-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Fleet] Remove fleetServerEnabled feature flag and use fleet system indices #92422
[Fleet] Remove fleetServerEnabled feature flag and use fleet system indices #92422
Conversation
ca50600
to
1845afa
Compare
1845afa
to
3c28588
Compare
7fbec05
to
35b583d
Compare
35b583d
to
f89b0db
Compare
Pinging @elastic/fleet (Team:Fleet) |
…-server-indices-by-default
I added release note breaking tag, but actually I am not sure. Looks like the Kibana API routes will remain in place during this PR, are there actually any breaking changes here? Will Kibana API routes be removed during this release too? |
@jen-huang thanks for adding the label, that PR will not remove the API routes, I would create a follow up PR that remove APIs as soon we are in sync with other teams that use Fleet, I will make sure to add the release note here. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚀 for the collector change, thanks!
…-server-indices-by-default
@mtojek @EricDavisX I do not think agents saved object are directly used in tests or in elastic-package so we should be good right? |
elastic-package: |
Sorry I should have precised Fleet saved object like agents, enrolment api keys. |
The e2e-testing scenarios do use the API to enroll / install agents and manipulate / apply policy, I suppose that would be impacted? I regret we don't have e2e-testing embedded into Kibana CI yet. But any manual testing done should cover the same usage right? should we use Observability 'deploy my pr' and test on this a bit to be sure? |
As a result of this PR: elastic/kibana#92422
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @nchaulet for making the changes in endpoint - those in this PR look good.
There are, however, several others that need to be done. Here is what I found:
- search for
fleet-
(the prefix to all saved object types): you will find several KQL filters (kuery=
) that need to have the SO type removed from it. - search for
_SAVED_OBJECT_TYPE
(the suffix of the const's that hold saved object type names): you will see several other areas that use those and thus also need to be adjusted
I found these in both security solution as well as in the functional test folders.
Speaking about agents, I think the deepest level the elastic-package is interacting is FleetAPI :) For reference: https://github.com/elastic/elastic-package/blob/master/internal/kibana/agents.go#L100 BTW I really appreciate the heads up, thanks! |
@paul-tavares I just did a pass to remove the |
…-server-indices-by-default
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry for the delay @nchaulet . Looks good. Thanks for making the changes in Endpoint
@elasticmachine merge upstream |
@elasticmachine merge upstream |
💚 Build SucceededMetrics [docs]Async chunks
Page load bundle
History
To update your PR or re-run it, just comment with: cc @nchaulet |
…ndices (#92422) (#93923) Co-authored-by: Kibana Machine <[email protected]>
Summary
Resolve #92422
In 7.13 we are going to make Fleet Server the default way to use Elastic Agent, in preparation of this, that PR:
fleetServerEnabled
flagThis PR should not break anything as the kibana agents endpoint are still here (I will remove this endpoints in a following PR, after syncing with folks from endpoint and elastic package to ensure we do not break anything)
What to test?
You should be able to enroll agent throught Kibana as usual.
You should be able to enroll agent through Fleet server using the default Policy server see (TODO add link to fleet server readme)