Skip to content
This repository was archived by the owner on Sep 17, 2024. It is now read-only.
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
86 commits
Select commit Hold shift + click to select a range
b618488
feat: add support for running the tests in ARM
mdelapenya Feb 8, 2021
17c836f
fix: arm workers are not immutable yet
mdelapenya Feb 8, 2021
9eb92ea
Merge branch 'master' into arm-suppport
mdelapenya Feb 23, 2021
e47600e
chore: calculate artifact from the GOARCH variable
mdelapenya Feb 23, 2021
c009e8d
chore: run elasticsearch in the right platform
mdelapenya Feb 23, 2021
a880fcd
chore: add log for architecture
mdelapenya Feb 23, 2021
34bcaf3
Merge branch 'master' into arm-suppport
mdelapenya Mar 5, 2021
f8a0d51
chore: print env variable for GOARCH
mdelapenya Mar 8, 2021
0cd42e0
chore: set GOARCH based in the worker
mdelapenya Mar 8, 2021
d42766d
fix: wrong copy&paste
mdelapenya Mar 8, 2021
6663c23
chore: install k8s dependencies on ARM
mdelapenya Mar 8, 2021
33bc88e
chore: install godog using GOARCH
mdelapenya Mar 8, 2021
c7193a2
fix: proper values for GO env in Makefile
mdelapenya Mar 8, 2021
8e7bf49
chore: add log when requesting a node
mdelapenya Mar 8, 2021
05ea8ce
fix: define Groovy variable
mdelapenya Mar 8, 2021
d51a013
chore: use proper platform for kibana
mdelapenya Mar 8, 2021
5a8a4ae
chore: simplify platforms selection logic
mdelapenya Mar 8, 2021
235e3bb
fix: use proper CI label for node selector
mdelapenya Mar 8, 2021
8326a23
chore: remove running containers in clean-docker script
mdelapenya Mar 8, 2021
7a8d36c
chore: clean up docker state on mutable workers
mdelapenya Mar 8, 2021
30053ab
chore: use parallel branch name for filebeat logs
mdelapenya Mar 8, 2021
04555b2
fix: add forgotten double quotes
mdelapenya Mar 8, 2021
529fc73
chore: print Docker compose version On ARM
mdelapenya Mar 8, 2021
ac6d3a0
chore: use aarch64 architecture for RPM packages
mdelapenya Mar 9, 2021
fbcbdcf
chore: support ARM in tar installer
mdelapenya Mar 9, 2021
b4d6601
Merge branch 'master' into arm-suppport
mdelapenya Mar 9, 2021
9a20396
fix: proper arch for TAR installer
mdelapenya Mar 9, 2021
65d5010
chore: log when the artifact is found
mdelapenya Mar 9, 2021
610d0b8
chore: be defensive about no running containers
mdelapenya Mar 9, 2021
e83517b
Merge branch 'master' into arm-suppport
mdelapenya Mar 10, 2021
9d3dadb
chore: add tests for RPM artifact name
mdelapenya Mar 9, 2021
e6c65c9
chore: add tests for x86_64 TAR artifact
mdelapenya Mar 9, 2021
2d1dc07
Merge branch 'master' into arm-suppport
mdelapenya Mar 18, 2021
855f949
chore: remove docker label from CI workers
mdelapenya Mar 18, 2021
5528a1b
Merge branch 'master' into arm-suppport
mdelapenya Apr 7, 2021
b3c33c0
chore: separate ARM tests in a second parallel stage
mdelapenya Apr 7, 2021
b8bdbe5
Merge branch 'master' into arm-suppport
mdelapenya Apr 8, 2021
f2e57c6
chore: update stage name
mdelapenya Apr 8, 2021
99426de
fix: update arm target platform
mdelapenya Apr 8, 2021
6c2f21b
chore: use GOARCH in the junit file
mdelapenya Apr 8, 2021
4906816
chore: use GOARCH in filebeat logs
mdelapenya Apr 8, 2021
a14eebb
chore: run all stages in parallel
mdelapenya Apr 8, 2021
1d3770d
chore: add platform to log when skipping tests
mdelapenya Apr 8, 2021
4cb4afa
fix: use a filebeat version that supports multiplatform
mdelapenya Apr 8, 2021
9f4522a
Merge branch 'master' into arm-suppport
mdelapenya Apr 19, 2021
e1d355b
Merge branch 'master' into arm-suppport
mdelapenya Apr 21, 2021
d045f10
Merge branch 'master' into arm-suppport
mdelapenya Apr 23, 2021
7142ab8
chore: do not run integrations on ARM
mdelapenya Apr 23, 2021
496b5ef
chore: move test resources for ARM
mdelapenya Apr 23, 2021
6bdf785
Merge branch 'master' into arm-suppport
mdelapenya Apr 23, 2021
bae9a66
chore: use staging environment for package-registry
mdelapenya Apr 24, 2021
33deffa
fix: remove clean because arm workers are now immutable
mdelapenya Apr 26, 2021
73fb39f
Merge branch 'master' into arm-suppport
mdelapenya Apr 27, 2021
a755f6f
chore: use new multiplatform images
mdelapenya Apr 27, 2021
7883dbb
chore: use new multiplatform base images for fleet-server
mdelapenya Apr 28, 2021
63ca5f1
Merge branch 'master' into arm-suppport
mdelapenya Apr 30, 2021
11f2d22
Merge branch 'master' into arm-suppport
mdelapenya May 6, 2021
f8632dd
chore: add platform to elastic-agent cloud flavour
mdelapenya May 6, 2021
6749590
fix: use proper variable for platform
mdelapenya May 6, 2021
fbe8cd6
Merge branch 'master' into arm-suppport
mdelapenya May 6, 2021
9104501
chore: do not clean up installer's workspace
mdelapenya May 6, 2021
ac300e2
Revert "chore: do not clean up installer's workspace"
mdelapenya May 6, 2021
01cc441
chore(ci): skip pull of images from code
mdelapenya May 6, 2021
2d9e29f
Merge branch 'master' into arm-suppport
mdelapenya May 12, 2021
b31a67b
Revert "chore(ci): skip pull of images from code"
mdelapenya May 13, 2021
4e46490
chore: set platform when pulling images
mdelapenya May 13, 2021
43e9e6d
Merge branch 'master' into arm-suppport
mdelapenya May 14, 2021
84b93b4
Merge branch 'master' into arm-suppport
mdelapenya May 19, 2021
339a052
chore: update packer cache with our systemd images
mdelapenya May 19, 2021
b4cd209
fix: request proper platform image for the agent
mdelapenya May 19, 2021
e9e39ff
Merge branch 'master' into arm-suppport
mdelapenya May 19, 2021
52161a6
feat: exclude scenarios per platform
mdelapenya May 21, 2021
5be1485
chore: remove tags for endpoint, as they are not used at all
mdelapenya May 21, 2021
6ed5d55
fix: skip endpoint integration on ARM64
mdelapenya May 21, 2021
080da73
feat: provide supported platforms at the scenario level on CI
mdelapenya May 21, 2021
ce81c7c
fix: use proper length method for groovy arrays
mdelapenya May 21, 2021
72130dd
fix: groovy arrays use size
mdelapenya May 21, 2021
9f347d5
fix: override suite platforms per scenario
mdelapenya May 21, 2021
9ef81ca
chore: update Jenkins label for arm workers
mdelapenya May 24, 2021
0128c1b
chore: simplify platforms, reusing stack
mdelapenya May 24, 2021
bb7eea0
chore: explicitly pass GOARCH to CI script
mdelapenya May 24, 2021
752594d
Revert "chore: update Jenkins label for arm workers"
mdelapenya May 24, 2021
bd198ee
Merge branch 'master' into arm-suppport
mdelapenya May 26, 2021
95532aa
Merge branch 'master' into arm-suppport
mdelapenya May 26, 2021
0ece4da
Merge branch 'master' into arm-suppport
mdelapenya Jun 1, 2021
aa09c0e
Merge branch 'master' into arm-suppport
mdelapenya Jun 1, 2021
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .ci/.e2e-tests.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -12,12 +12,15 @@ SUITES:
tags: "metricbeat"
- suite: "fleet"
platforms:
- "arm64"
- "ubuntu-18.04"
scenarios:
- name: "Fleet"
pullRequestFilter: " && ~debian"
tags: "fleet_mode_agent"
- name: "Endpoint Integration"
platforms:
- "ubuntu-18.04"
Copy link
Copy Markdown
Contributor Author

@mdelapenya mdelapenya May 21, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's possible to override platforms at the scenario level, which will override suite's ones

pullRequestFilter: " && ~debian"
tags: "agent_endpoint_integration"
- name: "Linux Integration"
Expand Down
34 changes: 27 additions & 7 deletions .ci/Jenkinsfile
Original file line number Diff line number Diff line change
Expand Up @@ -249,16 +249,23 @@ def checkTestSuite(Map parallelTasks = [:], Map item = [:]) {
def suite = item.suite
def platforms = item.platforms
item.scenarios.each { scenario ->
def name = scenario.name
def platformsValue = platforms
def scenarioPlatforms = scenario.platforms
if (scenarioPlatforms?.size() > 0) {
// scenario platforms take precedence over suite platforms, overriding them
platformsValue = scenarioPlatforms
}
def pullRequestFilter = scenario.containsKey('pullRequestFilter') ? scenario.pullRequestFilter : ''
def tags = scenario.tags
def regexps = [ "^e2e/_suites/${suite}/.*", "^.ci/.*", "^cli/.*", "^e2e/.*\\.go", "^internal/.*\\.go" ]
if ("${FORCE_SKIP_GIT_CHECKS}" == "true" || isGitRegionMatch(patterns: regexps, shouldMatchAll: false)) {
platforms.each { platform ->
platformsValue.each { platform ->
log(level: 'INFO', text: "Adding ${platform}:${suite}:${tags} test suite to the build execution")
parallelTasks["${platform}_${suite}_${tags}"] = generateFunctionalTestStep(platform: "${platform}", suite: "${suite}", tags: "${tags}", pullRequestFilter: "${pullRequestFilter}")
parallelTasks["${platform}_${suite}_${tags}"] = generateFunctionalTestStep(name: "${name}", platform: "${platform}", suite: "${suite}", tags: "${tags}", pullRequestFilter: "${pullRequestFilter}")
}
} else {
log(level: 'WARN', text: "The ${suite}:${tags} test suite won't be executed because there are no modified files")
log(level: 'WARN', text: "The ${platform}:${suite}:${tags} test suite won't be executed because there are no modified files")
}
}
}
Expand All @@ -281,6 +288,7 @@ def doNotifyBuildResult(boolean slackNotify) {
}

def generateFunctionalTestStep(Map args = [:]){
def name = args.get('name')
def platform = args.get('platform')
def suite = args.get('suite')
def tags = args.get('tags')
Expand All @@ -298,7 +306,17 @@ def generateFunctionalTestStep(Map args = [:]){
if (isPR() || isUpstreamTrigger(filter: 'PR-')) {
tags += pullRequestFilter
}
def workerLabels = "${platform} && immutable && docker"

def goArch = "amd64"
def workerLabels = "${platform} && immutable"
if (platform == "arm64") {
goArch = "arm64"
// ARM is not ready as immutable workers
workerLabels = "arm"
Comment thread
mdelapenya marked this conversation as resolved.
}

// Skip scenarios per platform
tags += " && ~@skip:${goArch}"

return {
withNode(labels: "${workerLabels}", sleepMax: 20, forceWorkspace: true){
Expand All @@ -309,10 +327,12 @@ def generateFunctionalTestStep(Map args = [:]){
if(isInstalled(tool: 'docker', flag: '--version')) {
dockerLogin(secret: "${DOCKER_ELASTIC_SECRET}", registry: "${DOCKER_REGISTRY}")
}
filebeat(output: "docker_logs_${suite}_${tags}.log", workdir: "${env.WORKSPACE}"){
filebeat(image: 'docker.elastic.co/beats/filebeat:7.13.0-SNAPSHOT', output: "docker_logs_${goArch}_${suite}_${name}.log", workdir: "${env.WORKSPACE}"){
dir("${BASE_DIR}"){
withSecretVault(secret: "${VAULT_INSTRUMENTATION_SECRET}", user_key: "apmServerToken", user_var_name: "APM_SECRET_TOKEN", pass_key: "apmServerUrl", pass_var_name: "APM_SERVER_URL"){
sh script: """.ci/scripts/functional-test.sh "${suite}" "${tags}" "${STACK_VERSION}" "${BEAT_VERSION}" """, label: "Run functional tests for ${suite}:${tags}"
withEnv(["GOARCH=${goArch}"]) {
Comment thread
mdelapenya marked this conversation as resolved.
withSecretVault(secret: "${VAULT_INSTRUMENTATION_SECRET}", user_key: "apmServerToken", user_var_name: "APM_SECRET_TOKEN", pass_key: "apmServerUrl", pass_var_name: "APM_SERVER_URL"){
sh script: """.ci/scripts/functional-test.sh "${suite}" "${tags}" "${STACK_VERSION}" "${BEAT_VERSION}" """, label: "Run functional tests for ${suite}:${tags}"
}
}
}
}
Expand Down
6 changes: 3 additions & 3 deletions .ci/packer_cache.sh
Original file line number Diff line number Diff line change
Expand Up @@ -5,9 +5,9 @@ source /usr/local/bin/bash_standard_lib.sh

readonly GO_VERSION=$(cat .go-version)

DOCKER_IMAGES="centos/systemd:latest
alehaa/debian-systemd:stretch
docker.elastic.co/beats/filebeat:7.10.1
DOCKER_IMAGES="docker.elastic.co/observability-ci/centos-systemd:latest
docker.elastic.co/observability-ci/debian-systemd:latest
docker.elastic.co/beats/filebeat:7.13.0-SNAPSHOT
docker.elastic.co/observability-ci/picklesdoc:2.20.1
golang:${GO_VERSION}-stretch
"
Expand Down
3 changes: 3 additions & 0 deletions .ci/scripts/clean-docker.sh
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,9 @@ set -euxo pipefail
readonly VERSION="$(cat $(pwd)/.stack-version)"

main() {
# remove running containers
docker container rm -fv $(docker container ls -a --quiet) || true

# refresh docker images
cat <<EOF >.tmp_images
docker.elastic.co/beats/elastic-agent:${VERSION}
Expand Down
5 changes: 3 additions & 2 deletions .ci/scripts/functional-test.sh
Original file line number Diff line number Diff line change
Expand Up @@ -22,13 +22,14 @@ SUITE=${1:-''}
TAGS=${2:-''}
STACK_VERSION=${3:-"${BASE_VERSION}"}
BEAT_VERSION=${4:-"${BASE_VERSION}"}
GOARCH=${GOARCH:-"amd64"}

## Install the required dependencies for the given SUITE
.ci/scripts/install-test-dependencies.sh "${SUITE}"

rm -rf outputs || true
mkdir -p outputs

REPORT="$(pwd)/outputs/TEST-${SUITE}"
REPORT="$(pwd)/outputs/TEST-${GOARCH}-${SUITE}"
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

GOARCH is missing in the variable definitions, is that intended?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Mmm, this is set by the pipeline, within a withEnv block. Are you concerned about using this script outside the CI? If so, you are right, as the GOARCH is not set. Do you suggest passing it as a positional parameter instead? I think it would be a simple change.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok, will proceed as in that commit. Thanks!!


TAGS="${TAGS}" FORMAT=junit:${REPORT}.xml STACK_VERSION=${STACK_VERSION} BEAT_VERSION=${BEAT_VERSION} make --no-print-directory -C e2e/_suites/${SUITE} functional-test
TAGS="${TAGS}" FORMAT=junit:${REPORT}.xml GOARCH=${GOARCH} STACK_VERSION=${STACK_VERSION} BEAT_VERSION=${BEAT_VERSION} make --no-print-directory -C e2e/_suites/${SUITE} functional-test
11 changes: 6 additions & 5 deletions .ci/scripts/install-helm-test-dependencies.sh
Original file line number Diff line number Diff line change
Expand Up @@ -14,32 +14,33 @@ set -euxo pipefail
# - KUBERNETES_VERSION - that's the Kubernetes version which will be installed and enabled.
#

GOARCH=${GOARCH:-"amd64"}
MSG="parameter missing."
HOME=${HOME:?$MSG}

HELM_VERSION="${HELM_VERSION:-"3.5.2"}"
HELM_TAR_GZ_FILE="helm-v${HELM_VERSION}-linux-amd64.tar.gz"
HELM_TAR_GZ_FILE="helm-v${HELM_VERSION}-linux-${GOARCH}.tar.gz"
KIND_VERSION="v${KIND_VERSION:-"0.10.0"}"
KUBERNETES_VERSION="${KUBERNETES_VERSION:-"1.18.2"}"

HELM_CMD="${HOME}/bin/helm"
KBC_CMD="${HOME}/bin/kubectl"

# Install kind as a Go binary
GO111MODULE="on" go get sigs.k8s.io/kind@${KIND_VERSION}
GOARCH=${GOARCH} GO111MODULE="on" go get sigs.k8s.io/kind@${KIND_VERSION}

mkdir -p "${HOME}/bin" "${HOME}/.kube"
touch "${HOME}/.kube/config"

# Install kubectl
curl -sSLo "${KBC_CMD}" "https://storage.googleapis.com/kubernetes-release/release/v${KUBERNETES_VERSION}/bin/linux/amd64/kubectl"
curl -sSLo "${KBC_CMD}" "https://storage.googleapis.com/kubernetes-release/release/v${KUBERNETES_VERSION}/bin/linux/${GOARCH}/kubectl"
chmod +x "${KBC_CMD}"
${KBC_CMD} version --client

# Install Helm
curl -o ${HELM_TAR_GZ_FILE} "https://get.helm.sh/${HELM_TAR_GZ_FILE}"
tar -xvf ${HELM_TAR_GZ_FILE}
mv linux-amd64/helm ${HELM_CMD}
mv linux-${GOARCH}/helm ${HELM_CMD}
chmod +x "${HELM_CMD}"
${HELM_CMD} version --client
rm -fr linux-amd64 ${HELM_TAR_GZ_FILE}
rm -fr linux-${GOARCH} ${HELM_TAR_GZ_FILE}
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ monitoring.ui.container.elasticsearch.enabled: true
xpack.encryptedSavedObjects.encryptionKey: "12345678901234567890123456789012"

xpack.fleet.enabled: true
xpack.fleet.registryUrl: http://package-registry:8080
xpack.fleet.registryUrl: https://epr-staging.elastic.co
Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We are moving from a local package registry to the real staging one

xpack.fleet.agents.enabled: true
xpack.fleet.agents.elasticsearch.host: http://elasticsearch:9200
xpack.fleet.agents.fleet_server.hosts:
Expand Down
11 changes: 2 additions & 9 deletions cli/config/compose/profiles/fleet/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,30 +17,23 @@ services:
- ELASTIC_USERNAME=elastic
- ELASTIC_PASSWORD=changeme
image: "docker.elastic.co/elasticsearch/elasticsearch:${stackVersion:-8.0.0-SNAPSHOT}"
platform: ${stackPlatform:-linux/amd64}
ports:
- "9200:9200"
kibana:
depends_on:
elasticsearch:
condition: service_healthy
package-registry:
condition: service_healthy
healthcheck:
test: "curl -f http://localhost:5601/login | grep kbn-injected-metadata 2>&1 >/dev/null"
retries: 600
interval: 1s
image: "docker.elastic.co/${kibanaDockerNamespace:-kibana}/kibana:${kibanaVersion:-8.0.0-SNAPSHOT}"
platform: ${stackPlatform:-linux/amd64}
ports:
- "5601:5601"
volumes:
- ./configurations/kibana.config.yml:/usr/share/kibana/config/kibana.yml
package-registry:
Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we get to an agreement to test PR versions of the package registry, then we can re-add this block again.

image: docker.elastic.co/package-registry/distribution:staging
healthcheck:
test: ["CMD", "curl", "-f", "http://localhost:8080"]
retries: 300
interval: 1s

fleet-server:
image: "docker.elastic.co/beats/elastic-agent:${stackVersion:-8.0.0-SNAPSHOT}"
depends_on:
Expand Down
1 change: 1 addition & 0 deletions cli/config/compose/profiles/metricbeat/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,5 +10,6 @@ services:
- ELASTIC_USERNAME=elastic
- ELASTIC_PASSWORD=changeme
image: "docker.elastic.co/elasticsearch/elasticsearch:${stackVersion:-8.0.0-SNAPSHOT}"
platform: ${stackPlatform:-linux/amd64}
ports:
- "9200:9200"
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
version: '2.4'
services:
elastic-agent:
image: centos/systemd:${centos_systemdTag:-latest}
image: docker.elastic.co/observability-ci/centos-systemd:latest
container_name: ${centos_systemdContainerName}
entrypoint: "/usr/sbin/init"
platform: ${stackPlatform:-linux/amd64}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,7 @@ services:
- "DATA_PATH=/apm-legacy/data/"
- "LOGS_PATH=/apm-legacy/logs/"
- "HOME_PATH=/apm-legacy/"
platform: ${stackPlatform:-linux/amd64}
volumes:
- "${apmVolume}:/apm-legacy"
ports:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
version: '2.4'
services:
elastic-agent:
image: alehaa/debian-systemd:${debian_systemdTag:-stretch}
image: docker.elastic.co/observability-ci/debian-systemd:latest
container_name: ${debian_systemdContainerName}
entrypoint: "/sbin/init"
platform: ${stackPlatform:-linux/amd64}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,6 @@ services:
environment:
- "FLEET_SERVER_ENABLE=${fleetServerMode:-0}"
- "FLEET_SERVER_INSECURE_HTTP=${fleetServerMode:-0}"
platform: ${elasticAgentPlatform:-linux/amd64}
platform: ${stackPlatform:-linux/amd64}
ports:
- "127.0.0.1:8220:8220"
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ services:
- ELASTIC_USERNAME=elastic
- ELASTIC_PASSWORD=changeme
image: "docker.elastic.co/observability-ci/elasticsearch:${elasticsearchTag}"
platform: ${elasticsearchPlatform:-linux/amd64}
ports:
- "9200:9200"
- "9300:9300"
Original file line number Diff line number Diff line change
@@ -1,9 +1,10 @@
version: '2.4'
services:
fleet-server-centos:
image: centos/systemd:${fleet_server_centosTag:-latest}
image: docker.elastic.co/observability-ci/centos-systemd:latest
container_name: ${fleet_server_centosContainerName}
entrypoint: "/usr/sbin/init"
platform: ${stackPlatform:-linux/amd64}
privileged: true
volumes:
- /sys/fs/cgroup:/sys/fs/cgroup:ro
Original file line number Diff line number Diff line change
@@ -1,9 +1,10 @@
version: '2.4'
services:
fleet-server-debian:
image: alehaa/debian-systemd:${fleet_server_debianTag:-stretch}
image: docker.elastic.co/observability-ci/debian-systemd:latest
container_name: ${fleet_server_debianContainerName}
entrypoint: "/sbin/init"
platform: ${stackPlatform:-linux/amd64}
privileged: true
volumes:
- /sys/fs/cgroup:/sys/fs/cgroup:ro
2 changes: 1 addition & 1 deletion cli/config/compose/services/metricbeat/docker-compose.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,6 @@ services:
image: "docker.elastic.co/${metricbeatDockerNamespace:-beats}/metricbeat:${metricbeatTag:-8.0.0-SNAPSHOT}"
labels:
co.elastic.logs/module: "${serviceName}"
platform: ${metricbeatPlatform:-linux/amd64}
platform: ${stackPlatform:-linux/amd64}
volumes:
- "${metricbeatConfigFile}:/usr/share/metricbeat/metricbeat.yml"
Original file line number Diff line number Diff line change
@@ -1,8 +1,8 @@
@agent_endpoint_integration
@skip:arm64
Feature: Agent Endpoint Integration
Scenarios for Agent to deploy Endpoint and sending data to Fleet and Elasticsearch.

@deploy-endpoint-with-agent
Scenario Outline: Adding the Endpoint Integration to an Agent makes the host to show in Security App
Given a "<os>" agent is deployed to Fleet with "tar" installer
And the agent is listed in Fleet as "online"
Expand All @@ -20,7 +20,6 @@ Examples: Debian
| os |
| debian |

@endpoint-policy-check
Scenario Outline: Deploying an Endpoint makes policies to appear in the Security App
When an "Endpoint" is successfully deployed with a "<os>" Agent using "tar" installer
Then the policy response will be shown in the Security App
Expand All @@ -35,7 +34,6 @@ Examples: Debian
| os |
| debian |

@set-policy-and-check-changes
Scenario Outline: Changing an Agent policy is reflected in the Security App
Given an "Endpoint" is successfully deployed with a "<os>" Agent using "tar" installer
When the policy is updated to have "malware" in "detect" mode
Expand All @@ -51,7 +49,6 @@ Examples: Debian
| os |
| debian |

@deploy-endpoint-then-unenroll-agent
Scenario Outline: Un-enrolling Elastic Agent stops Elastic Endpoint
Given an "Endpoint" is successfully deployed with a "<os>" Agent using "tar" installer
When the agent is un-enrolled
Expand All @@ -68,7 +65,6 @@ Examples: Debian
| os |
| debian |

@deploy-endpoint-then-remove-it-from-policy
Scenario Outline: Removing Endpoint from Agent policy stops the connected Endpoint
Given an "Endpoint" is successfully deployed with a "<os>" Agent using "tar" installer
When the "Endpoint Security" integration is "removed" in the policy
Expand Down
2 changes: 0 additions & 2 deletions e2e/_suites/fleet/ingest_manager_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -66,8 +66,6 @@ func InitializeIngestManagerTestSuite(ctx *godog.TestSuiteContext) {
ctx.BeforeSuite(func() {
setUpSuite()

log.Trace("Bootstrapping Fleet Server")

if !shell.GetEnvBool("SKIP_PULL") {
images := []string{
"docker.elastic.co/beats/elastic-agent:" + common.BeatVersion,
Expand Down
5 changes: 3 additions & 2 deletions e2e/_suites/fleet/stand-alone.go
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,9 @@ func (fts *FleetTestSuite) startStandAloneAgent(image string, flavour string, en
agentService := deploy.NewServiceRequest(common.ElasticAgentServiceName)
dockerInstaller, _ := installer.Attach(fts.deployer, agentService, "docker")
dockerInstaller.Preinstall()
dockerImageTag += "-amd64"

arch := utils.GetArchitecture()
dockerImageTag += "-" + arch
}

common.ProfileEnv["elasticAgentDockerImageSuffix"] = ""
Expand All @@ -125,7 +127,6 @@ func (fts *FleetTestSuite) startStandAloneAgent(image string, flavour string, en
containerName := fmt.Sprintf("%s_%s_%d", common.FleetProfileName, common.ElasticAgentServiceName, 1)

common.ProfileEnv["elasticAgentContainerName"] = containerName
common.ProfileEnv["elasticAgentPlatform"] = "linux/amd64"
common.ProfileEnv["elasticAgentTag"] = dockerImageTag

for k, v := range env {
Expand Down
Loading