aws: re-enable system tests for securityhub data streams and silence expected template error#14947
Conversation
…expected template error For cert updates, in _dev/deploy/docker/files run (for securityhub_findings and securityhub_findings_full_posture) openssl req -x509 -newkey rsa:2048 -keyout private.key -out certificate.crt -sha256 -days 3650 -nodes -subj "/C=XX/L=Default City/O=Default Company Ltd/CN=securityhub.xxxx.amazonaws.cn" (for securityhub_insights) openssl req -x509 -newkey rsa:2048 -keyout private.key -out certificate.crt -sha256 -days 3650 -nodes -subj "/C=XX/L=Default City/O=Default Company Ltd/CN=securityhub.xxxx.amazonaws.com" and then distribute the certificate to the system test configs.
4c2f069 to
bd3c5be
Compare
🚀 Benchmarks reportTo see the full report comment with |
💚 Build Succeeded
cc @efd6 |
|
Pinging @elastic/security-service-integrations (Team:Security-Service Integrations) |
|
/test stack 9.1.2 |
|
With the 9.1.2 test there are a few failures due to the status reporting, I assume some of this relates back to elastic/beats#45664, but the last one looks like a different problem? system test: (elastic-agent logs - default) in aws.securityhub_insights
system test: (elastic-agent logs - default) in aws.securityhub_findings_full_posture
system test: (elastic-agent logs - default) in aws.guardduty
|
|
The first two tests are both flaky, but I can improve the situation with the first one so that it and the second can be addressed with elastic/beats#45664. The last one is due to the incorrect use of a |
|
/test stack 9.1.2 |
💚 Build Succeeded
cc @efd6 |
|
💔 Build Failed
Failed CI StepsHistorycc @efd6 |
|
Package aws - 3.14.0 containing this change is available at https://epr.elastic.co/package/aws/3.14.0/ |
…expected template error (elastic#14947) For cert updates, in _dev/deploy/docker/files run (for securityhub_findings and securityhub_findings_full_posture) openssl req -x509 -newkey rsa:2048 -keyout private.key -out certificate.crt -sha256 -days 3650 -nodes -subj "/C=XX/L=Default City/O=Default Company Ltd/CN=securityhub.xxxx.amazonaws.cn" (for securityhub_insights) openssl req -x509 -newkey rsa:2048 -keyout private.key -out certificate.crt -sha256 -days 3650 -nodes -subj "/C=XX/L=Default City/O=Default Company Ltd/CN=securityhub.xxxx.amazonaws.com" and then distribute the certificate to the system test configs. Also fix incorrect use of 'with' in guardduty agent template.




Proposed commit message
Checklist
changelog.ymlfile.Author's Checklist
How to test this PR locally
Related issues
Screenshots