feat(oidc): for using EC credentials#13926
Conversation
🚀 Benchmarks reportPackage
|
| Data stream | Previous EPS | New EPS | Diff (%) | Result |
|---|---|---|---|---|
alert |
1569.86 | 1288.66 | -281.2 (-17.91%) | 💔 |
vulnerability |
3802.28 | 2994.01 | -808.27 (-21.26%) | 💔 |
To see the full report comment with /test benchmark fullreport
|
test serverless |
* main: (42 commits) [jamf_pro] Fix `flattened` field types for non-object values (elastic#13985) [Netskope Alerts] Add text multi-field to netskope.alerts.breach.description field (elastic#13977) zscaler_zia: add strict field template mode for tcp and http_endpoint input data streams (elastic#13904) apm: Add config for tail-based sampling discard on write (elastic#13950) [CI] Add dev/coverage into backport script (elastic#13987) Update configuration updatecli for 8.x snapshot (elastic#13981) [Prometheus] Add username, password, and SSL related fields for query dataset (elastic#13969) o365: Ignore failures in rename processors for organization fields (elastic#13983) aws.firewall: Document ingested log types of AWS Network Firewall (elastic#13978) mimecast: resolve field data type conflicts between data streams (elastic#13825) [Infoblox NIOS] Handle the parsing of IPv6 address (elastic#13947) [Cribl] Fix handling of metric event type (elastic#13930) zscaler_zpa: fix handling of multiple remote IPs, and event categorisation (elastic#13755) Adding agentless deployment to the sublime security integration (elastic#13963) [integration/system] add use_performance_counters in system integration (elastic#13150) crowdstrike,m365_defender,microsoft_defender_{cloud,endpoint},sentinel_one: normalise severity handling (elastic#13955) [forgerock] Map `forgerock.response.elapsedTime` as a long not a date (elastic#13959) github: squelch errors from pagination ends (elastic#13965) cisco_secure_endpoint: squelch errors from pagination ends (elastic#13964) [Cloud Security] Cloud Asset Inventory: fixed cloud formation URL (elastic#13971) ...
💛 Build succeeded, but was flaky
Failed CI Steps
History
cc @v1v |
| - avaly/gcp-secret-manager#v1.2.0: | ||
| env: | ||
| EC_API_KEY: elastic-cloud-observability-team-qa-api-key | ||
| EC_HOST: elastic-cloud-observability-team-qa-endpoint |
There was a problem hiding this comment.
I think this secret is not really a secret, shall we use the value instead?
There was a problem hiding this comment.
When this feature was implemented, I was not totally sure if that URL should be public or not. That's why I added that as a secret.
There was a problem hiding this comment.
If possible I think it would be interesting to keep both values as secrets. It would be quick to change and both values are in the same location.
|
| - avaly/gcp-secret-manager#v1.2.0: | ||
| env: | ||
| EC_API_KEY: elastic-cloud-observability-team-qa-api-key | ||
| EC_HOST: elastic-cloud-observability-team-qa-endpoint |
There was a problem hiding this comment.
When this feature was implemented, I was not totally sure if that URL should be public or not. That's why I added that as a secret.
|
@Mergifyio backport backport-security_detection_engine-8.18 backport-security_detection_engine-8.17 |
✅ Backports have been createdDetails
|
(cherry picked from commit d20ee73)
(cherry picked from commit d20ee73)
PENDING BACKPORTS
|
@v1v please backport these changes to this branch too: Thanks! |
|
@Mergifyio backport backport-apm-8.15 backport-cloud_security_posture-1.13 |
✅ Backports have been createdDetails
|
(cherry picked from commit d20ee73)
(cherry picked from commit d20ee73)
|
@Mergifyio backport backport-security_detection_engine-8.16 backport-crowdstrike-1.52 |
✅ Backports have been createdDetails
|
(cherry picked from commit d20ee73)
(cherry picked from commit d20ee73)
|
@Mergifyio backport backport-ti_abusech-2.6 backport-crowdstrike-1.46 |
✅ Backports have been createdDetails
|
(cherry picked from commit d20ee73)
(cherry picked from commit d20ee73) # Conflicts: # .buildkite/pipeline.serverless.yml





Proposed commit message
Use the google secrets to fetch the EC credentials we provide and they are ephemeral.
Use https://github.com/avaly/gcp-secret-manager-buildkite-plugin.
Checklist
changelog.ymlfile.Author's Checklist
How to test this PR locally
In the CI, see this build based on https://github.com/elastic/integrations/tree/test/use-google-secrets
Related issues
Screenshots