Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Cloud Posture] Ensure package policy namespace is always set to default #152168

Merged
merged 2 commits into from
Feb 27, 2023

Conversation

orouz
Copy link
Contributor

@orouz orouz commented Feb 26, 2023

Summary

once #151886 is merged, changes to agent policy will update the package policy id and also the namespace. in our case, we only support the default namespace (IIRC - to prevent confusion with k8s namespaces)

so this PR adds an effect to ensure the namespace is always set to default

Copy link
Contributor

@JordanSh JordanSh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

there are a bunch of mentions of 'default', would be better to have one shared constant for that value

@orouz orouz force-pushed the csp_fleet_namespace branch from 7e2b1e0 to f6a462d Compare February 27, 2023 04:06
@kibana-ci
Copy link
Collaborator

💚 Build Succeeded

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
cloudSecurityPosture 147.0KB 147.3KB +256.0B
Unknown metric groups

ESLint disabled line counts

id before after diff
securitySolution 428 430 +2

Total ESLint disabled count

id before after diff
securitySolution 506 508 +2

History

  • 💔 Build #110516 failed 7e2b1e0c23a9e3315cc471f7840435de2196c5b9
  • 💔 Build #110513 failed 2630a43ffa8b275b2d73d0f7961dca21f1973fb2

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@orouz orouz marked this pull request as ready for review February 27, 2023 05:24
@orouz orouz requested a review from a team as a code owner February 27, 2023 05:24
@orouz orouz added release_note:skip Skip the PR/issue when compiling release notes Team:Cloud Security Cloud Security team related v8.7.0 labels Feb 27, 2023
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security)

@orouz orouz merged commit 5d3d75f into elastic:main Feb 27, 2023
@kibanamachine
Copy link
Contributor

💔 All backports failed

Status Branch Result
8.7 Backport failed because of merge conflicts

Manual backport

To create the backport manually run:

node scripts/backport --pr 152168

Questions ?

Please refer to the Backport tool documentation

@orouz
Copy link
Contributor Author

orouz commented Feb 27, 2023

💚 All backports created successfully

Status Branch Result
8.7

Note: Successful backport PRs will be merged automatically after passing CI.

Questions ?

Please refer to the Backport tool documentation

orouz added a commit to orouz/kibana that referenced this pull request Feb 27, 2023
orouz added a commit that referenced this pull request Feb 27, 2023
…o default (#152168) (#152175)

# Backport

This will backport the following commits from `main` to `8.7`:
- [[Cloud Posture] Ensure package policy namespace is always set to
default (#152168)](#152168)

<!--- Backport version: 8.9.7 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sqren/backport)

<!--BACKPORT [{"author":{"name":"Or
Ouziel","email":"or.ouziel@elastic.co"},"sourceCommit":{"committedDate":"2023-02-27T05:26:14Z","message":"[Cloud
Posture] Ensure package policy namespace is always set to default
(#152168)","sha":"5d3d75fe83aa662d3b7d1acad282ab7a55fbce06","branchLabelMapping":{"^v8.8.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:Cloud
Security","v8.7.0","v8.8.0"],"number":152168,"url":"https://github.com/elastic/kibana/pull/152168","mergeCommit":{"message":"[Cloud
Posture] Ensure package policy namespace is always set to default
(#152168)","sha":"5d3d75fe83aa662d3b7d1acad282ab7a55fbce06"}},"sourceBranch":"main","suggestedTargetBranches":["8.7"],"targetPullRequestStates":[{"branch":"8.7","label":"v8.7.0","labelRegex":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v8.8.0","labelRegex":"^v8.8.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/152168","number":152168,"mergeCommit":{"message":"[Cloud
Posture] Ensure package policy namespace is always set to default
(#152168)","sha":"5d3d75fe83aa662d3b7d1acad282ab7a55fbce06"}}]}]
BACKPORT-->

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
bmorelli25 pushed a commit to bmorelli25/kibana that referenced this pull request Mar 10, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
release_note:skip Skip the PR/issue when compiling release notes Team:Cloud Security Cloud Security team related v8.7.0 v8.8.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants