Skip to content

[master] Security CCS automation POC#99042

Merged
cavokz merged 1 commit intoelastic:masterfrom
cavokz:security_ccs_automation_poc
May 11, 2021
Merged

[master] Security CCS automation POC#99042
cavokz merged 1 commit intoelastic:masterfrom
cavokz:security_ccs_automation_poc

Conversation

@cavokz
Copy link
Copy Markdown
Contributor

@cavokz cavokz commented May 3, 2021

Summary

Automate testing of the security signal generation when detection rules are applied to remote clusters. See https://github.com/elastic/security-team/issues/1030.

@cavokz cavokz force-pushed the security_ccs_automation_poc branch 2 times, most recently from d54a93e to a07179c Compare May 4, 2021 15:24
@cavokz cavokz changed the title WIP: Security ccs automation poc Security CCS automation POC May 4, 2021
@cavokz cavokz force-pushed the security_ccs_automation_poc branch from a07179c to 5d40cbe Compare May 4, 2021 16:02
@cavokz cavokz added release_note:skip Skip the PR/issue when compiling release notes Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. labels May 4, 2021
@elasticmachine
Copy link
Copy Markdown
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We don't need to add a test to create a rule, the execution of the rule should be part of it since we need it to perform the assertion.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should this reasoning be applied also to the index pattern creation then?

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That would be great! Take a look to my comment above.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is better if we assert the number of alerts we are expecting.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This requires tuning, depends on the observation period and on the time elapsed when the reading is done. I also suspect that the observed index (.monitoring-es-*) get updated. Essentially, I'm not sure we can have a deterministic value here. Maybe I should investigate some other index for applying the rule onto.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is complex to use our own index of data in the CCS configuration?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As anticipated, none of the indices on the remote (except makelogs*, which is non ECS-compatible) has a deterministic number of entries that can be checked here.

Should we consider ingesting some other data then?

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yup, we should.

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is probably a good place to use esArchiver, but it's going to take a little bit of work.

The integration-test repo no longer uses node.js which would be required to call esArchiver.
After the CCS config is provisioned we basically do pushd ../kibana, and then start the FTR tests.

FTR tests do load data with esArchiver, but currently only to the local cluster. While it's possible to add other configuration for FTR so that esArchiver could also load data in a remote cluster, I think it would be easier to use the CLI to call it from the jenkins_test.sh script in the integration-test just before starting the FTR.
If you want to go this route, let me know and I'll help with it.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As in this file it is already tested that an index pattern can be added, in order to improve execution time, as part of the data preparation we need for our test, we can probably add the index we need through the API.

Copy link
Copy Markdown
Contributor Author

@cavokz cavokz May 5, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Such API is available since 7.11 but it's not publicly documented yet. See #99372. The API is described in the original implementation PR #83576.

@cavokz cavokz force-pushed the security_ccs_automation_poc branch from 5d40cbe to b250aee Compare May 10, 2021 15:03
@cavokz cavokz changed the title Security CCS automation POC [master] Security CCS automation POC May 10, 2021
@cavokz cavokz added the v8.0.0 label May 10, 2021
@cavokz cavokz requested review from LeeDr and removed request for Bamieh and cuff-links May 11, 2021 10:06
Copy link
Copy Markdown
Contributor

@MadameSheema MadameSheema left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approving the PR in order to have something already merged and working, but I think we should refactor it to differentiate between the preparation of the test and the test itself. We need also to work to make the test deterministic to make sure that the CCS configuration is fully working.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is complex to use our own index of data in the CCS configuration?

.expect(200);
});

it('create remote monitoring ES index pattern', async () => {
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The code inside this test and the above is a preparation of the test we want to perform. So I would refactor it in order to reflect that.

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We actually have 2 other ways to automate creating the index pattern without using the API.

  1. The old way we're trying to move away from is using es_archiver, which let's us save and load a whole .kibana index, which includes the index-pattern saved object. There's still lots of this in use in functional tests. And we do still need it for loading data other than the .kibana index.

  2. kbnarchiver is pretty new. It basically just wraps the saved object API. There's a CLI for it. So the basic steps would be;

  • manually create your index pattern, and any other saved objects you need for your test
  • run the CLI to export the saved objects to a .json file
  • add the .json file to your PR and code to load that file in your test (often in the before method)

Here's an example PR switching from using esArchiver to kbnArchiver #98063

@cavokz cavokz merged commit 2d05d9f into elastic:master May 11, 2021
@cavokz cavokz deleted the security_ccs_automation_poc branch May 11, 2021 14:19
@cavokz cavokz assigned cavokz and unassigned cavokz May 12, 2021
@kibanamachine
Copy link
Copy Markdown
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@kibanamachine kibanamachine added the backport missing Added to PRs automatically when the are determined to be missing a backport. label May 13, 2021
@kibanamachine
Copy link
Copy Markdown
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

1 similar comment
@kibanamachine
Copy link
Copy Markdown
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Copy Markdown
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

5 similar comments
@kibanamachine
Copy link
Copy Markdown
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Copy Markdown
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Copy Markdown
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Copy Markdown
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Copy Markdown
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@cavokz cavokz added the backport:skip This PR does not require backporting label May 26, 2021
@kibanamachine kibanamachine removed the backport missing Added to PRs automatically when the are determined to be missing a backport. label May 26, 2021
@cavokz
Copy link
Copy Markdown
Contributor Author

cavokz commented May 26, 2021

This is just a first step and it's not worth backporting.

@kibanamachine
Copy link
Copy Markdown
Contributor

kibanamachine commented Jun 7, 2021

💔 Build Failed

Failed CI Steps


Test Failures

Kibana Pipeline / general / task-queue-process-23 / X-Pack Endpoint API Integration Tests.x-pack/test/security_solution_endpoint_api_int/apis/resolver/entity·ts.Endpoint plugin Resolver tests Resolver tests for the entity route winlogbeat tests "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 1 times on tracked branches: https://dryrun

[00:00:00]       │
[00:00:00]         └-: Endpoint plugin
[00:00:00]           └-> "before all" hook in "Endpoint plugin"
[00:00:00]           └-> "before all" hook in "Endpoint plugin"
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:01]             │ proc [kibana]   log   [18:08:59.369] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.372] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.373] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.374] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39880, url.original: /search?package=system&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39882, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39884, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39878, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:01]             │ proc [kibana]   log   [18:08:59.414] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.416] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.417] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.418] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39898, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39900, url.original: /search?package=system&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39902, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39904, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:01]             │ proc [kibana]   log   [18:08:59.422] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.423] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.424] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.424] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39918, url.original: /package/elastic_agent/0.0.6
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39912, url.original: /package/fleet_server/0.2.1
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39914, url.original: /package/system/0.12.0
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39920, url.original: /package/endpoint/0.18.0
[00:00:01]             │ proc [kibana]   log   [18:08:59.436] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.437] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39932, url.original: /package/system/0.12.0/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39936, url.original: /package/endpoint/0.18.0/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39926, url.original: /package/elastic_agent/0.0.6/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39934, url.original: /package/fleet_server/0.2.1/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39944, url.original: /epr/elastic_agent/elastic_agent-0.0.6.zip
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39942, url.original: /epr/fleet_server/fleet_server-0.2.1.zip
[00:00:01]             │ proc [kibana]   log   [18:08:59.444] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39948, url.original: /epr/endpoint/endpoint-0.18.0.zip
[00:00:01]             │ proc [kibana]   log   [18:08:59.453] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39952, url.original: /epr/system/system-0.12.0.zip
[00:00:03]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index lifecycle policy [.fleet-actions-results]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [.fleet-actions-results] for index patterns [.fleet-actions-results]
[00:00:04]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index lifecycle policy [logs-endpoint.collection-diagnostic]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-elastic_agent.elastic_agent-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-elastic_agent.elastic_agent] for index patterns [metrics-elastic_agent.elastic_agent-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.application] for index patterns [logs-system.application-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.security] for index patterns [logs-system.security-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.system] for index patterns [logs-system.system-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.network-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.process-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.alerts-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-endpoint.policy-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-endpoint.metadata-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [.logs-endpoint.diagnostic.collection-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-endpoint.metrics-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.file-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.registry-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.security-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.library-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [.logs-endpoint.diagnostic.collection] for index patterns [.logs-endpoint.diagnostic.collection-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:10]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.transform-internal-007] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.transform-internal-007]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-internal-007][0]]])." previous.health="YELLOW" reason="shards started [[.transform-internal-007][0]]"
[00:00:10]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:10]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]])." previous.health="YELLOW" reason="shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]"
[00:00:10]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [endpoint.metadata_current-default-0.18.0] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:10]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [endpoint.metadata_current-default-0.18.0] successfully completed and scheduled task in node operation
[00:00:12]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:13]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:14]             │ proc [kibana]   log   [18:09:12.626] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:14]             │ info [docker:registry] 2021/06/07 18:09:12 source.ip: 172.17.0.1:40010, url.original: /search?package=system&internal=true&experimental=true
[00:00:14]             │ proc [kibana]   log   [18:09:12.649] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:14]             │ info [docker:registry] 2021/06/07 18:09:12 source.ip: 172.17.0.1:40014, url.original: /search?package=system&internal=true&experimental=true
[00:00:14]             │ proc [kibana]   log   [18:09:12.658] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:14]             │ info [docker:registry] 2021/06/07 18:09:12 source.ip: 172.17.0.1:40018, url.original: /package/system/0.12.0
[00:00:14]             │ info [docker:registry] 2021/06/07 18:09:12 source.ip: 172.17.0.1:40022, url.original: /package/system/0.12.0/
[00:00:14]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:16]             │ proc [kibana]   log   [18:09:14.655] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:16]             │ info [docker:registry] 2021/06/07 18:09:14 source.ip: 172.17.0.1:40030, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:16]             │ proc [kibana]   log   [18:09:14.671] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:16]             │ info [docker:registry] 2021/06/07 18:09:14 source.ip: 172.17.0.1:40034, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:16]             │ proc [kibana]   log   [18:09:14.677] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:16]             │ info [docker:registry] 2021/06/07 18:09:14 source.ip: 172.17.0.1:40038, url.original: /package/fleet_server/0.2.1
[00:00:16]             │ info [docker:registry] 2021/06/07 18:09:14 source.ip: 172.17.0.1:40042, url.original: /package/fleet_server/0.2.1/
[00:00:19]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.fleet-enrollment-api-keys-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:19]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.fleet-enrollment-api-keys-7]
[00:00:19]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-enrollment-api-keys-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-enrollment-api-keys-7][0]]"
[00:00:20]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.fleet-policies-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:20]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.fleet-policies-7]
[00:00:20]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-policies-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-policies-7][0]]"
[00:00:21]           └-: Resolver tests
[00:00:21]             └-> "before all" hook in "Resolver tests"
[00:00:22]             └-: Resolver tests for the entity route
[00:00:22]               └-> "before all" hook in "Resolver tests for the entity route"
[00:00:22]               └-: winlogbeat tests
[00:00:22]                 └-> "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"
[00:00:22]                 └-> "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"
[00:00:22]                   │ info [endpoint/resolver/winlogbeat] Loading "mappings.json"
[00:00:22]                   │ info [endpoint/resolver/winlogbeat] Loading "data.json.gz"
[00:00:22]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001] creating index, cause [api], templates [], shards [1]/[1]
[00:00:22]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="RED" message="Cluster health status changed from [YELLOW] to [RED] (reason: [index [winlogbeat-7.11.0-2020.12.03-000001] created])." previous.health="YELLOW" reason="index [winlogbeat-7.11.0-2020.12.03-000001] created"
[00:00:52]                   │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001/4WOJhfzkTk26Fmv7ZJVMag] deleting index
[00:00:52]                   │ info [endpoint/resolver/winlogbeat] Deleted existing index "winlogbeat-7.11.0-2020.12.03-000001"
[00:00:52]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001] creating index, cause [api], templates [], shards [1]/[1]
[00:00:52]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="RED" message="Cluster health status changed from [YELLOW] to [RED] (reason: [index [winlogbeat-7.11.0-2020.12.03-000001] created])." previous.health="YELLOW" reason="index [winlogbeat-7.11.0-2020.12.03-000001] created"
[00:01:22]                   │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001/jXWZq3EBQcq9sBcOfm-dwg] deleting index
[00:01:22]                   │ info [endpoint/resolver/winlogbeat] Deleted existing index "winlogbeat-7.11.0-2020.12.03-000001"
[00:01:22]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001] creating index, cause [api], templates [], shards [1]/[1]
[00:01:22]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="RED" message="Cluster health status changed from [YELLOW] to [RED] (reason: [index [winlogbeat-7.11.0-2020.12.03-000001] created])." previous.health="YELLOW" reason="index [winlogbeat-7.11.0-2020.12.03-000001] created"
[00:01:52]                   └- ✖ fail: Endpoint plugin Resolver tests Resolver tests for the entity route winlogbeat tests "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"
[00:01:52]                   │      ResponseError: resource_already_exists_exception
[00:01:52]                   │       at onBody (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:337:23)
[00:01:52]                   │       at IncomingMessage.onEnd (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:264:11)
[00:01:52]                   │       at endReadableNT (internal/streams/readable.js:1327:12)
[00:01:52]                   │       at processTicksAndRejections (internal/process/task_queues.js:80:21)
[00:01:52]                   │ 
[00:01:52]                   │ 

Stack Trace

ResponseError: resource_already_exists_exception
    at onBody (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:337:23)
    at IncomingMessage.onEnd (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:264:11)
    at endReadableNT (internal/streams/readable.js:1327:12)
    at processTicksAndRejections (internal/process/task_queues.js:80:21) {
  meta: {
    body: { error: [Object], status: 400 },
    statusCode: 400,
    headers: {
      'x-elastic-product': 'Elasticsearch',
      'content-type': 'application/json;charset=utf-8',
      'content-length': '481'
    },
    meta: {
      context: null,
      request: [Object],
      name: 'elasticsearch-js',
      connection: [Object],
      attempts: 1,
      aborted: false
    }
  }
}

Kibana Pipeline / general / task-queue-process-23 / X-Pack Endpoint API Integration Tests.x-pack/test/security_solution_endpoint_api_int/apis/resolver/entity·ts.Endpoint plugin Resolver tests Resolver tests for the entity route winlogbeat tests "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has not failed recently on tracked branches

[00:00:00]       │
[00:00:00]         └-: Endpoint plugin
[00:00:00]           └-> "before all" hook in "Endpoint plugin"
[00:00:00]           └-> "before all" hook in "Endpoint plugin"
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:00]             │ proc [kibana]   log   [18:00:39.976] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:00:39.978] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:00:39.979] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:00:39.980] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/07 18:00:39 source.ip: 172.17.0.1:36438, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/06/07 18:00:39 source.ip: 172.17.0.1:36436, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/06/07 18:00:39 source.ip: 172.17.0.1:36434, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/06/07 18:00:39 source.ip: 172.17.0.1:36432, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:01]             │ proc [kibana]   log   [18:00:40.044] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.045] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.046] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.047] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.050] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36454, url.original: /search?package=system&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36458, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36456, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36452, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:01]             │ proc [kibana]   log   [18:00:40.052] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.053] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.053] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36462, url.original: /package/system/0.12.0
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36472, url.original: /package/fleet_server/0.2.1
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36474, url.original: /package/elastic_agent/0.0.6
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36468, url.original: /package/endpoint/0.18.0
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36478, url.original: /package/system/0.12.0/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36490, url.original: /package/endpoint/0.18.0/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36486, url.original: /package/elastic_agent/0.0.6/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36482, url.original: /package/fleet_server/0.2.1/
[00:00:01]             │ proc [kibana]   log   [18:00:40.072] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.073] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.075] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36494, url.original: /epr/fleet_server/fleet_server-0.2.1.zip
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36498, url.original: /epr/elastic_agent/elastic_agent-0.0.6.zip
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36502, url.original: /epr/endpoint/endpoint-0.18.0.zip
[00:00:01]             │ proc [kibana]   log   [18:00:40.088] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36506, url.original: /epr/system/system-0.12.0.zip
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:03]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index lifecycle policy [.fleet-actions-results]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [.fleet-actions-results] for index patterns [.fleet-actions-results]
[00:00:04]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index lifecycle policy [logs-endpoint.collection-diagnostic]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-elastic_agent.elastic_agent-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-elastic_agent.elastic_agent] for index patterns [metrics-elastic_agent.elastic_agent-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.application] for index patterns [logs-system.application-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.security] for index patterns [logs-system.security-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.system] for index patterns [logs-system.system-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.network-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [.logs-endpoint.diagnostic.collection-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.file-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-endpoint.metadata-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.alerts-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.security-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-endpoint.policy-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-endpoint.metrics-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.registry-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.library-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.process-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [.logs-endpoint.diagnostic.collection] for index patterns [.logs-endpoint.diagnostic.collection-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.transform-internal-007] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.transform-internal-007]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-internal-007][0]]])." previous.health="YELLOW" reason="shards started [[.transform-internal-007][0]]"
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]])." previous.health="YELLOW" reason="shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]"
[00:00:09]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [endpoint.metadata_current-default-0.18.0] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:09]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [endpoint.metadata_current-default-0.18.0] successfully completed and scheduled task in node operation
[00:00:11]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:12]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:13]             │ proc [kibana]   log   [18:00:52.218] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/06/07 18:00:52 source.ip: 172.17.0.1:36564, url.original: /search?package=system&internal=true&experimental=true
[00:00:13]             │ proc [kibana]   log   [18:00:52.241] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/06/07 18:00:52 source.ip: 172.17.0.1:36568, url.original: /search?package=system&internal=true&experimental=true
[00:00:13]             │ proc [kibana]   log   [18:00:52.249] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/06/07 18:00:52 source.ip: 172.17.0.1:36572, url.original: /package/system/0.12.0
[00:00:13]             │ info [docker:registry] 2021/06/07 18:00:52 source.ip: 172.17.0.1:36576, url.original: /package/system/0.12.0/
[00:00:13]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:15]             │ proc [kibana]   log   [18:00:54.247] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/06/07 18:00:54 source.ip: 172.17.0.1:36584, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:15]             │ proc [kibana]   log   [18:00:54.263] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/06/07 18:00:54 source.ip: 172.17.0.1:36588, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:15]             │ proc [kibana]   log   [18:00:54.271] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/06/07 18:00:54 source.ip: 172.17.0.1:36592, url.original: /package/fleet_server/0.2.1
[00:00:15]             │ info [docker:registry] 2021/06/07 18:00:54 source.ip: 172.17.0.1:36596, url.original: /package/fleet_server/0.2.1/
[00:00:18]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.fleet-enrollment-api-keys-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.fleet-enrollment-api-keys-7]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-enrollment-api-keys-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-enrollment-api-keys-7][0]]"
[00:00:19]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.fleet-policies-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:19]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.fleet-policies-7]
[00:00:19]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-policies-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-policies-7][0]]"
[00:00:20]           └-: Resolver tests
[00:00:20]             └-> "before all" hook in "Resolver tests"
[00:00:20]             └-: Resolver tests for the entity route
[00:00:20]               └-> "before all" hook in "Resolver tests for the entity route"
[00:00:20]               └-: winlogbeat tests
[00:00:20]                 └-> "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"
[00:00:20]                 └-> "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"
[00:00:20]                   │ info [endpoint/resolver/winlogbeat] Loading "mappings.json"
[00:00:20]                   │ info [endpoint/resolver/winlogbeat] Loading "data.json.gz"
[00:00:20]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001] creating index, cause [api], templates [], shards [1]/[1]
[00:00:20]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="RED" message="Cluster health status changed from [YELLOW] to [RED] (reason: [index [winlogbeat-7.11.0-2020.12.03-000001] created])." previous.health="YELLOW" reason="index [winlogbeat-7.11.0-2020.12.03-000001] created"
[00:00:50]                   │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001/crDLivASQoCtXHe2_kv43Q] deleting index
[00:00:50]                   │ info [endpoint/resolver/winlogbeat] Deleted existing index "winlogbeat-7.11.0-2020.12.03-000001"
[00:00:51]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001] creating index, cause [api], templates [], shards [1]/[1]
[00:00:51]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="RED" message="Cluster health status changed from [YELLOW] to [RED] (reason: [index [winlogbeat-7.11.0-2020.12.03-000001] created])." previous.health="YELLOW" reason="index [winlogbeat-7.11.0-2020.12.03-000001] created"
[00:01:21]                   │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001/nw0Q5KT0R1yTxH-ZcbeNMw] deleting index
[00:01:21]                   │ info [endpoint/resolver/winlogbeat] Deleted existing index "winlogbeat-7.11.0-2020.12.03-000001"
[00:01:21]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001] creating index, cause [api], templates [], shards [1]/[1]
[00:01:21]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="RED" message="Cluster health status changed from [YELLOW] to [RED] (reason: [index [winlogbeat-7.11.0-2020.12.03-000001] created])." previous.health="YELLOW" reason="index [winlogbeat-7.11.0-2020.12.03-000001] created"
[00:01:51]                   └- ✖ fail: Endpoint plugin Resolver tests Resolver tests for the entity route winlogbeat tests "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"
[00:01:51]                   │      ResponseError: resource_already_exists_exception
[00:01:51]                   │       at onBody (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:337:23)
[00:01:51]                   │       at IncomingMessage.onEnd (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:264:11)
[00:01:51]                   │       at endReadableNT (internal/streams/readable.js:1327:12)
[00:01:51]                   │       at processTicksAndRejections (internal/process/task_queues.js:80:21)
[00:01:51]                   │ 
[00:01:51]                   │ 

Stack Trace

ResponseError: resource_already_exists_exception
    at onBody (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:337:23)
    at IncomingMessage.onEnd (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:264:11)
    at endReadableNT (internal/streams/readable.js:1327:12)
    at processTicksAndRejections (internal/process/task_queues.js:80:21) {
  meta: {
    body: { error: [Object], status: 400 },
    statusCode: 400,
    headers: {
      'x-elastic-product': 'Elasticsearch',
      'content-type': 'application/json;charset=utf-8',
      'content-length': '481'
    },
    meta: {
      context: null,
      request: [Object],
      name: 'elasticsearch-js',
      connection: [Object],
      attempts: 1,
      aborted: false
    }
  }
}

Kibana Pipeline / general / Chrome X-Pack UI Functional Tests.x-pack/test/functional/apps/infra/metrics_anomalies·ts.InfraOps App Metrics UI Metrics UI Anomaly Flyout with anomalies present renders more anomalies on threshold change

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 3 times on tracked branches: https://github.com/elastic/kibana/issues/100446

[00:00:00]       │
[00:37:54]         └-: InfraOps App
[00:37:54]           └-> "before all" hook in "InfraOps App"
[00:42:16]           └-: Metrics UI
[00:42:16]             └-> "before all" hook in "Metrics UI"
[00:43:36]             └-: Metrics UI Anomaly Flyout
[00:43:36]               └-> "before all" hook in "Metrics UI Anomaly Flyout"
[00:43:36]               └-> "before all" hook in "Metrics UI Anomaly Flyout"
[00:43:37]                 │ info [empty_kibana] Loading "mappings.json"
[00:43:37]                 │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_pre6.5.0_001/x9A3NGtPQP-rky4WYb-PgA] deleting index
[00:43:37]                 │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_task_manager_8.0.0_001/vUGAWWxeQaOtsKVj5qw1ng] deleting index
[00:43:37]                 │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001/w3ZYx_r9Qw-Z-6myPwziNQ] deleting index
[00:43:37]                 │ info [empty_kibana] Deleted existing index ".kibana_8.0.0_001"
[00:43:37]                 │ info [empty_kibana] Deleted existing index ".kibana_task_manager_8.0.0_001"
[00:43:37]                 │ info [empty_kibana] Deleted existing index ".kibana_pre6.5.0_001"
[00:43:37]                 │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana] creating index, cause [api], templates [], shards [1]/[1]
[00:43:37]                 │ info [empty_kibana] Created index ".kibana"
[00:43:37]                 │ debg [empty_kibana] ".kibana" settings {"index":{"number_of_replicas":"1","number_of_shards":"1"}}
[00:43:37]                 │ debg Migrating saved objects
[00:43:37]                 │ proc [kibana]   log   [18:38:16.570] [info][savedobjects-service] [.kibana_task_manager] INIT -> CREATE_NEW_TARGET. took: 4ms.
[00:43:37]                 │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_task_manager_8.0.0_001] creating index, cause [api], templates [], shards [1]/[1]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.576] [info][savedobjects-service] [.kibana] INIT -> LEGACY_SET_WRITE_BLOCK. took: 12ms.
[00:43:37]                 │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] updating number_of_replicas to [0] for indices [.kibana_task_manager_8.0.0_001]
[00:43:37]                 │ info [o.e.c.m.MetadataIndexStateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] adding block write to indices [[.kibana/ibQatWA8SueL0dVyr_CRag]]
[00:43:37]                 │ info [o.e.c.m.MetadataIndexStateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] completed adding block write to indices [.kibana]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.655] [info][savedobjects-service] [.kibana_task_manager] CREATE_NEW_TARGET -> MARK_VERSION_INDEX_READY. took: 85ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.676] [info][savedobjects-service] [.kibana] LEGACY_SET_WRITE_BLOCK -> LEGACY_CREATE_REINDEX_TARGET. took: 100ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.693] [info][savedobjects-service] [.kibana_task_manager] MARK_VERSION_INDEX_READY -> DONE. took: 38ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.693] [info][savedobjects-service] [.kibana_task_manager] Migration completed after 127ms
[00:43:37]                 │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_pre6.5.0_001] creating index, cause [api], templates [], shards [1]/[1]
[00:43:37]                 │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] updating number_of_replicas to [0] for indices [.kibana_pre6.5.0_001]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.751] [info][savedobjects-service] [.kibana] LEGACY_CREATE_REINDEX_TARGET -> LEGACY_REINDEX. took: 75ms.
[00:43:37]                 │ info [o.e.t.LoggingTaskListener] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] 78726 finished with response BulkByScrollResponse[took=1.7ms,timed_out=false,sliceId=null,updated=0,created=0,deleted=0,batches=0,versionConflicts=0,noops=0,retries=0,throttledUntil=0s,bulk_failures=[],search_failures=[]]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.758] [info][savedobjects-service] [.kibana] LEGACY_REINDEX -> LEGACY_REINDEX_WAIT_FOR_TASK. took: 7ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.767] [info][savedobjects-service] [.kibana] LEGACY_REINDEX_WAIT_FOR_TASK -> LEGACY_DELETE. took: 9ms.
[00:43:37]                 │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana/ibQatWA8SueL0dVyr_CRag] deleting index
[00:43:37]                 │ proc [kibana]   log   [18:38:16.806] [info][savedobjects-service] [.kibana] LEGACY_DELETE -> SET_SOURCE_WRITE_BLOCK. took: 39ms.
[00:43:37]                 │ info [o.e.c.m.MetadataIndexStateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] adding block write to indices [[.kibana_pre6.5.0_001/zN1-hOkZQByPBL2W7XvZjg]]
[00:43:37]                 │ info [o.e.c.m.MetadataIndexStateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] completed adding block write to indices [.kibana_pre6.5.0_001]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.853] [info][savedobjects-service] [.kibana] SET_SOURCE_WRITE_BLOCK -> CREATE_REINDEX_TEMP. took: 47ms.
[00:43:37]                 │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_reindex_temp] creating index, cause [api], templates [], shards [1]/[1]
[00:43:37]                 │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] updating number_of_replicas to [0] for indices [.kibana_8.0.0_reindex_temp]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.914] [info][savedobjects-service] [.kibana] CREATE_REINDEX_TEMP -> REINDEX_SOURCE_TO_TEMP_OPEN_PIT. took: 61ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.920] [info][savedobjects-service] [.kibana] REINDEX_SOURCE_TO_TEMP_OPEN_PIT -> REINDEX_SOURCE_TO_TEMP_READ. took: 6ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.927] [info][savedobjects-service] [.kibana] REINDEX_SOURCE_TO_TEMP_READ -> REINDEX_SOURCE_TO_TEMP_CLOSE_PIT. took: 7ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.933] [info][savedobjects-service] [.kibana] REINDEX_SOURCE_TO_TEMP_CLOSE_PIT -> SET_TEMP_WRITE_BLOCK. took: 6ms.
[00:43:37]                 │ info [o.e.c.m.MetadataIndexStateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] adding block write to indices [[.kibana_8.0.0_reindex_temp/M8kuVxnCToaW-M5cizb_1g]]
[00:43:37]                 │ info [o.e.c.m.MetadataIndexStateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] completed adding block write to indices [.kibana_8.0.0_reindex_temp]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.978] [info][savedobjects-service] [.kibana] SET_TEMP_WRITE_BLOCK -> CLONE_TEMP_TO_TARGET. took: 45ms.
[00:43:37]                 │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] applying create index request using existing index [.kibana_8.0.0_reindex_temp] metadata
[00:43:37]                 │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001] creating index, cause [clone_index], templates [], shards [1]/[1]
[00:43:37]                 │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] updating number_of_replicas to [0] for indices [.kibana_8.0.0_001]
[00:43:37]                 │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001/-bCbXgtRRmeUmDHUYqPuRw] create_mapping
[00:43:37]                 │ proc [kibana]   log   [18:38:17.073] [info][savedobjects-service] [.kibana] CLONE_TEMP_TO_TARGET -> REFRESH_TARGET. took: 95ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:17.080] [info][savedobjects-service] [.kibana] REFRESH_TARGET -> OUTDATED_DOCUMENTS_SEARCH_OPEN_PIT. took: 7ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:17.086] [info][savedobjects-service] [.kibana] OUTDATED_DOCUMENTS_SEARCH_OPEN_PIT -> OUTDATED_DOCUMENTS_SEARCH_READ. took: 6ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:17.093] [info][savedobjects-service] [.kibana] OUTDATED_DOCUMENTS_SEARCH_READ -> OUTDATED_DOCUMENTS_SEARCH_CLOSE_PIT. took: 7ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:17.097] [info][savedobjects-service] [.kibana] OUTDATED_DOCUMENTS_SEARCH_CLOSE_PIT -> UPDATE_TARGET_MAPPINGS. took: 4ms.
[00:43:37]                 │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001/-bCbXgtRRmeUmDHUYqPuRw] update_mapping [_doc]
[00:43:37]                 │ info [o.e.t.LoggingTaskListener] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] 78793 finished with response BulkByScrollResponse[took=1.3ms,timed_out=false,sliceId=null,updated=0,created=0,deleted=0,batches=0,versionConflicts=0,noops=0,retries=0,throttledUntil=0s,bulk_failures=[],search_failures=[]]
[00:43:37]                 │ proc [kibana]   log   [18:38:17.152] [info][savedobjects-service] [.kibana] UPDATE_TARGET_MAPPINGS -> UPDATE_TARGET_MAPPINGS_WAIT_FOR_TASK. took: 55ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:17.158] [info][savedobjects-service] [.kibana] UPDATE_TARGET_MAPPINGS_WAIT_FOR_TASK -> MARK_VERSION_INDEX_READY. took: 6ms.
[00:43:37]                 │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_reindex_temp/M8kuVxnCToaW-M5cizb_1g] deleting index
[00:43:37]                 │ proc [kibana]   log   [18:38:17.198] [info][savedobjects-service] [.kibana] MARK_VERSION_INDEX_READY -> DONE. took: 40ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:17.198] [info][savedobjects-service] [.kibana] Migration completed after 634ms
[00:43:37]                 │ debg [empty_kibana] Migrated Kibana index after loading Kibana data
[00:43:37]                 │ debg [empty_kibana] Ensured that default space exists in .kibana
[00:43:37]                 │ debg applying update to kibana config: {"accessibility:disableAnimations":true,"dateFormat:tz":"UTC","visualization:visualize:legacyChartsLibrary":true}
[00:43:37]                 │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001/-bCbXgtRRmeUmDHUYqPuRw] update_mapping [_doc]
[00:43:48]               └-: with anomalies present
[00:43:48]                 └-> "before all" hook for "renders the anomaly table with anomalies"
[00:43:48]                 └-> "before all" hook for "renders the anomaly table with anomalies"
[00:43:48]                   │ info [infra/metrics_anomalies] Loading "mappings.json"
[00:43:48]                   │ info [infra/metrics_anomalies] Loading "data.json.gz"
[00:43:48]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.ml-anomalies-shared] creating index, cause [api], templates [.ml-anomalies-], shards [1]/[0]
[00:43:48]                   │ info [infra/metrics_anomalies] Created index ".ml-anomalies-shared"
[00:43:48]                   │ debg [infra/metrics_anomalies] ".ml-anomalies-shared" settings {"index":{"auto_expand_replicas":"0-1","hidden":"true","number_of_replicas":"0","number_of_shards":"1","translog":{"durability":"async"}}}
[00:43:48]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.ml-annotations-6] creating index, cause [api], templates [], shards [1]/[1]
[00:43:48]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] updating number_of_replicas to [0] for indices [.ml-annotations-6]
[00:43:49]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.ml-config] creating index, cause [api], templates [], shards [1]/[1]
[00:43:49]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] updating number_of_replicas to [0] for indices [.ml-config]
[00:43:49]                   │ info [infra/metrics_anomalies] Created index ".ml-config"
[00:43:49]                   │ debg [infra/metrics_anomalies] ".ml-config" settings {"index":{"auto_expand_replicas":"0-1","max_result_window":"10000","number_of_replicas":"0","number_of_shards":"1"}}
[00:43:49]                   │ info [infra/metrics_anomalies] Indexed 1182 docs into ".ml-anomalies-shared"
[00:43:49]                   │ info [infra/metrics_anomalies] Indexed 12 docs into ".ml-config"
[00:43:49]                   │ debg Creating saved object: {"type":"ml-job","id":"anomaly-detector-kibana-metrics-ui-default-default-hosts_memory_usage","overwrite":true,"attributes":{"job_id":"kibana-metrics-ui-default-default-hosts_memory_usage","datafeed_id":"datafeed-kibana-metrics-ui-default-default-hosts_memory_usage","type":"anomaly-detector"}}
[00:43:49]                   │ debg Creating saved object: {"type":"ml-job","id":"anomaly-detector-kibana-metrics-ui-default-default-hosts_network_out","overwrite":true,"attributes":{"job_id":"kibana-metrics-ui-default-default-hosts_network_out","datafeed_id":"datafeed-kibana-metrics-ui-default-default-hosts_network_out","type":"anomaly-detector"}}
[00:43:49]                   │ debg Creating saved object: {"type":"ml-job","id":"anomaly-detector-kibana-metrics-ui-default-default-hosts_network_in","overwrite":true,"attributes":{"job_id":"kibana-metrics-ui-default-default-hosts_network_in","datafeed_id":"datafeed-kibana-metrics-ui-default-default-hosts_network_in","type":"anomaly-detector"}}
[00:43:49]                   │ debg Creating saved object: {"type":"ml-job","id":"anomaly-detector-kibana-metrics-ui-default-default-k8s_network_out","overwrite":true,"attributes":{"job_id":"kibana-metrics-ui-default-default-k8s_network_out","datafeed_id":"datafeed-kibana-metrics-ui-default-default-k8s_network_out","type":"anomaly-detector"}}
[00:43:49]                   │ debg Creating saved object: {"type":"ml-job","id":"anomaly-detector-kibana-metrics-ui-default-default-k8s_network_in","overwrite":true,"attributes":{"job_id":"kibana-metrics-ui-default-default-k8s_network_in","datafeed_id":"datafeed-kibana-metrics-ui-default-default-k8s_network_in","type":"anomaly-detector"}}
[00:43:49]                   │ debg Creating saved object: {"type":"ml-job","id":"anomaly-detector-kibana-metrics-ui-default-default-k8s_memory_usage","overwrite":true,"attributes":{"job_id":"kibana-metrics-ui-default-default-k8s_memory_usage","datafeed_id":"datafeed-kibana-metrics-ui-default-default-k8s_memory_usage","type":"anomaly-detector"}}
[00:43:49]                   │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001/-bCbXgtRRmeUmDHUYqPuRw] update_mapping [_doc]
[00:43:49]                 └-> renders the anomaly table with anomalies
[00:43:49]                   └-> "before each" hook: global before each for "renders the anomaly table with anomalies"
[00:43:49]                   │ debg TestSubjects.click(openAnomalyFlyoutButton)
[00:43:49]                   │ debg Find.clickByCssSelector('[data-test-subj="openAnomalyFlyoutButton"]') with timeout=10000
[00:43:49]                   │ debg Find.findByCssSelector('[data-test-subj="openAnomalyFlyoutButton"]') with timeout=10000
[00:43:49]                   │ debg TestSubjects.exists(loadMLFlyout)
[00:43:49]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="loadMLFlyout"]') with timeout=2500
[00:43:49]                   │ debg TestSubjects.click(anomalyFlyoutAnomaliesTab)
[00:43:49]                   │ debg Find.clickByCssSelector('[data-test-subj="anomalyFlyoutAnomaliesTab"]') with timeout=10000
[00:43:49]                   │ debg Find.findByCssSelector('[data-test-subj="anomalyFlyoutAnomaliesTab"]') with timeout=10000
[00:43:50]                   │ debg TestSubjects.click(anomaliesComboBoxType)
[00:43:50]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:50]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:50]                   │ debg TestSubjects.click(anomaliesHostComboBoxItem)
[00:43:50]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesHostComboBoxItem"]') with timeout=10000
[00:43:50]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesHostComboBoxItem"]') with timeout=10000
[00:43:50]                   │ debg TestSubjects.click(superDatePickerShowDatesButton)
[00:43:50]                   │ debg Find.clickByCssSelector('[data-test-subj="superDatePickerShowDatesButton"]') with timeout=10000
[00:43:50]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerShowDatesButton"]') with timeout=10000
[00:43:50]                   │ debg TestSubjects.click(superDatePickerstartDatePopoverButton)
[00:43:50]                   │ debg Find.clickByCssSelector('[data-test-subj="superDatePickerstartDatePopoverButton"]') with timeout=10000
[00:43:50]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerstartDatePopoverButton"]') with timeout=10000
[00:43:50]                   │ debg TestSubjects.click(superDatePickerAbsoluteTab)
[00:43:50]                   │ debg Find.clickByCssSelector('[data-test-subj="superDatePickerAbsoluteTab"]') with timeout=10000
[00:43:50]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerAbsoluteTab"]') with timeout=10000
[00:43:50]                   │ debg TestSubjects.find(superDatePickerAbsoluteDateInput)
[00:43:50]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerAbsoluteDateInput"]') with timeout=10000
[00:43:51]                   │ debg TestSubjects.findAll(anomalyRow)
[00:43:51]                   │ debg Find.allByCssSelector('[data-test-subj="anomalyRow"]') with timeout=10000
[00:43:51]                   │ debg TestSubjects.click(anomaliesComboBoxType)
[00:43:51]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:51]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:51]                   │ debg TestSubjects.click(anomaliesK8sComboBoxItem)
[00:43:51]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesK8sComboBoxItem"]') with timeout=10000
[00:43:51]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesK8sComboBoxItem"]') with timeout=10000
[00:43:51]                   │ debg TestSubjects.findAll(anomalyRow)
[00:43:51]                   │ debg Find.allByCssSelector('[data-test-subj="anomalyRow"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.click(euiFlyoutCloseButton)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="euiFlyoutCloseButton"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="euiFlyoutCloseButton"]') with timeout=10000
[00:43:52]                   └- ✓ pass  (2.4s) "InfraOps App Metrics UI Metrics UI Anomaly Flyout with anomalies present renders the anomaly table with anomalies"
[00:43:52]                 └-> renders the anomaly table after a date change with no anomalies
[00:43:52]                   └-> "before each" hook: global before each for "renders the anomaly table after a date change with no anomalies"
[00:43:52]                   │ debg TestSubjects.click(openAnomalyFlyoutButton)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="openAnomalyFlyoutButton"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="openAnomalyFlyoutButton"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.exists(loadMLFlyout)
[00:43:52]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="loadMLFlyout"]') with timeout=2500
[00:43:52]                   │ debg TestSubjects.click(anomalyFlyoutAnomaliesTab)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="anomalyFlyoutAnomaliesTab"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="anomalyFlyoutAnomaliesTab"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.click(anomaliesComboBoxType)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.click(anomaliesHostComboBoxItem)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesHostComboBoxItem"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesHostComboBoxItem"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.click(superDatePickerShowDatesButton)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="superDatePickerShowDatesButton"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerShowDatesButton"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.click(superDatePickerstartDatePopoverButton)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="superDatePickerstartDatePopoverButton"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerstartDatePopoverButton"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.click(superDatePickerAbsoluteTab)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="superDatePickerAbsoluteTab"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerAbsoluteTab"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.find(superDatePickerAbsoluteDateInput)
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerAbsoluteDateInput"]') with timeout=10000
[00:43:53]                   │ debg TestSubjects.find(noAnomaliesFoundMsg)
[00:43:53]                   │ debg Find.findByCssSelector('[data-test-subj="noAnomaliesFoundMsg"]') with timeout=10000
[00:43:53]                   │ debg TestSubjects.click(anomaliesComboBoxType)
[00:43:53]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:53]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:53]                   │ debg TestSubjects.click(anomaliesK8sComboBoxItem)
[00:43:53]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesK8sComboBoxItem"]') with timeout=10000
[00:43:53]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesK8sComboBoxItem"]') with timeout=10000
[00:43:53]                   │ debg TestSubjects.find(noAnomaliesFoundMsg)
[00:43:53]                   │ debg Find.findByCssSelector('[data-test-subj="noAnomaliesFoundMsg"]') with timeout=10000
[00:43:54]                   │ debg TestSubjects.click(euiFlyoutCloseButton)
[00:43:54]                   │ debg Find.clickByCssSelector('[data-test-subj="euiFlyoutCloseButton"]') with timeout=10000
[00:43:54]                   │ debg Find.findByCssSelector('[data-test-subj="euiFlyoutCloseButton"]') with timeout=10000
[00:43:54]                   └- ✓ pass  (2.0s) "InfraOps App Metrics UI Metrics UI Anomaly Flyout with anomalies present renders the anomaly table after a date change with no anomalies"
[00:43:54]                 └-> renders more anomalies on threshold change
[00:43:54]                   └-> "before each" hook: global before each for "renders more anomalies on threshold change"
[00:43:54]                   │ debg TestSubjects.click(infrastructureNavLink_/settings)
[00:43:54]                   │ debg Find.clickByCssSelector('[data-test-subj="infrastructureNavLink_/settings"]') with timeout=10000
[00:43:54]                   │ debg Find.findByCssSelector('[data-test-subj="infrastructureNavLink_/settings"]') with timeout=10000
[00:43:54]                   │ debg Find.findByCssSelector('.euiFieldNumber.euiRangeInput.euiRangeInput--max') with timeout=10000
[00:43:54]                   │ debg TestSubjects.find(~sourceConfigurationContent)
[00:43:54]                   │ debg Find.findByCssSelector('[data-test-subj~="sourceConfigurationContent"]') with timeout=10000
[00:43:54]                   │ debg TestSubjects.findDescendant(~applySettingsButton)
[00:43:54]                   │ debg Find.descendantDisplayedByCssSelector('[data-test-subj~="applySettingsButton"]')
[00:43:54]                   │ debg TestSubjects.find(~sourceConfigurationContent)
[00:43:54]                   │ debg Find.findByCssSelector('[data-test-subj~="sourceConfigurationContent"]') with timeout=10000
[00:43:54]                   │ debg TestSubjects.findDescendant(~applySettingsButton)
[00:43:54]                   │ debg Find.descendantDisplayedByCssSelector('[data-test-subj~="applySettingsButton"]')
[00:43:54]                   │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001/-bCbXgtRRmeUmDHUYqPuRw] update_mapping [_doc]
[00:43:55]                   │ debg TestSubjects.click(infrastructureNavLink_/inventory)
[00:43:55]                   │ debg Find.clickByCssSelector('[data-test-subj="infrastructureNavLink_/inventory"]') with timeout=10000
[00:43:55]                   │ debg Find.findByCssSelector('[data-test-subj="infrastructureNavLink_/inventory"]') with timeout=10000
[00:43:55]                   │ debg TestSubjects.click(openAnomalyFlyoutButton)
[00:43:55]                   │ debg Find.clickByCssSelector('[data-test-subj="openAnomalyFlyoutButton"]') with timeout=10000
[00:43:55]                   │ debg Find.findByCssSelector('[data-test-subj="openAnomalyFlyoutButton"]') with timeout=10000
[00:43:56]                   │ debg TestSubjects.exists(loadMLFlyout)
[00:43:56]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="loadMLFlyout"]') with timeout=2500
[00:43:56]                   │ debg TestSubjects.click(anomalyFlyoutAnomaliesTab)
[00:43:56]                   │ debg Find.clickByCssSelector('[data-test-subj="anomalyFlyoutAnomaliesTab"]') with timeout=10000
[00:43:56]                   │ debg Find.findByCssSelector('[data-test-subj="anomalyFlyoutAnomaliesTab"]') with timeout=10000
[00:43:56]                   │ debg TestSubjects.click(anomaliesComboBoxType)
[00:43:56]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:56]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:56]                   │ debg TestSubjects.click(anomaliesHostComboBoxItem)
[00:43:56]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesHostComboBoxItem"]') with timeout=10000
[00:43:56]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesHostComboBoxItem"]') with timeout=10000
[00:43:56]                   │ debg TestSubjects.findAll(anomalyRow)
[00:43:56]                   │ debg Find.allByCssSelector('[data-test-subj="anomalyRow"]') with timeout=10000
[00:44:06]                   │ info Taking screenshot "/dev/shm/workspace/parallel/1/kibana/x-pack/test/functional/screenshots/failure/InfraOps App Metrics UI Metrics UI Anomaly Flyout with anomalies present renders more anomalies on threshold change.png"
[00:44:06]                   │ info Current URL is: http://localhost:6111/app/metrics/inventory
[00:44:06]                   │ info Saving page source to: /dev/shm/workspace/parallel/1/kibana/x-pack/test/functional/failure_debug/html/InfraOps App Metrics UI Metrics UI Anomaly Flyout with anomalies present renders more anomalies on threshold change.html
[00:44:06]                   └- ✖ fail: InfraOps App Metrics UI Metrics UI Anomaly Flyout with anomalies present renders more anomalies on threshold change
[00:44:06]                   │      Error: expected 0 to equal 4
[00:44:06]                   │       at Assertion.assert (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/expect/expect.js:100:11)
[00:44:06]                   │       at Assertion.be.Assertion.equal (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/expect/expect.js:227:8)
[00:44:06]                   │       at Assertion.be (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/expect/expect.js:69:22)
[00:44:06]                   │       at Context.<anonymous> (test/functional/apps/infra/metrics_anomalies.ts:96:41)
[00:44:06]                   │       at runMicrotasks (<anonymous>)
[00:44:06]                   │       at processTicksAndRejections (internal/process/task_queues.js:93:5)
[00:44:06]                   │       at Object.apply (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16)
[00:44:06]                   │ 
[00:44:06]                   │ 

Stack Trace

Error: expected 0 to equal 4
    at Assertion.assert (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/expect/expect.js:100:11)
    at Assertion.be.Assertion.equal (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/expect/expect.js:227:8)
    at Assertion.be (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/expect/expect.js:69:22)
    at Context.<anonymous> (test/functional/apps/infra/metrics_anomalies.ts:96:41)
    at runMicrotasks (<anonymous>)
    at processTicksAndRejections (internal/process/task_queues.js:93:5)
    at Object.apply (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16)

and 4 more failures, only showing the first 3.

Metrics [docs]

✅ unchanged

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

cc @cavokz

cavokz added a commit that referenced this pull request Jun 8, 2021
* [7.x] Add CCS integration test for security rules

* [7.x] More precise alerts matching

* Split out test preparation and cleanup

* Load data on the remote cluster

* Update the rule to the new (remote) data

Backport of #99042 and #99820.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport:skip This PR does not require backporting release_note:skip Skip the PR/issue when compiling release notes Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. v8.0.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants