Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Cloud Security] add agentless ux creation flow #189932

Merged

Conversation

Omolola-Akinleye
Copy link
Contributor

@Omolola-Akinleye Omolola-Akinleye commented Aug 5, 2024

Summary

This PR add UX updates to agentless creation flow which include the following:

  • Disabling Agent-based popups when newly created policy is Agentless
  • Adding Cloud Credentials Instructions
  • Minor UX adjustments such as adding Readme doc link on AWS credentials form and spacing between Azure Credentials form.
image
Screen.Recording.2024-08-05.at.7.08.16.PM.mov

@Omolola-Akinleye Omolola-Akinleye self-assigned this Aug 5, 2024
@Omolola-Akinleye Omolola-Akinleye marked this pull request as ready for review August 5, 2024 21:26
@Omolola-Akinleye Omolola-Akinleye requested review from a team as code owners August 5, 2024 21:26
@botelastic botelastic bot added the Team:Fleet Team label for Observability Data Collection Fleet team label Aug 5, 2024
@elasticmachine
Copy link
Contributor

Pinging @elastic/fleet (Team:Fleet)

@Omolola-Akinleye Omolola-Akinleye added release_note:feature Makes this part of the condensed release notes Team: Cloud Security and removed Team:Fleet Team label for Observability Data Collection Fleet team labels Aug 5, 2024
@Omolola-Akinleye Omolola-Akinleye marked this pull request as draft August 5, 2024 21:55
@Omolola-Akinleye Omolola-Akinleye linked an issue Aug 5, 2024 that may be closed by this pull request
1 task
@Omolola-Akinleye Omolola-Akinleye added the ci:cloud-deploy Create or update a Cloud deployment label Aug 5, 2024
@Omolola-Akinleye Omolola-Akinleye marked this pull request as ready for review August 6, 2024 17:06
@botelastic botelastic bot added the Team:Fleet Team label for Observability Data Collection Fleet team label Aug 6, 2024
@Omolola-Akinleye Omolola-Akinleye added the ci:project-deploy-security Create a Security Serverless Project label Aug 6, 2024
Copy link
Member

@nchaulet nchaulet left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fleet changes LGTM 🚀

Copy link
Contributor

@seanrathier seanrathier left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice work! I like the separation of the agentless and agent-based components. One curiosity question.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

At first, I was concerned with us having a form for agent-based and another for agentless, but I can see there are enough changes that having 1 component would make it significantly more complex.
👍

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes this makes the separation of concerns more simple.

@@ -378,31 +378,18 @@ export function useOnSubmit({

const hasGoogleCloudShell = data?.item ? getCloudShellUrlFromPackagePolicy(data.item) : false;

if (hasFleetAddAgentsPrivileges) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Wow! This is great. I'm really curious why we don't need this anymore.

Copy link
Contributor Author

@Omolola-Akinleye Omolola-Akinleye Aug 8, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you! That's a good callout. @opauloh I saw in the git history you add the conditions for showing the template prompts. I removed the pop-up condition logic because I believe we are repeating the same logic below. SUBMITTED is used to set status which indicates package policy has been successfully saved or the agent count exists. wdyt? Am I missing anything? cc: @seanrathier

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think your updated logic below to check for hasFleetAddAgentsPrivileges has covered this piece of logic @Omolola-Akinleye, nice catch

@@ -378,31 +378,18 @@ export function useOnSubmit({

const hasGoogleCloudShell = data?.item ? getCloudShellUrlFromPackagePolicy(data.item) : false;

if (hasFleetAddAgentsPrivileges) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think your updated logic below to check for hasFleetAddAgentsPrivileges has covered this piece of logic @Omolola-Akinleye, nice catch

@Omolola-Akinleye
Copy link
Contributor Author

@elasticmachine merge upstream

@kibana-ci
Copy link
Collaborator

kibana-ci commented Aug 12, 2024

💛 Build succeeded, but was flaky

Failed CI Steps

Test Failures

  • [job] [logs] FTR Configs #44 / Rules Management - Prebuilt Rules - Update Prebuilt Rules Package @ess @serverless @skipInServerlessMKI update_prebuilt_rules_package should allow user to install prebuilt rules from scratch, then install new rules and upgrade existing rules from the new package

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
cloudSecurityPosture 469.8KB 477.4KB +7.6KB
fleet 1.8MB 1.8MB -235.0B
total +7.3KB

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

cc @Omolola-Akinleye

@Omolola-Akinleye Omolola-Akinleye enabled auto-merge (squash) August 12, 2024 20:47
@Omolola-Akinleye Omolola-Akinleye merged commit a23f63d into elastic:main Aug 12, 2024
26 checks passed
@kibanamachine kibanamachine added the backport:skip This commit does not require backporting label Aug 12, 2024
bryce-b pushed a commit to bryce-b/kibana that referenced this pull request Aug 13, 2024
## Summary
This PR add UX updates to agentless creation flow which include the
following:
 * Disabling Agent-based popups when newly created policy is Agentless
 * Adding Cloud Credentials Instructions 
* Minor UX adjustments such as adding Readme doc link on AWS credentials
form and spacing between Azure Credentials form.
 
<img width="985" alt="image"
src="https://github.com/user-attachments/assets/47b8dcaa-b63d-478d-b12e-ab6ba1d075eb">


https://github.com/user-attachments/assets/48d3a49e-043d-48f6-ac0c-8e131d47e976

---------

Co-authored-by: Elastic Machine <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:skip This commit does not require backporting ci:cloud-deploy Create or update a Cloud deployment ci:project-deploy-security Create a Security Serverless Project release_note:feature Makes this part of the condensed release notes Team:Fleet Team label for Observability Data Collection Fleet team v8.16.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[Cloud Security] Update copy for Agentless Setup Access instructions
7 participants