-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Cloud Security] limit setup options for Agentless CSPM #172562
Conversation
dc55d19
to
48b5d37
Compare
/ci |
/ci |
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
💚 Build Succeeded
Metrics [docs]Module Count
Async chunks
Unknown metric groupsESLint disabled line counts
Total ESLint disabled count
History
To update your PR or re-run it, just comment with: |
…t policy (#173553) ## Summary Right now every Security project in serverless is created with [an Agentless policy](https://github.com/elastic/project-controller/blob/main/internal/project/security/security_kibana_config.go#L80) (gated be the feature flag based on or org id) and in this policy `is_managed` set to `false`. We in Cloud Security want to make the policy managed. This change is to allow us to do that and still be able to install integrations on the policy. In a nutshell, the logic is to force install integration if the agent policy id is `agentless`. If we are not missing something, it should be safe, as when managed, the agentless agent policy won't be available in the list of Existing Hosts and the only way to pick it for installation in the UI is to implement the same logic we implemented in CSP integration in - #171671 - #172562 Part of: - elastic/security-team#8117 ## Screencast https://github.com/elastic/security-team/assets/478762/c41f2f33-0c43-467f-a54a-8710b26a0abc ### Checklist Delete any items that are not applicable to this PR. - [x] [Unit or functional tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html) were updated or added to match the most common scenarios
Summary
Follow up after
Closes
Includes:
How to test
Make sure to have the FF in your
serverless.security.dev.yml
(it's similar to thekibana.dev.yml
but specifically for Serverless Security Projects) enabled. Also specify some serverless project id, to enable the logic ofisServerlessEnabled
The follow the steps from this comment https://github.com/elastic/security-team/issues/7972#issuecomment-1808096052 to have the Agentless artifacts (agent, policy, output, and fleet server host) locally
After that, you should be able to test the flow.
Screencast
screencast-mail.google.com-2023.12.08-16_37_35.webm
Checklist
Delete any items that are not applicable to this PR.