Skip to content
This repository has been archived by the owner on Sep 17, 2024. It is now read-only.

feat: support passing KIBANA_VERSION #905

Merged
merged 26 commits into from
Apr 12, 2021

Conversation

mdelapenya
Copy link
Contributor

@mdelapenya mdelapenya commented Mar 16, 2021

What does this PR do?

This PR adds a way to instrument the test framework to consume a different Docker image for Kibana: instead of using the STACK_VERSION variable, Kibana container version will be managed by KIBANA_VERSION. If it's not set, then the Docker image related to a Kibana PR will be used. This image is stored under the observability-ci Docker namespace.

We are also adding a pipeline that is listening for a webhook on the Kibana repo, and when the comment /run-fleet-e2e-tests is added to a PR by an Elastician, then the new pipeline will be triggered building and pushing the Docker image for that PR, and finally using that image in the e2e tests. This new pipeline will allow running it manually, passing the PR ID as an input parameter.

Why is it important?

It will support the ability of running the tests against Kibana PRs (specially for Fleet), using the Dockerised version of Kibana for the PR.

Checklist

  • My code follows the style guidelines of this project
  • I have commented my code, particularly in hard-to-understand areas
  • I have made corresponding changes to the documentation
  • I have made corresponding change to the default configuration files
  • I have added tests that prove my fix is effective or that my feature works
  • I have run the Unit tests for the CLI, and they are passing locally
  • I have run the End-2-End tests for the suite I'm working on, and they are passing locally
  • I have noticed new Go dependencies (run make notice in the proper directory)

Author's Checklist

  • [ ]

How to test this PR locally

Running a PR version of Kibana, i.e. pr94204, that we already know it was pushed to the registry:

SUITE="fleet" TAGS="fleet_mode_agent && centos && enroll" TIMEOUT_FACTOR=3 LOG_LEVEL=TRACE KIBANA_VERSION=pr94204 BEATS_USE_CI_SNAPSHOTS=true DEVELOPER_MODE=true make -C e2e functional-test

Please pay attention to the BEATS_USE_CI_SNAPSHOTS=true variable.

Running default version of Kibana, i.e. 8.0.0-SNAPSHOT:

SUITE="fleet" TAGS="fleet_mode_agent && centos && enroll" TIMEOUT_FACTOR=3 LOG_LEVEL=TRACE DEVELOPER_MODE=true make -C e2e functional-test

Related issues

Follow-ups

We'd need to add a Jenkins pipeline listening for Kibana PRs, with the proposed synchronous workflow (@EricDavisX @ph, please confirm):

  1. a PR is sent to Kibana
    a. the author comments with /run-fleet-e2e-tests, or
    b. the modified paths affect Fleet code
  2. the Kibana Docker image for that PR is built by the existing feature of Deploy my Kibana, without deploying it to the test cluster
  3. The e2e tests in this repo are triggered, using KIBANA_VERSION=prXYZ
  4. After the tests run, a commit status is added with the test results.

@mdelapenya mdelapenya self-assigned this Mar 16, 2021
@mdelapenya mdelapenya requested review from a team and EricDavisX March 16, 2021 17:15
@elasticmachine
Copy link
Contributor

elasticmachine commented Mar 16, 2021

💔 Tests Failed

the below badges are clickable and redirect to their specific view in the CI or DOCS
Pipeline View Test View Changes Artifacts preview

Expand to view the summary

Build stats

  • Build Cause: Pull request #905 updated

  • Start Time: 2021-04-12T09:20:09.946+0000

  • Duration: 27 min 48 sec

  • Commit: 7e6af36

Test stats 🧪

Test Results
Failed 1
Passed 140
Skipped 0
Total 141

Trends 🧪

Image of Build Times

Image of Tests

Test errors 1

Expand to view the tests failures

Initializing / End-To-End Tests / ubuntu-18.04_fleet_agent_endpoint_integration / Deploying an Endpoint makes policies to appear in the Security App – Agent Endpoint Integration
    Expand to view the error details

     Step the policy response will be shown in the Security App: The policy response is not listed as 'success' in the Administration view in the Security App yet 
    

  • no stacktrace

Steps errors 1

Expand to view the steps failures

Run functional tests for fleet:agent_endpoint_integration && ~@nightly && ~debian
  • Took 21 min 33 sec . View more details on here
  • Description: .ci/scripts/functional-test.sh "fleet" "agent_endpoint_integration && ~@nightly && ~debian" "8.0.0-SNAPSHOT" "8.0.0-SNAPSHOT"

Log output

Expand to view the last 100 lines of log output

[2021-04-12T09:46:25.238Z] time="2021-04-12T09:46:24Z" level=debug msg="Agent listed in Fleet with online status" agentID=3e6e08c0-ae31-4ff6-9bfa-083caf50daf6 hostname=bf252d5cbbbd
[2021-04-12T09:46:25.239Z] time="2021-04-12T09:46:24Z" level=info msg="The Agent is in the desired status" elapsedTime=12.69574443s hostname=bf252d5cbbbd isAgentInStatus=true retries=6 status=online
[2021-04-12T09:46:25.239Z] time="2021-04-12T09:46:24Z" level=debug msg="Integration in latest version found" name=endpoint title="Endpoint Security" version=0.18.0
[2021-04-12T09:46:28.543Z] {"level":"debug","time":"2021-04-12T09:46:28Z","message":"sent request with 0 transactions, 0 spans, 0 errors, 1 metricset"}
[2021-04-12T09:46:28.543Z] time="2021-04-12T09:46:28Z" level=info msg="Integration added to the configuration" integration=endpoint integrationConfigurationID=3bf6bcfe-60ca-47ea-a860-2142edc773da policyID=729577e0-9b71-11eb-8dfc-fd1e3e776d9f version=0.18.0
[2021-04-12T09:46:28.543Z] time="2021-04-12T09:46:28Z" level=debug msg="Package policy found in the configuration" package="{3bf6bcfe-60ca-47ea-a860-2142edc773da endpoint Endpoint Security 0.18.0 0xc000439d50}" policyID=729577e0-9b71-11eb-8dfc-fd1e3e776d9f
[2021-04-12T09:46:31.852Z] time="2021-04-12T09:46:31Z" level=info msg="Integration deleted from the configuration" integration=endpoint packageConfigId=3bf6bcfe-60ca-47ea-a860-2142edc773da policyID=729577e0-9b71-11eb-8dfc-fd1e3e776d9f version=0.18.0
[2021-04-12T09:46:31.852Z] time="2021-04-12T09:46:31Z" level=debug msg="Agent listed in Fleet with online status" agentID=3e6e08c0-ae31-4ff6-9bfa-083caf50daf6 hostname=bf252d5cbbbd
[2021-04-12T09:46:31.852Z] time="2021-04-12T09:46:31Z" level=info msg="The Agent is in the desired status" elapsedTime=73.780025ms hostname=bf252d5cbbbd isAgentInStatus=true retries=1 status=online
[2021-04-12T09:46:31.852Z] time="2021-04-12T09:46:31Z" level=info msg="The Agent is not listed in the Administration view in the Security App" elapsedTime=41.469608ms hostname=bf252d5cbbbd retries=1
[2021-04-12T09:46:32.425Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:13.088Z","log.origin":{"file.name":"warn/warn.go","file.line":18},"message":"The Elastic Agent is currently in BETA and should not be used in production","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:13.088Z","log.origin":{"file.name":"application/application.go","file.line":68},"message":"Detecting execution mode","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:13.089Z","log.origin":{"file.name":"application/application.go","file.line":93},"message":"Agent is managed by Fleet","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:13.089Z","log.origin":{"file.name":"capabilities/capabilities.go","file.line":59},"message":"capabilities file not found in /opt/Elastic/Agent/capabilities.yml","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:13.258Z","log.logger":"composable","log.origin":{"file.name":"composable/controller.go","file.line":46},"message":"EXPERIMENTAL - Inputs with variables are currently experimental and should not be used in production","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:13.361Z","log.logger":"composable.providers.docker","log.origin":{"file.name":"docker/docker.go","file.line":43},"message":"Docker provider skipped, unable to connect: Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running?","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:13.362Z","log.logger":"api","log.origin":{"file.name":"api/server.go","file.line":62},"message":"Starting stats endpoint","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:13.362Z","log.origin":{"file.name":"application/managed_mode.go","file.line":289},"message":"Agent is starting","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:13.362Z","log.logger":"api","log.origin":{"file.name":"api/server.go","file.line":64},"message":"Metrics endpoint listening on: /opt/Elastic/Agent/data/tmp/elastic-agent.sock (configured: unix:///opt/Elastic/Agent/data/tmp/elastic-agent.sock)","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"warn","@timestamp":"2021-04-12T09:46:13.463Z","log.origin":{"file.name":"application/managed_mode.go","file.line":302},"message":"failed to ack update open /opt/Elastic/Agent/data/.update-marker: no such file or directory","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:15.028Z","log.origin":{"file.name":"stateresolver/stateresolver.go","file.line":48},"message":"New State ID is IUSzA7x7","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:15.028Z","log.origin":{"file.name":"stateresolver/stateresolver.go","file.line":49},"message":"Converging state requires execution of 3 step(s)","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:15.028Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"metricbeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/metricbeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:15.028Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"metricbeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/metricbeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:17.977Z","log.origin":{"file.name":"log/reporter.go","file.line":40},"message":"2021-04-12T09:46:17Z: type: 'STATE': sub_type: 'STARTING' message: Application: metricbeat--8.0.0-SNAPSHOT[3e6e08c0-ae31-4ff6-9bfa-083caf50daf6]: State changed to STARTING: Starting","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:17.979Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"filebeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/filebeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:17.979Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"filebeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/filebeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.426Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:19.130Z","log.origin":{"file.name":"log/reporter.go","file.line":40},"message":"2021-04-12T09:46:19Z: type: 'STATE': sub_type: 'RUNNING' message: Application: metricbeat--8.0.0-SNAPSHOT[3e6e08c0-ae31-4ff6-9bfa-083caf50daf6]: State changed to RUNNING: Running","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:22.825Z","log.origin":{"file.name":"log/reporter.go","file.line":40},"message":"2021-04-12T09:46:22Z: type: 'STATE': sub_type: 'STARTING' message: Application: filebeat--8.0.0-SNAPSHOT[3e6e08c0-ae31-4ff6-9bfa-083caf50daf6]: State changed to STARTING: Starting","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:22.828Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"filebeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/filebeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:22.828Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"filebeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/filebeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:23.039Z","log.origin":{"file.name":"operation/operator.go","file.line":259},"message":"operation 'operation-install' skipped for filebeat.8.0.0-SNAPSHOT","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:23.295Z","log.origin":{"file.name":"log/reporter.go","file.line":40},"message":"2021-04-12T09:46:23Z: type: 'STATE': sub_type: 'STARTING' message: Application: filebeat--8.0.0-SNAPSHOT--36643631373035623733363936343635[3e6e08c0-ae31-4ff6-9bfa-083caf50daf6]: State changed to STARTING: Starting","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:23.297Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"metricbeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/metricbeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:23.297Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"metricbeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/metricbeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:23.505Z","log.origin":{"file.name":"operation/operator.go","file.line":259},"message":"operation 'operation-install' skipped for metricbeat.8.0.0-SNAPSHOT","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:23.675Z","log.origin":{"file.name":"log/reporter.go","file.line":40},"message":"2021-04-12T09:46:23Z: type: 'STATE': sub_type: 'STARTING' message: Application: metricbeat--8.0.0-SNAPSHOT--36643631373035623733363936343635[3e6e08c0-ae31-4ff6-9bfa-083caf50daf6]: State changed to STARTING: Starting","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:23.676Z","log.origin":{"file.name":"stateresolver/stateresolver.go","file.line":66},"message":"Updating internal state","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:23.965Z","log.origin":{"file.name":"log/reporter.go","file.line":40},"message":"2021-04-12T09:46:23Z: type: 'STATE': sub_type: 'RUNNING' message: Application: filebeat--8.0.0-SNAPSHOT[3e6e08c0-ae31-4ff6-9bfa-083caf50daf6]: State changed to RUNNING: Running","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:24.406Z","log.origin":{"file.name":"log/reporter.go","file.line":40},"message":"2021-04-12T09:46:24Z: type: 'STATE': sub_type: 'RUNNING' message: Application: filebeat--8.0.0-SNAPSHOT--36643631373035623733363936343635[3e6e08c0-ae31-4ff6-9bfa-083caf50daf6]: State changed to RUNNING: Running","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:24.832Z","log.origin":{"file.name":"log/reporter.go","file.line":40},"message":"2021-04-12T09:46:24Z: type: 'STATE': sub_type: 'RUNNING' message: Application: metricbeat--8.0.0-SNAPSHOT--36643631373035623733363936343635[3e6e08c0-ae31-4ff6-9bfa-083caf50daf6]: State changed to RUNNING: Running","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:31.457Z","log.origin":{"file.name":"stateresolver/stateresolver.go","file.line":48},"message":"New State ID is DqlwQnQE","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:31.457Z","log.origin":{"file.name":"stateresolver/stateresolver.go","file.line":49},"message":"Converging state requires execution of 2 step(s)","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.427Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:31.458Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"metricbeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/metricbeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.428Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:31.458Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"metricbeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/metricbeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.428Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:31.682Z","log.origin":{"file.name":"operation/operator.go","file.line":259},"message":"operation 'operation-install' skipped for metricbeat.8.0.0-SNAPSHOT","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.428Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:31.682Z","log.origin":{"file.name":"operation/operator.go","file.line":259},"message":"operation 'operation-start' skipped for metricbeat.8.0.0-SNAPSHOT","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.428Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:31.683Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"filebeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/filebeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.428Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:31.683Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"filebeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/filebeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.428Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:31.847Z","log.origin":{"file.name":"operation/operator.go","file.line":259},"message":"operation 'operation-install' skipped for filebeat.8.0.0-SNAPSHOT","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.428Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:31.847Z","log.origin":{"file.name":"operation/operator.go","file.line":259},"message":"operation 'operation-start' skipped for filebeat.8.0.0-SNAPSHOT","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.428Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:31.848Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"metricbeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/metricbeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.428Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:31.848Z","log.origin":{"file.name":"operation/operation_fetch.go","file.line":61},"message":"metricbeat.8.0.0-SNAPSHOT already exists in /opt/Elastic/Agent/data/elastic-agent-7b729d/downloads/metricbeat-8.0.0-SNAPSHOT-linux-x86_64.tar.gz. Skipping operation operation-fetch","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.428Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:32.078Z","log.origin":{"file.name":"operation/operator.go","file.line":259},"message":"operation 'operation-install' skipped for metricbeat.8.0.0-SNAPSHOT","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.428Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:32.078Z","log.origin":{"file.name":"operation/operator.go","file.line":259},"message":"operation 'operation-start' skipped for metricbeat.8.0.0-SNAPSHOT","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.428Z] {"log.level":"info","@timestamp":"2021-04-12T09:46:32.079Z","log.origin":{"file.name":"stateresolver/stateresolver.go","file.line":66},"message":"Updating internal state","ecs.version":"1.6.0"}
[2021-04-12T09:46:32.690Z] time="2021-04-12T09:46:32Z" level=debug msg="Docker compose executed." cmd="[exec -T centos-systemd cat /opt/Elastic/Agent/data/elastic-agent-7b729d/logs//elastic-agent-json.log]" composeFilePaths="[/var/lib/jenkins/workspace/PR-905-16-74db6860-6be4-46f0-955f-d911d36ac4f5/.op/compose/profiles/fleet/docker-compose.yml /var/lib/jenkins/workspace/PR-905-16-74db6860-6be4-46f0-955f-d911d36ac4f5/.op/compose/services/centos-systemd/docker-compose.yml]" env="map[centos_systemdAgentBinarySrcPath:/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz278206623 centos_systemdAgentBinaryTargetPath:/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz centos_systemdContainerName:fleet_centos-systemd_elastic-agent_1 centos_systemdTag:latest kibanaDockerNamespace:observability-ci kibanaVersion:8.0.0-SNAPSHOT stackVersion:8.0.0-SNAPSHOT]" profile=fleet
[2021-04-12T09:46:34.606Z] Elastic Agent has been uninstalled.
[2021-04-12T09:46:34.606Z] time="2021-04-12T09:46:34Z" level=debug msg="Docker compose executed." cmd="[exec -T centos-systemd elastic-agent uninstall -f]" composeFilePaths="[/var/lib/jenkins/workspace/PR-905-16-74db6860-6be4-46f0-955f-d911d36ac4f5/.op/compose/profiles/fleet/docker-compose.yml /var/lib/jenkins/workspace/PR-905-16-74db6860-6be4-46f0-955f-d911d36ac4f5/.op/compose/services/centos-systemd/docker-compose.yml]" env="map[centos_systemdAgentBinarySrcPath:/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz278206623 centos_systemdAgentBinaryTargetPath:/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz centos_systemdContainerName:fleet_centos-systemd_elastic-agent_1 centos_systemdTag:latest kibanaDockerNamespace:observability-ci kibanaVersion:8.0.0-SNAPSHOT stackVersion:8.0.0-SNAPSHOT]" profile=fleet
[2021-04-12T09:46:34.607Z] time="2021-04-12T09:46:34Z" level=debug msg="Un-enrolling agent in Fleet" agentID=3e6e08c0-ae31-4ff6-9bfa-083caf50daf6 hostname=bf252d5cbbbd
[2021-04-12T09:46:36.524Z] time="2021-04-12T09:46:36Z" level=debug msg="Fleet agent was unenrolled" agentID=3e6e08c0-ae31-4ff6-9bfa-083caf50daf6
[2021-04-12T09:46:36.786Z] Stopping fleet_centos-systemd_elastic-agent_1 ... 
[2021-04-12T09:46:49.054Z] 
Stopping fleet_centos-systemd_elastic-agent_1 ... done
Removing fleet_centos-systemd_elastic-agent_1 ... 
[2021-04-12T09:46:49.054Z] 
Removing fleet_centos-systemd_elastic-agent_1 ... done
Going to remove fleet_centos-systemd_elastic-agent_1
[2021-04-12T09:46:49.054Z] time="2021-04-12T09:46:47Z" level=debug msg="Docker compose executed." cmd="[rm -fvs centos-systemd]" composeFilePaths="[/var/lib/jenkins/workspace/PR-905-16-74db6860-6be4-46f0-955f-d911d36ac4f5/.op/compose/profiles/fleet/docker-compose.yml /var/lib/jenkins/workspace/PR-905-16-74db6860-6be4-46f0-955f-d911d36ac4f5/.op/compose/services/centos-systemd/docker-compose.yml]" env="map[centos_systemdAgentBinarySrcPath:/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz278206623 centos_systemdAgentBinaryTargetPath:/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz centos_systemdContainerName:fleet_centos-systemd_elastic-agent_1 centos_systemdTag:latest kibanaDockerNamespace:observability-ci kibanaVersion:8.0.0-SNAPSHOT stackVersion:8.0.0-SNAPSHOT]" profile=fleet
[2021-04-12T09:46:49.054Z] time="2021-04-12T09:46:47Z" level=debug msg="Service removed from compose" profile=fleet service=centos-systemd
[2021-04-12T09:46:49.054Z] {"level":"debug","time":"2021-04-12T09:46:48Z","message":"gathering metrics"}
[2021-04-12T09:46:49.316Z] time="2021-04-12T09:46:49Z" level=debug msg="The token was deleted" tokenID=b7436cbf-6e7f-4899-8805-e56848f17088
[2021-04-12T09:46:49.316Z] time="2021-04-12T09:46:49Z" level=info msg="Integration deleted from the configuration" integration=endpoint packageConfigId=3bf6bcfe-60ca-47ea-a860-2142edc773da policyID=729577e0-9b71-11eb-8dfc-fd1e3e776d9f version=0.18.0
[2021-04-12T09:46:49.316Z] time="2021-04-12T09:46:49Z" level=debug msg="Destroying Fleet runtime dependencies"
[2021-04-12T09:46:49.888Z] Stopping fleet_kibana_1           ... 
[2021-04-12T09:46:49.888Z] Stopping fleet_elasticsearch_1    ... 
[2021-04-12T09:46:49.888Z] Stopping fleet_package-registry_1 ... 
[2021-04-12T09:46:51.693Z] 
Stopping fleet_kibana_1           ... done

Stopping fleet_package-registry_1 ... done

Stopping fleet_elasticsearch_1    ... done
Removing fleet_kibana_1           ... 
[2021-04-12T09:46:51.694Z] Removing fleet_elasticsearch_1    ... 
[2021-04-12T09:46:51.694Z] Removing fleet_package-registry_1 ... 
[2021-04-12T09:46:51.955Z] 
Removing fleet_package-registry_1 ... done

Removing fleet_kibana_1           ... done

Removing fleet_elasticsearch_1    ... done
Removing network fleet_default
[2021-04-12T09:46:52.216Z] time="2021-04-12T09:46:52Z" level=debug msg="Docker compose executed." cmd="[down --remove-orphans]" composeFilePaths="[/var/lib/jenkins/workspace/PR-905-16-74db6860-6be4-46f0-955f-d911d36ac4f5/.op/compose/profiles/fleet/docker-compose.yml]" env="map[centos_systemdAgentBinarySrcPath:/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz278206623 centos_systemdAgentBinaryTargetPath:/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz centos_systemdContainerName:fleet_centos-systemd_elastic-agent_1 centos_systemdTag:latest kibanaDockerNamespace:observability-ci kibanaVersion:8.0.0-SNAPSHOT stackVersion:8.0.0-SNAPSHOT]" profile=fleet
[2021-04-12T09:46:52.216Z] time="2021-04-12T09:46:52Z" level=debug msg="Elastic Agent binary was removed." installer=centos-tar-8.0.0-SNAPSHOT path=/tmp/elastic-agent-8.0.0-SNAPSHOT-linux-x86_64.tar.gz278206623
[2021-04-12T09:46:52.216Z] Makefile:73: recipe for target 'functional-test' failed
[2021-04-12T09:46:52.216Z] make: *** [functional-test] Error 1
[2021-04-12T09:46:52.322Z] [INFO] Stopping Filebeat Docker container
[2021-04-12T09:46:52.612Z] + docker exec -t 90374138ce7ee81cf0b824af2a6108c495babf4b2a94f21bf115695e6bddd8d2 chmod -R ugo+rw /output
[2021-04-12T09:46:52.872Z] + docker stop --time 30 90374138ce7ee81cf0b824af2a6108c495babf4b2a94f21bf115695e6bddd8d2
[2021-04-12T09:46:53.443Z] 90374138ce7ee81cf0b824af2a6108c495babf4b2a94f21bf115695e6bddd8d2
[2021-04-12T09:46:53.462Z] Archiving artifacts
[2021-04-12T09:46:54.183Z] Recording test results
[2021-04-12T09:46:54.676Z] [Checks API] No suitable checks publisher found.
[2021-04-12T09:46:54.699Z] Archiving artifacts
[2021-04-12T09:46:54.770Z] Running in /var/lib/jenkins/workspace/PR-905-16-74db6860-6be4-46f0-955f-d911d36ac4f5/src/github.com/elastic/e2e-testing
[2021-04-12T09:46:55.134Z] + go clean -modcache
[2021-04-12T09:46:55.869Z] Failed in branch ubuntu-18.04_fleet_agent_endpoint_integration
[2021-04-12T09:46:56.998Z] Stage "Release" skipped due to earlier failure(s)
[2021-04-12T09:46:57.374Z] Running on Jenkins in /var/lib/jenkins/workspace/e2e-tests_e2e-testing-mbp_PR-905
[2021-04-12T09:46:57.423Z] [INFO] getVaultSecret: Getting secrets
[2021-04-12T09:46:57.521Z] Masking supported pattern matches of $VAULT_ADDR or $VAULT_ROLE_ID or $VAULT_SECRET_ID
[2021-04-12T09:46:58.178Z] + chmod 755 generate-build-data.sh
[2021-04-12T09:46:58.178Z] + ./generate-build-data.sh https://beats-ci.elastic.co/blue/rest/organizations/jenkins/pipelines/e2e-tests/e2e-testing-mbp/PR-905/ https://beats-ci.elastic.co/blue/rest/organizations/jenkins/pipelines/e2e-tests/e2e-testing-mbp/PR-905/runs/16 FAILURE 1607969
[2021-04-12T09:46:58.428Z] INFO: curl https://beats-ci.elastic.co/blue/rest/organizations/jenkins/pipelines/e2e-tests/e2e-testing-mbp/PR-905/runs/16/steps/?limit=10000 -o steps-info.json
[2021-04-12T09:46:59.339Z] INFO: curl https://beats-ci.elastic.co/blue/rest/organizations/jenkins/pipelines/e2e-tests/e2e-testing-mbp/PR-905/runs/16/tests/?status=FAILED -o tests-errors.json

🐛 Flaky test report

❕ There are test failures but not known flaky tests.

Expand to view the summary

Test stats 🧪

Test Results
Failed 1
Passed 140
Skipped 0
Total 141

Genuine test errors 1

💔 There are test failures but not known flaky tests, most likely a genuine test failure.

  • Name: Initializing / End-To-End Tests / ubuntu-18.04_fleet_agent_endpoint_integration / Deploying an Endpoint makes policies to appear in the Security App – Agent Endpoint Integration

Copy link
Contributor

@EricDavisX EricDavisX left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

With a brief review, it LGTM;

@EricDavisX
Copy link
Contributor

Hi also, with regards to:
1a. the author comments with /run-fleet-e2e-tests...

I wanted to acknowledge it would be helpful to have an explicit, and easily edited list of the e2e 'suites' that are included when we make the test run. Is that implied or otherwise easily done? I didn't see (maybe reading too fast) where in the current changes that we could control the list. For instance, do we want it to run the separate Helm chart or other Beats tests? Maybe. Maybe not, it would be good to make it explicit.

@mdelapenya
Copy link
Contributor Author

mdelapenya commented Mar 16, 2021

Hi also, with regards to:
1a. the author comments with /run-fleet-e2e-tests...

I wanted to acknowledge it would be helpful to have an explicit, and easily edited list of the e2e 'suites' that are included when we make the test run. Is that implied or otherwise easily done? I didn't see (maybe reading too fast) where in the current changes that we could control the list. For instance, do we want it to run the separate Helm chart or other Beats tests? Maybe. Maybe not, it would be good to make it explicit.

This PR is adding the support, not changing the existing behavior, as KIBANA_VERSION would be the same as the stack.

The second part will be a jenkins pipeline listening for kibana events on PRs, as the comment I suggested. This is not yet in place.

About the different tests suites, the new pipeline will/should trigger the fleet tests, only. Exactly the same as the nightly build does.

It uses the generic-webhook-trigger to get Kibana PRs payloads, and with
that information trigger the e2e tests build.
.ci/e2eKibana.groovy Outdated Show resolved Hide resolved
.ci/e2eKibana.groovy Outdated Show resolved Hide resolved
printPostContent: false,
silentResponse: true,
regexpFilterText: '$GT_REPO$GT_BODY',
regexpFilterExpression: '^elastic/kibana/run-fleet-e2e-tests$'
Copy link
Contributor Author

@mdelapenya mdelapenya Mar 30, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The command to run the tests in Kibana would be /run-fleet-e2e-tests

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@EricDavisX this pipeline represents the way to interact with Kibana PRs. Will document it, but:

  • In a kibana PR, add a comment with /run-fleet-e2e-tests. Only for elasticians
  • Using the UI: trigger the pipeline using as the only parameter the GIT SHA of the kibana PR. (We still have to capture the version of kibana for that commit SHA)

)
}
parameters {
string(name: 'kibana_sha', defaultValue: "", description: "Commit to be used to run the Fleet E2E Tests. (e.g 1234567890abcdef)")
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Support running the tests from the UI

string(name: 'runTestsSuites', value: suite),
string(name: 'GITHUB_CHECK_NAME', value: env.GITHUB_CHECK_E2E_TESTS_NAME),
string(name: 'GITHUB_CHECK_REPO', value: env.REPO),
string(name: 'GITHUB_CHECK_SHA1', value: getCommit()),
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

.ci/e2eKibana.groovy Outdated Show resolved Hide resolved
)
}
parameters {
string(name: 'kibana_pr', defaultValue: "master", description: "PR ID to use to build the Docker image. (e.g 10000)")
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We are simplifying the manual trigger: simply use the PR ID, without PR/

}

// we are going to use the 'pr12345' tag
return "pr${params.kibana_pr}"
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The Docker tag generated by the kibanaDockerBuild step builds and pushes the pr12345 tag

return "pr${params.kibana_pr}"
}

def hasCommentAuthorWritePermissions(prId, commentId){
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mdelapenya mdelapenya marked this pull request as ready for review March 30, 2021 18:01
* master:
  Remove the agent config file parameters for stand alone (elastic#983)
  Uniquify the stand-alone step for checking agent status (elastic#993)
@mdelapenya
Copy link
Contributor Author

I'm gonna merge this one, so that we can start using the new pipeline and detecting possible errors the soonest

@mdelapenya mdelapenya merged commit 7abccaf into elastic:master Apr 12, 2021
@mdelapenya mdelapenya deleted the 901-support-kibana-prs branch April 12, 2021 15:00
mergify bot pushed a commit that referenced this pull request Apr 13, 2021
* chore: support returning different fallback Docker namespaces

* chore: add KIBANA_VERSION variable

* docs: document new Kibana variable

* chore(ci): add regular to pipeline for Kibana PRs

It uses the generic-webhook-trigger to get Kibana PRs payloads, and with
that information trigger the e2e tests build.

* chore: only process kibana events

* chore: add PR author to the cause string

* chore: print PR sha in cause string

* chore: update Generic Trigger to match existing example

* chore: support manually running the tests for a PR

* chore: do not notify on slack on build greens

* fix: rename JJB as it's not a multibranch pipeline

* feat: build kibana image based on the PR or the UI params

* chore: simplify triggering the pipeline from the UI

* chore: simplify even more

* chore: use stackVersion if kibana version is not set

* docs: update docs about KIBANA_VERSION

* chore: rename variable

* chore: rename job

* fix: misleading param description

* fix: set the proper Docker namespace for Kibana

(cherry picked from commit 7abccaf)

# Conflicts:
#	.ci/Jenkinsfile
#	cli/config/compose/profiles/fleet/docker-compose.yml
#	e2e/_suites/fleet/README.md
#	e2e/_suites/fleet/ingest_manager_test.go
#	e2e/_suites/metricbeat/README.md
mergify bot pushed a commit that referenced this pull request Apr 13, 2021
* chore: support returning different fallback Docker namespaces

* chore: add KIBANA_VERSION variable

* docs: document new Kibana variable

* chore(ci): add regular to pipeline for Kibana PRs

It uses the generic-webhook-trigger to get Kibana PRs payloads, and with
that information trigger the e2e tests build.

* chore: only process kibana events

* chore: add PR author to the cause string

* chore: print PR sha in cause string

* chore: update Generic Trigger to match existing example

* chore: support manually running the tests for a PR

* chore: do not notify on slack on build greens

* fix: rename JJB as it's not a multibranch pipeline

* feat: build kibana image based on the PR or the UI params

* chore: simplify triggering the pipeline from the UI

* chore: simplify even more

* chore: use stackVersion if kibana version is not set

* docs: update docs about KIBANA_VERSION

* chore: rename variable

* chore: rename job

* fix: misleading param description

* fix: set the proper Docker namespace for Kibana

(cherry picked from commit 7abccaf)

# Conflicts:
#	.ci/Jenkinsfile
#	cli/config/compose/profiles/fleet/docker-compose.yml
#	e2e/_suites/fleet/README.md
#	e2e/_suites/fleet/ingest_manager_test.go
#	e2e/_suites/metricbeat/README.md
mergify bot pushed a commit that referenced this pull request Apr 13, 2021
* chore: support returning different fallback Docker namespaces

* chore: add KIBANA_VERSION variable

* docs: document new Kibana variable

* chore(ci): add regular to pipeline for Kibana PRs

It uses the generic-webhook-trigger to get Kibana PRs payloads, and with
that information trigger the e2e tests build.

* chore: only process kibana events

* chore: add PR author to the cause string

* chore: print PR sha in cause string

* chore: update Generic Trigger to match existing example

* chore: support manually running the tests for a PR

* chore: do not notify on slack on build greens

* fix: rename JJB as it's not a multibranch pipeline

* feat: build kibana image based on the PR or the UI params

* chore: simplify triggering the pipeline from the UI

* chore: simplify even more

* chore: use stackVersion if kibana version is not set

* docs: update docs about KIBANA_VERSION

* chore: rename variable

* chore: rename job

* fix: misleading param description

* fix: set the proper Docker namespace for Kibana

(cherry picked from commit 7abccaf)

# Conflicts:
#	.ci/Jenkinsfile
#	cli/config/compose/profiles/fleet/docker-compose.yml
#	e2e/_suites/fleet/README.md
#	e2e/_suites/fleet/ingest_manager_test.go
#	e2e/_suites/metricbeat/README.md
mdelapenya added a commit that referenced this pull request Apr 13, 2021
* feat: support passing KIBANA_VERSION (#905)

* chore: support returning different fallback Docker namespaces

* chore: add KIBANA_VERSION variable

* docs: document new Kibana variable

* chore(ci): add regular to pipeline for Kibana PRs

It uses the generic-webhook-trigger to get Kibana PRs payloads, and with
that information trigger the e2e tests build.

* chore: only process kibana events

* chore: add PR author to the cause string

* chore: print PR sha in cause string

* chore: update Generic Trigger to match existing example

* chore: support manually running the tests for a PR

* chore: do not notify on slack on build greens

* fix: rename JJB as it's not a multibranch pipeline

* feat: build kibana image based on the PR or the UI params

* chore: simplify triggering the pipeline from the UI

* chore: simplify even more

* chore: use stackVersion if kibana version is not set

* docs: update docs about KIBANA_VERSION

* chore: rename variable

* chore: rename job

* fix: misleading param description

* fix: set the proper Docker namespace for Kibana

(cherry picked from commit 7abccaf)

# Conflicts:
#	.ci/Jenkinsfile
#	cli/config/compose/profiles/fleet/docker-compose.yml
#	e2e/_suites/fleet/README.md
#	e2e/_suites/fleet/ingest_manager_test.go
#	e2e/_suites/metricbeat/README.md

* fix: resolve conflicts

* fix: remove unused variable

* Revert "fix: remove unused variable"

This reverts commit e20645a.

* fix: do not remove kibana config yet

Co-authored-by: Manuel de la Peña <mdelapenya@gmail.com>
mdelapenya added a commit that referenced this pull request Apr 13, 2021
* feat: support passing KIBANA_VERSION (#905)

* chore: support returning different fallback Docker namespaces

* chore: add KIBANA_VERSION variable

* docs: document new Kibana variable

* chore(ci): add regular to pipeline for Kibana PRs

It uses the generic-webhook-trigger to get Kibana PRs payloads, and with
that information trigger the e2e tests build.

* chore: only process kibana events

* chore: add PR author to the cause string

* chore: print PR sha in cause string

* chore: update Generic Trigger to match existing example

* chore: support manually running the tests for a PR

* chore: do not notify on slack on build greens

* fix: rename JJB as it's not a multibranch pipeline

* feat: build kibana image based on the PR or the UI params

* chore: simplify triggering the pipeline from the UI

* chore: simplify even more

* chore: use stackVersion if kibana version is not set

* docs: update docs about KIBANA_VERSION

* chore: rename variable

* chore: rename job

* fix: misleading param description

* fix: set the proper Docker namespace for Kibana

(cherry picked from commit 7abccaf)

# Conflicts:
#	.ci/Jenkinsfile
#	cli/config/compose/profiles/fleet/docker-compose.yml
#	e2e/_suites/fleet/README.md
#	e2e/_suites/fleet/ingest_manager_test.go
#	e2e/_suites/metricbeat/README.md

* fix: resolve conflicts

* fix: remove unused variable

* Revert "fix: remove unused variable"

This reverts commit b192f74.

* fix: do not remove kibana path yet

Co-authored-by: Manuel de la Peña <mdelapenya@gmail.com>
mdelapenya added a commit that referenced this pull request Apr 13, 2021
* feat: support passing KIBANA_VERSION (#905)

* chore: support returning different fallback Docker namespaces

* chore: add KIBANA_VERSION variable

* docs: document new Kibana variable

* chore(ci): add regular to pipeline for Kibana PRs

It uses the generic-webhook-trigger to get Kibana PRs payloads, and with
that information trigger the e2e tests build.

* chore: only process kibana events

* chore: add PR author to the cause string

* chore: print PR sha in cause string

* chore: update Generic Trigger to match existing example

* chore: support manually running the tests for a PR

* chore: do not notify on slack on build greens

* fix: rename JJB as it's not a multibranch pipeline

* feat: build kibana image based on the PR or the UI params

* chore: simplify triggering the pipeline from the UI

* chore: simplify even more

* chore: use stackVersion if kibana version is not set

* docs: update docs about KIBANA_VERSION

* chore: rename variable

* chore: rename job

* fix: misleading param description

* fix: set the proper Docker namespace for Kibana

(cherry picked from commit 7abccaf)

# Conflicts:
#	.ci/Jenkinsfile
#	cli/config/compose/profiles/fleet/docker-compose.yml
#	e2e/_suites/fleet/README.md
#	e2e/_suites/fleet/ingest_manager_test.go
#	e2e/_suites/metricbeat/README.md

* fix: resolve conflicts

* fix: remove unused variable

* Revert "fix: remove unused variable"

This reverts commit e69fe76.

* fix: do not remove kibana config yet

Co-authored-by: Manuel de la Peña <mdelapenya@gmail.com>
mdelapenya added a commit to mdelapenya/e2e-testing that referenced this pull request Apr 15, 2021
* master:
  chore: add debug info for the payload (elastic#1044)
  chore: add debug traces for the webhook payload (elastic#1043)
  fix: wrong interpolation (elastic#1042)
  Update Elastic Agent to not use Kibana (elastic#1036)
  fix: apply X version for non-master branches (elastic#1037)
  fix: add NodeJS to PATH (elastic#1035)
  fix: use an agent when building kibana (elastic#1030)
  fix(jjb): use a branch that exists (elastic#1029)
  remove uninstall step (elastic#1017)
  fix: delay checking stale agent version until it's used (elastic#1016)
  fix: use same JJB than in custom kibana (elastic#1010)
  chore: simplify PR template (elastic#1011)
  feat: support passing KIBANA_VERSION (elastic#905)
  [mergify] assign the original author (elastic#1009)
  Remove the agent config file parameters for stand alone (elastic#983)
  Uniquify the stand-alone step for checking agent status (elastic#993)
mdelapenya added a commit to mdelapenya/e2e-testing that referenced this pull request Apr 19, 2021
* master:
  fix: check if kibana version is a commit (elastic#1047)
  fix: incorrect variable name (elastic#1046)
  fix: typo in parameters (elastic#1045)
  chore: add debug info for the payload (elastic#1044)
  chore: add debug traces for the webhook payload (elastic#1043)
  fix: wrong interpolation (elastic#1042)
  Update Elastic Agent to not use Kibana (elastic#1036)
  fix: apply X version for non-master branches (elastic#1037)
  fix: add NodeJS to PATH (elastic#1035)
  fix: use an agent when building kibana (elastic#1030)
  fix(jjb): use a branch that exists (elastic#1029)
  remove uninstall step (elastic#1017)
  fix: delay checking stale agent version until it's used (elastic#1016)
  fix: use same JJB than in custom kibana (elastic#1010)
  chore: simplify PR template (elastic#1011)
  feat: support passing KIBANA_VERSION (elastic#905)
  [mergify] assign the original author (elastic#1009)
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants