-
Notifications
You must be signed in to change notification settings - Fork 198
Temporarily have FIPS integration tests spin up deployments in Production CFT environment #10007
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Pinging @elastic/elastic-agent-control-plane (Team:Elastic-Agent-Control-Plane) |
| - vault_ec_key_staging_frh_gov: &vault_ec_key_staging_frh_gov | ||
| # - vault_ec_key_staging_frh_gov: &vault_ec_key_staging_frh_gov | ||
| # elastic/vault-secrets#v0.1.0: | ||
| # path: "kv/ci-shared/platform-ingest/platform-ingest-ec-staging-gov" | ||
| # field: "apiKey" | ||
| # env_var: "EC_API_KEY" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think you can keep this YAML anchor, without commenting out, then you just use the other one
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, I thought about that but wanted to deliberately comment it out so we know it's being (temporarily) replaced by the other one. I'll add a comment inline explaining that.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added explanation in 2c6b4ad.
|
FIPS integration testing steps ran successfully in the last CI run so removing ae0e89d from this PR now. This will let us easily revert the changes in this PR once the Staging GovCloud issues are fixed. To be clear, we need the change in ae0e89d for the long term, so that's been added in a separate PR: #10008 |
This reverts commit ae0e89d.
…tion CFT environment (#10007) * Have FIPS integration tests spin up deployments in Production CFT environment * Add explanatory comment * Run extended tests if FIPS integration tests pipeline changes * Revert "Run extended tests if FIPS integration tests pipeline changes" This reverts commit ae0e89d. (cherry picked from commit c76bfe2)
…tion CFT environment (#10007) * Have FIPS integration tests spin up deployments in Production CFT environment * Add explanatory comment * Run extended tests if FIPS integration tests pipeline changes * Revert "Run extended tests if FIPS integration tests pipeline changes" This reverts commit ae0e89d. (cherry picked from commit c76bfe2)
…tion CFT environment (#10007) (#10011) * Have FIPS integration tests spin up deployments in Production CFT environment * Add explanatory comment * Run extended tests if FIPS integration tests pipeline changes * Revert "Run extended tests if FIPS integration tests pipeline changes" This reverts commit ae0e89d. (cherry picked from commit c76bfe2) Co-authored-by: Shaunak Kashyap <ycombinator@gmail.com>
|
💛 Build succeeded, but was flaky
Failed CI StepsHistory
cc @ycombinator |
…tion CFT environment (#10007) * Have FIPS integration tests spin up deployments in Production CFT environment * Add explanatory comment * Run extended tests if FIPS integration tests pipeline changes * Revert "Run extended tests if FIPS integration tests pipeline changes" This reverts commit ae0e89d.
…tion CFT environment (elastic#10007) * Have FIPS integration tests spin up deployments in Production CFT environment * Add explanatory comment * Run extended tests if FIPS integration tests pipeline changes * Revert "Run extended tests if FIPS integration tests pipeline changes" This reverts commit ae0e89d.





What does this PR do?
This PR temporarily creates ECH deployments for the FIPS integration testing Buildkite pipeline in the Production CFT ESS environment (as opposed to the Staging GovCloud ESS environment).
Why is it important?
The FIPS integration tests pipeline is currently failing because the step where it provisions deployments in GovCloud Staging is consistently failing.