Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[master] Security CCS automation POC #99042

Merged
merged 1 commit into from
May 11, 2021

Conversation

cavokz
Copy link
Contributor

@cavokz cavokz commented May 3, 2021

Summary

Automate testing of the security signal generation when detection rules are applied to remote clusters. See https:/elastic/security-team/issues/1030.

@cavokz cavokz force-pushed the security_ccs_automation_poc branch 2 times, most recently from d54a93e to a07179c Compare May 4, 2021 15:24
@cavokz cavokz changed the title WIP: Security ccs automation poc Security CCS automation POC May 4, 2021
@cavokz cavokz force-pushed the security_ccs_automation_poc branch from a07179c to 5d40cbe Compare May 4, 2021 16:02
@cavokz cavokz added release_note:skip Skip the PR/issue when compiling release notes Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. labels May 4, 2021
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@@ -203,5 +224,51 @@ export default ({ getService, getPageObjects }) => {
expect(hitCount).to.be.lessThan(originalHitCount);
});
});

it('should add detection rule', async () => {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We don't need to add a test to create a rule, the execution of the rule should be part of it since we need it to perform the assertion.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should this reasoning be applied also to the index pattern creation then?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That would be great! Take a look to my comment above.

await retry.tryForTime(40000, async () => {
const hitCount = await PageObjects.discover.getHitCount();
log.debug('### hit count = ' + hitCount);
expect(hitCount).to.be.greaterThan('0');
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is better if we assert the number of alerts we are expecting.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This requires tuning, depends on the observation period and on the time elapsed when the reading is done. I also suspect that the observed index (.monitoring-es-*) get updated. Essentially, I'm not sure we can have a deterministic value here. Maybe I should investigate some other index for applying the rule onto.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is complex to use our own index of data in the CCS configuration?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As anticipated, none of the indices on the remote (except makelogs*, which is non ECS-compatible) has a deterministic number of entries that can be checked here.

Should we consider ingesting some other data then?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yup, we should.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is probably a good place to use esArchiver, but it's going to take a little bit of work.

The integration-test repo no longer uses node.js which would be required to call esArchiver.
After the CCS config is provisioned we basically do pushd ../kibana, and then start the FTR tests.

FTR tests do load data with esArchiver, but currently only to the local cluster. While it's possible to add other configuration for FTR so that esArchiver could also load data in a remote cluster, I think it would be easier to use the CLI to call it from the jenkins_test.sh script in the integration-test just before starting the FTR.
If you want to go this route, let me know and I'll help with it.

const patternName = await PageObjects.settings.getIndexPageHeading();
expect(patternName).to.be('*:makelogs工程-*');
});

it('create local siem signals index pattern', async () => {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As in this file it is already tested that an index pattern can be added, in order to improve execution time, as part of the data preparation we need for our test, we can probably add the index we need through the API.

Copy link
Contributor Author

@cavokz cavokz May 5, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Such API is available since 7.11 but it's not publicly documented yet. See #99372. The API is described in the original implementation PR #83576.

@cavokz cavokz force-pushed the security_ccs_automation_poc branch from 5d40cbe to b250aee Compare May 10, 2021 15:03
@cavokz cavokz changed the title Security CCS automation POC [master] Security CCS automation POC May 10, 2021
@cavokz cavokz added the v8.0.0 label May 10, 2021
@cavokz cavokz requested review from LeeDr and removed request for cuff-links and Bamieh May 11, 2021 10:06
Copy link
Member

@MadameSheema MadameSheema left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approving the PR in order to have something already merged and working, but I think we should refactor it to differentiate between the preparation of the test and the test itself. We need also to work to make the test deterministic to make sure that the CCS configuration is fully working.

await retry.tryForTime(40000, async () => {
const hitCount = await PageObjects.discover.getHitCount();
log.debug('### hit count = ' + hitCount);
expect(hitCount).to.be.greaterThan('0');
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It is complex to use our own index of data in the CCS configuration?

.expect(200);
});

it('create remote monitoring ES index pattern', async () => {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The code inside this test and the above is a preparation of the test we want to perform. So I would refactor it in order to reflect that.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We actually have 2 other ways to automate creating the index pattern without using the API.

  1. The old way we're trying to move away from is using es_archiver, which let's us save and load a whole .kibana index, which includes the index-pattern saved object. There's still lots of this in use in functional tests. And we do still need it for loading data other than the .kibana index.

  2. kbnarchiver is pretty new. It basically just wraps the saved object API. There's a CLI for it. So the basic steps would be;

  • manually create your index pattern, and any other saved objects you need for your test
  • run the CLI to export the saved objects to a .json file
  • add the .json file to your PR and code to load that file in your test (often in the before method)

Here's an example PR switching from using esArchiver to kbnArchiver #98063

@cavokz cavokz merged commit 2d05d9f into elastic:master May 11, 2021
@cavokz cavokz deleted the security_ccs_automation_poc branch May 11, 2021 14:19
@cavokz cavokz assigned cavokz and unassigned cavokz May 12, 2021
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@kibanamachine kibanamachine added the backport missing Added to PRs automatically when the are determined to be missing a backport. label May 13, 2021
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

1 similar comment
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

5 similar comments
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create backports run node scripts/backport --pr 99042 or prevent reminders by adding the backport:skip label.

@cavokz cavokz added the backport:skip This commit does not require backporting label May 26, 2021
@kibanamachine kibanamachine removed the backport missing Added to PRs automatically when the are determined to be missing a backport. label May 26, 2021
@cavokz
Copy link
Contributor Author

cavokz commented May 26, 2021

This is just a first step and it's not worth backporting.

@kibanamachine
Copy link
Contributor

kibanamachine commented Jun 7, 2021

💔 Build Failed

Failed CI Steps


Test Failures

Kibana Pipeline / general / task-queue-process-23 / X-Pack Endpoint API Integration Tests.x-pack/test/security_solution_endpoint_api_int/apis/resolver/entity·ts.Endpoint plugin Resolver tests Resolver tests for the entity route winlogbeat tests "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 1 times on tracked branches: https://dryrun

[00:00:00]       │
[00:00:00]         └-: Endpoint plugin
[00:00:00]           └-> "before all" hook in "Endpoint plugin"
[00:00:00]           └-> "before all" hook in "Endpoint plugin"
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:01]             │ proc [kibana]   log   [18:08:59.369] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.372] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.373] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.374] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39880, url.original: /search?package=system&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39882, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39884, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39878, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:01]             │ proc [kibana]   log   [18:08:59.414] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.416] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.417] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.418] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39898, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39900, url.original: /search?package=system&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39902, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39904, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:01]             │ proc [kibana]   log   [18:08:59.422] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.423] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.424] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.424] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39918, url.original: /package/elastic_agent/0.0.6
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39912, url.original: /package/fleet_server/0.2.1
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39914, url.original: /package/system/0.12.0
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39920, url.original: /package/endpoint/0.18.0
[00:00:01]             │ proc [kibana]   log   [18:08:59.436] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:08:59.437] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39932, url.original: /package/system/0.12.0/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39936, url.original: /package/endpoint/0.18.0/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39926, url.original: /package/elastic_agent/0.0.6/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39934, url.original: /package/fleet_server/0.2.1/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39944, url.original: /epr/elastic_agent/elastic_agent-0.0.6.zip
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39942, url.original: /epr/fleet_server/fleet_server-0.2.1.zip
[00:00:01]             │ proc [kibana]   log   [18:08:59.444] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39948, url.original: /epr/endpoint/endpoint-0.18.0.zip
[00:00:01]             │ proc [kibana]   log   [18:08:59.453] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:08:59 source.ip: 172.17.0.1:39952, url.original: /epr/system/system-0.12.0.zip
[00:00:03]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index lifecycle policy [.fleet-actions-results]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [.fleet-actions-results] for index patterns [.fleet-actions-results]
[00:00:04]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index lifecycle policy [logs-endpoint.collection-diagnostic]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-elastic_agent.elastic_agent-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-elastic_agent.elastic_agent] for index patterns [metrics-elastic_agent.elastic_agent-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.application] for index patterns [logs-system.application-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.security] for index patterns [logs-system.security-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.system] for index patterns [logs-system.system-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.network-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.process-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.alerts-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-endpoint.policy-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-endpoint.metadata-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [.logs-endpoint.diagnostic.collection-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-endpoint.metrics-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.file-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.registry-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.security-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.library-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [.logs-endpoint.diagnostic.collection] for index patterns [.logs-endpoint.diagnostic.collection-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:10]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.transform-internal-007] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.transform-internal-007]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-internal-007][0]]])." previous.health="YELLOW" reason="shards started [[.transform-internal-007][0]]"
[00:00:10]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:10]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:10]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]])." previous.health="YELLOW" reason="shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]"
[00:00:10]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [endpoint.metadata_current-default-0.18.0] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:10]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [endpoint.metadata_current-default-0.18.0] successfully completed and scheduled task in node operation
[00:00:12]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:13]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:14]             │ proc [kibana]   log   [18:09:12.626] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:14]             │ info [docker:registry] 2021/06/07 18:09:12 source.ip: 172.17.0.1:40010, url.original: /search?package=system&internal=true&experimental=true
[00:00:14]             │ proc [kibana]   log   [18:09:12.649] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:14]             │ info [docker:registry] 2021/06/07 18:09:12 source.ip: 172.17.0.1:40014, url.original: /search?package=system&internal=true&experimental=true
[00:00:14]             │ proc [kibana]   log   [18:09:12.658] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:14]             │ info [docker:registry] 2021/06/07 18:09:12 source.ip: 172.17.0.1:40018, url.original: /package/system/0.12.0
[00:00:14]             │ info [docker:registry] 2021/06/07 18:09:12 source.ip: 172.17.0.1:40022, url.original: /package/system/0.12.0/
[00:00:14]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/_Fg1YnNWQGSowy1HuK8_UA] update_mapping [_doc]
[00:00:16]             │ proc [kibana]   log   [18:09:14.655] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:16]             │ info [docker:registry] 2021/06/07 18:09:14 source.ip: 172.17.0.1:40030, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:16]             │ proc [kibana]   log   [18:09:14.671] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:16]             │ info [docker:registry] 2021/06/07 18:09:14 source.ip: 172.17.0.1:40034, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:16]             │ proc [kibana]   log   [18:09:14.677] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:16]             │ info [docker:registry] 2021/06/07 18:09:14 source.ip: 172.17.0.1:40038, url.original: /package/fleet_server/0.2.1
[00:00:16]             │ info [docker:registry] 2021/06/07 18:09:14 source.ip: 172.17.0.1:40042, url.original: /package/fleet_server/0.2.1/
[00:00:19]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.fleet-enrollment-api-keys-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:19]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.fleet-enrollment-api-keys-7]
[00:00:19]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-enrollment-api-keys-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-enrollment-api-keys-7][0]]"
[00:00:20]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.fleet-policies-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:20]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.fleet-policies-7]
[00:00:20]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-policies-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-policies-7][0]]"
[00:00:21]           └-: Resolver tests
[00:00:21]             └-> "before all" hook in "Resolver tests"
[00:00:22]             └-: Resolver tests for the entity route
[00:00:22]               └-> "before all" hook in "Resolver tests for the entity route"
[00:00:22]               └-: winlogbeat tests
[00:00:22]                 └-> "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"
[00:00:22]                 └-> "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"
[00:00:22]                   │ info [endpoint/resolver/winlogbeat] Loading "mappings.json"
[00:00:22]                   │ info [endpoint/resolver/winlogbeat] Loading "data.json.gz"
[00:00:22]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001] creating index, cause [api], templates [], shards [1]/[1]
[00:00:22]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="RED" message="Cluster health status changed from [YELLOW] to [RED] (reason: [index [winlogbeat-7.11.0-2020.12.03-000001] created])." previous.health="YELLOW" reason="index [winlogbeat-7.11.0-2020.12.03-000001] created"
[00:00:52]                   │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001/4WOJhfzkTk26Fmv7ZJVMag] deleting index
[00:00:52]                   │ info [endpoint/resolver/winlogbeat] Deleted existing index "winlogbeat-7.11.0-2020.12.03-000001"
[00:00:52]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001] creating index, cause [api], templates [], shards [1]/[1]
[00:00:52]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="RED" message="Cluster health status changed from [YELLOW] to [RED] (reason: [index [winlogbeat-7.11.0-2020.12.03-000001] created])." previous.health="YELLOW" reason="index [winlogbeat-7.11.0-2020.12.03-000001] created"
[00:01:22]                   │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001/jXWZq3EBQcq9sBcOfm-dwg] deleting index
[00:01:22]                   │ info [endpoint/resolver/winlogbeat] Deleted existing index "winlogbeat-7.11.0-2020.12.03-000001"
[00:01:22]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001] creating index, cause [api], templates [], shards [1]/[1]
[00:01:22]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="RED" message="Cluster health status changed from [YELLOW] to [RED] (reason: [index [winlogbeat-7.11.0-2020.12.03-000001] created])." previous.health="YELLOW" reason="index [winlogbeat-7.11.0-2020.12.03-000001] created"
[00:01:52]                   └- ✖ fail: Endpoint plugin Resolver tests Resolver tests for the entity route winlogbeat tests "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"
[00:01:52]                   │      ResponseError: resource_already_exists_exception
[00:01:52]                   │       at onBody (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:337:23)
[00:01:52]                   │       at IncomingMessage.onEnd (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:264:11)
[00:01:52]                   │       at endReadableNT (internal/streams/readable.js:1327:12)
[00:01:52]                   │       at processTicksAndRejections (internal/process/task_queues.js:80:21)
[00:01:52]                   │ 
[00:01:52]                   │ 

Stack Trace

ResponseError: resource_already_exists_exception
    at onBody (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:337:23)
    at IncomingMessage.onEnd (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:264:11)
    at endReadableNT (internal/streams/readable.js:1327:12)
    at processTicksAndRejections (internal/process/task_queues.js:80:21) {
  meta: {
    body: { error: [Object], status: 400 },
    statusCode: 400,
    headers: {
      'x-elastic-product': 'Elasticsearch',
      'content-type': 'application/json;charset=utf-8',
      'content-length': '481'
    },
    meta: {
      context: null,
      request: [Object],
      name: 'elasticsearch-js',
      connection: [Object],
      attempts: 1,
      aborted: false
    }
  }
}

Kibana Pipeline / general / task-queue-process-23 / X-Pack Endpoint API Integration Tests.x-pack/test/security_solution_endpoint_api_int/apis/resolver/entity·ts.Endpoint plugin Resolver tests Resolver tests for the entity route winlogbeat tests "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has not failed recently on tracked branches

[00:00:00]       │
[00:00:00]         └-: Endpoint plugin
[00:00:00]           └-> "before all" hook in "Endpoint plugin"
[00:00:00]           └-> "before all" hook in "Endpoint plugin"
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:00]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:00]             │ proc [kibana]   log   [18:00:39.976] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:00:39.978] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:00:39.979] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ proc [kibana]   log   [18:00:39.980] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:00]             │ info [docker:registry] 2021/06/07 18:00:39 source.ip: 172.17.0.1:36438, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/06/07 18:00:39 source.ip: 172.17.0.1:36436, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/06/07 18:00:39 source.ip: 172.17.0.1:36434, url.original: /search?package=system&internal=true&experimental=true
[00:00:00]             │ info [docker:registry] 2021/06/07 18:00:39 source.ip: 172.17.0.1:36432, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:01]             │ proc [kibana]   log   [18:00:40.044] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.045] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.046] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.047] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.050] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36454, url.original: /search?package=system&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36458, url.original: /search?package=elastic_agent&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36456, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36452, url.original: /search?package=endpoint&internal=true&experimental=true
[00:00:01]             │ proc [kibana]   log   [18:00:40.052] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.053] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.053] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36462, url.original: /package/system/0.12.0
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36472, url.original: /package/fleet_server/0.2.1
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36474, url.original: /package/elastic_agent/0.0.6
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36468, url.original: /package/endpoint/0.18.0
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36478, url.original: /package/system/0.12.0/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36490, url.original: /package/endpoint/0.18.0/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36486, url.original: /package/elastic_agent/0.0.6/
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36482, url.original: /package/fleet_server/0.2.1/
[00:00:01]             │ proc [kibana]   log   [18:00:40.072] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.073] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ proc [kibana]   log   [18:00:40.075] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36494, url.original: /epr/fleet_server/fleet_server-0.2.1.zip
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36498, url.original: /epr/elastic_agent/elastic_agent-0.0.6.zip
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36502, url.original: /epr/endpoint/endpoint-0.18.0.zip
[00:00:01]             │ proc [kibana]   log   [18:00:40.088] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:01]             │ info [docker:registry] 2021/06/07 18:00:40 source.ip: 172.17.0.1:36506, url.original: /epr/system/system-0.12.0.zip
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:03]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index lifecycle policy [.fleet-actions-results]
[00:00:03]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:03]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [.fleet-actions-results] for index patterns [.fleet-actions-results]
[00:00:04]             │ info [o.e.x.i.a.TransportPutLifecycleAction] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index lifecycle policy [logs-endpoint.collection-diagnostic]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-elastic_agent.elastic_agent-mappings]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-elastic_agent.elastic_agent] for index patterns [metrics-elastic_agent.elastic_agent-*]
[00:00:06]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-metadata-current] for index patterns [metrics-endpoint.metadata_current_*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.fsstat] for index patterns [metrics-system.fsstat-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.auth] for index patterns [logs-system.auth-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.cpu] for index patterns [metrics-system.cpu-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.application] for index patterns [logs-system.application-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.filesystem] for index patterns [metrics-system.filesystem-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.core] for index patterns [metrics-system.core-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.load] for index patterns [metrics-system.load-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.process_summary] for index patterns [metrics-system.process_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.diskio] for index patterns [metrics-system.diskio-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.memory] for index patterns [metrics-system.memory-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.process] for index patterns [metrics-system.process-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.security] for index patterns [logs-system.security-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.network] for index patterns [metrics-system.network-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.socket_summary] for index patterns [metrics-system.socket_summary-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.syslog] for index patterns [logs-system.syslog-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-system.system] for index patterns [logs-system.system-*]
[00:00:07]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-system.uptime] for index patterns [metrics-system.uptime-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.network-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [.logs-endpoint.diagnostic.collection-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.file-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-endpoint.metadata-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.alerts-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.security-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-endpoint.policy-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [metrics-endpoint.metrics-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.registry-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.library-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding component template [logs-endpoint.events.process-mappings]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.network] for index patterns [logs-endpoint.events.network-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [.logs-endpoint.diagnostic.collection] for index patterns [.logs-endpoint.diagnostic.collection-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.file] for index patterns [logs-endpoint.events.file-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-endpoint.metadata] for index patterns [metrics-endpoint.metadata-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.alerts] for index patterns [logs-endpoint.alerts-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.security] for index patterns [logs-endpoint.events.security-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-endpoint.policy] for index patterns [metrics-endpoint.policy-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [metrics-endpoint.metrics] for index patterns [metrics-endpoint.metrics-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.registry] for index patterns [logs-endpoint.events.registry-*]
[00:00:08]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.library] for index patterns [logs-endpoint.events.library-*]
[00:00:09]             │ info [o.e.c.m.MetadataIndexTemplateService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] adding index template [logs-endpoint.events.process] for index patterns [logs-endpoint.events.process-*]
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.transform-internal-007] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.transform-internal-007]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-internal-007][0]]])." previous.health="YELLOW" reason="shards started [[.transform-internal-007][0]]"
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.transform-notifications-000002] creating index, cause [auto(bulk api)], templates [.transform-notifications-000002], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.transform-notifications-000002]
[00:00:09]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [metrics-endpoint.metadata_current_default] creating index, cause [api], templates [metrics-metadata-current], shards [1]/[1]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [metrics-endpoint.metadata_current_default]
[00:00:09]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]])." previous.health="YELLOW" reason="shards started [[.transform-notifications-000002][0], [metrics-endpoint.metadata_current_default][0]]"
[00:00:09]             │ info [o.e.x.t.t.TransformTask] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [endpoint.metadata_current-default-0.18.0] updating state for transform to [{"task_state":"started","indexer_state":"stopped","checkpoint":0,"should_stop_at_checkpoint":false}].
[00:00:09]             │ info [o.e.x.t.t.TransformPersistentTasksExecutor] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [endpoint.metadata_current-default-0.18.0] successfully completed and scheduled task in node operation
[00:00:11]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:12]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:13]             │ proc [kibana]   log   [18:00:52.218] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/06/07 18:00:52 source.ip: 172.17.0.1:36564, url.original: /search?package=system&internal=true&experimental=true
[00:00:13]             │ proc [kibana]   log   [18:00:52.241] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/06/07 18:00:52 source.ip: 172.17.0.1:36568, url.original: /search?package=system&internal=true&experimental=true
[00:00:13]             │ proc [kibana]   log   [18:00:52.249] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:13]             │ info [docker:registry] 2021/06/07 18:00:52 source.ip: 172.17.0.1:36572, url.original: /package/system/0.12.0
[00:00:13]             │ info [docker:registry] 2021/06/07 18:00:52 source.ip: 172.17.0.1:36576, url.original: /package/system/0.12.0/
[00:00:13]             │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.kibana_8.0.0_001/JYz0N-jkRiSigLeNfhOAzA] update_mapping [_doc]
[00:00:15]             │ proc [kibana]   log   [18:00:54.247] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/06/07 18:00:54 source.ip: 172.17.0.1:36584, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:15]             │ proc [kibana]   log   [18:00:54.263] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/06/07 18:00:54 source.ip: 172.17.0.1:36588, url.original: /search?package=fleet_server&internal=true&experimental=true
[00:00:15]             │ proc [kibana]   log   [18:00:54.271] [info][fleet][plugins] Custom registry url is an experimental feature and is unsupported.
[00:00:15]             │ info [docker:registry] 2021/06/07 18:00:54 source.ip: 172.17.0.1:36592, url.original: /package/fleet_server/0.2.1
[00:00:15]             │ info [docker:registry] 2021/06/07 18:00:54 source.ip: 172.17.0.1:36596, url.original: /package/fleet_server/0.2.1/
[00:00:18]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.fleet-enrollment-api-keys-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.fleet-enrollment-api-keys-7]
[00:00:18]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-enrollment-api-keys-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-enrollment-api-keys-7][0]]"
[00:00:19]             │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [.fleet-policies-7] creating index, cause [auto(bulk api)], templates [], shards [1]/[1]
[00:00:19]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] updating number_of_replicas to [0] for indices [.fleet-policies-7]
[00:00:19]             │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="GREEN" message="Cluster health status changed from [YELLOW] to [GREEN] (reason: [shards started [[.fleet-policies-7][0]]])." previous.health="YELLOW" reason="shards started [[.fleet-policies-7][0]]"
[00:00:20]           └-: Resolver tests
[00:00:20]             └-> "before all" hook in "Resolver tests"
[00:00:20]             └-: Resolver tests for the entity route
[00:00:20]               └-> "before all" hook in "Resolver tests for the entity route"
[00:00:20]               └-: winlogbeat tests
[00:00:20]                 └-> "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"
[00:00:20]                 └-> "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"
[00:00:20]                   │ info [endpoint/resolver/winlogbeat] Loading "mappings.json"
[00:00:20]                   │ info [endpoint/resolver/winlogbeat] Loading "data.json.gz"
[00:00:20]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001] creating index, cause [api], templates [], shards [1]/[1]
[00:00:20]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="RED" message="Cluster health status changed from [YELLOW] to [RED] (reason: [index [winlogbeat-7.11.0-2020.12.03-000001] created])." previous.health="YELLOW" reason="index [winlogbeat-7.11.0-2020.12.03-000001] created"
[00:00:50]                   │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001/crDLivASQoCtXHe2_kv43Q] deleting index
[00:00:50]                   │ info [endpoint/resolver/winlogbeat] Deleted existing index "winlogbeat-7.11.0-2020.12.03-000001"
[00:00:51]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001] creating index, cause [api], templates [], shards [1]/[1]
[00:00:51]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="RED" message="Cluster health status changed from [YELLOW] to [RED] (reason: [index [winlogbeat-7.11.0-2020.12.03-000001] created])." previous.health="YELLOW" reason="index [winlogbeat-7.11.0-2020.12.03-000001] created"
[00:01:21]                   │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001/nw0Q5KT0R1yTxH-ZcbeNMw] deleting index
[00:01:21]                   │ info [endpoint/resolver/winlogbeat] Deleted existing index "winlogbeat-7.11.0-2020.12.03-000001"
[00:01:21]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] [winlogbeat-7.11.0-2020.12.03-000001] creating index, cause [api], templates [], shards [1]/[1]
[00:01:21]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-18-1623088034608283532] current.health="RED" message="Cluster health status changed from [YELLOW] to [RED] (reason: [index [winlogbeat-7.11.0-2020.12.03-000001] created])." previous.health="YELLOW" reason="index [winlogbeat-7.11.0-2020.12.03-000001] created"
[00:01:51]                   └- ✖ fail: Endpoint plugin Resolver tests Resolver tests for the entity route winlogbeat tests "before all" hook for "returns a winlogbeat sysmon event when the event matches the schema correctly"
[00:01:51]                   │      ResponseError: resource_already_exists_exception
[00:01:51]                   │       at onBody (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:337:23)
[00:01:51]                   │       at IncomingMessage.onEnd (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:264:11)
[00:01:51]                   │       at endReadableNT (internal/streams/readable.js:1327:12)
[00:01:51]                   │       at processTicksAndRejections (internal/process/task_queues.js:80:21)
[00:01:51]                   │ 
[00:01:51]                   │ 

Stack Trace

ResponseError: resource_already_exists_exception
    at onBody (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:337:23)
    at IncomingMessage.onEnd (/dev/shm/workspace/kibana/node_modules/@elastic/elasticsearch/lib/Transport.js:264:11)
    at endReadableNT (internal/streams/readable.js:1327:12)
    at processTicksAndRejections (internal/process/task_queues.js:80:21) {
  meta: {
    body: { error: [Object], status: 400 },
    statusCode: 400,
    headers: {
      'x-elastic-product': 'Elasticsearch',
      'content-type': 'application/json;charset=utf-8',
      'content-length': '481'
    },
    meta: {
      context: null,
      request: [Object],
      name: 'elasticsearch-js',
      connection: [Object],
      attempts: 1,
      aborted: false
    }
  }
}

Kibana Pipeline / general / Chrome X-Pack UI Functional Tests.x-pack/test/functional/apps/infra/metrics_anomalies·ts.InfraOps App Metrics UI Metrics UI Anomaly Flyout with anomalies present renders more anomalies on threshold change

Link to Jenkins

Standard Out

Failed Tests Reporter:
  - Test has failed 3 times on tracked branches: https:/elastic/kibana/issues/100446

[00:00:00]       │
[00:37:54]         └-: InfraOps App
[00:37:54]           └-> "before all" hook in "InfraOps App"
[00:42:16]           └-: Metrics UI
[00:42:16]             └-> "before all" hook in "Metrics UI"
[00:43:36]             └-: Metrics UI Anomaly Flyout
[00:43:36]               └-> "before all" hook in "Metrics UI Anomaly Flyout"
[00:43:36]               └-> "before all" hook in "Metrics UI Anomaly Flyout"
[00:43:37]                 │ info [empty_kibana] Loading "mappings.json"
[00:43:37]                 │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_pre6.5.0_001/x9A3NGtPQP-rky4WYb-PgA] deleting index
[00:43:37]                 │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_task_manager_8.0.0_001/vUGAWWxeQaOtsKVj5qw1ng] deleting index
[00:43:37]                 │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001/w3ZYx_r9Qw-Z-6myPwziNQ] deleting index
[00:43:37]                 │ info [empty_kibana] Deleted existing index ".kibana_8.0.0_001"
[00:43:37]                 │ info [empty_kibana] Deleted existing index ".kibana_task_manager_8.0.0_001"
[00:43:37]                 │ info [empty_kibana] Deleted existing index ".kibana_pre6.5.0_001"
[00:43:37]                 │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana] creating index, cause [api], templates [], shards [1]/[1]
[00:43:37]                 │ info [empty_kibana] Created index ".kibana"
[00:43:37]                 │ debg [empty_kibana] ".kibana" settings {"index":{"number_of_replicas":"1","number_of_shards":"1"}}
[00:43:37]                 │ debg Migrating saved objects
[00:43:37]                 │ proc [kibana]   log   [18:38:16.570] [info][savedobjects-service] [.kibana_task_manager] INIT -> CREATE_NEW_TARGET. took: 4ms.
[00:43:37]                 │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_task_manager_8.0.0_001] creating index, cause [api], templates [], shards [1]/[1]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.576] [info][savedobjects-service] [.kibana] INIT -> LEGACY_SET_WRITE_BLOCK. took: 12ms.
[00:43:37]                 │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] updating number_of_replicas to [0] for indices [.kibana_task_manager_8.0.0_001]
[00:43:37]                 │ info [o.e.c.m.MetadataIndexStateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] adding block write to indices [[.kibana/ibQatWA8SueL0dVyr_CRag]]
[00:43:37]                 │ info [o.e.c.m.MetadataIndexStateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] completed adding block write to indices [.kibana]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.655] [info][savedobjects-service] [.kibana_task_manager] CREATE_NEW_TARGET -> MARK_VERSION_INDEX_READY. took: 85ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.676] [info][savedobjects-service] [.kibana] LEGACY_SET_WRITE_BLOCK -> LEGACY_CREATE_REINDEX_TARGET. took: 100ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.693] [info][savedobjects-service] [.kibana_task_manager] MARK_VERSION_INDEX_READY -> DONE. took: 38ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.693] [info][savedobjects-service] [.kibana_task_manager] Migration completed after 127ms
[00:43:37]                 │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_pre6.5.0_001] creating index, cause [api], templates [], shards [1]/[1]
[00:43:37]                 │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] updating number_of_replicas to [0] for indices [.kibana_pre6.5.0_001]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.751] [info][savedobjects-service] [.kibana] LEGACY_CREATE_REINDEX_TARGET -> LEGACY_REINDEX. took: 75ms.
[00:43:37]                 │ info [o.e.t.LoggingTaskListener] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] 78726 finished with response BulkByScrollResponse[took=1.7ms,timed_out=false,sliceId=null,updated=0,created=0,deleted=0,batches=0,versionConflicts=0,noops=0,retries=0,throttledUntil=0s,bulk_failures=[],search_failures=[]]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.758] [info][savedobjects-service] [.kibana] LEGACY_REINDEX -> LEGACY_REINDEX_WAIT_FOR_TASK. took: 7ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.767] [info][savedobjects-service] [.kibana] LEGACY_REINDEX_WAIT_FOR_TASK -> LEGACY_DELETE. took: 9ms.
[00:43:37]                 │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana/ibQatWA8SueL0dVyr_CRag] deleting index
[00:43:37]                 │ proc [kibana]   log   [18:38:16.806] [info][savedobjects-service] [.kibana] LEGACY_DELETE -> SET_SOURCE_WRITE_BLOCK. took: 39ms.
[00:43:37]                 │ info [o.e.c.m.MetadataIndexStateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] adding block write to indices [[.kibana_pre6.5.0_001/zN1-hOkZQByPBL2W7XvZjg]]
[00:43:37]                 │ info [o.e.c.m.MetadataIndexStateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] completed adding block write to indices [.kibana_pre6.5.0_001]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.853] [info][savedobjects-service] [.kibana] SET_SOURCE_WRITE_BLOCK -> CREATE_REINDEX_TEMP. took: 47ms.
[00:43:37]                 │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_reindex_temp] creating index, cause [api], templates [], shards [1]/[1]
[00:43:37]                 │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] updating number_of_replicas to [0] for indices [.kibana_8.0.0_reindex_temp]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.914] [info][savedobjects-service] [.kibana] CREATE_REINDEX_TEMP -> REINDEX_SOURCE_TO_TEMP_OPEN_PIT. took: 61ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.920] [info][savedobjects-service] [.kibana] REINDEX_SOURCE_TO_TEMP_OPEN_PIT -> REINDEX_SOURCE_TO_TEMP_READ. took: 6ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.927] [info][savedobjects-service] [.kibana] REINDEX_SOURCE_TO_TEMP_READ -> REINDEX_SOURCE_TO_TEMP_CLOSE_PIT. took: 7ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:16.933] [info][savedobjects-service] [.kibana] REINDEX_SOURCE_TO_TEMP_CLOSE_PIT -> SET_TEMP_WRITE_BLOCK. took: 6ms.
[00:43:37]                 │ info [o.e.c.m.MetadataIndexStateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] adding block write to indices [[.kibana_8.0.0_reindex_temp/M8kuVxnCToaW-M5cizb_1g]]
[00:43:37]                 │ info [o.e.c.m.MetadataIndexStateService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] completed adding block write to indices [.kibana_8.0.0_reindex_temp]
[00:43:37]                 │ proc [kibana]   log   [18:38:16.978] [info][savedobjects-service] [.kibana] SET_TEMP_WRITE_BLOCK -> CLONE_TEMP_TO_TARGET. took: 45ms.
[00:43:37]                 │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] applying create index request using existing index [.kibana_8.0.0_reindex_temp] metadata
[00:43:37]                 │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001] creating index, cause [clone_index], templates [], shards [1]/[1]
[00:43:37]                 │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] updating number_of_replicas to [0] for indices [.kibana_8.0.0_001]
[00:43:37]                 │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001/-bCbXgtRRmeUmDHUYqPuRw] create_mapping
[00:43:37]                 │ proc [kibana]   log   [18:38:17.073] [info][savedobjects-service] [.kibana] CLONE_TEMP_TO_TARGET -> REFRESH_TARGET. took: 95ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:17.080] [info][savedobjects-service] [.kibana] REFRESH_TARGET -> OUTDATED_DOCUMENTS_SEARCH_OPEN_PIT. took: 7ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:17.086] [info][savedobjects-service] [.kibana] OUTDATED_DOCUMENTS_SEARCH_OPEN_PIT -> OUTDATED_DOCUMENTS_SEARCH_READ. took: 6ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:17.093] [info][savedobjects-service] [.kibana] OUTDATED_DOCUMENTS_SEARCH_READ -> OUTDATED_DOCUMENTS_SEARCH_CLOSE_PIT. took: 7ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:17.097] [info][savedobjects-service] [.kibana] OUTDATED_DOCUMENTS_SEARCH_CLOSE_PIT -> UPDATE_TARGET_MAPPINGS. took: 4ms.
[00:43:37]                 │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001/-bCbXgtRRmeUmDHUYqPuRw] update_mapping [_doc]
[00:43:37]                 │ info [o.e.t.LoggingTaskListener] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] 78793 finished with response BulkByScrollResponse[took=1.3ms,timed_out=false,sliceId=null,updated=0,created=0,deleted=0,batches=0,versionConflicts=0,noops=0,retries=0,throttledUntil=0s,bulk_failures=[],search_failures=[]]
[00:43:37]                 │ proc [kibana]   log   [18:38:17.152] [info][savedobjects-service] [.kibana] UPDATE_TARGET_MAPPINGS -> UPDATE_TARGET_MAPPINGS_WAIT_FOR_TASK. took: 55ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:17.158] [info][savedobjects-service] [.kibana] UPDATE_TARGET_MAPPINGS_WAIT_FOR_TASK -> MARK_VERSION_INDEX_READY. took: 6ms.
[00:43:37]                 │ info [o.e.c.m.MetadataDeleteIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_reindex_temp/M8kuVxnCToaW-M5cizb_1g] deleting index
[00:43:37]                 │ proc [kibana]   log   [18:38:17.198] [info][savedobjects-service] [.kibana] MARK_VERSION_INDEX_READY -> DONE. took: 40ms.
[00:43:37]                 │ proc [kibana]   log   [18:38:17.198] [info][savedobjects-service] [.kibana] Migration completed after 634ms
[00:43:37]                 │ debg [empty_kibana] Migrated Kibana index after loading Kibana data
[00:43:37]                 │ debg [empty_kibana] Ensured that default space exists in .kibana
[00:43:37]                 │ debg applying update to kibana config: {"accessibility:disableAnimations":true,"dateFormat:tz":"UTC","visualization:visualize:legacyChartsLibrary":true}
[00:43:37]                 │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001/-bCbXgtRRmeUmDHUYqPuRw] update_mapping [_doc]
[00:43:48]               └-: with anomalies present
[00:43:48]                 └-> "before all" hook for "renders the anomaly table with anomalies"
[00:43:48]                 └-> "before all" hook for "renders the anomaly table with anomalies"
[00:43:48]                   │ info [infra/metrics_anomalies] Loading "mappings.json"
[00:43:48]                   │ info [infra/metrics_anomalies] Loading "data.json.gz"
[00:43:48]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.ml-anomalies-shared] creating index, cause [api], templates [.ml-anomalies-], shards [1]/[0]
[00:43:48]                   │ info [infra/metrics_anomalies] Created index ".ml-anomalies-shared"
[00:43:48]                   │ debg [infra/metrics_anomalies] ".ml-anomalies-shared" settings {"index":{"auto_expand_replicas":"0-1","hidden":"true","number_of_replicas":"0","number_of_shards":"1","translog":{"durability":"async"}}}
[00:43:48]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.ml-annotations-6] creating index, cause [api], templates [], shards [1]/[1]
[00:43:48]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] updating number_of_replicas to [0] for indices [.ml-annotations-6]
[00:43:49]                   │ info [o.e.c.m.MetadataCreateIndexService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.ml-config] creating index, cause [api], templates [], shards [1]/[1]
[00:43:49]                   │ info [o.e.c.r.a.AllocationService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] updating number_of_replicas to [0] for indices [.ml-config]
[00:43:49]                   │ info [infra/metrics_anomalies] Created index ".ml-config"
[00:43:49]                   │ debg [infra/metrics_anomalies] ".ml-config" settings {"index":{"auto_expand_replicas":"0-1","max_result_window":"10000","number_of_replicas":"0","number_of_shards":"1"}}
[00:43:49]                   │ info [infra/metrics_anomalies] Indexed 1182 docs into ".ml-anomalies-shared"
[00:43:49]                   │ info [infra/metrics_anomalies] Indexed 12 docs into ".ml-config"
[00:43:49]                   │ debg Creating saved object: {"type":"ml-job","id":"anomaly-detector-kibana-metrics-ui-default-default-hosts_memory_usage","overwrite":true,"attributes":{"job_id":"kibana-metrics-ui-default-default-hosts_memory_usage","datafeed_id":"datafeed-kibana-metrics-ui-default-default-hosts_memory_usage","type":"anomaly-detector"}}
[00:43:49]                   │ debg Creating saved object: {"type":"ml-job","id":"anomaly-detector-kibana-metrics-ui-default-default-hosts_network_out","overwrite":true,"attributes":{"job_id":"kibana-metrics-ui-default-default-hosts_network_out","datafeed_id":"datafeed-kibana-metrics-ui-default-default-hosts_network_out","type":"anomaly-detector"}}
[00:43:49]                   │ debg Creating saved object: {"type":"ml-job","id":"anomaly-detector-kibana-metrics-ui-default-default-hosts_network_in","overwrite":true,"attributes":{"job_id":"kibana-metrics-ui-default-default-hosts_network_in","datafeed_id":"datafeed-kibana-metrics-ui-default-default-hosts_network_in","type":"anomaly-detector"}}
[00:43:49]                   │ debg Creating saved object: {"type":"ml-job","id":"anomaly-detector-kibana-metrics-ui-default-default-k8s_network_out","overwrite":true,"attributes":{"job_id":"kibana-metrics-ui-default-default-k8s_network_out","datafeed_id":"datafeed-kibana-metrics-ui-default-default-k8s_network_out","type":"anomaly-detector"}}
[00:43:49]                   │ debg Creating saved object: {"type":"ml-job","id":"anomaly-detector-kibana-metrics-ui-default-default-k8s_network_in","overwrite":true,"attributes":{"job_id":"kibana-metrics-ui-default-default-k8s_network_in","datafeed_id":"datafeed-kibana-metrics-ui-default-default-k8s_network_in","type":"anomaly-detector"}}
[00:43:49]                   │ debg Creating saved object: {"type":"ml-job","id":"anomaly-detector-kibana-metrics-ui-default-default-k8s_memory_usage","overwrite":true,"attributes":{"job_id":"kibana-metrics-ui-default-default-k8s_memory_usage","datafeed_id":"datafeed-kibana-metrics-ui-default-default-k8s_memory_usage","type":"anomaly-detector"}}
[00:43:49]                   │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001/-bCbXgtRRmeUmDHUYqPuRw] update_mapping [_doc]
[00:43:49]                 └-> renders the anomaly table with anomalies
[00:43:49]                   └-> "before each" hook: global before each for "renders the anomaly table with anomalies"
[00:43:49]                   │ debg TestSubjects.click(openAnomalyFlyoutButton)
[00:43:49]                   │ debg Find.clickByCssSelector('[data-test-subj="openAnomalyFlyoutButton"]') with timeout=10000
[00:43:49]                   │ debg Find.findByCssSelector('[data-test-subj="openAnomalyFlyoutButton"]') with timeout=10000
[00:43:49]                   │ debg TestSubjects.exists(loadMLFlyout)
[00:43:49]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="loadMLFlyout"]') with timeout=2500
[00:43:49]                   │ debg TestSubjects.click(anomalyFlyoutAnomaliesTab)
[00:43:49]                   │ debg Find.clickByCssSelector('[data-test-subj="anomalyFlyoutAnomaliesTab"]') with timeout=10000
[00:43:49]                   │ debg Find.findByCssSelector('[data-test-subj="anomalyFlyoutAnomaliesTab"]') with timeout=10000
[00:43:50]                   │ debg TestSubjects.click(anomaliesComboBoxType)
[00:43:50]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:50]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:50]                   │ debg TestSubjects.click(anomaliesHostComboBoxItem)
[00:43:50]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesHostComboBoxItem"]') with timeout=10000
[00:43:50]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesHostComboBoxItem"]') with timeout=10000
[00:43:50]                   │ debg TestSubjects.click(superDatePickerShowDatesButton)
[00:43:50]                   │ debg Find.clickByCssSelector('[data-test-subj="superDatePickerShowDatesButton"]') with timeout=10000
[00:43:50]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerShowDatesButton"]') with timeout=10000
[00:43:50]                   │ debg TestSubjects.click(superDatePickerstartDatePopoverButton)
[00:43:50]                   │ debg Find.clickByCssSelector('[data-test-subj="superDatePickerstartDatePopoverButton"]') with timeout=10000
[00:43:50]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerstartDatePopoverButton"]') with timeout=10000
[00:43:50]                   │ debg TestSubjects.click(superDatePickerAbsoluteTab)
[00:43:50]                   │ debg Find.clickByCssSelector('[data-test-subj="superDatePickerAbsoluteTab"]') with timeout=10000
[00:43:50]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerAbsoluteTab"]') with timeout=10000
[00:43:50]                   │ debg TestSubjects.find(superDatePickerAbsoluteDateInput)
[00:43:50]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerAbsoluteDateInput"]') with timeout=10000
[00:43:51]                   │ debg TestSubjects.findAll(anomalyRow)
[00:43:51]                   │ debg Find.allByCssSelector('[data-test-subj="anomalyRow"]') with timeout=10000
[00:43:51]                   │ debg TestSubjects.click(anomaliesComboBoxType)
[00:43:51]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:51]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:51]                   │ debg TestSubjects.click(anomaliesK8sComboBoxItem)
[00:43:51]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesK8sComboBoxItem"]') with timeout=10000
[00:43:51]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesK8sComboBoxItem"]') with timeout=10000
[00:43:51]                   │ debg TestSubjects.findAll(anomalyRow)
[00:43:51]                   │ debg Find.allByCssSelector('[data-test-subj="anomalyRow"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.click(euiFlyoutCloseButton)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="euiFlyoutCloseButton"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="euiFlyoutCloseButton"]') with timeout=10000
[00:43:52]                   └- ✓ pass  (2.4s) "InfraOps App Metrics UI Metrics UI Anomaly Flyout with anomalies present renders the anomaly table with anomalies"
[00:43:52]                 └-> renders the anomaly table after a date change with no anomalies
[00:43:52]                   └-> "before each" hook: global before each for "renders the anomaly table after a date change with no anomalies"
[00:43:52]                   │ debg TestSubjects.click(openAnomalyFlyoutButton)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="openAnomalyFlyoutButton"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="openAnomalyFlyoutButton"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.exists(loadMLFlyout)
[00:43:52]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="loadMLFlyout"]') with timeout=2500
[00:43:52]                   │ debg TestSubjects.click(anomalyFlyoutAnomaliesTab)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="anomalyFlyoutAnomaliesTab"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="anomalyFlyoutAnomaliesTab"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.click(anomaliesComboBoxType)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.click(anomaliesHostComboBoxItem)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesHostComboBoxItem"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesHostComboBoxItem"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.click(superDatePickerShowDatesButton)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="superDatePickerShowDatesButton"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerShowDatesButton"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.click(superDatePickerstartDatePopoverButton)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="superDatePickerstartDatePopoverButton"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerstartDatePopoverButton"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.click(superDatePickerAbsoluteTab)
[00:43:52]                   │ debg Find.clickByCssSelector('[data-test-subj="superDatePickerAbsoluteTab"]') with timeout=10000
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerAbsoluteTab"]') with timeout=10000
[00:43:52]                   │ debg TestSubjects.find(superDatePickerAbsoluteDateInput)
[00:43:52]                   │ debg Find.findByCssSelector('[data-test-subj="superDatePickerAbsoluteDateInput"]') with timeout=10000
[00:43:53]                   │ debg TestSubjects.find(noAnomaliesFoundMsg)
[00:43:53]                   │ debg Find.findByCssSelector('[data-test-subj="noAnomaliesFoundMsg"]') with timeout=10000
[00:43:53]                   │ debg TestSubjects.click(anomaliesComboBoxType)
[00:43:53]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:53]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:53]                   │ debg TestSubjects.click(anomaliesK8sComboBoxItem)
[00:43:53]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesK8sComboBoxItem"]') with timeout=10000
[00:43:53]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesK8sComboBoxItem"]') with timeout=10000
[00:43:53]                   │ debg TestSubjects.find(noAnomaliesFoundMsg)
[00:43:53]                   │ debg Find.findByCssSelector('[data-test-subj="noAnomaliesFoundMsg"]') with timeout=10000
[00:43:54]                   │ debg TestSubjects.click(euiFlyoutCloseButton)
[00:43:54]                   │ debg Find.clickByCssSelector('[data-test-subj="euiFlyoutCloseButton"]') with timeout=10000
[00:43:54]                   │ debg Find.findByCssSelector('[data-test-subj="euiFlyoutCloseButton"]') with timeout=10000
[00:43:54]                   └- ✓ pass  (2.0s) "InfraOps App Metrics UI Metrics UI Anomaly Flyout with anomalies present renders the anomaly table after a date change with no anomalies"
[00:43:54]                 └-> renders more anomalies on threshold change
[00:43:54]                   └-> "before each" hook: global before each for "renders more anomalies on threshold change"
[00:43:54]                   │ debg TestSubjects.click(infrastructureNavLink_/settings)
[00:43:54]                   │ debg Find.clickByCssSelector('[data-test-subj="infrastructureNavLink_/settings"]') with timeout=10000
[00:43:54]                   │ debg Find.findByCssSelector('[data-test-subj="infrastructureNavLink_/settings"]') with timeout=10000
[00:43:54]                   │ debg Find.findByCssSelector('.euiFieldNumber.euiRangeInput.euiRangeInput--max') with timeout=10000
[00:43:54]                   │ debg TestSubjects.find(~sourceConfigurationContent)
[00:43:54]                   │ debg Find.findByCssSelector('[data-test-subj~="sourceConfigurationContent"]') with timeout=10000
[00:43:54]                   │ debg TestSubjects.findDescendant(~applySettingsButton)
[00:43:54]                   │ debg Find.descendantDisplayedByCssSelector('[data-test-subj~="applySettingsButton"]')
[00:43:54]                   │ debg TestSubjects.find(~sourceConfigurationContent)
[00:43:54]                   │ debg Find.findByCssSelector('[data-test-subj~="sourceConfigurationContent"]') with timeout=10000
[00:43:54]                   │ debg TestSubjects.findDescendant(~applySettingsButton)
[00:43:54]                   │ debg Find.descendantDisplayedByCssSelector('[data-test-subj~="applySettingsButton"]')
[00:43:54]                   │ info [o.e.c.m.MetadataMappingService] [kibana-ci-immutable-ubuntu-16-tests-xxl-1623086365289355279] [.kibana_8.0.0_001/-bCbXgtRRmeUmDHUYqPuRw] update_mapping [_doc]
[00:43:55]                   │ debg TestSubjects.click(infrastructureNavLink_/inventory)
[00:43:55]                   │ debg Find.clickByCssSelector('[data-test-subj="infrastructureNavLink_/inventory"]') with timeout=10000
[00:43:55]                   │ debg Find.findByCssSelector('[data-test-subj="infrastructureNavLink_/inventory"]') with timeout=10000
[00:43:55]                   │ debg TestSubjects.click(openAnomalyFlyoutButton)
[00:43:55]                   │ debg Find.clickByCssSelector('[data-test-subj="openAnomalyFlyoutButton"]') with timeout=10000
[00:43:55]                   │ debg Find.findByCssSelector('[data-test-subj="openAnomalyFlyoutButton"]') with timeout=10000
[00:43:56]                   │ debg TestSubjects.exists(loadMLFlyout)
[00:43:56]                   │ debg Find.existsByDisplayedByCssSelector('[data-test-subj="loadMLFlyout"]') with timeout=2500
[00:43:56]                   │ debg TestSubjects.click(anomalyFlyoutAnomaliesTab)
[00:43:56]                   │ debg Find.clickByCssSelector('[data-test-subj="anomalyFlyoutAnomaliesTab"]') with timeout=10000
[00:43:56]                   │ debg Find.findByCssSelector('[data-test-subj="anomalyFlyoutAnomaliesTab"]') with timeout=10000
[00:43:56]                   │ debg TestSubjects.click(anomaliesComboBoxType)
[00:43:56]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:56]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesComboBoxType"]') with timeout=10000
[00:43:56]                   │ debg TestSubjects.click(anomaliesHostComboBoxItem)
[00:43:56]                   │ debg Find.clickByCssSelector('[data-test-subj="anomaliesHostComboBoxItem"]') with timeout=10000
[00:43:56]                   │ debg Find.findByCssSelector('[data-test-subj="anomaliesHostComboBoxItem"]') with timeout=10000
[00:43:56]                   │ debg TestSubjects.findAll(anomalyRow)
[00:43:56]                   │ debg Find.allByCssSelector('[data-test-subj="anomalyRow"]') with timeout=10000
[00:44:06]                   │ info Taking screenshot "/dev/shm/workspace/parallel/1/kibana/x-pack/test/functional/screenshots/failure/InfraOps App Metrics UI Metrics UI Anomaly Flyout with anomalies present renders more anomalies on threshold change.png"
[00:44:06]                   │ info Current URL is: http://localhost:6111/app/metrics/inventory
[00:44:06]                   │ info Saving page source to: /dev/shm/workspace/parallel/1/kibana/x-pack/test/functional/failure_debug/html/InfraOps App Metrics UI Metrics UI Anomaly Flyout with anomalies present renders more anomalies on threshold change.html
[00:44:06]                   └- ✖ fail: InfraOps App Metrics UI Metrics UI Anomaly Flyout with anomalies present renders more anomalies on threshold change
[00:44:06]                   │      Error: expected 0 to equal 4
[00:44:06]                   │       at Assertion.assert (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/expect/expect.js:100:11)
[00:44:06]                   │       at Assertion.be.Assertion.equal (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/expect/expect.js:227:8)
[00:44:06]                   │       at Assertion.be (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/expect/expect.js:69:22)
[00:44:06]                   │       at Context.<anonymous> (test/functional/apps/infra/metrics_anomalies.ts:96:41)
[00:44:06]                   │       at runMicrotasks (<anonymous>)
[00:44:06]                   │       at processTicksAndRejections (internal/process/task_queues.js:93:5)
[00:44:06]                   │       at Object.apply (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16)
[00:44:06]                   │ 
[00:44:06]                   │ 

Stack Trace

Error: expected 0 to equal 4
    at Assertion.assert (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/expect/expect.js:100:11)
    at Assertion.be.Assertion.equal (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/expect/expect.js:227:8)
    at Assertion.be (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/expect/expect.js:69:22)
    at Context.<anonymous> (test/functional/apps/infra/metrics_anomalies.ts:96:41)
    at runMicrotasks (<anonymous>)
    at processTicksAndRejections (internal/process/task_queues.js:93:5)
    at Object.apply (/dev/shm/workspace/parallel/1/kibana/node_modules/@kbn/test/src/functional_test_runner/lib/mocha/wrap_function.js:73:16)

and 4 more failures, only showing the first 3.

Metrics [docs]

✅ unchanged

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

cc @cavokz

cavokz added a commit that referenced this pull request Jun 8, 2021
* [7.x] Add CCS integration test for security rules

* [7.x] More precise alerts matching

* Split out test preparation and cleanup

* Load data on the remote cluster

* Update the rule to the new (remote) data

Backport of #99042 and #99820.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:skip This commit does not require backporting release_note:skip Skip the PR/issue when compiling release notes Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. v8.0.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants