Skip to content

Conversation

@kibanamachine
Copy link
Contributor

Backports the following commits to 7.x:

@kibanamachine kibanamachine added the backport This PR is a backport of another PR label May 26, 2021
@kibanamachine kibanamachine enabled auto-merge (squash) May 26, 2021 01:36
@kibanamachine
Copy link
Contributor Author

💛 Build succeeded, but was flaky


Test Failures

Kibana Pipeline / general / task-queue-process-16 / X-Pack Endpoint Functional Tests.x-pack/test/security_solution_endpoint/apps/endpoint/policy_details·ts.endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 8 times on tracked branches: https://github.com/elastic/kibana/issues/92567

[00:00:00]       │
[00:00:00]         └-: endpoint
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [.kibana_7.14.0_001/opXvQf2eSSe4-wXGq0rSwA] update_mapping [_doc]
[00:00:01]             │ proc [kibana]   log   [02:09:11.961] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [02:09:11.964] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [02:09:11.965] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [02:09:11.965] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:11 source.ip: 172.17.0.1:42758, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.14.0
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:11 source.ip: 172.17.0.1:42760, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:11 source.ip: 172.17.0.1:42762, url.original: /search?package=fleet_server&internal=true&experimental=true&kibana.version=7.14.0
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:11 source.ip: 172.17.0.1:42756, url.original: /search?package=elastic_agent&internal=true&experimental=true&kibana.version=7.14.0
[00:00:01]             │ proc [kibana]   log   [02:09:12.007] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [02:09:12.010] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [02:09:12.012] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [02:09:12.014] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42774, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.14.0
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42772, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42778, url.original: /search?package=elastic_agent&internal=true&experimental=true&kibana.version=7.14.0
[00:00:01]             │ proc [kibana]   log   [02:09:12.018] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42782, url.original: /search?package=fleet_server&internal=true&experimental=true&kibana.version=7.14.0
[00:00:01]             │ proc [kibana]   log   [02:09:12.021] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [02:09:12.022] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [02:09:12.024] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42786, url.original: /package/system/0.12.0
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42794, url.original: /package/endpoint/0.18.0
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42792, url.original: /package/elastic_agent/0.0.6
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42798, url.original: /package/fleet_server/0.2.1
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42802, url.original: /package/system/0.12.0/
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42812, url.original: /package/elastic_agent/0.0.6/
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42808, url.original: /package/endpoint/0.18.0/
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42814, url.original: /package/fleet_server/0.2.1/
[00:00:01]             │ proc [kibana]   log   [02:09:12.034] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [02:09:12.036] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42822, url.original: /epr/fleet_server/fleet_server-0.2.1.zip
[00:00:01]             │ proc [kibana]   log   [02:09:12.046] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42820, url.original: /epr/elastic_agent/elastic_agent-0.0.6.zip
[00:00:01]             │ proc [kibana]   log   [02:09:12.055] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42826, url.original: /epr/endpoint/endpoint-0.18.0.zip
[00:00:01]             │ info [docker:registry] 2021/05/26 02:09:12 source.ip: 172.17.0.1:42830, url.original: /epr/system/system-0.12.0.zip
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [.kibana_7.14.0_001/opXvQf2eSSe4-wXGq0rSwA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [.kibana_7.14.0_001/opXvQf2eSSe4-wXGq0rSwA] update_mapping [_doc]
[00:00:03]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index lifecycle policy [.fleet-actions-results]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [.kibana_7.14.0_001/opXvQf2eSSe4-wXGq0rSwA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [.fleet-actions-results] for index patterns [.fleet-actions-results]
[00:00:04]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index lifecycle policy [logs-endpoint.collection-diagnostic]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding component template [metrics-elastic_agent.elastic_agent-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-elastic_agent.elastic_agent] for index patterns [metrics-elastic_agent.elastic_agent-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [logs-system.security] for index patterns [logs-system.security-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [logs-system.application] for index patterns [logs-system.application-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [logs-system.system] for index patterns [logs-system.system-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding component template [logs-endpoint.events.registry-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding component template [logs-endpoint.alerts-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding component template [.logs-endpoint.diagnostic.collection-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding component template [logs-endpoint.events.file-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding component template [logs-endpoint.events.library-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding component template [metrics-endpoint.policy-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding component template [logs-endpoint.events.security-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding component template [metrics-endpoint.metrics-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding component template [logs-endpoint.events.process-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding component template [metrics-endpoint.metadata-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding component template [logs-endpoint.events.network-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [.logs-endpoint.diagnostic.collection] for index patterns [.logs-endpoint.diagnostic.collection-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [.transform-internal-007] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] updating number_of_replicas to [0] for indices [.transform-internal-007]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-internal-007][0]]]).
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]]).
[00:00:09]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [endpoint.metadata_current-default-0.18.0] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:09]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [endpoint.metadata_current-default-0.18.0] successfully completed and scheduled task in node operation
[00:00:11]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [.kibana_7.14.0_001/opXvQf2eSSe4-wXGq0rSwA] update_mapping [_doc]
[00:00:12]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [.kibana_7.14.0_001/opXvQf2eSSe4-wXGq0rSwA] update_mapping [_doc]
[00:00:13]             │ proc [kibana]   log   [02:09:24.207] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/05/26 02:09:24 source.ip: 172.17.0.1:42888, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.14.0
[00:00:13]             │ proc [kibana]   log   [02:09:24.234] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/05/26 02:09:24 source.ip: 172.17.0.1:42892, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.14.0
[00:00:13]             │ proc [kibana]   log   [02:09:24.244] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/05/26 02:09:24 source.ip: 172.17.0.1:42896, url.original: /package/system/0.12.0
[00:00:13]             │ info [docker:registry] 2021/05/26 02:09:24 source.ip: 172.17.0.1:42900, url.original: /package/system/0.12.0/
[00:00:13]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [.kibana_7.14.0_001/opXvQf2eSSe4-wXGq0rSwA] update_mapping [_doc]
[00:00:15]             │ proc [kibana]   log   [02:09:26.248] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/05/26 02:09:26 source.ip: 172.17.0.1:42908, url.original: /search?package=fleet_server&internal=true&experimental=true&kibana.version=7.14.0
[00:00:15]             │ proc [kibana]   log   [02:09:26.270] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/05/26 02:09:26 source.ip: 172.17.0.1:42912, url.original: /search?package=fleet_server&internal=true&experimental=true&kibana.version=7.14.0
[00:00:15]             │ proc [kibana]   log   [02:09:26.278] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/05/26 02:09:26 source.ip: 172.17.0.1:42916, url.original: /package/fleet_server/0.2.1
[00:00:15]             │ info [docker:registry] 2021/05/26 02:09:26 source.ip: 172.17.0.1:42920, url.original: /package/fleet_server/0.2.1/
[00:00:17]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [.fleet-enrollment-api-keys-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:17]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] updating number_of_replicas to [0] for indices [.fleet-enrollment-api-keys-7]
[00:00:17]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-enrollment-api-keys-7][0]]]).
[00:00:18]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] [.fleet-policies-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] updating number_of_replicas to [0] for indices [.fleet-policies-7]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1621994518629488534] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-policies-7][0]]]).
[00:00:50]           └-: When on the Endpoint Policy Details Page
[00:00:50]             └-> "before all" hook in "When on the Endpoint Policy Details Page"
[00:01:56]             └-: and the save button is clicked
[00:01:56]               └-> "before all" hook for "should display success toast on successful save"
[00:01:56]               └-> should display success toast on successful save
[00:01:56]                 └-> "before each" hook: global before each for "should display success toast on successful save"
[00:01:56]                 └-> "before each" hook for "should display success toast on successful save"
[00:01:58]                   │ info Using cached retrieval of endpoint package
[00:01:59]                   │ proc [kibana]   log   [02:11:10.078] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:59]                   │ proc [kibana]   log   [02:11:10.079] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:59]                   │ info [docker:registry] 2021/05/26 02:11:10 source.ip: 172.17.0.1:44328, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:01:59]                   │ info [docker:registry] 2021/05/26 02:11:10 source.ip: 172.17.0.1:44326, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:01:59]                   │ proc [kibana]   log   [02:11:10.095] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:01:59]                   │ info [docker:registry] 2021/05/26 02:11:10 source.ip: 172.17.0.1:44332, url.original: /package/endpoint/0.18.0
[00:01:59]                   │ info [docker:registry] 2021/05/26 02:11:10 source.ip: 172.17.0.1:44336, url.original: /package/endpoint/0.18.0/
[00:02:01]                   │ debg navigateToActualUrl http://localhost:61161/app/security/administration/policy/1b8f369e-6cce-4898-8124-2804105b1da3
[00:02:01]                   │ debg browser[INFO] http://localhost:61161/app/security/administration/policy/1b8f369e-6cce-4898-8124-2804105b1da3?_t=1621995072739 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:01]                   │
