-
Notifications
You must be signed in to change notification settings - Fork 154
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add integration test for install via RPM on SLES #4461
Conversation
This pull request does not have a backport label. Could you fix it @leehinman? 🙏
NOTE: |
8f61642
to
3e87ee3
Compare
Quality Gate passedKudos, no new issues were introduced! 0 New issues |
Pinging @elastic/elastic-agent (Team:Elastic-Agent) |
@@ -125,7 +125,75 @@ func TestDebLogIngestFleetManaged(t *testing.T) { | |||
// name. This policy does not contain any integration. | |||
t.Log("Enrolling agent in Fleet with a test policy") | |||
createPolicyReq := kibana.AgentPolicy{ | |||
Name: fmt.Sprintf("test-policy-enroll-%d", time.Now().Unix()), | |||
Name: fmt.Sprintf("test-policy-enroll-%s", uuid.New().String()), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
Related to #4421
I guess this test was not there when I fixed it 🙂
What does this PR do?
Adds Integration test that uses SLES 15 AMD to test fleet managed elastic-agent installed via RPM.
Only AMD was added because at the moment ogc doesn't support SLES ARM on GCP. Also looked at implementing #4301 (comment) This was skipped because adding a slice of strings (for supported package formats) to the OS struct broke comparison of OS structs. I think this is still worth doing, just in a separate PR because it is likely to change a fair number of things.
Why is it important?
Need to test our RPM builds
Checklist
./changelog/fragments
using the changelog toolAuthor's Checklist
How to test this PR locally
Related issues
Use cases
Screenshots
Logs
Questions to ask yourself