Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Solution] Update wordings and breadcrumb for timelines page #90809

Merged
merged 14 commits into from
Feb 25, 2021

Conversation

angorayc
Copy link
Contributor

@angorayc angorayc commented Feb 9, 2021

Summary

This PR is to update the wording on timelines page, to differentiate between timeline and timeline template.

Items to check:

Update wordings:
#87469

    • Import Timeline button label

image

  • Change: The button will now only say "Import" instead of "Import timeline"
    • Import Timeline button on click pop-up

image

  • Change: Info text will say "Select a security timeline or timeline template to import" (copy help needed)
    Note: As we can import multiple timelines / templates in a file at a time, so I change the wording to Select a security timeline or timeline template file to import instead
    • Delete Template pop-up

image

  • Change: Info text will say "You will not be able to recover this timeline template or its notes once deleted."
    • Change: Empty table text will now say "0 timeline templates match the search criteria"

image

  1. Update breadcrumbs:
    [Security Solution] Create Timeline page is displaying under Templates tab on clicking Discard Timeline Template button #87458

Updated UX:

Template1

Template4

  • Change: We no longer differentiate the bread crumbs between a Timeline and Timeline template. When a Timeline or Timeline template is open, the breadcrumbs will always be "Security / Timelines" (see below)

Screen Shot 2021-01-28 at 11 16 13 AM

Checklist

Delete any items that are not applicable to this PR.

@angorayc angorayc added v7.12.0 release_note:skip Skip the PR/issue when compiling release notes Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Threat Hunting Security Solution Threat Hunting Team labels Feb 9, 2021
@angorayc angorayc changed the title update wordings [Security Solution] Update wordings for timelines page Feb 9, 2021
@angorayc angorayc changed the title [Security Solution] Update wordings for timelines page [Security Solution] Update wordings and breadcrumb for timelines page Feb 9, 2021
@angorayc angorayc marked this pull request as ready for review February 9, 2021 17:49
@angorayc angorayc requested a review from a team as a code owner February 9, 2021 17:49
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-threat-hunting (Team:Threat Hunting)

@angorayc
Copy link
Contributor Author

@elasticmachine merge upstream

@angorayc
Copy link
Contributor Author

@elasticmachine merge upstream

@angorayc
Copy link
Contributor Author

@elasticmachine merge upstream

@angorayc
Copy link
Contributor Author

@elasticmachine merge upstream

@angorayc
Copy link
Contributor Author

@elasticmachine merge upstream

@angorayc
Copy link
Contributor Author

@elasticmachine merge upstream

}
);

export const SELECT_TIMELINE = i18n.translate(
'xpack.securitySolution.timelines.components.importTimelineModal.selectTimelineDescription',
{
defaultMessage: 'Select a Security timeline (as exported from the Timeline view) to import',
defaultMessage: 'Select a security timeline or timeline template file to import',
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(copy help needed)
Note: As we can import multiple timelines / templates in a file at a time, so I change the wording to Select a security timeline or timeline template file to import instead

The following text incorporates the multiple selection feature noted above:

Select one or more timeline or timeline template files to import

The word security is omitted in the suggestion above, which leaves open the possibility to import timelines or templates in an non-security context in the future.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yup, omitted security sounds good, but at the moment we still only support importing a single ndjson file at a time. (However the ndjson file might contain more than one timeline or timeline template's json object in it.)
So I think just removing the security would be fine.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the clarification re: multiple selection vs multiple timelines in a single file. In that case, please consider the following suggestion:

Select a timeline or timeline template file to import

Copy link
Contributor

@andrew-goldstein andrew-goldstein left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for these changes @angorayc!

I made one suggestion per the request in the PR for copy feedback. Everything else looks good, and is tested locally.

LGTM 🙏

@kibanamachine
Copy link
Contributor

💛 Build succeeded, but was flaky


Test Failures

Kibana Pipeline / general / X-Pack Endpoint Functional Tests.x-pack/test/security_solution_endpoint/apps/endpoint/policy_details·ts.endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 8 times on tracked branches: https://github.com/elastic/kibana/issues/92567

[00:00:00]       │
[00:00:00]         └-: endpoint
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]             │ proc [kibana]   log   [14:49:34.524] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [14:49:34.528] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [14:49:34.529] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50024, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50016, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50014, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [14:49:34.604] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [14:49:34.611] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [14:49:34.612] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50034, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50038, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50032, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ proc [kibana]   log   [14:49:34.619] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [14:49:34.620] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [14:49:34.621] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50044, url.original: /package/endpoint/0.17.1
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50046, url.original: /package/elastic_agent/0.0.5
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50050, url.original: /package/system/0.10.9
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50058, url.original: /package/elastic_agent/0.0.5/
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50060, url.original: /package/endpoint/0.17.1/
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50062, url.original: /package/system/0.10.9/
[00:00:00]             │ proc [kibana]   log   [14:49:34.636] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50066, url.original: /epr/elastic_agent/elastic_agent-0.0.5.zip
[00:00:00]             │ proc [kibana]   log   [14:49:34.649] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50070, url.original: /epr/endpoint/endpoint-0.17.1.zip
[00:00:00]             │ proc [kibana]   log   [14:49:34.668] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [.kibana_8.0.0_001/PjGNudpOQnSt07rr9C0vpA] update_mapping [_doc]
[00:00:00]             │ info [docker:registry] 2021/02/25 14:49:34 source.ip: 172.17.0.1:50074, url.original: /epr/system/system-0.10.9.zip
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [.kibana_8.0.0_001/PjGNudpOQnSt07rr9C0vpA] update_mapping [_doc]
[00:00:01]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [.kibana_8.0.0_001/PjGNudpOQnSt07rr9C0vpA] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [.kibana_8.0.0_001/PjGNudpOQnSt07rr9C0vpA] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [.kibana_8.0.0_001/PjGNudpOQnSt07rr9C0vpA] update_mapping [_doc]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [.kibana_8.0.0_001/PjGNudpOQnSt07rr9C0vpA] update_mapping [_doc]
[00:00:03]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index lifecycle policy [logs-endpoint.collection-diagnostic]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding component template [metrics-elastic_agent.elastic_agent-mappings]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-elastic_agent.elastic_agent] for index patterns [metrics-elastic_agent.elastic_agent-*]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [logs-system.application] for index patterns [logs-system.application-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [logs-system.security] for index patterns [logs-system.security-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [logs-system.system] for index patterns [logs-system.system-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding component template [logs-endpoint.events.registry-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding component template [logs-endpoint.events.network-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding component template [logs-endpoint.events.file-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding component template [logs-endpoint.events.process-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding component template [logs-endpoint.alerts-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding component template [metrics-endpoint.metadata-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding component template [metrics-endpoint.metrics-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding component template [logs-endpoint.events.library-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding component template [logs-endpoint.events.security-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding component template [.logs-endpoint.diagnostic.collection-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding component template [metrics-endpoint.policy-mappings]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [.logs-endpoint.diagnostic.collection] for index patterns [.logs-endpoint.diagnostic.collection-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [.transform-internal-006] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] updating number_of_replicas to [0] for indices [.transform-internal-006]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-internal-006][0]]])." previous.health="YELLOW" reason="shards started [[.transform-internal-006][0]]"
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:09]             │ info [o.e.x.t.t.p.SchemaUtil] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] Failed to deduce mapping for [agent.id], fall back to keyword. Create the destination index with complete mappings first to avoid deducing the mappings
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[metrics-endpoint.metadata_current_default][0]]])." previous.health="YELLOW" reason="shards started [[metrics-endpoint.metadata_current_default][0]]"
[00:00:09]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [endpoint.metadata_current-default-0.17.1] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:09]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [endpoint.metadata_current-default-0.17.1] successfully completed and scheduled task in node operation
[00:00:11]             │ proc [kibana]   log   [14:49:46.034] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:11]             │ info [docker:registry] 2021/02/25 14:49:46 source.ip: 172.17.0.1:50860, url.original: /search?package=system&internal=true&experimental=true
[00:00:11]             │ proc [kibana]   log   [14:49:46.071] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:11]             │ info [docker:registry] 2021/02/25 14:49:46 source.ip: 172.17.0.1:50864, url.original: /search?package=system&internal=true&experimental=true
[00:00:11]             │ proc [kibana]   log   [14:49:46.088] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:11]             │ info [docker:registry] 2021/02/25 14:49:46 source.ip: 172.17.0.1:50868, url.original: /package/system/0.10.9
[00:00:11]             │ info [docker:registry] 2021/02/25 14:49:46 source.ip: 172.17.0.1:50872, url.original: /package/system/0.10.9/
[00:00:11]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [.kibana_8.0.0_001/PjGNudpOQnSt07rr9C0vpA] update_mapping [_doc]
[00:00:13]             │ info [o.e.x.s.a.r.TransportPutRoleAction] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] added role [fleet_enroll]
[00:00:13]             │ info [o.e.x.s.a.u.TransportPutUserAction] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] added user [fleet_enroll]
[00:00:15]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [.kibana_8.0.0_001/PjGNudpOQnSt07rr9C0vpA] update_mapping [_doc]
[00:00:15]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1614259501760874307] [.kibana_8.0.0_001/PjGNudpOQnSt07rr9C0vpA] update_mapping [_doc]
[00:00:49]           └-: When on the Endpoint Policy Details Page
[00:00:49]             └-> "before all" hook in "When on the Endpoint Policy Details Page"
[00:02:18]             └-: and the save button is clicked
[00:02:18]               └-> "before all" hook for "should display success toast on successful save"
[00:02:18]               └-> should display success toast on successful save
[00:02:18]                 └-> "before each" hook: global before each for "should display success toast on successful save"
[00:02:18]                 └-> "before each" hook for "should display success toast on successful save"
[00:02:23]                   │ info Using cached retrieval of endpoint package
[00:02:23]                   │ proc [kibana]   log   [14:51:58.211] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:23]                   │ info [docker:registry] 2021/02/25 14:51:58 source.ip: 172.17.0.1:60960, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:23]                   │ proc [kibana]   log   [14:51:58.245] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:23]                   │ info [docker:registry] 2021/02/25 14:51:58 source.ip: 172.17.0.1:60966, url.original: /package/endpoint/0.17.1
[00:02:23]                   │ info [docker:registry] 2021/02/25 14:51:58 source.ip: 172.17.0.1:60970, url.original: /package/endpoint/0.17.1/
[00:02:26]                   │ debg navigateToActualUrl http://localhost:6141/app/security/administration/policy/9fb586f7-fcf0-4add-870a-3263f7c852a2
[00:02:26]                   │ debg browser[INFO] http://localhost:6141/app/security/administration/policy/9fb586f7-fcf0-4add-870a-3263f7c852a2?_t=1614264720622 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:26]                   │
[00:02:26]                   │ debg browser[INFO] http://localhost:6141/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:26]                   │ debg currentUrl = http://localhost:6141/app/security/administration/policy/9fb586f7-fcf0-4add-870a-3263f7c852a2
[00:02:26]                   │          appUrl = http://localhost:6141/app/security/administration/policy/9fb586f7-fcf0-4add-870a-3263f7c852a2
[00:02:26]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:26]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:27]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:27]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:27]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:28]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:28]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:28]                   │ proc [kibana]   log   [14:52:02.864] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:28]                   │ info [docker:registry] 2021/02/25 14:52:02 source.ip: 172.17.0.1:32974, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:29]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:02:29]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:29]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:29]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:29]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:29]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:29]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:29]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:29]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:29]                 │ debg Clicking modal confirm
