-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Cloud Security] Sending the Agentless API the deployment_mode information #196955
[Cloud Security] Sending the Agentless API the deployment_mode information #196955
Conversation
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security) |
💔 Build Failed
Failed CI StepsTest Failures
Metrics [docs]Async chunks
Historycc @seanrathier |
...ections/agent_policy/create_package_policy_page/single_page_layout/hooks/setup_technology.ts
Outdated
Show resolved
Hide resolved
Pinging @elastic/fleet (Team:Fleet) |
fa19751
to
0671ae8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Starting backport for target branches: 8.x https://github.com/elastic/kibana/actions/runs/11500154313 |
…ation (elastic#196955) (cherry picked from commit 1820eaf)
💚 All backports created successfully
Note: Successful backport PRs will be merged automatically after passing CI. Questions ?Please refer to the Backport tool documentation |
…information (#196955) (#197638) # Backport This will backport the following commits from `main` to `8.x`: - [[Cloud Security] Sending the Agentless API the deployment_mode information (#196955)](#196955) <!--- Backport version: 9.4.3 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) <!--BACKPORT [{"author":{"name":"seanrathier","email":"[email protected]"},"sourceCommit":{"committedDate":"2024-10-24T13:18:45Z","message":"[Cloud Security] Sending the Agentless API the deployment_mode information (#196955)","sha":"1820eafcdfc35d2a7e506d3960029e5abc7e34d7","branchLabelMapping":{"^v9.0.0$":"main","^v8.17.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:Fleet","v9.0.0","Team:Cloud Security","backport:prev-minor","8.17 candidate"],"title":"[Cloud Security] Sending the Agentless API the deployment_mode information","number":196955,"url":"https://github.com/elastic/kibana/pull/196955","mergeCommit":{"message":"[Cloud Security] Sending the Agentless API the deployment_mode information (#196955)","sha":"1820eafcdfc35d2a7e506d3960029e5abc7e34d7"}},"sourceBranch":"main","suggestedTargetBranches":[],"targetPullRequestStates":[{"branch":"main","label":"v9.0.0","branchLabelMappingKey":"^v9.0.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/196955","number":196955,"mergeCommit":{"message":"[Cloud Security] Sending the Agentless API the deployment_mode information (#196955)","sha":"1820eafcdfc35d2a7e506d3960029e5abc7e34d7"}}]}] BACKPORT--> Co-authored-by: seanrathier <[email protected]>
Summary
When the deployment_modes agentless is available and the user selects the Agentless installation, we send the Agentless API the integration's deployment_modes values for organization, division, and team attributes.
The business rules allow for a single integration policy template to have agentless mode while the other is not agentless, therefore the integration UI needs to send the selected policy name to the
setup_technology
hook'shandleSetupTechnologyChange
We are using the
NewAgentPolicy
types global_data_tags to hold the organization, division, and team name and theAgentlessAgentService.createAgent
function reads the tags and passes them to the Agentless API by sending the data in the body of the request under thelabel
attributeChecklist
Delete any items that are not applicable to this PR.