[00:02:01]                   │ debg browser[INFO] http://localhost:61161/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:01]                   │ debg currentUrl = http://localhost:61161/app/security/administration/policy/1b8f369e-6cce-4898-8124-2804105b1da3
[00:02:01]                   │          appUrl = http://localhost:61161/app/security/administration/policy/1b8f369e-6cce-4898-8124-2804105b1da3
[00:02:01]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:01]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:02]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:02]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:02]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:02]                   │ proc [kibana]   log   [02:11:13.734] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:02]                   │ info [docker:registry] 2021/05/26 02:11:13 source.ip: 172.17.0.1:44346, url.original: /search?experimental=true&kibana.version=7.14.0
[00:02:03]                   │ proc [kibana]   log   [02:11:14.143] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:03]                   │ info [docker:registry] 2021/05/26 02:11:14 source.ip: 172.17.0.1:44350, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:04]                   │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:04]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:04]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:04]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:02:04]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:04]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:04]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:04]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:04]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:04]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:05]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:05]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:05]                 │ debg Clicking modal confirm
[00:02:05]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:05]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:05]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:05]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:05]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:05]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:05]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:05]                 │ proc [kibana]   log   [02:11:16.115] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:05]                 │ info [docker:registry] 2021/05/26 02:11:16 source.ip: 172.17.0.1:44358, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:05]                 │ proc [kibana]   log   [02:11:16.124] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:05]                 │ info [docker:registry] 2021/05/26 02:11:16 source.ip: 172.17.0.1:44362, url.original: /package/endpoint/0.18.0
[00:02:05]                 │ info [docker:registry] 2021/05/26 02:11:16 source.ip: 172.17.0.1:44366, url.original: /package/endpoint/0.18.0/
[00:02:07]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:08]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:08]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:08]                 │ debg TestSubjects.getVisibleText(policyDetailsSuccessMessage)
[00:02:08]                 │ debg TestSubjects.find(policyDetailsSuccessMessage)
[00:02:08]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=10000
[00:02:08]                 └- ✓ pass  (3.4s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should display success toast on successful save"
[00:02:08]               └-> "after each" hook for "should display success toast on successful save"
[00:02:11]               └-> should persist update on the screen
[00:02:11]                 └-> "before each" hook: global before each for "should persist update on the screen"
[00:02:11]                 └-> "before each" hook for "should persist update on the screen"
[00:02:13]                   │ info Using cached retrieval of endpoint package
[00:02:14]                   │ proc [kibana]   log   [02:11:25.118] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:14]                   │ proc [kibana]   log   [02:11:25.119] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:14]                   │ info [docker:registry] 2021/05/26 02:11:25 source.ip: 172.17.0.1:44396, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:14]                   │ info [docker:registry] 2021/05/26 02:11:25 source.ip: 172.17.0.1:44398, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:14]                   │ proc [kibana]   log   [02:11:25.141] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:14]                   │ info [docker:registry] 2021/05/26 02:11:25 source.ip: 172.17.0.1:44404, url.original: /package/endpoint/0.18.0
[00:02:14]                   │ info [docker:registry] 2021/05/26 02:11:25 source.ip: 172.17.0.1:44408, url.original: /package/endpoint/0.18.0/
[00:02:16]                   │ debg navigateToActualUrl http://localhost:61161/app/security/administration/policy/9ab9f6f4-96ac-4e0b-ab78-7dcc5c2d40bc
[00:02:16]                   │ debg browser[INFO] http://localhost:61161/app/security/administration/policy/9ab9f6f4-96ac-4e0b-ab78-7dcc5c2d40bc?_t=1621995087767 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:16]                   │
[00:02:16]                   │ debg browser[INFO] http://localhost:61161/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:16]                   │ debg currentUrl = http://localhost:61161/app/security/administration/policy/9ab9f6f4-96ac-4e0b-ab78-7dcc5c2d40bc
[00:02:16]                   │          appUrl = http://localhost:61161/app/security/administration/policy/9ab9f6f4-96ac-4e0b-ab78-7dcc5c2d40bc
[00:02:16]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:16]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:17]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:17]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:17]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:17]                   │ proc [kibana]   log   [02:11:28.844] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:17]                   │ info [docker:registry] 2021/05/26 02:11:28 source.ip: 172.17.0.1:44420, url.original: /search?experimental=true&kibana.version=7.14.0
[00:02:18]                   │ proc [kibana]   log   [02:11:29.264] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:18]                   │ info [docker:registry] 2021/05/26 02:11:29 source.ip: 172.17.0.1:44424, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:19]                   │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:19]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:19]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:19]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_process']/../label') with timeout=10000
[00:02:19]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:19]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:20]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:20]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:20]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:20]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:20]                 │ debg Clicking modal confirm
[00:02:20]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:20]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:20]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:20]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:20]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:20]                 │ proc [kibana]   log   [02:11:31.251] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:20]                 │ info [docker:registry] 2021/05/26 02:11:31 source.ip: 172.17.0.1:44432, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:20]                 │ proc [kibana]   log   [02:11:31.259] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:20]                 │ info [docker:registry] 2021/05/26 02:11:31 source.ip: 172.17.0.1:44436, url.original: /package/endpoint/0.18.0
[00:02:20]                 │ info [docker:registry] 2021/05/26 02:11:31 source.ip: 172.17.0.1:44440, url.original: /package/endpoint/0.18.0/
[00:02:22]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:23]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:23]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:23]                 │ debg navigateToActualUrl http://localhost:61161/app/security/administration/endpoints
[00:02:23]                 │ debg browser[INFO] http://localhost:61161/app/security/administration/endpoints?_t=1621995094292 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:23]                 │
[00:02:23]                 │ debg browser[INFO] http://localhost:61161/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:23]                 │ debg currentUrl = http://localhost:61161/app/security/administration/endpoints
[00:02:23]                 │          appUrl = http://localhost:61161/app/security/administration/endpoints
[00:02:23]                 │ debg TestSubjects.find(kibanaChrome)
[00:02:23]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:24]                 │ debg isGlobalLoadingIndicatorVisible
[00:02:24]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:24]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:24]                 │ proc [kibana]   log   [02:11:35.327] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:24]                 │ info [docker:registry] 2021/05/26 02:11:35 source.ip: 172.17.0.1:44452, url.original: /search?experimental=true&kibana.version=7.14.0
[00:02:24]                 │ proc [kibana]   log   [02:11:35.742] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:24]                 │ info [docker:registry] 2021/05/26 02:11:35 source.ip: 172.17.0.1:44456, url.original: /search?category=security&kibana.version=7.14.0
[00:02:24]                 │ proc [kibana]   log   [02:11:35.832] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:24]                 │ info [docker:registry] 2021/05/26 02:11:35 source.ip: 172.17.0.1:44460, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:24]                 │ proc [kibana]   log   [02:11:35.868] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:24]                 │ info [docker:registry] 2021/05/26 02:11:35 source.ip: 172.17.0.1:44464, url.original: /search?category=security&kibana.version=7.14.0
[00:02:25]                 │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:26]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:26]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:26]                 │ debg navigateToActualUrl http://localhost:61161/app/security/administration/policy/9ab9f6f4-96ac-4e0b-ab78-7dcc5c2d40bc
[00:02:26]                 │ debg browser[INFO] http://localhost:61161/app/security/administration/policy/9ab9f6f4-96ac-4e0b-ab78-7dcc5c2d40bc?_t=1621995097360 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:26]                 │
[00:02:26]                 │ debg browser[INFO] http://localhost:61161/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:26]                 │ debg currentUrl = http://localhost:61161/app/security/administration/policy/9ab9f6f4-96ac-4e0b-ab78-7dcc5c2d40bc
[00:02:26]                 │          appUrl = http://localhost:61161/app/security/administration/policy/9ab9f6f4-96ac-4e0b-ab78-7dcc5c2d40bc
[00:02:26]                 │ debg TestSubjects.find(kibanaChrome)
[00:02:26]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:27]                 │ proc [kibana]   log   [02:11:38.069] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:27]                 │ info [docker:registry] 2021/05/26 02:11:38 source.ip: 172.17.0.1:44472, url.original: /search?experimental=true&kibana.version=7.14.0
[00:02:27]                 │ debg isGlobalLoadingIndicatorVisible
[00:02:27]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:27]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:27]                 │ proc [kibana]   log   [02:11:38.456] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:27]                 │ info [docker:registry] 2021/05/26 02:11:38 source.ip: 172.17.0.1:44478, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:28]                 │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:29]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:29]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:29]                 │ debg TestSubjects.find(policyWindowsEvent_process)
[00:02:29]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_process"]') with timeout=10000
[00:02:29]                 └- ✓ pass  (9.4s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should persist update on the screen"
[00:02:29]               └-> "after each" hook for "should persist update on the screen"
[00:02:32]               └-> should have updated policy data in overall Agent Policy
[00:02:32]                 └-> "before each" hook: global before each for "should have updated policy data in overall Agent Policy"
[00:02:32]                 └-> "before each" hook for "should have updated policy data in overall Agent Policy"
[00:02:34]                   │ info Using cached retrieval of endpoint package
[00:02:35]                   │ proc [kibana]   log   [02:11:46.130] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:35]                   │ proc [kibana]   log   [02:11:46.131] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:35]                   │ info [docker:registry] 2021/05/26 02:11:46 source.ip: 172.17.0.1:44504, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:35]                   │ info [docker:registry] 2021/05/26 02:11:46 source.ip: 172.17.0.1:44508, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:35]                   │ proc [kibana]   log   [02:11:46.148] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:35]                   │ info [docker:registry] 2021/05/26 02:11:46 source.ip: 172.17.0.1:44512, url.original: /package/endpoint/0.18.0
[00:02:35]                   │ info [docker:registry] 2021/05/26 02:11:46 source.ip: 172.17.0.1:44516, url.original: /package/endpoint/0.18.0/
[00:02:36]                   │ debg navigateToActualUrl http://localhost:61161/app/security/administration/policy/c06db222-52b4-42e5-8aad-ea3da8818cd2
[00:02:36]                   │ debg browser[INFO] http://localhost:61161/app/security/administration/policy/c06db222-52b4-42e5-8aad-ea3da8818cd2?_t=1621995107799 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:36]                   │
[00:02:36]                   │ debg browser[INFO] http://localhost:61161/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:36]                   │ debg currentUrl = http://localhost:61161/app/security/administration/policy/c06db222-52b4-42e5-8aad-ea3da8818cd2
[00:02:36]                   │          appUrl = http://localhost:61161/app/security/administration/policy/c06db222-52b4-42e5-8aad-ea3da8818cd2
[00:02:36]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:36]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:37]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:37]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:37]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:37]                   │ proc [kibana]   log   [02:11:48.851] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:37]                   │ info [docker:registry] 2021/05/26 02:11:48 source.ip: 172.17.0.1:44524, url.original: /search?experimental=true&kibana.version=7.14.0
[00:02:38]                   │ proc [kibana]   log   [02:11:49.283] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:38]                   │ info [docker:registry] 2021/05/26 02:11:49 source.ip: 172.17.0.1:44528, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:39]                   │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:39]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:39]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:39]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_file']/../label') with timeout=10000
[00:02:39]                 │ debg Find.byXPath('//input[@data-test-subj='policyLinuxEvent_file']/../label') with timeout=10000
[00:02:39]                 │ debg Find.byXPath('//input[@data-test-subj='policyMacEvent_file']/../label') with timeout=10000
[00:02:41]                 │ warn WebElementWrapper.click: element click intercepted: Element <label class="euiCheckbox__label" for="ibabe7e45-bdc7-11eb-8ace-73b7b0ff95ee">...</label> is not clickable at point (447, 60). Other element would receive the click: <div class="euiFlexGroup euiFlexGroup--alignItemsCenter euiFlexGroup--directionRow header__breadcrumbsWithExtensionContainer">...</div>
[00:02:41]                 │        (Session info: headless chrome=90.0.4430.212)
[00:02:41]                 │ debg finding element 'By(xpath, //input[@data-test-subj='policyWindowsEvent_file']/../label)' again, 2 attempts left
[00:02:41]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:41]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:41]                 │ debg TestSubjects.find(advancedPolicyButton)
[00:02:41]                 │ debg Find.findByCssSelector('[data-test-subj="advancedPolicyButton"]') with timeout=10000
[00:02:41]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:41]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:41]                 │ debg TestSubjects.find(linux.advanced.agent.connection_delay)
[00:02:41]                 │ debg Find.findByCssSelector('[data-test-subj="linux.advanced.agent.connection_delay"]') with timeout=10000
[00:02:41]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:41]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:41]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:41]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:41]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:41]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:41]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:41]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:41]                 │ debg Clicking modal confirm
[00:02:41]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:41]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:41]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:41]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:41]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:41]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:41]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:41]                 │ proc [kibana]   log   [02:11:52.840] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:41]                 │ info [docker:registry] 2021/05/26 02:11:52 source.ip: 172.17.0.1:44540, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:41]                 │ proc [kibana]   log   [02:11:52.847] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:41]                 │ info [docker:registry] 2021/05/26 02:11:52 source.ip: 172.17.0.1:44544, url.original: /package/endpoint/0.18.0
[00:02:41]                 │ info [docker:registry] 2021/05/26 02:11:52 source.ip: 172.17.0.1:44548, url.original: /package/endpoint/0.18.0/
[00:02:44]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:44]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:44]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:44]                 └- ✓ pass  (5.0s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy"
[00:02:44]               └-> "after each" hook for "should have updated policy data in overall Agent Policy"
[00:02:47]               └-> should have cleared the advanced section when the user deletes the value
[00:02:47]                 └-> "before each" hook: global before each for "should have cleared the advanced section when the user deletes the value"
[00:02:47]                 └-> "before each" hook for "should have cleared the advanced section when the user deletes the value"
[00:02:49]                   │ info Using cached retrieval of endpoint package
[00:02:50]                   │ proc [kibana]   log   [02:12:01.191] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:50]                   │ proc [kibana]   log   [02:12:01.192] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:50]                   │ info [docker:registry] 2021/05/26 02:12:01 source.ip: 172.17.0.1:44576, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:50]                   │ info [docker:registry] 2021/05/26 02:12:01 source.ip: 172.17.0.1:44580, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:50]                   │ proc [kibana]   log   [02:12:01.213] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:50]                   │ info [docker:registry] 2021/05/26 02:12:01 source.ip: 172.17.0.1:44584, url.original: /package/endpoint/0.18.0
[00:02:50]                   │ info [docker:registry] 2021/05/26 02:12:01 source.ip: 172.17.0.1:44588, url.original: /package/endpoint/0.18.0/
[00:02:51]                   │ proc [kibana]   log   [02:12:02.315] [info][plugins][securitySolution] Committed manifest 1.0.2
[00:02:51]                   │ proc [kibana]   log   [02:12:02.326] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:51]                   │ info [docker:registry] 2021/05/26 02:12:02 source.ip: 172.17.0.1:44594, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:51]                   │ proc [kibana]   log   [02:12:02.331] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:51]                   │ info [docker:registry] 2021/05/26 02:12:02 source.ip: 172.17.0.1:44598, url.original: /package/endpoint/0.18.0
[00:02:51]                   │ info [docker:registry] 2021/05/26 02:12:02 source.ip: 172.17.0.1:44602, url.original: /package/endpoint/0.18.0/
[00:02:51]                   │ debg navigateToActualUrl http://localhost:61161/app/security/administration/policy/354fc3e9-41a2-4f33-9612-1416531d7e03
[00:02:52]                   │ debg browser[INFO] http://localhost:61161/app/security/administration/policy/354fc3e9-41a2-4f33-9612-1416531d7e03?_t=1621995122825 340 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:52]                   │
[00:02:52]                   │ debg browser[INFO] http://localhost:61161/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:52]                   │ debg currentUrl = http://localhost:61161/app/security/administration/policy/354fc3e9-41a2-4f33-9612-1416531d7e03
[00:02:52]                   │          appUrl = http://localhost:61161/app/security/administration/policy/354fc3e9-41a2-4f33-9612-1416531d7e03
[00:02:52]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:52]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:52]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:52]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:52]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:53]                   │ proc [kibana]   log   [02:12:03.945] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:53]                   │ info [docker:registry] 2021/05/26 02:12:03 source.ip: 172.17.0.1:44610, url.original: /search?experimental=true&kibana.version=7.14.0
[00:02:53]                   │ proc [kibana]   log   [02:12:04.579] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:53]                   │ info [docker:registry] 2021/05/26 02:12:04 source.ip: 172.17.0.1:44616, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:54]                   │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:55]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:55]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:55]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:55]                 │ debg TestSubjects.find(advancedPolicyButton)
[00:02:55]                 │ debg Find.findByCssSelector('[data-test-subj="advancedPolicyButton"]') with timeout=10000
[00:02:55]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:55]                 │ debg TestSubjects.find(linux.advanced.agent.connection_delay)
[00:02:55]                 │ debg Find.findByCssSelector('[data-test-subj="linux.advanced.agent.connection_delay"]') with timeout=10000
[00:02:55]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:55]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:55]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:55]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:55]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:55]                 │ debg Clicking modal confirm
[00:02:55]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:55]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:55]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:55]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:55]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:55]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:55]                 │ proc [kibana]   log   [02:12:06.568] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:55]                 │ info [docker:registry] 2021/05/26 02:12:06 source.ip: 172.17.0.1:44622, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:55]                 │ proc [kibana]   log   [02:12:06.573] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:55]                 │ info [docker:registry] 2021/05/26 02:12:06 source.ip: 172.17.0.1:44626, url.original: /package/endpoint/0.18.0
[00:02:55]                 │ info [docker:registry] 2021/05/26 02:12:06 source.ip: 172.17.0.1:44630, url.original: /package/endpoint/0.18.0/
[00:02:58]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:58]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:58]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:58]                 │ info Taking screenshot "/dev/shm/workspace/kibana/x-pack/test/functional/screenshots/failure/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value.png"
[00:02:58]                 │ info Current URL is: http://localhost:61161/app/security/administration/policy/354fc3e9-41a2-4f33-9612-1416531d7e03
[00:02:58]                 │ info Saving page source to: /dev/shm/workspace/kibana/x-pack/test/functional/failure_debug/html/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value.html
[00:02:58]                 └- ✖ fail: endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value
[00:02:58]                 │       Error: expected [ { id: '354fc3e9-41a2-4f33-9612-1416531d7e03',
[00:02:58]                 │     revision: 3,
[00:02:58]                 │     name: 'Protect East Coast',
[00:02:58]                 │     type: 'endpoint',
[00:02:58]                 │     data_stream: { namespace: 'default' },
[00:02:58]                 │     use_output: 'default',
[00:02:58]                 │     artifact_manifest: 
[00:02:58]                 │      { schema_version: 'v1',
[00:02:58]                 │        manifest_version: '1.0.2',
[00:02:58]                 │        artifacts: [Object] },
[00:02:58]                 │     policy: { linux: [Object], windows: [Object], mac: [Object] },
[00:02:58]                 │     meta: { package: [Object] } } ] to sort of equal [ { id: '354fc3e9-41a2-4f33-9612-1416531d7e03',
[00:02:58]                 │     revision: 2,
[00:02:58]                 │     data_stream: { namespace: 'default' },
[00:02:58]                 │     name: 'Protect East Coast',
[00:02:58]                 │     meta: { package: [Object] },
[00:02:58]                 │     artifact_manifest: 
[00:02:58]                 │      { artifacts: [Object],
[00:02:58]                 │        manifest_version: '1.0.2',
[00:02:58]                 │        schema_version: 'v1' },
[00:02:58]                 │     policy: { linux: [Object], mac: [Object], windows: [Object] },
[00:02:58]                 │     type: 'endpoint',
[00:02:58]                 │     use_output: 'default' } ]
[00:02:58]                 │       + expected - actual
[00:02:58]                 │ 
[00:02:58]                 │                  "encoded_size": 22
[00:02:58]                 │                  "encryption_algorithm": "none"
[00:02:58]                 │                  "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │                }
[00:02:58]                 │       +        "endpoint-trustlist-linux-v1": {
[00:02:58]                 │       +          "compression_algorithm": "zlib"
[00:02:58]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +          "decoded_size": 14
[00:02:58]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:02:58]                 │       +          "encoded_size": 22
[00:02:58]                 │       +          "encryption_algorithm": "none"
[00:02:58]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +        }
[00:02:58]                 │       +        "endpoint-trustlist-macos-v1": {
[00:02:58]                 │       +          "compression_algorithm": "zlib"
[00:02:58]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +          "decoded_size": 14
[00:02:58]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:02:58]                 │       +          "encoded_size": 22
[00:02:58]                 │       +          "encryption_algorithm": "none"
[00:02:58]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +        }
[00:02:58]                 │       +        "endpoint-trustlist-windows-v1": {
[00:02:58]                 │       +          "compression_algorithm": "zlib"
[00:02:58]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +          "decoded_size": 14
[00:02:58]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:02:58]                 │       +          "encoded_size": 22
[00:02:58]                 │       +          "encryption_algorithm": "none"
[00:02:58]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:02:58]                 │       +        }
[00:02:58]                 │              }
[00:02:58]                 │              "manifest_version": "1.0.2"
[00:02:58]                 │              "schema_version": "v1"
[00:02:58]                 │            }
[00:02:58]                 │ --
[00:02:58]                 │                  "supported": true
[00:02:58]                 │                }
[00:02:58]                 │              }
[00:02:58]                 │            }
[00:02:58]                 │       -    "revision": 3
[00:02:58]                 │       +    "revision": 2
[00:02:58]                 │            "type": "endpoint"
[00:02:58]                 │            "use_output": "default"
[00:02:58]                 │          }
[00:02:58]                 │        ]
[00:02:58]                 │       
[00:02:58]                 │       at Assertion.assert (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:100:11)
[00:02:58]                 │       at Assertion.eql (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:244:8)
[00:02:58]                 │       at Context.<anonymous> (test/security_solution_endpoint/apps/endpoint/policy_details.ts:369:43)
[00:02:58]                 │       at Object.apply (/dev/shm/workspace/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16)
[00:02:58]                 │ 
[00:02:58]                 │ 

