Skip to content

[7.x] [ILM] Migrate to new page layout (#101927)#102077

Merged
alisonelizabeth merged 1 commit intoelastic:7.xfrom
alisonelizabeth:backport/7.x/pr-101927
Jun 14, 2021
Merged

[7.x] [ILM] Migrate to new page layout (#101927)#102077
alisonelizabeth merged 1 commit intoelastic:7.xfrom
alisonelizabeth:backport/7.x/pr-101927

Conversation

@alisonelizabeth
Copy link
Copy Markdown
Contributor

Backports the following commits to 7.x:

@alisonelizabeth alisonelizabeth added the backport This PR is a backport of another PR label Jun 14, 2021
@alisonelizabeth alisonelizabeth enabled auto-merge (squash) June 14, 2021 14:51
@kibanamachine
Copy link
Copy Markdown
Contributor

💛 Build succeeded, but was flaky


Test Failures

Kibana Pipeline / general / task-queue-process-4 / X-Pack Endpoint Functional Tests.x-pack/test/security_solution_endpoint/apps/endpoint/policy_details·ts.endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 9 times on tracked branches: https://github.com/elastic/kibana/issues/92567

[00:00:00]       │
[00:00:00]         └-: endpoint
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]           └-> "before all" hook in "endpoint"
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [.kibana_7.14.0_001/8dO9JRcvQDmJpYm1dgHWvA] update_mapping [_doc]
[00:00:00]             │ proc [kibana]   log   [15:25:25.527] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [15:25:25.530] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [15:25:25.532] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [15:25:25.533] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:44952, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.14.0
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:44950, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:44958, url.original: /search?package=elastic_agent&internal=true&experimental=true&kibana.version=7.14.0
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:44960, url.original: /search?package=fleet_server&internal=true&experimental=true&kibana.version=7.14.0
[00:00:00]             │ proc [kibana]   log   [15:25:25.581] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [15:25:25.586] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [15:25:25.587] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [15:25:25.589] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:44978, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:44968, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.14.0
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:44980, url.original: /search?package=elastic_agent&internal=true&experimental=true&kibana.version=7.14.0
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:44976, url.original: /search?package=fleet_server&internal=true&experimental=true&kibana.version=7.14.0
[00:00:00]             │ proc [kibana]   log   [15:25:25.592] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [15:25:25.595] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [15:25:25.595] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [15:25:25.596] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:44992, url.original: /package/system/0.12.0
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:44984, url.original: /package/endpoint/0.18.0
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:44994, url.original: /package/elastic_agent/0.0.6
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:44996, url.original: /package/fleet_server/0.2.1
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:45002, url.original: /package/fleet_server/0.2.1/
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:45012, url.original: /package/system/0.12.0/
[00:00:00]             │ proc [kibana]   log   [15:25:25.607] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:45004, url.original: /package/elastic_agent/0.0.6/
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:45016, url.original: /epr/fleet_server/fleet_server-0.2.1.zip
[00:00:00]             │ proc [kibana]   log   [15:25:25.614] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:45010, url.original: /package/endpoint/0.18.0/
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:45020, url.original: /epr/elastic_agent/elastic_agent-0.0.6.zip
[00:00:00]             │ proc [kibana]   log   [15:25:25.636] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [15:25:25.637] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:45026, url.original: /epr/endpoint/endpoint-0.18.0.zip
[00:00:00]             │ info [docker:registry] 2021/06/14 15:25:25 source.ip: 172.17.0.1:45028, url.original: /epr/system/system-0.12.0.zip
[00:00:02]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index lifecycle policy [.fleet-actions-results]
[00:00:02]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [.kibana_7.14.0_001/8dO9JRcvQDmJpYm1dgHWvA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [.kibana_7.14.0_001/8dO9JRcvQDmJpYm1dgHWvA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [.fleet-actions-results] for index patterns [.fleet-actions-results]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [.kibana_7.14.0_001/8dO9JRcvQDmJpYm1dgHWvA] update_mapping [_doc]
[00:00:03]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index lifecycle policy [logs-endpoint.collection-diagnostic]
[00:00:05]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding component template [metrics-elastic_agent.elastic_agent-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-elastic_agent.elastic_agent] for index patterns [metrics-elastic_agent.elastic_agent-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [logs-system.application] for index patterns [logs-system.application-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [logs-system.security] for index patterns [logs-system.security-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [logs-system.system] for index patterns [logs-system.system-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding component template [.logs-endpoint.diagnostic.collection-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding component template [metrics-endpoint.metadata-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding component template [logs-endpoint.events.network-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding component template [logs-endpoint.events.process-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding component template [logs-endpoint.events.registry-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding component template [logs-endpoint.events.library-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding component template [logs-endpoint.events.security-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding component template [metrics-endpoint.policy-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding component template [logs-endpoint.events.file-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding component template [logs-endpoint.alerts-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding component template [metrics-endpoint.metrics-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [.logs-endpoint.diagnostic.collection] for index patterns [.logs-endpoint.diagnostic.collection-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:10]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [.transform-internal-007] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] updating number_of_replicas to [0] for indices [.transform-internal-007]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-internal-007][0]]]).
[00:00:10]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:10]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]]).
[00:00:10]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [endpoint.metadata_current-default-0.18.0] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:10]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [endpoint.metadata_current-default-0.18.0] successfully completed and scheduled task in node operation
[00:00:12]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [.kibana_7.14.0_001/8dO9JRcvQDmJpYm1dgHWvA] update_mapping [_doc]
[00:00:13]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [.kibana_7.14.0_001/8dO9JRcvQDmJpYm1dgHWvA] update_mapping [_doc]
[00:00:14]             │ proc [kibana]   log   [15:25:38.700] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:14]             │ info [docker:registry] 2021/06/14 15:25:38 source.ip: 172.17.0.1:45086, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.14.0
[00:00:14]             │ proc [kibana]   log   [15:25:38.725] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:14]             │ info [docker:registry] 2021/06/14 15:25:38 source.ip: 172.17.0.1:45090, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.14.0
[00:00:14]             │ proc [kibana]   log   [15:25:38.734] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:14]             │ info [docker:registry] 2021/06/14 15:25:38 source.ip: 172.17.0.1:45094, url.original: /package/system/0.12.0
[00:00:14]             │ info [docker:registry] 2021/06/14 15:25:38 source.ip: 172.17.0.1:45098, url.original: /package/system/0.12.0/
[00:00:14]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [.kibana_7.14.0_001/8dO9JRcvQDmJpYm1dgHWvA] update_mapping [_doc]
[00:00:16]             │ proc [kibana]   log   [15:25:40.734] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:16]             │ info [docker:registry] 2021/06/14 15:25:40 source.ip: 172.17.0.1:45106, url.original: /search?package=fleet_server&internal=true&experimental=true&kibana.version=7.14.0
[00:00:16]             │ proc [kibana]   log   [15:25:40.754] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:16]             │ info [docker:registry] 2021/06/14 15:25:40 source.ip: 172.17.0.1:45110, url.original: /search?package=fleet_server&internal=true&experimental=true&kibana.version=7.14.0
[00:00:16]             │ proc [kibana]   log   [15:25:40.762] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:16]             │ info [docker:registry] 2021/06/14 15:25:40 source.ip: 172.17.0.1:45114, url.original: /package/fleet_server/0.2.1
[00:00:16]             │ info [docker:registry] 2021/06/14 15:25:40 source.ip: 172.17.0.1:45118, url.original: /package/fleet_server/0.2.1/
[00:00:18]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [.fleet-enrollment-api-keys-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] updating number_of_replicas to [0] for indices [.fleet-enrollment-api-keys-7]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-enrollment-api-keys-7][0]]]).
[00:00:20]             │ proc [kibana]   log   [15:25:44.759] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:20]             │ proc [kibana]   log   [15:25:44.769] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:20]             │ info [docker:registry] 2021/06/14 15:25:44 source.ip: 172.17.0.1:45130, url.original: /search?package=system&internal=true&experimental=true&kibana.version=7.14.0
[00:00:20]             │ info [docker:registry] 2021/06/14 15:25:44 source.ip: 172.17.0.1:45134, url.original: /search?package=fleet_server&internal=true&experimental=true&kibana.version=7.14.0
[00:00:20]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] [.fleet-policies-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:20]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] updating number_of_replicas to [0] for indices [.fleet-policies-7]
[00:00:20]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623683949733539256] Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-policies-7][0]]]).
[00:00:52]           └-: When on the Endpoint Policy Details Page
[00:00:52]             └-> "before all" hook in "When on the Endpoint Policy Details Page"
[00:01:59]             └-: and the save button is clicked
[00:01:59]               └-> "before all" hook for "should display success toast on successful save"
[00:01:59]               └-> should display success toast on successful save
[00:01:59]                 └-> "before each" hook: global before each for "should display success toast on successful save"
[00:01:59]                 └-> "before each" hook for "should display success toast on successful save"
[00:02:01]                   │ info Using cached retrieval of endpoint package
[00:02:01]                   │ proc [kibana]   log   [15:27:26.361] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:01]                   │ info [docker:registry] 2021/06/14 15:27:26 source.ip: 172.17.0.1:46728, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:01]                   │ proc [kibana]   log   [15:27:26.376] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:01]                   │ info [docker:registry] 2021/06/14 15:27:26 source.ip: 172.17.0.1:46732, url.original: /package/endpoint/0.18.0
[00:02:01]                   │ info [docker:registry] 2021/06/14 15:27:26 source.ip: 172.17.0.1:46736, url.original: /package/endpoint/0.18.0/
[00:02:02]                   │ proc [kibana]   log   [15:27:27.516] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:02]                   │ info [docker:registry] 2021/06/14 15:27:27 source.ip: 172.17.0.1:46742, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:03]                   │ debg navigateToActualUrl http://localhost:6141/app/security/administration/policy/a505b476-9b10-4abc-8311-42424727fbbd
[00:02:03]                   │ debg browser[INFO] http://localhost:6141/app/security/administration/policy/a505b476-9b10-4abc-8311-42424727fbbd?_t=1623684448020 339 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:03]                   │
[00:02:03]                   │ debg browser[INFO] http://localhost:6141/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:03]                   │ debg currentUrl = http://localhost:6141/app/security/administration/policy/a505b476-9b10-4abc-8311-42424727fbbd
[00:02:03]                   │          appUrl = http://localhost:6141/app/security/administration/policy/a505b476-9b10-4abc-8311-42424727fbbd
[00:02:03]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:03]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:04]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:04]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:04]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:04]                   │ proc [kibana]   log   [15:27:29.230] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:04]                   │ info [docker:registry] 2021/06/14 15:27:29 source.ip: 172.17.0.1:46750, url.original: /search?experimental=true&kibana.version=7.14.0
[00:02:05]                   │ proc [kibana]   log   [15:27:29.726] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:05]                   │ info [docker:registry] 2021/06/14 15:27:29 source.ip: 172.17.0.1:46754, url.original: /search?category=security&kibana.version=7.14.0
[00:02:05]                   │ proc [kibana]   log   [15:27:29.806] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:05]                   │ info [docker:registry] 2021/06/14 15:27:29 source.ip: 172.17.0.1:46758, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:05]                   │ proc [kibana]   log   [15:27:29.822] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:05]                   │ info [docker:registry] 2021/06/14 15:27:29 source.ip: 172.17.0.1:46762, url.original: /search?category=security&kibana.version=7.14.0
[00:02:05]                   │ proc [kibana]   log   [15:27:29.913] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:05]                   │ info [docker:registry] 2021/06/14 15:27:29 source.ip: 172.17.0.1:46766, url.original: /search?category=security&kibana.version=7.14.0
[00:02:05]                   │ proc [kibana]   log   [15:27:29.949] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:05]                   │ info [docker:registry] 2021/06/14 15:27:29 source.ip: 172.17.0.1:46770, url.original: /search?category=security&kibana.version=7.14.0
[00:02:05]                   │ proc [kibana]   log   [15:27:29.981] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:05]                   │ info [docker:registry] 2021/06/14 15:27:29 source.ip: 172.17.0.1:46774, url.original: /search?category=security&kibana.version=7.14.0
[00:02:05]                   │ proc [kibana]   log   [15:27:30.013] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:05]                   │ info [docker:registry] 2021/06/14 15:27:30 source.ip: 172.17.0.1:46778, url.original: /search?category=security&kibana.version=7.14.0
[00:02:05]                   │ proc [kibana]   log   [15:27:30.046] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:05]                   │ info [docker:registry] 2021/06/14 15:27:30 source.ip: 172.17.0.1:46782, url.original: /search?category=security&kibana.version=7.14.0
[00:02:05]                   │ proc [kibana]   log   [15:27:30.076] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:05]                   │ info [docker:registry] 2021/06/14 15:27:30 source.ip: 172.17.0.1:46786, url.original: /search?category=security&kibana.version=7.14.0
[00:02:06]                   │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:06]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:06]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:06]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_dns']/../label') with timeout=10000
[00:02:06]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:06]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:06]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:06]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:06]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:06]                 │ debg Clicking modal confirm
[00:02:06]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:06]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:06]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:06]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:06]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:06]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:06]                 │ proc [kibana]   log   [15:27:31.610] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:06]                 │ info [docker:registry] 2021/06/14 15:27:31 source.ip: 172.17.0.1:46794, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:06]                 │ proc [kibana]   log   [15:27:31.615] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:06]                 │ info [docker:registry] 2021/06/14 15:27:31 source.ip: 172.17.0.1:46798, url.original: /package/endpoint/0.18.0
[00:02:06]                 │ info [docker:registry] 2021/06/14 15:27:31 source.ip: 172.17.0.1:46802, url.original: /package/endpoint/0.18.0/
[00:02:08]                 │ proc [kibana]   log   [15:27:33.556] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:08]                 │ info [docker:registry] 2021/06/14 15:27:33 source.ip: 172.17.0.1:46810, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:09]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:09]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:09]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:09]                 │ debg TestSubjects.getVisibleText(policyDetailsSuccessMessage)
[00:02:09]                 │ debg TestSubjects.find(policyDetailsSuccessMessage)
[00:02:09]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=10000
[00:02:09]                 └- ✓ pass  (3.3s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should display success toast on successful save"
[00:02:09]               └-> "after each" hook for "should display success toast on successful save"
[00:02:13]               └-> should persist update on the screen
[00:02:13]                 └-> "before each" hook: global before each for "should persist update on the screen"
[00:02:13]                 └-> "before each" hook for "should persist update on the screen"
[00:02:15]                   │ info Using cached retrieval of endpoint package
[00:02:15]                   │ proc [kibana]   log   [15:27:40.371] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:15]                   │ info [docker:registry] 2021/06/14 15:27:40 source.ip: 172.17.0.1:46834, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:15]                   │ proc [kibana]   log   [15:27:40.387] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:15]                   │ info [docker:registry] 2021/06/14 15:27:40 source.ip: 172.17.0.1:46838, url.original: /package/endpoint/0.18.0
[00:02:15]                   │ info [docker:registry] 2021/06/14 15:27:40 source.ip: 172.17.0.1:46842, url.original: /package/endpoint/0.18.0/
[00:02:16]                   │ proc [kibana]   log   [15:27:41.604] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:16]                   │ info [docker:registry] 2021/06/14 15:27:41 source.ip: 172.17.0.1:46848, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:17]                   │ debg navigateToActualUrl http://localhost:6141/app/security/administration/policy/20904ce5-38e9-45a6-9352-255d3fe8220e
[00:02:17]                   │ debg browser[INFO] http://localhost:6141/app/security/administration/policy/20904ce5-38e9-45a6-9352-255d3fe8220e?_t=1623684462051 339 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:17]                   │
[00:02:17]                   │ debg browser[INFO] http://localhost:6141/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:17]                   │ debg currentUrl = http://localhost:6141/app/security/administration/policy/20904ce5-38e9-45a6-9352-255d3fe8220e
[00:02:17]                   │          appUrl = http://localhost:6141/app/security/administration/policy/20904ce5-38e9-45a6-9352-255d3fe8220e
[00:02:17]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:17]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:18]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:18]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:18]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:18]                   │ proc [kibana]   log   [15:27:43.241] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:18]                   │ info [docker:registry] 2021/06/14 15:27:43 source.ip: 172.17.0.1:46856, url.original: /search?experimental=true&kibana.version=7.14.0
[00:02:18]                   │ proc [kibana]   log   [15:27:43.522] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:18]                   │ info [docker:registry] 2021/06/14 15:27:43 source.ip: 172.17.0.1:46860, url.original: /search?category=security&kibana.version=7.14.0
[00:02:18]                   │ proc [kibana]   log   [15:27:43.603] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:18]                   │ info [docker:registry] 2021/06/14 15:27:43 source.ip: 172.17.0.1:46864, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:18]                   │ proc [kibana]   log   [15:27:43.635] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:18]                   │ info [docker:registry] 2021/06/14 15:27:43 source.ip: 172.17.0.1:46868, url.original: /search?category=security&kibana.version=7.14.0
[00:02:19]                   │ proc [kibana]   log   [15:27:43.705] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:19]                   │ info [docker:registry] 2021/06/14 15:27:43 source.ip: 172.17.0.1:46872, url.original: /search?category=security&kibana.version=7.14.0
[00:02:19]                   │ proc [kibana]   log   [15:27:43.767] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:19]                   │ info [docker:registry] 2021/06/14 15:27:43 source.ip: 172.17.0.1:46876, url.original: /search?category=security&kibana.version=7.14.0
[00:02:19]                   │ proc [kibana]   log   [15:27:43.802] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:19]                   │ info [docker:registry] 2021/06/14 15:27:43 source.ip: 172.17.0.1:46880, url.original: /search?category=security&kibana.version=7.14.0
[00:02:19]                   │ proc [kibana]   log   [15:27:43.845] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:19]                   │ info [docker:registry] 2021/06/14 15:27:43 source.ip: 172.17.0.1:46884, url.original: /search?category=security&kibana.version=7.14.0
[00:02:19]                   │ proc [kibana]   log   [15:27:43.878] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:19]                   │ info [docker:registry] 2021/06/14 15:27:43 source.ip: 172.17.0.1:46888, url.original: /search?category=security&kibana.version=7.14.0
[00:02:19]                   │ proc [kibana]   log   [15:27:43.912] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:19]                   │ info [docker:registry] 2021/06/14 15:27:43 source.ip: 172.17.0.1:46892, url.original: /search?category=security&kibana.version=7.14.0
[00:02:20]                   │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:20]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:20]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:20]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_process']/../label') with timeout=10000
[00:02:20]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:20]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:20]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:20]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:20]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:20]                 │ debg Clicking modal confirm
[00:02:20]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:20]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:20]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:20]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:20]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:20]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:20]                 │ proc [kibana]   log   [15:27:45.620] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:20]                 │ info [docker:registry] 2021/06/14 15:27:45 source.ip: 172.17.0.1:46900, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:20]                 │ proc [kibana]   log   [15:27:45.627] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:20]                 │ info [docker:registry] 2021/06/14 15:27:45 source.ip: 172.17.0.1:46904, url.original: /package/endpoint/0.18.0
[00:02:20]                 │ info [docker:registry] 2021/06/14 15:27:45 source.ip: 172.17.0.1:46908, url.original: /package/endpoint/0.18.0/
[00:02:22]                 │ proc [kibana]   log   [15:27:47.648] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:22]                 │ info [docker:registry] 2021/06/14 15:27:47 source.ip: 172.17.0.1:46916, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:23]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:23]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:23]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:23]                 │ debg navigateToActualUrl http://localhost:6141/app/security/administration/endpoints
[00:02:24]                 │ debg browser[INFO] http://localhost:6141/app/security/administration/endpoints?_t=1623684468653 339 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:24]                 │
[00:02:24]                 │ debg browser[INFO] http://localhost:6141/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:24]                 │ debg currentUrl = http://localhost:6141/app/security/administration/endpoints
[00:02:24]                 │          appUrl = http://localhost:6141/app/security/administration/endpoints
[00:02:24]                 │ debg TestSubjects.find(kibanaChrome)
[00:02:24]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:25]                 │ debg isGlobalLoadingIndicatorVisible
[00:02:25]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:25]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:25]                 │ proc [kibana]   log   [15:27:49.773] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:25]                 │ info [docker:registry] 2021/06/14 15:27:49 source.ip: 172.17.0.1:46924, url.original: /search?experimental=true&kibana.version=7.14.0
[00:02:25]                 │ proc [kibana]   log   [15:27:50.175] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:25]                 │ info [docker:registry] 2021/06/14 15:27:50 source.ip: 172.17.0.1:46928, url.original: /search?category=security&kibana.version=7.14.0
[00:02:25]                 │ proc [kibana]   log   [15:27:50.281] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:25]                 │ info [docker:registry] 2021/06/14 15:27:50 source.ip: 172.17.0.1:46932, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:25]                 │ proc [kibana]   log   [15:27:50.308] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:25]                 │ info [docker:registry] 2021/06/14 15:27:50 source.ip: 172.17.0.1:46936, url.original: /search?category=security&kibana.version=7.14.0
[00:02:25]                 │ proc [kibana]   log   [15:27:50.345] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:25]                 │ info [docker:registry] 2021/06/14 15:27:50 source.ip: 172.17.0.1:46940, url.original: /search?category=security&kibana.version=7.14.0
[00:02:25]                 │ proc [kibana]   log   [15:27:50.377] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:25]                 │ info [docker:registry] 2021/06/14 15:27:50 source.ip: 172.17.0.1:46944, url.original: /search?category=security&kibana.version=7.14.0
[00:02:25]                 │ proc [kibana]   log   [15:27:50.406] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:25]                 │ info [docker:registry] 2021/06/14 15:27:50 source.ip: 172.17.0.1:46948, url.original: /search?category=security&kibana.version=7.14.0
[00:02:25]                 │ proc [kibana]   log   [15:27:50.435] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:25]                 │ info [docker:registry] 2021/06/14 15:27:50 source.ip: 172.17.0.1:46952, url.original: /search?category=security&kibana.version=7.14.0
[00:02:26]                 │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:27]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:27]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:27]                 │ debg navigateToActualUrl http://localhost:6141/app/security/administration/policy/20904ce5-38e9-45a6-9352-255d3fe8220e
[00:02:27]                 │ debg browser[INFO] http://localhost:6141/app/security/administration/policy/20904ce5-38e9-45a6-9352-255d3fe8220e?_t=1623684471787 339 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:27]                 │
[00:02:27]                 │ debg browser[INFO] http://localhost:6141/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:27]                 │ debg currentUrl = http://localhost:6141/app/security/administration/policy/20904ce5-38e9-45a6-9352-255d3fe8220e
[00:02:27]                 │          appUrl = http://localhost:6141/app/security/administration/policy/20904ce5-38e9-45a6-9352-255d3fe8220e
[00:02:27]                 │ debg TestSubjects.find(kibanaChrome)
[00:02:27]                 │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:27]                 │ debg isGlobalLoadingIndicatorVisible
[00:02:27]                 │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:27]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:27]                 │ proc [kibana]   log   [15:27:52.663] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:28]                 │ info [docker:registry] 2021/06/14 15:27:52 source.ip: 172.17.0.1:46960, url.original: /search?experimental=true&kibana.version=7.14.0
[00:02:28]                 │ proc [kibana]   log   [15:27:53.010] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:28]                 │ info [docker:registry] 2021/06/14 15:27:53 source.ip: 172.17.0.1:46968, url.original: /search?category=security&kibana.version=7.14.0
[00:02:28]                 │ proc [kibana]   log   [15:27:53.106] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:28]                 │ info [docker:registry] 2021/06/14 15:27:53 source.ip: 172.17.0.1:46972, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:28]                 │ proc [kibana]   log   [15:27:53.161] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:28]                 │ info [docker:registry] 2021/06/14 15:27:53 source.ip: 172.17.0.1:46976, url.original: /search?category=security&kibana.version=7.14.0
[00:02:28]                 │ proc [kibana]   log   [15:27:53.206] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:28]                 │ info [docker:registry] 2021/06/14 15:27:53 source.ip: 172.17.0.1:46980, url.original: /search?category=security&kibana.version=7.14.0
[00:02:28]                 │ proc [kibana]   log   [15:27:53.239] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:28]                 │ info [docker:registry] 2021/06/14 15:27:53 source.ip: 172.17.0.1:46984, url.original: /search?category=security&kibana.version=7.14.0
[00:02:28]                 │ proc [kibana]   log   [15:27:53.269] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:28]                 │ info [docker:registry] 2021/06/14 15:27:53 source.ip: 172.17.0.1:46988, url.original: /search?category=security&kibana.version=7.14.0
[00:02:28]                 │ proc [kibana]   log   [15:27:53.302] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:28]                 │ info [docker:registry] 2021/06/14 15:27:53 source.ip: 172.17.0.1:46992, url.original: /search?category=security&kibana.version=7.14.0
[00:02:28]                 │ proc [kibana]   log   [15:27:53.332] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:28]                 │ info [docker:registry] 2021/06/14 15:27:53 source.ip: 172.17.0.1:46996, url.original: /search?category=security&kibana.version=7.14.0
[00:02:28]                 │ proc [kibana]   log   [15:27:53.358] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:28]                 │ info [docker:registry] 2021/06/14 15:27:53 source.ip: 172.17.0.1:47000, url.original: /search?category=security&kibana.version=7.14.0
[00:02:29]                 │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:30]                 │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:30]                 │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:30]                 │ debg TestSubjects.find(policyWindowsEvent_process)
[00:02:30]                 │ debg Find.findByCssSelector('[data-test-subj="policyWindowsEvent_process"]') with timeout=10000
[00:02:30]                 └- ✓ pass  (9.4s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should persist update on the screen"
[00:02:30]               └-> "after each" hook for "should persist update on the screen"
[00:02:33]               └-> should have updated policy data in overall Agent Policy
[00:02:33]                 └-> "before each" hook: global before each for "should have updated policy data in overall Agent Policy"
[00:02:33]                 └-> "before each" hook for "should have updated policy data in overall Agent Policy"
[00:02:36]                   │ info Using cached retrieval of endpoint package
[00:02:36]                   │ proc [kibana]   log   [15:28:01.391] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:36]                   │ info [docker:registry] 2021/06/14 15:28:01 source.ip: 172.17.0.1:47028, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:36]                   │ proc [kibana]   log   [15:28:01.403] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:36]                   │ info [docker:registry] 2021/06/14 15:28:01 source.ip: 172.17.0.1:47032, url.original: /package/endpoint/0.18.0
[00:02:36]                   │ info [docker:registry] 2021/06/14 15:28:01 source.ip: 172.17.0.1:47036, url.original: /package/endpoint/0.18.0/
[00:02:38]                   │ proc [kibana]   log   [15:28:02.730] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:38]                   │ info [docker:registry] 2021/06/14 15:28:02 source.ip: 172.17.0.1:47044, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:38]                   │ debg navigateToActualUrl http://localhost:6141/app/security/administration/policy/9917bb9b-c101-430c-9b44-d09032671cfe
[00:02:38]                   │ debg browser[INFO] http://localhost:6141/app/security/administration/policy/9917bb9b-c101-430c-9b44-d09032671cfe?_t=1623684483078 339 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:38]                   │
[00:02:38]                   │ debg browser[INFO] http://localhost:6141/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:38]                   │ debg currentUrl = http://localhost:6141/app/security/administration/policy/9917bb9b-c101-430c-9b44-d09032671cfe
[00:02:38]                   │          appUrl = http://localhost:6141/app/security/administration/policy/9917bb9b-c101-430c-9b44-d09032671cfe
[00:02:38]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:38]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:39]                   │ proc [kibana]   log   [15:28:04.224] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:39]                   │ info [docker:registry] 2021/06/14 15:28:04 source.ip: 172.17.0.1:47050, url.original: /search?experimental=true&kibana.version=7.14.0
[00:02:39]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:39]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:39]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:39]                   │ proc [kibana]   log   [15:28:04.449] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:39]                   │ info [docker:registry] 2021/06/14 15:28:04 source.ip: 172.17.0.1:47058, url.original: /search?category=security&kibana.version=7.14.0
[00:02:39]                   │ proc [kibana]   log   [15:28:04.527] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:39]                   │ info [docker:registry] 2021/06/14 15:28:04 source.ip: 172.17.0.1:47062, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:39]                   │ proc [kibana]   log   [15:28:04.595] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:39]                   │ info [docker:registry] 2021/06/14 15:28:04 source.ip: 172.17.0.1:47066, url.original: /search?category=security&kibana.version=7.14.0
[00:02:39]                   │ proc [kibana]   log   [15:28:04.638] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:39]                   │ info [docker:registry] 2021/06/14 15:28:04 source.ip: 172.17.0.1:47070, url.original: /search?category=security&kibana.version=7.14.0
[00:02:40]                   │ proc [kibana]   log   [15:28:04.672] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:40]                   │ info [docker:registry] 2021/06/14 15:28:04 source.ip: 172.17.0.1:47074, url.original: /search?category=security&kibana.version=7.14.0
[00:02:40]                   │ proc [kibana]   log   [15:28:04.712] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:40]                   │ info [docker:registry] 2021/06/14 15:28:04 source.ip: 172.17.0.1:47078, url.original: /search?category=security&kibana.version=7.14.0
[00:02:40]                   │ proc [kibana]   log   [15:28:04.765] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:40]                   │ info [docker:registry] 2021/06/14 15:28:04 source.ip: 172.17.0.1:47084, url.original: /search?category=security&kibana.version=7.14.0
[00:02:40]                   │ proc [kibana]   log   [15:28:04.810] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:40]                   │ info [docker:registry] 2021/06/14 15:28:04 source.ip: 172.17.0.1:47088, url.original: /search?category=security&kibana.version=7.14.0
[00:02:40]                   │ proc [kibana]   log   [15:28:04.844] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:40]                   │ info [docker:registry] 2021/06/14 15:28:04 source.ip: 172.17.0.1:47092, url.original: /search?category=security&kibana.version=7.14.0
[00:02:41]                   │ debg --- retry.tryForTime error: [data-test-subj="globalLoadingIndicator"] is not displayed
[00:02:41]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:41]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:41]                 │ debg Find.byXPath('//input[@data-test-subj='policyWindowsEvent_file']/../label') with timeout=10000
[00:02:41]                 │ debg Find.byXPath('//input[@data-test-subj='policyLinuxEvent_file']/../label') with timeout=10000
[00:02:41]                 │ debg Find.byXPath('//input[@data-test-subj='policyMacEvent_file']/../label') with timeout=10000
[00:02:42]                 │ warn WebElementWrapper.click: element click intercepted: Element <label class="euiCheckbox__label" for="i1ce250d5-cd25-11eb-b2b2-bbc1db6b15ae">...</label> is not clickable at point (447, 60). Other element would receive the click: <div class="euiFlexGroup euiFlexGroup--alignItemsCenter euiFlexGroup--directionRow header__breadcrumbsWithExtensionContainer">...</div>
[00:02:42]                 │        (Session info: headless chrome=91.0.4472.101)
[00:02:42]                 │ debg finding element 'By(xpath, //input[@data-test-subj='policyWindowsEvent_file']/../label)' again, 2 attempts left
[00:02:43]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:43]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:43]                 │ debg TestSubjects.find(advancedPolicyButton)
[00:02:43]                 │ debg Find.findByCssSelector('[data-test-subj="advancedPolicyButton"]') with timeout=10000
[00:02:43]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:43]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:43]                 │ debg TestSubjects.find(linux.advanced.agent.connection_delay)
[00:02:43]                 │ debg Find.findByCssSelector('[data-test-subj="linux.advanced.agent.connection_delay"]') with timeout=10000
[00:02:43]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:43]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:43]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:43]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:43]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:43]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:43]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:43]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:43]                 │ debg Clicking modal confirm
[00:02:43]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:43]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:43]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:43]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:43]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:43]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:43]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:43]                 │ proc [kibana]   log   [15:28:08.348] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:43]                 │ info [docker:registry] 2021/06/14 15:28:08 source.ip: 172.17.0.1:47102, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:43]                 │ proc [kibana]   log   [15:28:08.354] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:43]                 │ info [docker:registry] 2021/06/14 15:28:08 source.ip: 172.17.0.1:47106, url.original: /package/endpoint/0.18.0
[00:02:43]                 │ info [docker:registry] 2021/06/14 15:28:08 source.ip: 172.17.0.1:47110, url.original: /package/endpoint/0.18.0/
[00:02:45]                 │ proc [kibana]   log   [15:28:09.762] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:45]                 │ info [docker:registry] 2021/06/14 15:28:09 source.ip: 172.17.0.1:47116, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:46]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:02:46]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:02:46]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:02:46]                 │ proc [kibana]   log   [15:28:11.401] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:46]                 │ info [docker:registry] 2021/06/14 15:28:11 source.ip: 172.17.0.1:47126, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:46]                 └- ✓ pass  (5.1s) "endpoint When on the Endpoint Policy Details Page and the save button is clicked should have updated policy data in overall Agent Policy"
[00:02:46]               └-> "after each" hook for "should have updated policy data in overall Agent Policy"
[00:02:50]               └-> should have cleared the advanced section when the user deletes the value
[00:02:50]                 └-> "before each" hook: global before each for "should have cleared the advanced section when the user deletes the value"
[00:02:50]                 └-> "before each" hook for "should have cleared the advanced section when the user deletes the value"
[00:02:52]                   │ info Using cached retrieval of endpoint package
[00:02:52]                   │ proc [kibana]   log   [15:28:17.429] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:52]                   │ info [docker:registry] 2021/06/14 15:28:17 source.ip: 172.17.0.1:47148, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:52]                   │ proc [kibana]   log   [15:28:17.473] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:52]                   │ info [docker:registry] 2021/06/14 15:28:17 source.ip: 172.17.0.1:47152, url.original: /package/endpoint/0.18.0
[00:02:52]                   │ info [docker:registry] 2021/06/14 15:28:17 source.ip: 172.17.0.1:47156, url.original: /package/endpoint/0.18.0/
[00:02:54]                   │ proc [kibana]   log   [15:28:18.810] [info][plugins][securitySolution] Committed manifest 1.0.2
[00:02:54]                   │ proc [kibana]   log   [15:28:18.819] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:54]                   │ info [docker:registry] 2021/06/14 15:28:18 source.ip: 172.17.0.1:47162, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:54]                   │ proc [kibana]   log   [15:28:18.824] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:54]                   │ info [docker:registry] 2021/06/14 15:28:18 source.ip: 172.17.0.1:47166, url.original: /package/endpoint/0.18.0
[00:02:54]                   │ proc [kibana]   log   [15:28:18.829] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:54]                   │ info [docker:registry] 2021/06/14 15:28:18 source.ip: 172.17.0.1:47172, url.original: /package/endpoint/0.18.0/
[00:02:54]                   │ info [docker:registry] 2021/06/14 15:28:18 source.ip: 172.17.0.1:47174, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:54]                   │ debg navigateToActualUrl http://localhost:6141/app/security/administration/policy/3a6abc1f-1a91-4191-8b19-28b2334e4797
[00:02:54]                   │ debg browser[INFO] http://localhost:6141/app/security/administration/policy/3a6abc1f-1a91-4191-8b19-28b2334e4797?_t=1623684499107 339 Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'unsafe-eval' 'self'". Either the 'unsafe-inline' keyword, a hash ('sha256-P5polb1UreUSOe5V/Pv7tc+yeZuJXiOi/3fqhGsU7BE='), or a nonce ('nonce-...') is required to enable inline execution.
[00:02:54]                   │
[00:02:54]                   │ debg browser[INFO] http://localhost:6141/bootstrap.js 41:19 "^ A single error about an inline script not firing due to content security policy is expected!"
[00:02:54]                   │ debg currentUrl = http://localhost:6141/app/security/administration/policy/3a6abc1f-1a91-4191-8b19-28b2334e4797
[00:02:54]                   │          appUrl = http://localhost:6141/app/security/administration/policy/3a6abc1f-1a91-4191-8b19-28b2334e4797
[00:02:54]                   │ debg TestSubjects.find(kibanaChrome)
[00:02:54]                   │ debg Find.findByCssSelector('[data-test-subj="kibanaChrome"]') with timeout=60000
[00:02:55]                   │ debg isGlobalLoadingIndicatorVisible
[00:02:55]                   │ debg TestSubjects.exists(globalLoadingIndicator)
[00:02:55]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="globalLoadingIndicator"]') with timeout=1500
[00:02:55]                   │ proc [kibana]   log   [15:28:20.387] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:55]                   │ info [docker:registry] 2021/06/14 15:28:20 source.ip: 172.17.0.1:47182, url.original: /search?experimental=true&kibana.version=7.14.0
[00:02:56]                   │ debg TestSubjects.exists(globalLoadingIndicator-hidden)
[00:02:56]                   │ debg Find.existsByCssSelector('[data-test-subj="globalLoadingIndicator-hidden"]') with timeout=100000
[00:02:56]                   │ proc [kibana]   log   [15:28:20.847] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:56]                   │ info [docker:registry] 2021/06/14 15:28:20 source.ip: 172.17.0.1:47186, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:56]                   │ proc [kibana]   log   [15:28:20.952] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:56]                   │ info [docker:registry] 2021/06/14 15:28:20 source.ip: 172.17.0.1:47190, url.original: /search?category=security&kibana.version=7.14.0
[00:02:56]                   │ proc [kibana]   log   [15:28:21.044] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:56]                   │ info [docker:registry] 2021/06/14 15:28:21 source.ip: 172.17.0.1:47194, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:56]                   │ proc [kibana]   log   [15:28:21.080] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:56]                   │ info [docker:registry] 2021/06/14 15:28:21 source.ip: 172.17.0.1:47200, url.original: /search?category=security&kibana.version=7.14.0
[00:02:56]                   │ proc [kibana]   log   [15:28:21.121] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:56]                   │ info [docker:registry] 2021/06/14 15:28:21 source.ip: 172.17.0.1:47204, url.original: /search?category=security&kibana.version=7.14.0
[00:02:56]                   │ proc [kibana]   log   [15:28:21.157] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:56]                   │ info [docker:registry] 2021/06/14 15:28:21 source.ip: 172.17.0.1:47208, url.original: /search?category=security&kibana.version=7.14.0
[00:02:56]                   │ proc [kibana]   log   [15:28:21.193] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:56]                   │ info [docker:registry] 2021/06/14 15:28:21 source.ip: 172.17.0.1:47212, url.original: /search?category=security&kibana.version=7.14.0
[00:02:56]                   │ proc [kibana]   log   [15:28:21.230] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:56]                   │ info [docker:registry] 2021/06/14 15:28:21 source.ip: 172.17.0.1:47216, url.original: /search?category=security&kibana.version=7.14.0
[00:02:56]                   │ proc [kibana]   log   [15:28:21.266] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:56]                   │ info [docker:registry] 2021/06/14 15:28:21 source.ip: 172.17.0.1:47220, url.original: /search?category=security&kibana.version=7.14.0
[00:02:56]                   │ proc [kibana]   log   [15:28:21.302] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:56]                   │ info [docker:registry] 2021/06/14 15:28:21 source.ip: 172.17.0.1:47224, url.original: /search?category=security&kibana.version=7.14.0
[00:02:56]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:56]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:56]                 │ debg TestSubjects.find(advancedPolicyButton)
[00:02:56]                 │ debg Find.findByCssSelector('[data-test-subj="advancedPolicyButton"]') with timeout=10000
[00:02:57]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:57]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:57]                 │ debg TestSubjects.find(linux.advanced.agent.connection_delay)
[00:02:57]                 │ debg Find.findByCssSelector('[data-test-subj="linux.advanced.agent.connection_delay"]') with timeout=10000
[00:02:57]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:57]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:57]                 │ debg TestSubjects.exists(policyDetailsPage)
[00:02:57]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsPage"]') with timeout=120000
[00:02:57]                 │ debg TestSubjects.find(policyDetailsSaveButton)
[00:02:57]                 │ debg Find.findByCssSelector('[data-test-subj="policyDetailsSaveButton"]') with timeout=10000
[00:02:57]                 │ debg TestSubjects.exists(policyDetailsConfirmModal)
[00:02:57]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsConfirmModal"]') with timeout=120000
[00:02:57]                 │ debg Clicking modal confirm
[00:02:57]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:57]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:57]                 │ debg TestSubjects.click(confirmModalConfirmButton)
[00:02:57]                 │ debg Find.clickByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:57]                 │ debg Find.findByCssSelector('[data-test-subj="confirmModalConfirmButton"]') with timeout=10000
[00:02:57]                 │ debg TestSubjects.exists(confirmModalTitleText)
[00:02:57]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="confirmModalTitleText"]') with timeout=2500
[00:02:57]                 │ proc [kibana]   log   [15:28:22.308] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:57]                 │ info [docker:registry] 2021/06/14 15:28:22 source.ip: 172.17.0.1:47230, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:02:57]                 │ proc [kibana]   log   [15:28:22.314] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:57]                 │ info [docker:registry] 2021/06/14 15:28:22 source.ip: 172.17.0.1:47234, url.original: /package/endpoint/0.18.0
[00:02:57]                 │ info [docker:registry] 2021/06/14 15:28:22 source.ip: 172.17.0.1:47238, url.original: /package/endpoint/0.18.0/
[00:02:59]                 │ proc [kibana]   log   [15:28:23.874] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:02:59]                 │ info [docker:registry] 2021/06/14 15:28:23 source.ip: 172.17.0.1:47244, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:03:00]                 │ debg --- retry.tryForTime error: [data-test-subj="confirmModalTitleText"] is not displayed
[00:03:00]                 │ debg TestSubjects.exists(policyDetailsSuccessMessage)
[00:03:00]                 │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="policyDetailsSuccessMessage"]') with timeout=120000
[00:03:00]                 │ proc [kibana]   log   [15:28:25.374] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:03:00]                 │ info [docker:registry] 2021/06/14 15:28:25 source.ip: 172.17.0.1:47252, url.original: /search?package=endpoint&internal=true&experimental=true&kibana.version=7.14.0
[00:03:00]                 │ info Taking screenshot "/dev/shm/workspace/kibana/x-pack/test/functional/screenshots/failure/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value.png"
[00:03:00]                 │ info Current URL is: http://localhost:6141/app/security/administration/policy/3a6abc1f-1a91-4191-8b19-28b2334e4797
[00:03:00]                 │ info Saving page source to: /dev/shm/workspace/kibana/x-pack/test/functional/failure_debug/html/endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value.html
[00:03:00]                 └- ✖ fail: endpoint When on the Endpoint Policy Details Page and the save button is clicked should have cleared the advanced section when the user deletes the value
[00:03:00]                 │       Error: expected [ { id: '3a6abc1f-1a91-4191-8b19-28b2334e4797',
[00:03:00]                 │     revision: 3,
[00:03:00]                 │     name: 'Protect East Coast',
[00:03:00]                 │     type: 'endpoint',
[00:03:00]                 │     data_stream: { namespace: 'default' },
[00:03:00]                 │     use_output: 'default',
[00:03:00]                 │     artifact_manifest: 
[00:03:00]                 │      { schema_version: 'v1',
[00:03:00]                 │        manifest_version: '1.0.2',
[00:03:00]                 │        artifacts: [Object] },
[00:03:00]                 │     policy: { linux: [Object], windows: [Object], mac: [Object] },
[00:03:00]                 │     meta: { package: [Object] } } ] to sort of equal [ { id: '3a6abc1f-1a91-4191-8b19-28b2334e4797',
[00:03:00]                 │     revision: 2,
[00:03:00]                 │     data_stream: { namespace: 'default' },
[00:03:00]                 │     name: 'Protect East Coast',
[00:03:00]                 │     meta: { package: [Object] },
[00:03:00]                 │     artifact_manifest: 
[00:03:00]                 │      { artifacts: [Object],
[00:03:00]                 │        manifest_version: '1.0.2',
[00:03:00]                 │        schema_version: 'v1' },
[00:03:00]                 │     policy: { linux: [Object], mac: [Object], windows: [Object] },
[00:03:00]                 │     type: 'endpoint',
[00:03:00]                 │     use_output: 'default' } ]
[00:03:00]                 │       + expected - actual
[00:03:00]                 │ 
[00:03:00]                 │          {
[00:03:00]                 │            "artifact_manifest": {
[00:03:00]                 │              "artifacts": {
[00:03:00]                 │                "endpoint-eventfilterlist-linux-v1": {
[00:03:00]                 │       -          "compression_algorithm": "none"
[00:03:00]                 │       +          "compression_algorithm": "zlib"
[00:03:00]                 │                  "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │                  "decoded_size": 14
[00:03:00]                 │                  "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:03:00]                 │                  "encoded_size": 22
[00:03:00]                 │                  "encryption_algorithm": "none"
[00:03:00]                 │                  "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │                }
[00:03:00]                 │                "endpoint-eventfilterlist-macos-v1": {
[00:03:00]                 │       -          "compression_algorithm": "none"
[00:03:00]                 │       +          "compression_algorithm": "zlib"
[00:03:00]                 │                  "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │                  "decoded_size": 14
[00:03:00]                 │                  "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:03:00]                 │                  "encoded_size": 22
[00:03:00]                 │                  "encryption_algorithm": "none"
[00:03:00]                 │                  "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │                }
[00:03:00]                 │                "endpoint-eventfilterlist-windows-v1": {
[00:03:00]                 │       -          "compression_algorithm": "none"
[00:03:00]                 │       +          "compression_algorithm": "zlib"
[00:03:00]                 │                  "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │                  "decoded_size": 14
[00:03:00]                 │                  "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:03:00]                 │                  "encoded_size": 22
[00:03:00]                 │                  "encryption_algorithm": "none"
[00:03:00]                 │                  "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │                }
[00:03:00]                 │       +        "endpoint-exceptionlist-linux-v1": {
[00:03:00]                 │       +          "compression_algorithm": "zlib"
[00:03:00]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │       +          "decoded_size": 14
[00:03:00]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:03:00]                 │       +          "encoded_size": 22
[00:03:00]                 │       +          "encryption_algorithm": "none"
[00:03:00]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │       +        }
[00:03:00]                 │       +        "endpoint-exceptionlist-macos-v1": {
[00:03:00]                 │       +          "compression_algorithm": "zlib"
[00:03:00]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │       +          "decoded_size": 14
[00:03:00]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:03:00]                 │       +          "encoded_size": 22
[00:03:00]                 │       +          "encryption_algorithm": "none"
[00:03:00]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │       +        }
[00:03:00]                 │       +        "endpoint-exceptionlist-windows-v1": {
[00:03:00]                 │       +          "compression_algorithm": "zlib"
[00:03:00]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │       +          "decoded_size": 14
[00:03:00]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:03:00]                 │       +          "encoded_size": 22
[00:03:00]                 │       +          "encryption_algorithm": "none"
[00:03:00]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │       +        }
[00:03:00]                 │       +        "endpoint-trustlist-linux-v1": {
[00:03:00]                 │       +          "compression_algorithm": "zlib"
[00:03:00]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │       +          "decoded_size": 14
[00:03:00]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:03:00]                 │       +          "encoded_size": 22
[00:03:00]                 │       +          "encryption_algorithm": "none"
[00:03:00]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │       +        }
[00:03:00]                 │       +        "endpoint-trustlist-macos-v1": {
[00:03:00]                 │       +          "compression_algorithm": "zlib"
[00:03:00]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │       +          "decoded_size": 14
[00:03:00]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:03:00]                 │       +          "encoded_size": 22
[00:03:00]                 │       +          "encryption_algorithm": "none"
[00:03:00]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │       +        }
[00:03:00]                 │       +        "endpoint-trustlist-windows-v1": {
[00:03:00]                 │       +          "compression_algorithm": "zlib"
[00:03:00]                 │       +          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │       +          "decoded_size": 14
[00:03:00]                 │       +          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"
[00:03:00]                 │       +          "encoded_size": 22
[00:03:00]                 │       +          "encryption_algorithm": "none"
[00:03:00]                 │       +          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"
[00:03:00]                 │       +        }
[00:03:00]                 │              }
[00:03:00]                 │              "manifest_version": "1.0.2"
[00:03:00]                 │              "schema_version": "v1"
[00:03:00]                 │            }
[00:03:00]                 │ --
[00:03:00]                 │                  "supported": true
[00:03:00]                 │                }
[00:03:00]                 │              }
[00:03:00]                 │            }
[00:03:00]                 │       -    "revision": 3
[00:03:00]                 │       +    "revision": 2
[00:03:00]                 │            "type": "endpoint"
[00:03:00]                 │            "use_output": "default"
[00:03:00]                 │          }
[00:03:00]                 │        ]
[00:03:00]                 │       
[00:03:00]                 │       at Assertion.assert (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:100:11)
[00:03:00]                 │       at Assertion.eql (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:244:8)
[00:03:00]                 │       at Context.<anonymous> (test/security_solution_endpoint/apps/endpoint/policy_details.ts:369:43)
[00:03:00]                 │       at Object.apply (/dev/shm/workspace/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16)
[00:03:00]                 │ 
[00:03:00]                 │ 

Stack Trace

Error: expected [ { id: '3a6abc1f-1a91-4191-8b19-28b2334e4797',
    revision: 3,
    name: 'Protect East Coast',
    type: 'endpoint',
    data_stream: { namespace: 'default' },
    use_output: 'default',
    artifact_manifest: 
     { schema_version: 'v1',
       manifest_version: '1.0.2',
       artifacts: [Object] },
    policy: { linux: [Object], windows: [Object], mac: [Object] },
    meta: { package: [Object] } } ] to sort of equal [ { id: '3a6abc1f-1a91-4191-8b19-28b2334e4797',
    revision: 2,
    data_stream: { namespace: 'default' },
    name: 'Protect East Coast',
    meta: { package: [Object] },
    artifact_manifest: 
     { artifacts: [Object],
       manifest_version: '1.0.2',
       schema_version: 'v1' },
    policy: { linux: [Object], mac: [Object], windows: [Object] },
    type: 'endpoint',
    use_output: 'default' } ]
    at Assertion.assert (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:100:11)
    at Assertion.eql (/dev/shm/workspace/kibana/node_modules/@kbn/expect/expect.js:244:8)
    at Context.<anonymous> (test/security_solution_endpoint/apps/endpoint/policy_details.ts:369:43)
    at Object.apply (/dev/shm/workspace/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16) {
  actual: '[\n' +
    '  {\n' +
    '    "artifact_manifest": {\n' +
    '      "artifacts": {\n' +
    '        "endpoint-eventfilterlist-linux-v1": {\n' +
    '          "compression_algorithm": "none"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-eventfilterlist-macos-v1": {\n' +
    '          "compression_algorithm": "none"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-eventfilterlist-windows-v1": {\n' +
    '          "compression_algorithm": "none"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '      }\n' +
    '      "manifest_version": "1.0.2"\n' +
    '      "schema_version": "v1"\n' +
    '    }\n' +
    '    "data_stream": {\n' +
    '      "namespace": "default"\n' +
    '    }\n' +
    '    "id": "3a6abc1f-1a91-4191-8b19-28b2334e4797"\n' +
    '    "meta": {\n' +
    '      "package": {\n' +
    '        "name": "endpoint"\n' +
    '        "version": "0.18.0"\n' +
    '      }\n' +
    '    }\n' +
    '    "name": "Protect East Coast"\n' +
    '    "policy": {\n' +
    '      "linux": {\n' +
    '        "advanced": {\n' +
    '          "agent": {\n' +
    '            "connection_delay": "true"\n' +
    '          }\n' +
    '        }\n' +
    '        "events": {\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '      }\n' +
    '      "mac": {\n' +
    '        "events": {\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '      }\n' +
    '      "windows": {\n' +
    '        "antivirus_registration": {\n' +
    '          "enabled": false\n' +
    '        }\n' +
    '        "events": {\n' +
    '          "dll_and_driver_load": true\n' +
    '          "dns": true\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '          "registry": true\n' +
    '          "security": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '          "ransomware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '        "ransomware": {\n' +
    '          "mode": "prevent"\n' +
    '          "supported": true\n' +
    '        }\n' +
    '      }\n' +
    '    }\n' +
    '    "revision": 3\n' +
    '    "type": "endpoint"\n' +
    '    "use_output": "default"\n' +
    '  }\n' +
    ']',
  expected: '[\n' +
    '  {\n' +
    '    "artifact_manifest": {\n' +
    '      "artifacts": {\n' +
    '        "endpoint-eventfilterlist-linux-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-eventfilterlist-macos-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-eventfilterlist-windows-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-eventfilterlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-exceptionlist-linux-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-exceptionlist-macos-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-exceptionlist-windows-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-exceptionlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-trustlist-linux-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-linux-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-trustlist-macos-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-macos-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '        "endpoint-trustlist-windows-v1": {\n' +
    '          "compression_algorithm": "zlib"\n' +
    '          "decoded_sha256": "d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '          "decoded_size": 14\n' +
    '          "encoded_sha256": "f8e6afa1d5662f5b37f83337af774b5785b5b7f1daee08b7b00c2d6813874cda"\n' +
    '          "encoded_size": 22\n' +
    '          "encryption_algorithm": "none"\n' +
    '          "relative_url": "/api/fleet/artifacts/endpoint-trustlist-windows-v1/d801aa1fb7ddcc330a5e3173372ea6af4a3d08ec58074478e85aa5603e926658"\n' +
    '        }\n' +
    '      }\n' +
    '      "manifest_version": "1.0.2"\n' +
    '      "schema_version": "v1"\n' +
    '    }\n' +
    '    "data_stream": {\n' +
    '      "namespace": "default"\n' +
    '    }\n' +
    '    "id": "3a6abc1f-1a91-4191-8b19-28b2334e4797"\n' +
    '    "meta": {\n' +
    '      "package": {\n' +
    '        "name": "endpoint"\n' +
    '        "version": "0.18.0"\n' +
    '      }\n' +
    '    }\n' +
    '    "name": "Protect East Coast"\n' +
    '    "policy": {\n' +
    '      "linux": {\n' +
    '        "advanced": {\n' +
    '          "agent": {\n' +
    '            "connection_delay": "true"\n' +
    '          }\n' +
    '        }\n' +
    '        "events": {\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '      }\n' +
    '      "mac": {\n' +
    '        "events": {\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '      }\n' +
    '      "windows": {\n' +
    '        "antivirus_registration": {\n' +
    '          "enabled": false\n' +
    '        }\n' +
    '        "events": {\n' +
    '          "dll_and_driver_load": true\n' +
    '          "dns": true\n' +
    '          "file": true\n' +
    '          "network": true\n' +
    '          "process": true\n' +
    '          "registry": true\n' +
    '          "security": true\n' +
    '        }\n' +
    '        "logging": {\n' +
    '          "file": "info"\n' +
    '        }\n' +
    '        "malware": {\n' +
    '          "mode": "prevent"\n' +
    '        }\n' +
    '        "popup": {\n' +
    '          "malware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '          "ransomware": {\n' +
    '            "enabled": true\n' +
    '            "message": "Elastic Security {action} {filename}"\n' +
    '          }\n' +
    '        }\n' +
    '        "ransomware": {\n' +
    '          "mode": "prevent"\n' +
    '          "supported": true\n' +
    '        }\n' +
    '      }\n' +
    '    }\n' +
    '    "revision": 2\n' +
    '    "type": "endpoint"\n' +
    '    "use_output": "default"\n' +
    '  }\n' +
    ']',
  showDiff: true
}

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
indexLifecycleManagement 249.2KB 248.6KB -560.0B

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@alisonelizabeth alisonelizabeth merged commit eca9c2d into elastic:7.x Jun 14, 2021
@alisonelizabeth alisonelizabeth deleted the backport/7.x/pr-101927 branch June 14, 2021 18:25
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport This PR is a backport of another PR

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants