include the tag(s): [ 'ciGroup21' ]
│ info Remote initialized: chrome-headless-shell 126.0.6478.126
│ info chromedriver version: 126.0.6478.126 (d36ace6122e0a59570e258d82441395206d60e1c-refs/branch-heads/6478@{#1591})
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] updated role [system_indices_superuser]
│ info [o.e.x.s.a.u.TransportPutUserAction] [ftr] updated user [system_indices_superuser]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [test_logstash_reader]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_canvas_all]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_discover_all]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_dashboard_read]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_discover_read]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_visualize_read]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_visualize_all]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_dashboard_all]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_maps_all]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_maps_read]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [geoshape_data_reader]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [antimeridian_points_reader]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [antimeridian_shapes_reader]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [meta_for_geoshape_data_reader]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [geoconnections_data_reader]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [test_logs_data_reader]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [geoall_data_writer]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_index_pattern_management_all]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_devtools_read]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_ccr_role]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_upgrade_assistant_role]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [manage_rollups_role]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [test_rollup_reader]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [test_api_keys]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [manage_security]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [ccr_user]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [manage_ilm]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [index_management_user]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [snapshot_restore_user]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [ingest_pipelines_user]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [license_management_user]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [logstash_read_user]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [remote_clusters_user]
│ info [o.e.x.s.a.r.TransportPutRoleAction] [ftr] added role [global_alerts_logs_all_else_read]
│ info [o.e.x.s.a.u.TransportPutUserAction] [ftr] added user [test_user]
│ info Only running suites which are compatible with ES version 7.17.23
│ info Only running suites (and their sub-suites) if they include the tag(s): [ 'ciGroup21' ]
│ info Starting tests
│ warn debug logs are being captured, only error logs will be written to the console
│
└-: apps
└-> "before all" hook: beforeTestSuite.trigger in "apps"
└-: transform basic license
└-> "before all" hook: beforeTestSuite.trigger in "transform basic license"
└-: transform
└-> "before all" hook: beforeTestSuite.trigger in "transform"
└-> "before all" hook in "transform"
└-: permissions
└-> "before all" hook: beforeTestSuite.trigger in "permissions"
└-: for user with full transform access
└-> "before all" hook: beforeTestSuite.trigger in "for user with full transform access"
└-: with no data loaded
└-> "before all" hook: beforeTestSuite.trigger for "should display elements in the Transform list page correctly"
└-> "before all" hook for "should display elements in the Transform list page correctly"
└-> should display elements in the Transform list page correctly
└-> "before each" hook: global before each for "should display elements in the Transform list page correctly"
└- ✓ pass (4.8s)
└-> "after all" hook for "should display elements in the Transform list page correctly"
└-> "after all" hook: afterTestSuite.trigger for "should display elements in the Transform list page correctly"
└-: with data loaded
└-> "before all" hook: beforeTestSuite.trigger for "should display elements in the Transform list page correctly"
└-> "before all" hook for "should display elements in the Transform list page correctly"
└-> should display elements in the Transform list page correctly
└-> "before each" hook: global before each for "should display elements in the Transform list page correctly"
└- ✓ pass (31.6s)
└-> should display controls in the edit flyout correctly
└-> "before each" hook: global before each for "should display controls in the edit flyout correctly"
└- ✓ pass (3.9s)
└-> "after all" hook for "should display controls in the edit flyout correctly"
└-> "after all" hook: afterTestSuite.trigger for "should display controls in the edit flyout correctly"
└-> "after all" hook: afterTestSuite.trigger in "for user with full transform access"
└-: for user with read only transform access
└-> "before all" hook: beforeTestSuite.trigger in "for user with read only transform access"
└-: with no data loaded
└-> "before all" hook: beforeTestSuite.trigger for "should display elements in the Transform list page correctly"
└-> "before all" hook for "should display elements in the Transform list page correctly"
└-> should display elements in the Transform list page correctly
└-> "before each" hook: global before each for "should display elements in the Transform list page correctly"
└- ✓ pass (2.4s)
└-> "after all" hook for "should display elements in the Transform list page correctly"
└-> "after all" hook: afterTestSuite.trigger for "should display elements in the Transform list page correctly"
└-: with data loaded
└-> "before all" hook: beforeTestSuite.trigger for "should display elements in the Transform list page correctly"
└-> "before all" hook for "should display elements in the Transform list page correctly"
└-> should display elements in the Transform list page correctly
└-> "before each" hook: global before each for "should display elements in the Transform list page correctly"
└- ✓ pass (6.5s)
└-> "after all" hook for "should display elements in the Transform list page correctly"
└-> "after all" hook: afterTestSuite.trigger for "should display elements in the Transform list page correctly"
└-> "after all" hook: afterTestSuite.trigger in "for user with read only transform access"
└-> "after all" hook: afterTestSuite.trigger in "permissions"
└-: creation_index_pattern
└-> "before all" hook: beforeTestSuite.trigger in "creation_index_pattern"
└-> "before all" hook in "creation_index_pattern"
└-: batch transform with terms+date_histogram groups and avg agg
└-> loads the wizard for the source data
└-> navigates through the wizard and sets all needed fields
└-> runs the transform and displays it correctly in the job list
└-> navigates to discover and displays results of the destination index
└-: batch transform with terms group and percentiles agg
└-> loads the wizard for the source data
└-> navigates through the wizard and sets all needed fields
└-> runs the transform and displays it correctly in the job list
└-> navigates to discover and displays results of the destination index
└-: batch transform with the latest function
└-> loads the wizard for the source data
└-> navigates through the wizard and sets all needed fields
└-> runs the transform and displays it correctly in the job list
└-> navigates to discover and displays results of the destination index
└-> "after all" hook in "creation_index_pattern"
└-> "after all" hook: afterTestSuite.trigger in "creation_index_pattern"
└-: creation_saved_search
└-> "before all" hook: beforeTestSuite.trigger in "creation_saved_search"
└-> "before all" hook in "creation_saved_search"
└-: batch transform with terms groups and avg agg with saved search filter
└-> "before all" hook: beforeTestSuite.trigger for "loads the wizard for the source data"
└-> loads the wizard for the source data
└-> "before each" hook: global before each for "loads the wizard for the source data"
└- ✓ pass (4.2s)
└-> navigates through the wizard and sets all needed fields
└-> "before each" hook: global before each for "navigates through the wizard and sets all needed fields"
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:35:08.732+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 938.0B\nGET /*?expand_wildcards=hidden%2Call&filter_path=*.aliases%2C*.settings.index.hidden%2C*.data_stream","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:35:08.757+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 513.0B\nGET /*/_ilm/explain","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:35:08.769+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 2.0B\nGET /_all/_rollup/data","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:35:08.772+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.security-7, .transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 23.0B\nGET /_all/_ccr/info","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
└- ✓ pass (20.0s)
└-> runs the transform and displays it correctly in the job list
└-> "before each" hook: global before each for "runs the transform and displays it correctly in the job list"
└- ✓ pass (7.9s)
└-> "after all" hook for "runs the transform and displays it correctly in the job list"
└-> "after all" hook: afterTestSuite.trigger for "runs the transform and displays it correctly in the job list"
└-: batch transform with unique term and sort by time with saved search filter
└-> "before all" hook: beforeTestSuite.trigger for "loads the wizard for the source data"
└-> loads the wizard for the source data
└-> "before each" hook: global before each for "loads the wizard for the source data"
└- ✓ pass (7.4s)
└-> navigates through the wizard and sets all needed fields
└-> "before each" hook: global before each for "navigates through the wizard and sets all needed fields"
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:35:41.482+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 1.1KB\nGET /*?expand_wildcards=hidden%2Call&filter_path=*.aliases%2C*.settings.index.hidden%2C*.data_stream","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:35:41.492+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 513.0B\nGET /*/_ilm/explain","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:35:41.498+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 2.0B\nGET /_all/_rollup/data","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:35:41.501+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.security-7, .transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 23.0B\nGET /_all/_ccr/info","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
└- ✓ pass (16.4s)
└-> runs the transform and displays it correctly in the job list
└-> "before each" hook: global before each for "runs the transform and displays it correctly in the job list"
└- ✓ pass (8.2s)
└-> "after all" hook for "runs the transform and displays it correctly in the job list"
└-> "after all" hook: afterTestSuite.trigger for "runs the transform and displays it correctly in the job list"
└-> "after all" hook in "creation_saved_search"
└-> "after all" hook: afterTestSuite.trigger in "creation_saved_search"
└-: creation with runtime mappings
└-> "before all" hook: beforeTestSuite.trigger in "creation with runtime mappings"
└-> "before all" hook in "creation with runtime mappings"
└-: batch transform with pivot configurations and runtime mappings
└-> "before all" hook: beforeTestSuite.trigger for "loads the wizard for the source data"
└-> loads the wizard for the source data
└-> "before each" hook: global before each for "loads the wizard for the source data"
└- ✓ pass (4.0s)
└-> navigates through the wizard and sets all needed fields
└-> "before each" hook: global before each for "navigates through the wizard and sets all needed fields"
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:36:40.842+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 938.0B\nGET /*?expand_wildcards=hidden%2Call&filter_path=*.aliases%2C*.settings.index.hidden%2C*.data_stream","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:36:40.852+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 513.0B\nGET /*/_ilm/explain","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:36:40.861+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 2.0B\nGET /_all/_rollup/data","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:36:40.863+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.security-7, .transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 23.0B\nGET /_all/_ccr/info","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
└- ✓ pass (31.3s)
└-> runs the transform and displays it correctly in Discover page
└-> "before each" hook: global before each for "runs the transform and displays it correctly in Discover page"
└- ✓ pass (6.9s)
└-> "after all" hook for "runs the transform and displays it correctly in Discover page"
└-> "after all" hook: afterTestSuite.trigger for "runs the transform and displays it correctly in Discover page"
└-: batch transform with unique rt_airline_lower and sort by time and runtime mappings
└-> "before all" hook: beforeTestSuite.trigger for "loads the wizard for the source data"
└-> loads the wizard for the source data
└-> "before each" hook: global before each for "loads the wizard for the source data"
└- ✓ pass (7.1s)
└-> navigates through the wizard and sets all needed fields
└-> "before each" hook: global before each for "navigates through the wizard and sets all needed fields"
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:37:12.423+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 1.1KB\nGET /*?expand_wildcards=hidden%2Call&filter_path=*.aliases%2C*.settings.index.hidden%2C*.data_stream","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:37:12.430+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 513.0B\nGET /*/_ilm/explain","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:37:12.434+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 2.0B\nGET /_all/_rollup/data","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:37:12.435+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.async-search, .security-7, .transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 23.0B\nGET /_all/_ccr/info","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
└- ✓ pass (17.2s)
└-> runs the transform and displays it correctly in Discover page
└-> "before each" hook: global before each for "runs the transform and displays it correctly in Discover page"
└- ✓ pass (13.9s)
└-> "after all" hook for "runs the transform and displays it correctly in Discover page"
└-> "after all" hook: afterTestSuite.trigger for "runs the transform and displays it correctly in Discover page"
└-> "after all" hook in "creation with runtime mappings"
└-> "after all" hook: afterTestSuite.trigger in "creation with runtime mappings"
└-: cloning
└-> "before all" hook: beforeTestSuite.trigger in "cloning"
└-> "before all" hook in "cloning"
└-: clone transform
└-> "before all" hook: beforeTestSuite.trigger for "opens the existing transform in the wizard"
└-> opens the existing transform in the wizard
└-> "before each" hook: global before each for "opens the existing transform in the wizard"
└- ✓ pass (10.7s)
└-> navigates through the wizard, checks and sets all needed fields
└-> "before each" hook: global before each for "navigates through the wizard, checks and sets all needed fields"
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:37:57.185+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 1.1KB\nGET /*?expand_wildcards=hidden%2Call&filter_path=*.aliases%2C*.settings.index.hidden%2C*.data_stream","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:37:57.196+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 669.0B\nGET /*/_ilm/explain","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:37:57.200+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 2.0B\nGET /_all/_rollup/data","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:37:57.204+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.async-search, .security-7, .transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 23.0B\nGET /_all/_ccr/info","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
└- ✓ pass (6.1s)
└-> runs the clone transform and displays it correctly in the job list
└-> "before each" hook: global before each for "runs the clone transform and displays it correctly in the job list"
└- ✓ pass (3.9s)
└-> "after all" hook for "runs the clone transform and displays it correctly in the job list"
└-> "after all" hook: afterTestSuite.trigger for "runs the clone transform and displays it correctly in the job list"
└-: clone transform with runtime mappings
└-> "before all" hook: beforeTestSuite.trigger for "opens the existing transform in the wizard"
└-> opens the existing transform in the wizard
└-> "before each" hook: global before each for "opens the existing transform in the wizard"
└- ✓ pass (11.0s)
└-> navigates through the wizard, checks and sets all needed fields
└-> "before each" hook: global before each for "navigates through the wizard, checks and sets all needed fields"
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:38:18.567+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 1.1KB\nGET /*?expand_wildcards=hidden%2Call&filter_path=*.aliases%2C*.settings.index.hidden%2C*.data_stream","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:38:18.574+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 669.0B\nGET /*/_ilm/explain","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:38:18.595+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 2.0B\nGET /_all/_rollup/data","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:38:18.598+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.async-search, .security-7, .transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 23.0B\nGET /_all/_ccr/info","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
└- ✓ pass (7.6s)
└-> runs the clone transform and displays it correctly in the job list
└-> "before each" hook: global before each for "runs the clone transform and displays it correctly in the job list"
└- ✓ pass (4.1s)
└-> "after all" hook for "runs the clone transform and displays it correctly in the job list"
└-> "after all" hook: afterTestSuite.trigger for "runs the clone transform and displays it correctly in the job list"
└-: clone transform with latest function
└-> "before all" hook: beforeTestSuite.trigger for "opens the existing transform in the wizard"
└-> opens the existing transform in the wizard
└-> "before each" hook: global before each for "opens the existing transform in the wizard"
└- ✓ pass (11.1s)
└-> navigates through the wizard, checks and sets all needed fields
└-> "before each" hook: global before each for "navigates through the wizard, checks and sets all needed fields"
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:38:41.185+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 1.1KB\nGET /*?expand_wildcards=hidden%2Call&filter_path=*.aliases%2C*.settings.index.hidden%2C*.data_stream","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:38:41.205+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 669.0B\nGET /*/_ilm/explain","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:38:41.210+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 2.0B\nGET /_all/_rollup/data","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
│ proc [kibana] {"ecs":{"version":"1.12.0"},"@timestamp":"2024-07-15T21:38:41.217+00:00","message":"Elasticsearch deprecation: 299 Elasticsearch-7.17.23-SNAPSHOT-a51806accae1ed68496f790ea39d741e4ac9e0fc \"this request accesses system indices: [.async-search, .security-7, .transform-internal-007], but in a future major version, direct access to system indices will be prevented by default\"\nOrigin:kibana\nQuery:\n200 - 23.0B\nGET /_all/_ccr/info","log":{"level":"DEBUG","logger":"elasticsearch.deprecation"},"process":{"pid":5163}}
└- ✓ pass (6.8s)
└-> runs the clone transform and displays it correctly in the job list
└-> "before each" hook: global before each for "runs the clone transform and displays it correctly in the job list"
└- ✓ pass (4.6s)
└-> "after all" hook for "runs the clone transform and displays it correctly in the job list"
└-> "after all" hook: afterTestSuite.trigger for "runs the clone transform and displays it correctly in the job list"
└-> "after all" hook in "cloning"
└-> "after all" hook: afterTestSuite.trigger in "cloning"
└-: editing
└-> "before all" hook: beforeTestSuite.trigger in "editing"
└-> "before all" hook in "editing"
└-: edit transform with pivot configuration
└-> "before all" hook: beforeTestSuite.trigger for "opens the edit flyout for an existing transform"
└-> opens the edit flyout for an existing transform
└-> "before each" hook: global before each for "opens the edit flyout for an existing transform"
└- ✓ pass (11.2s)
└-> navigates through the edit flyout and sets all needed fields
└-> "before each" hook: global before each for "navigates through the edit flyout and sets all needed fields"
└- ✓ pass (1.4s)
└-> updates the transform and displays it correctly in the job list
└-> "before each" hook: global before each for "updates the transform and displays it correctly in the job list"
└- ✓ pass (5.0s)
└-> "after all" hook: afterTestSuite.trigger for "updates the transform and displays it correctly in the job list"
└-: edit transform with latest configuration
└-> "before all" hook: beforeTestSuite.trigger for "opens the edit flyout for an existing transform"
└-> opens the edit flyout for an existing transform
└-> "before each" hook: global before each for "opens the edit flyout for an existing transform"
└- ✓ pass (10.7s)
└-> navigates through the edit flyout and sets all needed fields
└-> "before each" hook: global before each for "navigates through the edit flyout and sets all needed fields"
└- ✓ pass (1.3s)
└-> updates the transform and displays it correctly in the job list
└-> "before each" hook: global before each for "updates the transform and displays it correctly in the job list"
└- ✓ pass (4.9s)
└-> "after all" hook: afterTestSuite.trigger for "updates the transform and displays it correctly in the job list"
└-> "after all" hook in "editing"
└-> "after all" hook: afterTestSuite.trigger in "editing"
└-: feature controls
└-> "before all" hook: beforeTestSuite.trigger in "feature controls"
└-: security
└-> "before all" hook: beforeTestSuite.trigger in "security"
└-> "before all" hook in "security"
└-: global all privileges (aka kibana_admin)
└-> "before all" hook: beforeTestSuite.trigger for "should show the Stack Management nav link"
└-> "before all" hook for "should show the Stack Management nav link"
└-> should show the Stack Management nav link
└-> "before each" hook: global before each for "should show the Stack Management nav link"
└- ✓ pass (5.3s)
└-> should not render the "Stack" section
└-> "before each" hook: global before each for "should not render the "Stack" section"
└- ✓ pass (2.4s)
└-> "after all" hook for "should not render the "Stack" section"
└-> "after all" hook: afterTestSuite.trigger for "should not render the "Stack" section"
└-: global dashboard read with transform_user
└-> "before all" hook: beforeTestSuite.trigger for "should show the Stack Management nav link"
└-> "before all" hook for "should show the Stack Management nav link"
└-> should show the Stack Management nav link
└-> "before each" hook: global before each for "should show the Stack Management nav link"
└- ✓ pass (5.2s)
└-> should render the "Data" section with Transform
└-> "before each" hook: global before each for "should render the "Data" section with Transform"
└- ✓ pass (2.5s)
└-> "after all" hook for "should render the "Data" section with Transform"
└-> "after all" hook: afterTestSuite.trigger for "should render the "Data" section with Transform"
└-> "after all" hook in "security"
└-> "after all" hook: afterTestSuite.trigger in "security"
└-> "after all" hook: afterTestSuite.trigger in "feature controls"
└-: deleting
└-> "before all" hook: beforeTestSuite.trigger in "deleting"
└-> "before all" hook in "deleting"
└-: batch transform with pivot configuration
└-> "before all" hook: beforeTestSuite.trigger for "delete transform"
└-> delete transform
└-> "before each" hook: global before each for "delete transform"
└- ✓ pass (14.2s)
└-> "after all" hook: afterTestSuite.trigger for "delete transform"
└-: continuous transform with pivot configuration
└-> "before all" hook: beforeTestSuite.trigger for "delete transform"
└-> delete transform
└-> "before each" hook: global before each for "delete transform"
└- ✓ pass (21.5s)
└-> "after all" hook: afterTestSuite.trigger for "delete transform"
└-: batch transform with latest configuration
└-> "before all" hook: beforeTestSuite.trigger for "delete transform"
└-> delete transform
└-> "before each" hook: global before each for "delete transform"
└- ✓ pass (11.0s)
└-> "after all" hook: afterTestSuite.trigger for "delete transform"
└-> "after all" hook in "deleting"
└-> "after all" hook: afterTestSuite.trigger in "deleting"
└-: starting
└-> "before all" hook: beforeTestSuite.trigger in "starting"
└-> "before all" hook in "starting"
└-: batch transform with pivot configuration
└-> "before all" hook: beforeTestSuite.trigger for "start transform"
└-> start transform
└-> "before each" hook: global before each for "start transform"
└- ✓ pass (12.3s)
└-> "after all" hook: afterTestSuite.trigger for "start transform"
└-: continuous transform with pivot configuration
└-> "before all" hook: beforeTestSuite.trigger for "start transform"
└-> start transform
└-> "before each" hook: global before each for "start transform"
└- ✓ pass (12.2s)
└-> "after all" hook: afterTestSuite.trigger for "start transform"
└-: batch transform with latest configuration
└-> "before all" hook: beforeTestSuite.trigger for "start transform"
└-> start transform
└-> "before each" hook: global before each for "start transform"
└- ✓ pass (12.4s)
└-> "after all" hook: afterTestSuite.trigger for "start transform"
└-: continuous transform with latest configuration
└-> "before all" hook: beforeTestSuite.trigger for "start transform"
└-> start transform
└-> "before each" hook: global before each for "start transform"
└- ✓ pass (12.5s)
└-> "after all" hook: afterTestSuite.trigger for "start transform"
└-> "after all" hook in "starting"
└-> "after all" hook: afterTestSuite.trigger in "starting"
└-> "after all" hook in "transform"
└-> "after all" hook: afterTestSuite.trigger in "transform"
└-> "after all" hook: afterTestSuite.trigger in "transform basic license"
└-> "after all" hook: afterTestSuite.trigger in "apps"
│
│43 passing (9.0m)
│12 pending
│
│ warn browser[SEVERE] ERROR FETCHING BROWSR LOGS: ECONNREFUSED connect ECONNREFUSED 127.0.0.1:46319
│ proc [kibana] log [21:42:15.786] [info][plugins-system][standard] Stopping all plugins.
│ proc [kibana] log [21:42:15.788] [info][kibana-monitoring][monitoring][monitoring][plugins] Monitoring stats collection is stopped
│ info [kibana] exited with null after 599.7 seconds
│ info [es] stopping node ftr
│ info [o.e.x.m.p.NativeController] [ftr] Native controller process has stopped - no new native processes can be started
│ info [o.e.n.Node] [ftr] stopping ...
│ info [o.e.x.w.WatcherService] [ftr] stopping watch service, reason [shutdown initiated]
│ info [o.e.x.w.WatcherLifeCycleService] [ftr] watcher has stopped and shutdown
│ info [o.e.n.Node] [ftr] stopped
│ info [o.e.n.Node] [ftr] closing ...
│ info [o.e.n.Node] [ftr] closed
│ info [es] stopped
│ info [es] no debug files found, assuming es did not write any
│ info [es] cleanup complete
Loading