Stack Trace

Error: expected [ { id: '354fc3e9-41a2-4f33-9612-1416531d7e03',
    revision: 3,
    name: 'Protect East Coast',
    type: 'endpoint',
    data_stream: { namespace: 'default' },
    use_output: 'default',
    artifact_manifest: 
     { schema_version: 'v1',
       manifest_version: '1.0.2',
       artifacts: [Object] },
    policy: { linux: [Object], windows: [Object], mac: [Object] },
    meta: { package: [Object] } } ] to sort of equal [ { id: '354fc3e9-41a2-4f33-9612-1416531d7e03',
    revision: 2,
    data_stream: { namespace: 'default' },
    name: 'Protect East Coast',
    meta: { package: [Object] },
    artifact_manifest: 
     { artifacts: [Object],
       manifest_version: '1.0.2',
       schema_version: 'v1' },
    policy: { linux: [Object], mac: [Object], windows: [Object] },
    type: 'endpoint',
    use_output: 'default' } ]
    at Assertion.assert (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:100:11)
    at Assertion.eql (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:244:8)
    at Context.<anonymous> (test/security_solution_endpoint/apps/endpoint/policy_details.ts:369:43)
    at Object.apply (/dev/shm/workspace/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16) {
  actual: '[\n' +
    '  {\n' +
    '    "artifact_manifest": {\n' +
    '      "artifacts": {\n' +
    '        "endpoint-eventfilterlist-linux-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-eventfilterlist-macos-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-eventfilterlist-windows-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-exceptionlist-linux-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-exceptionlist-macos-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-exceptionlist-windows-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '      }\n' +
    '      "manifest_version": "1.0.2"\n' +
    '      "schema_version": "v1"\n' +
    '    }\n' +
    '    "data_stream": {\n' +
    '      "namespace": "default"\n' +
    '    }\n' +
    '    "id": "354fc3e9-41a2-4f33-9612-1416531d7e03"\n' +
    '    "meta": {\n' +
    '      "package": {\n' +
    '        "name": "endpoint"\n' +
    '        "version": "0.18.0"\n' +
    '      }\n' +
    '    }\n' +
    '    "name": "Protect East Coast"\n' +
    '    "policy": {\n' +
    '      "linux": {\n' +
    '        "advanced": {\n' +
    '          "agent": {\n' +
    '            "connection_delay": "true"\n' +
    '          }\n' +
    '        }\n' +
    '        "events": {\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '      }\n' +
    '      "mac": {\n' +
    '        "events": {\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '      }\n' +
    '      "windows": {\n' +
    '        "antivirus_registration": {\n' +
    '          "enabled": false\n' +
    '        }\n' +
    '        "events": {\n' +
    '          "dll_and_driver_load": true\n' +
    '          "dns": true\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '          "registry": true\n' +
    '          "security": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '          "ransomware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '        "ransomware": {\n' +
    '          "mode": "prevent"\n' +
    '          "supported": true\n' +
    '        }\n' +
    '      }\n' +
    '    }\n' +
    '    "revision": 3\n' +
    '    "type": "endpoint"\n' +
    '    "use_output": "default"\n' +
    '  }\n' +
    ']',
  expected: '[\n' +
    '  {\n' +
    '    "artifact_manifest": {\n' +
    '      "artifacts": {\n' +
    '        "endpoint-eventfilterlist-linux-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-eventfilterlist-macos-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-eventfilterlist-windows-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-exceptionlist-linux-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-exceptionlist-macos-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-exceptionlist-windows-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-trustlist-linux-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-trustlist-macos-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-trustlist-windows-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '      }\n' +
    '      "manifest_version": "1.0.2"\n' +
    '      "schema_version": "v1"\n' +
    '    }\n' +
    '    "data_stream": {\n' +
    '      "namespace": "default"\n' +
    '    }\n' +
    '    "id": "354fc3e9-41a2-4f33-9612-1416531d7e03"\n' +
    '    "meta": {\n' +
    '      "package": {\n' +
    '        "name": "endpoint"\n' +
    '        "version": "0.18.0"\n' +
    '      }\n' +
    '    }\n' +
    '    "name": "Protect East Coast"\n' +
    '    "policy": {\n' +
    '      "linux": {\n' +
    '        "advanced": {\n' +
    '          "agent": {\n' +
    '            "connection_delay": "true"\n' +
    '          }\n' +
    '        }\n' +
    '        "events": {\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '      }\n' +
    '      "mac": {\n' +
    '        "events": {\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '      }\n' +
    '      "windows": {\n' +
    '        "antivirus_registration": {\n' +
    '          "enabled": false\n' +
    '        }\n' +
    '        "events": {\n' +
    '          "dll_and_driver_load": true\n' +
    '          "dns": true\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '          "registry": true\n' +
    '          "security": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '          "ransomware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '        "ransomware": {\n' +
    '          "mode": "prevent"\n' +
    '          "supported": true\n' +
    '        }\n' +
    '      }\n' +
    '    }\n' +
    '    "revision": 2\n' +
    '    "type": "endpoint"\n' +
    '    "use_output": "default"\n' +
    '  }\n' +
    ']',
  showDiff: true
}

Metrics [docs]

Unknown metric groups

References to deprecated APIs

id before after diff
canvas 29 25 -4
crossClusterReplication 8 6 -2
fleet 22 20 -2
globalSearch 4 2 -2
indexManagement 12 7 -5
infra 261 149 -112
lens 67 45 -22
licensing 18 15 -3
lists 239 236 -3
maps 286 208 -78
ml 121 115 -6
monitoring 109 56 -53
securitySolution 386 342 -44
stackAlerts 101 95 -6
total -342

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

cc @jbudz

@kibanamachine kibanamachine merged commit 194ae76 into elastic:7.x May 26, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport This PR is a backport of another PR

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants