-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Detection Engine] Update Prebuilt Security Rules Fleet Package Version Reference v8.4.2 #149164
[Detection Engine] Update Prebuilt Security Rules Fleet Package Version Reference v8.4.2 #149164
Conversation
Buildkite Job is failing for Security Solution test #3. It is unclear to me at the moment what the issue could be but it appears to originate from E2E cypress test for timelines regarding L109 of Error Timelines Creates a timeline by clicking untitled timeline from bottom bar can be added notes
Failures in tracked branches: 0
Buildkite Job
https://buildkite.com/elastic/kibana-pull-request/builds/101232#0185c6bf-5eb0-4d2a-aa7a-e59801067c88
AssertionError: Timed out retrying after 150000ms: expected '<span.euiBadge.CountBadge-sc-14igzi1-1.inyvbd.css-6ivbe3-euiBadge>' to have text '2', but the text was '1'
at Context.eval (webpack:///./tasks/timeline.ts:170:48) |
Hey @terrancedejesus, thanks for the ping, I'll take a look at the failing tests. Preliminary, the failure looks more like a flakiness. I'll double-check that. Also, there were a lot of changes previously with regard to the package distribution and testing on the Kibana side, so that all could be pretty confusing 😅 I think we should do a better job of communicating all the changes and how they should work in conjunction. Hence, I wanted to clarify some things bout the release process and how it should look from the Kibana standpoint. fleet_packages.json
For example, the next stack version, Prebuilt rules testing with Kibana@spong did a great job describing the testing process with Kibana in this PR. The new documentation hasn't been released yet, but once it is, it will be available here (it's a matter of days, I believe). He also created an example PR with the changes needed to test a prerelease package with Kibana. Release process checklistSo to summarize the above, the release process could look like the following: For OOB updates:
For release updates
@terrancedejesus, What would be the best way to incorporate those steps into your release process to ensure that our teams are on the same page regarding the rules testing/Kibana PRs? We could contribute to your documentation, or you could describe the steps yourself, and we will review them after that. What would be a preferable option for you? |
@Mikaayenson Garrett is trying to figure out what options are available and if we'd have to implement support for that. Since this might take some time and effort, I'd suggest we stick to opening PRs for the time being. |
I asked the @elastic/security-engineering-productivity team some time ago about that, and that was not possible. But we could open an enhancement request, I guess. |
That makes sense. Thanks for looking into it for the future. |
@elasticmachine merge upstream |
@xcrzx thanks for doing so. I really appreciate your willingness to help our team with some of these issues that we are not yet familiar with. It is a great deal of help! I re-ran the test just to see if it would pass again, considering your comment on it being flaky.
Thank you for adding clarification. I will admit the process has been a little confusing so far as we attempt to update our TRaDE documentation for the release process as well as note where enhancements can be made. As a side note, I will need to take more initiative on learning more about Fleet and Kibana's security solution as well as testing so I can communicate better about potential concerns or enhancements.
Thank you for clarifying all of this. The timing is important to note for our documentation to ensure the fleet packages reference aligns with the build candidates. I also noticed per this PR that it is being auto-updated as well and merged into main which doesn't seem to be an issue as long as we reference the production package prior to final BC and release?
Right, I remember reading some of this as your team was working on it but may need to revisit it with some more questions for curiosity or learning as I do not understand the full spectrum of how we test the security solution in Kibana or at least what our CI jobs test specifically. Thank you @spong and team for the excellent work!
Is there concern for prerelease packages to exist in EPR with the right prefix that forces us to remove them? Concerning customers potentially installing prerelease packages and then those packages being removed, we may have rule version conflicts? Aside from this, our process updates are being documented here until we finalize them and then publish them on our TRaDE wiki. It is a living document so feel free to add comments, questions, thoughts and anything else your team would like. You will notice that the OOB process you stated is pretty similar to what we had in mind after the required changes for package storage v2 and the Kibana FS rule removal. We have an existing TRaDE issue that we are using to track the release process updates and which @spong added some comments already. Aside from our live document, any additional PRs, issues and so fourth we are trying to track there. Glad we are on similar pages!
This is what TRaDE had in mind so we are glad our steps are similar for now. Prior to the 8.7 release, we wanted to figure out what changes were necessary to our release process. As a result, OOB updates with packages v8.3.4 and v8.4.2 were great starting points that allowed us to run through our process, identify what change is necessary and update our documentation. We would greatly appreciate any additional insight, potential enhancements, etc. in our working document. Once finalized we will publish it to our TRaDE wiki. Our goal is to make releases faster so we can eventually do either weekly or bi-weekly releases and it be a relatively short and effortless process. I think we have the tools to do so, just need some better insight and creativity 😄 |
All CI testing has passed for this prerelease package as detailed in #149158. We can release the v8.4.2 production package to EPR and update the fleet packages file accordingly. |
This is a good point. So on similar PRs, we should update fleet packages reference and adjust the Cypress test xpack value for the security solution to ensure they pass? |
We should always set the package version explicitly in the |
@elasticmachine merge upstream |
💛 Build succeeded, but was flaky
Failed CI StepsTest Failures
Metrics [docs]
History
To update your PR or re-run it, just comment with: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There's a PR created by automation, btw: https://github.com/elastic/kibana/pull/149245/files.
Closing this issue and tracking the changes in #149245 as a Fleet Code Owner has already approved. Thanks everyone for the additional commentary! |
Pull request was closed
Summary
Updates Fleet packages reference for prebuilt security rules to v8.4.2 from https://github.com/elastic/detection-rules/releases/tag/integration-v8.4.2
Per prebuilt security rules release process, for the latest package a prerelease package will be published to EPR. Following this, a PR is opened to Kibana to point the fleet packages reference to the prerelease for CI testing. Once successful, a production publication of the package is pushed to EPR and the existing Kibana PR is updated with the production package for CI tests to run again.
Checklist