-
Notifications
You must be signed in to change notification settings - Fork 42
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consolidate AWS wrong credentials with other beats #388
Comments
Alternative option - report bad health status due to the bad configuration. |
This task is 8.5 candidate. We should probably create another task, 8.6 candidate, about what you suggest @eyalkraft |
I like this alignment- it will make it easy for SAs and support to begin debugging. Thanks for driving this @olegsu Longer term, we'll align with what Eyal is pointing to. We want to propagate these various error states up to the UI in order to drive some action(s) from the user that will (hopefully) resolve these states. Here is a generic example in figma for the endpoint security integration of how this could be done. I will work with our designers on how I think this will look for us. relevant epics worth reading through to see how teams are dealing with these errors more holistically: 8.4 epic: https://github.com/elastic/security-team/issues/3494 |
@jeniawhite raised another point to consider - what happens if the creds are not valid anymore mid-cycle |
Motivation
When Cloudbeat is running on the EKS cluster and the AWS credentials are wrong it will log a message and stay in idle mode.
The log
When looking at other beats we see that Cloudbeat is not behaving the same way. For example
Definition of done
Related tasks/epics
Checklist
Please follow the following checklist at the beginning of your work, please comment with a suggested high-level solution. It should include:
Before closing this ticket
The text was updated successfully, but these errors were encountered: