-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Cloud Security] Render Setup Technology Selector based on deployment mode #194347
[Cloud Security] Render Setup Technology Selector based on deployment mode #194347
Conversation
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security) |
Pinging @elastic/fleet (Team:Fleet) |
💔 Build Failed
Failed CI Steps
Test Failures
Metrics [docs]Async chunks
Unknown metric groupsESLint disabled line counts
Total ESLint disabled count
History
To update your PR or re-run it, just comment with: cc @seanrathier |
1b7ae28
to
37f5619
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚀 Looks good! Thanks for catching this!
/ci |
21871f3
to
0fe3408
Compare
💚 Build Succeeded
Metrics [docs]Async chunks
Unknown metric groupsESLint disabled line counts
Total ESLint disabled count
History
cc @seanrathier |
Starting backport for target branches: 8.x https://github.com/elastic/kibana/actions/runs/11255360120 |
… mode (elastic#194347) (cherry picked from commit 2609a53)
💚 All backports created successfully
Note: Successful backport PRs will be merged automatically after passing CI. Questions ?Please refer to the Backport tool documentation |
…oyment mode (#194347) (#195591) # Backport This will backport the following commits from `main` to `8.x`: - [[Cloud Security] Render Setup Technology Selector based on deployment mode (#194347)](#194347) <!--- Backport version: 9.4.3 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) <!--BACKPORT [{"author":{"name":"seanrathier","email":"[email protected]"},"sourceCommit":{"committedDate":"2024-10-09T12:52:03Z","message":"[Cloud Security] Render Setup Technology Selector based on deployment mode (#194347)","sha":"2609a533fa950b9e7974d704fa0c3f9986816dbe","branchLabelMapping":{"^v9.0.0$":"main","^v8.16.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:Fleet","v9.0.0","Team:Cloud Security","backport:prev-minor","ci:cloud-deploy","8.16 candidate"],"title":"[Cloud Security] Render Setup Technology Selector based on deployment mode","number":194347,"url":"https://github.com/elastic/kibana/pull/194347","mergeCommit":{"message":"[Cloud Security] Render Setup Technology Selector based on deployment mode (#194347)","sha":"2609a533fa950b9e7974d704fa0c3f9986816dbe"}},"sourceBranch":"main","suggestedTargetBranches":[],"targetPullRequestStates":[{"branch":"main","label":"v9.0.0","branchLabelMappingKey":"^v9.0.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/194347","number":194347,"mergeCommit":{"message":"[Cloud Security] Render Setup Technology Selector based on deployment mode (#194347)","sha":"2609a533fa950b9e7974d704fa0c3f9986816dbe"}}]}] BACKPORT--> Co-authored-by: seanrathier <[email protected]>
Summary
This change migrates the CSPM agentless setup to use the deployment_mode setting in the CSPM integration.
It also fixes
I discovered an issue with how we are converting to use the
deployment_modes
, currently Fleet checks if ANY integration has thedeployment_mode agentless
set to determine if agentless is available. However, we have KSPM and CNVM which is not agentless.Issue created here to determine the best solution for all agentless integrations here
Related PRs
Checklist