[00:02:29]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:29]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:29]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:29]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:29]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:29]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:29]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:29]                 │ proc [kibana]   log   [14:52:04.424] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:29]                 │ info [docker:registry] 2021/02/25 14:52:04 source.ip: 172.17.0.1:33030, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:29]                 │ proc [kibana]   log   [14:52:04.434] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:29]                 │ info [docker:registry] 2021/02/25 14:52:04 source.ip: 172.17.0.1:33034, url.original: /package/endpoint/0.17.1
[00:02:29]                 │ info [docker:registry] 2021/02/25 14:52:04 source.ip: 172.17.0.1:33038, url.original: /package/endpoint/0.17.1/
[00:02:32]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:32]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:32]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:32]                 │ debg TestSubjects.getVisibleText(policyDetailsSuccessMessage)
[00:02:32]                 │ debg TestSubjects.find(policyDetailsSuccessMessage)
[00:02:32]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=10000
[00:02:32]                 └- ✓ pass  (3.7s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should display success toast on successful save"
[00:02:32]               └-> "after each" hook for "should display success toast on successful save"
[00:02:37]               └-> should persist update on the screen
[00:02:37]                 └-> "before each" hook: global before each for "should persist update on the screen"
[00:02:37]                 └-> "before each" hook for "should persist update on the screen"
[00:02:41]                   │ info Using cached retrieval of endpoint package
[00:02:42]                   │ proc [kibana]   log   [14:52:16.598] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:42]                   │ info [docker:registry] 2021/02/25 14:52:16 source.ip: 172.17.0.1:33850, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:42]                   │ proc [kibana]   log   [14:52:16.628] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:42]                   │ info [docker:registry] 2021/02/25 14:52:16 source.ip: 172.17.0.1:33854, url.original: /package/endpoint/0.17.1
[00:02:42]                   │ info [docker:registry] 2021/02/25 14:52:16 source.ip: 172.17.0.1:33858, url.original: /package/endpoint/0.17.1/
[00:02:44]                   │ debg navigateToActualUrl http://localhost:6141/app/security/administration/policy/06452de4-43c3-4adf-82d5-2325b2cf160d
[00:02:44]                   │ debg browser[INFO] http://localhost:6141/app/security/administration/policy/06452de4-43c3-4adf-82d5-2325b2cf160d?_t=1614264738836 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:44]                   │
[00:02:44]                   │ debg browser[INFO] http://localhost:6141/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:44]                   │ debg currentUrl = http://localhost:6141/app/security/administration/policy/06452de4-43c3-4adf-82d5-2325b2cf160d
[00:02:44]                   │          appUrl = http://localhost:6141/app/security/administration/policy/06452de4-43c3-4adf-82d5-2325b2cf160d
[00:02:44]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:44]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:45]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:45]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:45]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:46]                   │ proc [kibana]   log   [14:52:21.007] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:46]                   │ info [docker:registry] 2021/02/25 14:52:21 source.ip: 172.17.0.1:34144, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:47]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:47]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:47]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_process']/../label') with timeout=10000
[00:02:47]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:47]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:47]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:47]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:47]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:47]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:47]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:47]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:47]                 │ debg Clicking modal confirm
[00:02:47]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:47]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:47]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:47]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:47]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:47]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:47]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:48]                 │ proc [kibana]   log   [14:52:22.508] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:48]                 │ info [docker:registry] 2021/02/25 14:52:22 source.ip: 172.17.0.1:34322, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:48]                 │ proc [kibana]   log   [14:52:22.518] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:48]                 │ info [docker:registry] 2021/02/25 14:52:22 source.ip: 172.17.0.1:34328, url.original: /package/endpoint/0.17.1
[00:02:48]                 │ info [docker:registry] 2021/02/25 14:52:22 source.ip: 172.17.0.1:34332, url.original: /package/endpoint/0.17.1/
[00:02:48]                 │ proc [kibana]   log   [14:52:22.834] [info][plugins][securitySolution] Committed manifest 1.0.1
[00:02:50]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:50]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:50]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:51]                 │ debg navigateToActualUrl http://localhost:6141/app/security/administration/endpoints
[00:02:51]                 │ debg browser[INFO] http://localhost:6141/app/security/administration/endpoints?_t=1614264745506 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:51]                 │
[00:02:51]                 │ debg browser[INFO] http://localhost:6141/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:51]                 │ debg currentUrl = http://localhost:6141/app/security/administration/endpoints
[00:02:51]                 │          appUrl = http://localhost:6141/app/security/administration/endpoints
[00:02:51]                 │ debg TestSubjects.find(kibanaChrome)
[00:02:51]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:52]                 │ debg isGlobalLoadingIndicatorVisible
[00:02:52]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:52]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:52]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:52]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:53]                 │ proc [kibana]   log   [14:52:27.683] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:53]                 │ info [docker:registry] 2021/02/25 14:52:27 source.ip: 172.17.0.1:34856, url.original: /search?category=security
[00:02:53]                 │ proc [kibana]   log   [14:52:27.783] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:53]                 │ proc [kibana]   log   [14:52:27.790] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:53]                 │ info [docker:registry] 2021/02/25 14:52:27 source.ip: 172.17.0.1:34864, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:53]                 │ info [docker:registry] 2021/02/25 14:52:27 source.ip: 172.17.0.1:34868, url.original: /search?category=security
[00:02:54]                 │ debg navigateToActualUrl http://localhost:6141/app/security/administration/policy/06452de4-43c3-4adf-82d5-2325b2cf160d
[00:02:54]                 │ debg browser[INFO] http://localhost:6141/app/security/administration/policy/06452de4-43c3-4adf-82d5-2325b2cf160d?_t=1614264748643 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:54]                 │
[00:02:54]                 │ debg browser[INFO] http://localhost:6141/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:55]                 │ debg currentUrl = http://localhost:6141/app/security/administration/policy/06452de4-43c3-4adf-82d5-2325b2cf160d
[00:02:55]                 │          appUrl = http://localhost:6141/app/security/administration/policy/06452de4-43c3-4adf-82d5-2325b2cf160d
[00:02:55]                 │ debg TestSubjects.find(kibanaChrome)
[00:02:55]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:55]                 │ debg isGlobalLoadingIndicatorVisible
[00:02:55]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:55]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:55]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:56]                 │ proc [kibana]   log   [14:52:30.547] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:56]                 │ info [docker:registry] 2021/02/25 14:52:30 source.ip: 172.17.0.1:35064, url.original: /search?package=endpoint&internal=true&experimental=true
[00:02:57]                 │ debg TestSubjects.find(policyWindowsEvent_process)
[00:02:57]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_process"]') with timeout=10000
[00:02:57]                 └- ✓ pass  (9.7s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should persist update on the screen"
[00:02:57]               └-> "after each" hook for "should persist update on the screen"
[00:03:01]               └-> should have updated policy data in overall Agent Policy
[00:03:01]                 └-> "before each" hook: global before each for "should have updated policy data in overall Agent Policy"
[00:03:01]                 └-> "before each" hook for "should have updated policy data in overall Agent Policy"
[00:03:05]                   │ info Using cached retrieval of endpoint package
[00:03:06]                   │ proc [kibana]   log   [14:52:40.649] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:06]                   │ info [docker:registry] 2021/02/25 14:52:40 source.ip: 172.17.0.1:35508, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:06]                   │ proc [kibana]   log   [14:52:40.680] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:06]                   │ info [docker:registry] 2021/02/25 14:52:40 source.ip: 172.17.0.1:35516, url.original: /package/endpoint/0.17.1
[00:03:06]                   │ info [docker:registry] 2021/02/25 14:52:40 source.ip: 172.17.0.1:35520, url.original: /package/endpoint/0.17.1/
[00:03:08]                   │ debg navigateToActualUrl http://localhost:6141/app/security/administration/policy/a3b6665c-4260-4647-b52b-424389253508
[00:03:08]                   │ debg browser[INFO] http://localhost:6141/app/security/administration/policy/a3b6665c-4260-4647-b52b-424389253508?_t=1614264763082 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:08]                   │
[00:03:08]                   │ debg browser[INFO] http://localhost:6141/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:08]                   │ debg currentUrl = http://localhost:6141/app/security/administration/policy/a3b6665c-4260-4647-b52b-424389253508
[00:03:08]                   │          appUrl = http://localhost:6141/app/security/administration/policy/a3b6665c-4260-4647-b52b-424389253508
[00:03:08]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:08]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:10]                   │ debg isGlobalLoadingIndicatorVisible
[00:03:10]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:03:10]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:03:10]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:03:10]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:03:11]                   │ proc [kibana]   log   [14:52:45.499] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:11]                   │ info [docker:registry] 2021/02/25 14:52:45 source.ip: 172.17.0.1:35722, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:11]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_file']/../label') with timeout=10000
[00:03:11]                 │ debg Find.byXPath('//input[@data-test-subj='policyLinuxEvent_file']/../label') with timeout=10000
[00:03:11]                 │ debg Find.byXPath('//input[@data-test-subj='policyMacEvent_file']/../label') with timeout=10000
[00:03:13]                 │ warn WebElementWrapper.click: element click intercepted: Element <label class="euiCheckbox__label" for="i1ec55895-7779-11eb-a66b-f96be2a04aa3">...</label> is not clickable at point (447, 36). Other element would receive the click: <div class="euiHeader euiHeader--dark euiHeader--fixed header__firstBar">...</div>
[00:03:13]                 │        (Session info: headless chrome=88.0.4324.182)
[00:03:13]                 │ debg finding element 'By(xpath, //input[@data-test-subj='policyWindowsEvent_file']/../label)' again, 2 attempts left
[00:03:13]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:13]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:13]                 │ debg TestSubjects.find(advancedPolicyButton)
[00:03:13]                 │ debg Find.findByCssSelector('[data-test-subj="advancedPolicyButton"]') with timeout=10000
[00:03:13]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:13]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:13]                 │ debg TestSubjects.find(linux.advanced.agent.connection_delay)
[00:03:13]                 │ debg Find.findByCssSelector('[data-test-subj="linux.advanced.agent.connection_delay"]') with timeout=10000
[00:03:14]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:14]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:14]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:14]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:14]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:03:14]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:03:14]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:03:14]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:03:14]                 │ debg Clicking modal confirm
[00:03:14]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:03:14]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:03:14]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:03:14]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:03:14]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:03:14]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:03:14]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:03:14]                 │ proc [kibana]   log   [14:52:49.062] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:14]                 │ info [docker:registry] 2021/02/25 14:52:49 source.ip: 172.17.0.1:35822, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:14]                 │ proc [kibana]   log   [14:52:49.073] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:14]                 │ info [docker:registry] 2021/02/25 14:52:49 source.ip: 172.17.0.1:35826, url.original: /package/endpoint/0.17.1
[00:03:14]                 │ info [docker:registry] 2021/02/25 14:52:49 source.ip: 172.17.0.1:35830, url.original: /package/endpoint/0.17.1/
[00:03:17]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:03:17]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:03:17]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:03:17]                 └- ✓ pass  (5.8s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy"
[00:03:17]               └-> "after each" hook for "should have updated policy data in overall Agent Policy"
[00:03:22]               └-> should have cleared the advanced section when the user deletes the value
[00:03:22]                 └-> "before each" hook: global before each for "should have cleared the advanced section when the user deletes the value"
[00:03:22]                 └-> "before each" hook for "should have cleared the advanced section when the user deletes the value"
[00:03:26]                   │ info Using cached retrieval of endpoint package
[00:03:27]                   │ proc [kibana]   log   [14:53:01.854] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:27]                   │ info [docker:registry] 2021/02/25 14:53:01 source.ip: 172.17.0.1:36318, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:27]                   │ proc [kibana]   log   [14:53:01.877] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:27]                   │ info [docker:registry] 2021/02/25 14:53:01 source.ip: 172.17.0.1:36322, url.original: /package/endpoint/0.17.1
[00:03:27]                   │ info [docker:registry] 2021/02/25 14:53:01 source.ip: 172.17.0.1:36326, url.original: /package/endpoint/0.17.1/
[00:03:29]                   │ debg navigateToActualUrl http://localhost:6141/app/security/administration/policy/1f9af803-ff55-471f-8d25-59c74367e188
[00:03:29]                   │ debg browser[INFO] http://localhost:6141/app/security/administration/policy/1f9af803-ff55-471f-8d25-59c74367e188?_t=1614264784324 341 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:03:29]                   │
[00:03:29]                   │ debg browser[INFO] http://localhost:6141/bootstrap.js 42:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:03:30]                   │ debg currentUrl = http://localhost:6141/app/security/administration/policy/1f9af803-ff55-471f-8d25-59c74367e188
[00:03:30]                   │          appUrl = http://localhost:6141/app/security/administration/policy/1f9af803-ff55-471f-8d25-59c74367e188
[00:03:30]                   │ debg TestSubjects.find(kibanaChrome)
[00:03:30]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:03:31]                   │ debg isGlobalLoadingIndicatorVisible
[00:03:31]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:03:31]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:03:31]                   │ proc [kibana]   log   [14:53:06.358] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:31]                   │ info [docker:registry] 2021/02/25 14:53:06 source.ip: 172.17.0.1:36420, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:32]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:03:32]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:03:32]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:32]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:32]                 │ debg TestSubjects.find(advancedPolicyButton)
[00:03:32]                 │ debg Find.findByCssSelector('[data-test-subj="advancedPolicyButton"]') with timeout=10000
[00:03:33]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:33]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:33]                 │ debg TestSubjects.find(linux.advanced.agent.connection_delay)
[00:03:33]                 │ debg Find.findByCssSelector('[data-test-subj="linux.advanced.agent.connection_delay"]') with timeout=10000
[00:03:33]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:33]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:33]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:33]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:33]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:03:33]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:03:33]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:03:33]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:03:33]                 │ debg Clicking modal confirm
[00:03:33]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:03:33]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:03:33]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:03:33]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:03:33]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:03:33]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:03:33]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:03:33]                 │ proc [kibana]   log   [14:53:08.372] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:33]                 │ info [docker:registry] 2021/02/25 14:53:08 source.ip: 172.17.0.1:36474, url.original: /search?package=endpoint&internal=true&experimental=true
[00:03:33]                 │ proc [kibana]   log   [14:53:08.381] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:33]                 │ info [docker:registry] 2021/02/25 14:53:08 source.ip: 172.17.0.1:36478, url.original: /package/endpoint/0.17.1
[00:03:33]                 │ info [docker:registry] 2021/02/25 14:53:08 source.ip: 172.17.0.1:36482, url.original: /package/endpoint/0.17.1/
[00:03:36]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:03:36]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:03:36]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:03:37]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:37]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:37]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:03:37]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:03:37]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:03:37]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:03:38]                 │ warn WebElementWrapper.click: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItem" id="0">...</div>
[00:03:38]                 │        (Session info: headless chrome=88.0.4324.182)
[00:03:38]                 │ debg finding element 'By(css selector, [data-test-subj="policyDetailsSaveButton"])' again, 2 attempts left
[00:03:39]                 │ warn WebElementWrapper.click: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItem" id="0">...</div>
[00:03:39]                 │        (Session info: headless chrome=88.0.4324.182)
[00:03:39]                 │ debg finding element 'By(css selector, [data-test-subj="policyDetailsSaveButton"])' again, 1 attempts left
[00:03:40]                 │ warn WebElementWrapper.click: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItem" id="0">...</div>
[00:03:40]                 │        (Session info: headless chrome=88.0.4324.182)
[00:03:40]                 │ debg finding element 'By(css selector, [data-test-subj="policyDetailsSaveButton"])' again, 0 attempts left
[00:03:42]                 │ info Taking screenshot "/dev/shm/workspace/parallel/4/kibana/x-pack/test/functional/screenshots/failure/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value.png"
[00:03:42]                 │ info Current URL is: http://localhost:6141/app/security/administration/policy/1f9af803-ff55-471f-8d25-59c74367e188
[00:03:42]                 │ info Saving page source to: /dev/shm/workspace/parallel/4/kibana/x-pack/test/functional/failure_debug/html/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value.html
[00:03:42]                 └- ✖ fail: endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value
[00:03:42]                 │       ElementClickInterceptedError: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItemeuiGlobalToastListItem-isDismissed" id="0">...</div>
[00:03:42]                 │   (Session info: headless chrome=88.0.4324.182)
[00:03:42]                 │       at Object.throwDecodedError (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/error.js:550:15)
[00:03:42]                 │       at parseHttpResponse (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/http.js:565:13)
[00:03:42]                 │       at Executor.execute (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/http.js:491:26)
[00:03:42]                 │       at runMicrotasks (<anonymous>)
[00:03:42]                 │       at processTicksAndRejections (internal/process/task_queues.js:93:5)
[00:03:42]                 │       at Task.exec (/dev/shm/workspace/parallel/4/kibana/test/functional/services/remote/prevent_parallel_calls.ts:29:22)
[00:03:42]                 │ 
[00:03:42]                 │ 

Stack Trace

ElementClickInterceptedError: element click intercepted: Element <button class="euiButton euiButton--primary euiButton--fill" type="button" data-test-subj="policyDetailsSaveButton">...</button> is not clickable at point (1521, 972). Other element would receive the click: <div class="euiToast euiToast--success euiGlobalToastListItem euiGlobalToastListItem-isDismissed" id="0">...</div>
  (Session info: headless chrome=88.0.4324.182)
    at Object.throwDecodedError (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/error.js:550:15)
    at parseHttpResponse (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/http.js:565:13)
    at Executor.execute (/dev/shm/workspace/kibana/node_modules/selenium-webdriver/lib/http.js:491:26)
    at runMicrotasks (<anonymous>)
    at processTicksAndRejections (internal/process/task_queues.js:93:5)
    at Task.exec (/dev/shm/workspace/parallel/4/kibana/test/functional/services/remote/prevent_parallel_calls.ts:29:22) {
  remoteStacktrace: '#0 0x558f2f493199 <unknown>\n'
}

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
securitySolution 7.7MB 7.7MB +680.0B

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@angorayc angorayc merged commit 6c96fbb into elastic:master Feb 25, 2021
jloleysens added a commit to jloleysens/kibana that referenced this pull request Feb 25, 2021
…tiple-searchable-snapshot-actions

* 'master' of github.com:elastic/kibana:
  [Rollup] Fix use of undefined value in JS import (elastic#92791)
  [ILM] Fix replicas not showing  (elastic#92782)
  [Event Log] Extended README.md with the documentation for a REST API and Start plugin contract. (elastic#92562)
  [XY] Enables page reload toast for the legacyChartsLibrary setting (elastic#92811)
  [Security Solution][Case] Improve hooks (elastic#89580)
  [Security Solution] Update wordings and breadcrumb for timelines page (elastic#90809)
  [Security Solution] Replace EUI theme with mocks in jest suites (elastic#92462)
  docs: ✏️ use correct heading level (elastic#92806)
  [ILM ] Fix logic for showing/hiding recommended allocation on Cloud (elastic#90592)
  [Security Solution][Detections] Pull gap detection logic out in preparation for sharing between rule types (elastic#91966)
  [core.savedObjects] Remove _shard_doc tiebreaker since ES now adds it automatically. (elastic#92295)
  docs: ✏️ fix links in embeddable plugin readme (elastic#92778)

# Conflicts:
#	x-pack/plugins/index_lifecycle_management/public/application/sections/edit_policy/components/phases/shared_fields/searchable_snapshot_field/searchable_snapshot_field.tsx
angorayc added a commit to angorayc/kibana that referenced this pull request Feb 25, 2021
…elastic#90809)

* update wordings

* unit tests

* remove tabName from breadcrumbs

* update wordings

* change default status of timelines to null

* fix loading message

* update select timeline wording

Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
angorayc added a commit to angorayc/kibana that referenced this pull request Feb 25, 2021
…elastic#90809)

* update wordings

* unit tests

* remove tabName from breadcrumbs

* update wordings

* change default status of timelines to null

* fix loading message

* update select timeline wording

Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
angorayc added a commit that referenced this pull request Feb 25, 2021
…#90809) (#92865)

* update wordings

* unit tests

* remove tabName from breadcrumbs

* update wordings

* change default status of timelines to null

* fix loading message

* update select timeline wording

Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>

Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
angorayc added a commit that referenced this pull request Feb 26, 2021
…#90809) (#92866)

* update wordings

* unit tests

* remove tabName from breadcrumbs

* update wordings

* change default status of timelines to null

* fix loading message

* update select timeline wording

Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>

Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
release_note:skip Skip the PR/issue when compiling release notes Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Threat Hunting Security Solution Threat Hunting Team v7.12.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants