[Cloud Security] Mark internal cloud_security_posture ingest pipelines as managed#227684
[Cloud Security] Mark internal cloud_security_posture ingest pipelines as managed#227684zk2k2 wants to merge 5 commits intoelastic:mainfrom
Conversation
cloud_security_posture ingest pipelines so they are correctly marked as managed, fixing issue elastic#226696.
|
❌ Author of the following commits did not sign a Contributor Agreement: Please, read and sign the above mentioned agreement if you want to contribute to this project |
|
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security) |
|
cc @CohenIdo can you review it? |
|
Just commenting so that the CLA checks works |
|
/ci |
|
@elasticmachine run docs-build |
|
@zk2k2 I think you need to actually online sign the CA agreement so we could merge |
|
/ci |
|
@maxcold I signed the CLA multiple times I don't know why it's not picking up on it |
|
@zk2k2 weird, haven't had a case like that before. Did you use the same email |
|
/ci |
|
@elasticmachine run docs-build |
|
/ci |
💚 Build Succeeded
Metrics [docs]
History
|
|
@zk2k2 sorry for the ping but we would like to merge this PR and can't without CLA check passing. Can you check if you signed the agreement with the same email you did commits? It's |
|
Hi @maxcold , I am pretty sure I signed the CLA with the following email zied.kharrat@insat.ucar.tn, I also tried signing it with my other GitHub emails. If this helps, I have successfully signed the CLA for another PR to another issue #227619, pretty sure it was using zied.kharrat@insat.ucar.tn, let me know if I can help any other way |
|
@zk2k2 yeah, I think the issue is that the commit was created with email Anyway, the simplest way to fix it, I think, is to recreate this PR, making sure the commit is made with email |
|
@maxcold Oh I see, my bad! I will recreate the PR ASAP :) thanks for pointing it out! |
|
@zk2k2 thanks! closing this PR then |
## Summary Note: This PR replaces PR #227684 to fix a CLA issue (commit was made under the wrong e-mail) Fixes: - #226696 This PR fixes a bug where internal ingest pipelines used by the cloud_security_posture plugin were not marked as managed. By adding the `_meta.managed: true` field to these pipelines, they will now be correctly recognized as managed pipelines by Elasticsearch and Kibana. This prevents accidental user modifications and aligns with other Elastic-managed pipelines. --- ### Checklist - [x] Follows EUI writing guidelines and includes i18n support where applicable - [ ] Documentation updated as needed - [ ] Unit or functional tests updated or added - [ ] Checked for breaking HTTP API changes - [ ] Flaky Test Runner used on tests changed - [ ] Release Notes section included and appropriate label applied --- ### Identify risks This change only adds metadata to existing ingest pipeline definitions and does not affect pipeline logic or data processing. Risk of regressions or data loss is minimal. The change improves system stability by marking pipelines as managed. --- --------- Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
## Summary Note: This PR replaces PR elastic#227684 to fix a CLA issue (commit was made under the wrong e-mail) Fixes: - elastic#226696 This PR fixes a bug where internal ingest pipelines used by the cloud_security_posture plugin were not marked as managed. By adding the `_meta.managed: true` field to these pipelines, they will now be correctly recognized as managed pipelines by Elasticsearch and Kibana. This prevents accidental user modifications and aligns with other Elastic-managed pipelines. --- ### Checklist - [x] Follows EUI writing guidelines and includes i18n support where applicable - [ ] Documentation updated as needed - [ ] Unit or functional tests updated or added - [ ] Checked for breaking HTTP API changes - [ ] Flaky Test Runner used on tests changed - [ ] Release Notes section included and appropriate label applied --- ### Identify risks This change only adds metadata to existing ingest pipeline definitions and does not affect pipeline logic or data processing. Risk of regressions or data loss is minimal. The change improves system stability by marking pipelines as managed. --- --------- Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
## Summary Note: This PR replaces PR elastic#227684 to fix a CLA issue (commit was made under the wrong e-mail) Fixes: - elastic#226696 This PR fixes a bug where internal ingest pipelines used by the cloud_security_posture plugin were not marked as managed. By adding the `_meta.managed: true` field to these pipelines, they will now be correctly recognized as managed pipelines by Elasticsearch and Kibana. This prevents accidental user modifications and aligns with other Elastic-managed pipelines. --- ### Checklist - [x] Follows EUI writing guidelines and includes i18n support where applicable - [ ] Documentation updated as needed - [ ] Unit or functional tests updated or added - [ ] Checked for breaking HTTP API changes - [ ] Flaky Test Runner used on tests changed - [ ] Release Notes section included and appropriate label applied --- ### Identify risks This change only adds metadata to existing ingest pipeline definitions and does not affect pipeline logic or data processing. Risk of regressions or data loss is minimal. The change improves system stability by marking pipelines as managed. --- --------- Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
## Summary Note: This PR replaces PR elastic#227684 to fix a CLA issue (commit was made under the wrong e-mail) Fixes: - elastic#226696 This PR fixes a bug where internal ingest pipelines used by the cloud_security_posture plugin were not marked as managed. By adding the `_meta.managed: true` field to these pipelines, they will now be correctly recognized as managed pipelines by Elasticsearch and Kibana. This prevents accidental user modifications and aligns with other Elastic-managed pipelines. --- ### Checklist - [x] Follows EUI writing guidelines and includes i18n support where applicable - [ ] Documentation updated as needed - [ ] Unit or functional tests updated or added - [ ] Checked for breaking HTTP API changes - [ ] Flaky Test Runner used on tests changed - [ ] Release Notes section included and appropriate label applied --- ### Identify risks This change only adds metadata to existing ingest pipeline definitions and does not affect pipeline logic or data processing. Risk of regressions or data loss is minimal. The change improves system stability by marking pipelines as managed. --- --------- Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
Summary
Fixes:
This PR fixes a bug where internal ingest pipelines used by the cloud_security_posture plugin were not marked as managed.
By adding the
_meta.managed: truefield to these pipelines, they will now be correctly recognized as managed pipelines by Elasticsearch and Kibana.This prevents accidental user modifications and aligns with other Elastic-managed pipelines.
Checklist
Identify risks
This change only adds metadata to existing ingest pipeline definitions and does not affect pipeline logic or data processing.
Risk of regressions or data loss is minimal. The change improves system stability by marking pipelines as managed.