Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Security Solution][Endpoint] User cannot paginate through policies in exceptions flyout #171281

Closed
1 of 2 tasks
dasansol92 opened this issue Nov 15, 2023 · 2 comments
Closed
1 of 2 tasks
Assignees
Labels
8.12 candidate bug Fixes for quality problems that affect the customer experience OLM Sprint Team:Defend Workflows “EDR Workflows” sub-team of Security Solution

Comments

@dasansol92
Copy link
Contributor

dasansol92 commented Nov 15, 2023

Describe the bug:

There is no page size for package policies (using endpoint) in event filters, trusted apps, blocklists or host isolation exceptions flyout. If there are more policies than the default page size (20) user cannot select anything above 20.

Would be good adding some sort of pagination and dispatch a new query when using the provided search bar.

Steps to reproduce:

  1. Add more than 20 policies with defend integration in it
  2. Open create event filter flyout from event filters list (or other endpoint exception type like Trusted apps)
  3. On the assignment section, select Per policy.
  4. Note that you can only select the first 20 policies in the list and there is no option to select others.

Expected behavior:
User can select any policy with defend integration

Screenshots (if relevant):
Screenshot 2023-11-15 at 13 00 44

## AC

  • Set de page size to 1k package policies.
  • As a follow up, we can dispatch api search when typing on the search input, so if there are more than 1k policies on the system, user can search through those using the search input, even if there are more than 1k.
@dasansol92 dasansol92 added bug Fixes for quality problems that affect the customer experience grooming Team:Defend Workflows “EDR Workflows” sub-team of Security Solution 8.12 candidate labels Nov 15, 2023
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-defend-workflows (Team:Defend Workflows)

@dasansol92 dasansol92 self-assigned this Dec 5, 2023
@dasansol92
Copy link
Contributor Author

PR: #172563

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
8.12 candidate bug Fixes for quality problems that affect the customer experience OLM Sprint Team:Defend Workflows “EDR Workflows” sub-team of Security Solution
Projects
None yet
Development

No branches or pull requests

2 participants