Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cleanup saved objects mappings #153070

Conversation

TinaHeiligers
Copy link
Contributor

Related to #149102

This PR identifies saved objects with unindexed fields in their mapping definitions.

The draft specifically does the following:

  • Identifies saved object fields with index: false,
  • Adds dynamic: false to the root mapping definition,
  • Comments out the fields

@TinaHeiligers TinaHeiligers added release_note:skip Skip the PR/issue when compiling release notes backport:skip This commit does not require backporting v8.8.0 labels Mar 10, 2023
@TinaHeiligers
Copy link
Contributor Author

Many tests are failing meaning there's a direct reference to the field and removing it isn't as simple as deleting it from the mapping (with dynamic: false at that field's level).

Teams will need to investigate where they're using these and decide how they want to proceed.

@TinaHeiligers
Copy link
Contributor Author

@rudolf I started creating separate PR's to handle each team's mappings but didn't finish.
At least this draft identifies which saved objects can possibly reduce their field count.

@kibana-ci
Copy link
Collaborator

kibana-ci commented Mar 11, 2023

💔 Build Failed

Failed CI Steps

Test Failures

  • [job] [logs] Fleet Cypress Tests / Add Integration - Mock API upgrade package and upgrade package policy should upgrade integration policy
  • [job] [logs] Fleet Cypress Tests / Add Integration - Mock API upgrade package and upgrade package policy should upgrade integration policy
  • [job] [logs] Fleet Cypress Tests / Add Integration - Real API should add integration to policy
  • [job] [logs] Fleet Cypress Tests / Add Integration - Real API should add integration to policy
  • [job] [logs] Fleet Cypress Tests / Add Integration - Real API should display Apache integration in the Policies list once installed
  • [job] [logs] Fleet Cypress Tests / Add Integration - Real API should display Apache integration in the Policies list once installed
  • [job] [logs] Fleet Cypress Tests / Add Integration - Real API should install integration without policy
  • [job] [logs] Fleet Cypress Tests / Add Integration - Real API should install integration without policy
  • [job] [logs] Fleet Cypress Tests / Add Integration - Real API should upgrade policies with integration update
  • [job] [logs] Fleet Cypress Tests / Add Integration - Real API should upgrade policies with integration update
  • [job] [logs] Fleet Cypress Tests / Agent binary download source section allows to create new download source objects
  • [job] [logs] Fleet Cypress Tests / Agent binary download source section allows to create new download source objects
  • [job] [logs] Fleet Cypress Tests / Agent binary download source section has a default value and allows to edit an existing object
  • [job] [logs] Fleet Cypress Tests / Agent binary download source section has a default value and allows to edit an existing object
  • [job] [logs] Fleet Cypress Tests / Agent binary download source section the download source is displayed in agent policy settings
  • [job] [logs] Fleet Cypress Tests / Agent binary download source section the download source is displayed in agent policy settings
  • [job] [logs] Security Solution Tests #2 / Bulk editing index patterns of rules with index patterns and rules with a data view Add index patterns to custom rules: one rule is updated, one rule is skipped
  • [job] [logs] Jest Integration Tests #3 / checking migration metadata changes on all registered SO types detecting migration related changes in registered types
  • [job] [logs] FTR Configs #30 / Cloud Security Posture Findings Page "before all" hook in "Findings Page"
  • [job] [logs] FTR Configs #30 / Cloud Security Posture Findings Page "before all" hook in "Findings Page"
  • [job] [logs] FTR Configs #59 / cloud_security_posture GET /internal/cloud_security_posture/status Should return not-deployed when installed cspm
  • [job] [logs] FTR Configs #59 / cloud_security_posture GET /internal/cloud_security_posture/status Should return not-deployed when installed cspm
  • [job] [logs] FTR Configs #59 / cloud_security_posture GET /internal/cloud_security_posture/status Should return not-deployed when installed kspm
  • [job] [logs] FTR Configs #59 / cloud_security_posture GET /internal/cloud_security_posture/status Should return not-deployed when installed kspm
  • [job] [logs] FTR Configs #12 / detection engine api security and spaces enabled - Group 10 Finalizing signals migrations finalizes an arbitrary number of indices
  • [job] [logs] FTR Configs #12 / detection engine api security and spaces enabled - Group 10 Finalizing signals migrations finalizes an arbitrary number of indices
  • [job] [logs] FTR Configs #12 / detection engine api security and spaces enabled - Group 10 Finalizing signals migrations replaces the original index alias with the migrated one
  • [job] [logs] FTR Configs #12 / detection engine api security and spaces enabled - Group 10 Finalizing signals migrations replaces the original index alias with the migrated one
  • [job] [logs] FTR Configs #12 / detection engine api security and spaces enabled - Group 10 Finalizing signals migrations subsequent attempts at finalization are idempotent
  • [job] [logs] FTR Configs #12 / detection engine api security and spaces enabled - Group 10 Finalizing signals migrations subsequent attempts at finalization are idempotent
  • [job] [logs] FTR Configs #12 / detection engine api security and spaces enabled - Group 10 Signals migration status includes an index if its signals are within the specified range
  • [job] [logs] FTR Configs #12 / detection engine api security and spaces enabled - Group 10 Signals migration status includes an index if its signals are within the specified range
  • [job] [logs] FTR Configs #12 / detection engine api security and spaces enabled - Group 10 Signals migration status returns no indexes if no signals exist in the specified range
  • [job] [logs] FTR Configs #12 / detection engine api security and spaces enabled - Group 10 Signals migration status returns no indexes if no signals exist in the specified range
  • [job] [logs] FTR Configs #12 / detection engine api security and spaces enabled - Group 10 Signals migration status returns the mappings version and a breakdown of signals' version
  • [job] [logs] FTR Configs #12 / detection engine api security and spaces enabled - Group 10 Signals migration status returns the mappings version and a breakdown of signals' version
  • [job] [logs] FTR Configs #48 / detection engine api security and spaces enabled - Group 6 Detection engine signals/alerts compatibility Alerts Compatibility CTI migrates legacy enriched signals to be queried by threat.enrichments
  • [job] [logs] FTR Configs #48 / detection engine api security and spaces enabled - Group 6 Detection engine signals/alerts compatibility Alerts Compatibility CTI migrates legacy enriched signals to be queried by threat.enrichments
  • [job] [logs] Security Solution Tests #2 / Detection rules, bulk edit of rule actions All actions privileges Add a rule action to rules (existing connector)
  • [job] [logs] Security Solution Tests #2 / Detection rules, bulk edit of rule actions All actions privileges Add a rule action to rules (existing connector)
  • [job] [logs] Security Solution Tests #2 / Detection rules, bulk edit of rule actions All actions privileges Overwrite rule actions in rules
  • [job] [logs] Security Solution Tests #2 / Detection rules, bulk edit of rule actions All actions privileges Overwrite rule actions in rules
  • [job] [logs] Security Solution Tests #2 / Detection rules, bulk edit Prerequisites Only prebuilt rules selected
  • [job] [logs] Security Solution Tests #2 / Detection rules, bulk edit Prerequisites Only prebuilt rules selected
  • [job] [logs] Security Solution Tests #2 / Detection rules, bulk edit Prerequisites Prebuilt and custom rules selected: user cancels action
  • [job] [logs] Security Solution Tests #2 / Detection rules, bulk edit Prerequisites Prebuilt and custom rules selected: user cancels action
  • [job] [logs] Security Solution Tests #2 / Detection rules, bulk edit Prerequisites Prebuilt and custom rules selected: user proceeds with custom rules editing
  • [job] [logs] Security Solution Tests #2 / Detection rules, bulk edit Prerequisites Prebuilt and custom rules selected: user proceeds with custom rules editing
  • [job] [logs] Fleet Cypress Tests / Edit agent policy should edit agent policy
  • [job] [logs] Fleet Cypress Tests / Edit agent policy should edit agent policy
  • [job] [logs] Fleet Cypress Tests / Edit package policy should edit package policy
  • [job] [logs] Fleet Cypress Tests / Edit package policy should edit package policy
  • [job] [logs] Fleet Cypress Tests / Edit settings should allow to create a logstash output
  • [job] [logs] Fleet Cypress Tests / Edit settings should allow to create a logstash output
  • [job] [logs] Fleet Cypress Tests / Edit settings should allow to create new Fleet server hosts
  • [job] [logs] Fleet Cypress Tests / Edit settings should allow to create new Fleet server hosts
  • [job] [logs] Fleet Cypress Tests / Edit settings should allow to update Fleet server hosts
  • [job] [logs] Fleet Cypress Tests / Edit settings should allow to update Fleet server hosts
  • [job] [logs] Fleet Cypress Tests / Edit settings should update outputs
  • [job] [logs] Fleet Cypress Tests / Edit settings should update outputs
  • [job] [logs] FTR Configs #11 / endpoint "before all" hook in "endpoint"
  • [job] [logs] FTR Configs #11 / endpoint "before all" hook in "endpoint"
  • [job] [logs] FTR Configs #17 / Endpoint plugin "after all" hook in "Endpoint plugin"
  • [job] [logs] FTR Configs #17 / Endpoint plugin "after all" hook in "Endpoint plugin"
  • [job] [logs] FTR Configs #17 / Endpoint plugin "before all" hook in "Endpoint plugin"
  • [job] [logs] FTR Configs #17 / Endpoint plugin "before all" hook in "Endpoint plugin"
  • [job] [logs] Fleet Cypress Tests / Enrollment token page "before all" hook for "Create new Token"
  • [job] [logs] Fleet Cypress Tests / Enrollment token page "before all" hook for "Create new Token"
  • [job] [logs] Security Solution Tests #2 / Export rules exports only custom rules
  • [job] [logs] Security Solution Tests #2 / Export rules exports only custom rules
  • [job] [logs] Security Solution Tests #2 / Export rules rules with exceptions exports custom rules with exceptions
  • [job] [logs] Security Solution Tests #2 / Export rules rules with exceptions exports custom rules with exceptions
  • [job] [logs] Security Solution Tests #2 / Export rules shows a modal saying that no rules can be exported if all the selected rules are prebuilt
  • [job] [logs] Security Solution Tests #2 / Export rules shows a modal saying that no rules can be exported if all the selected rules are prebuilt
  • [job] [logs] Fleet Cypress Tests / Fleet add agent flyout With a Fleet Server already setup "before each" hook for "works in managed mode without agent policy created"
  • [job] [logs] Fleet Cypress Tests / Fleet add agent flyout With a Fleet Server already setup "before each" hook for "works in managed mode without agent policy created"
  • [job] [logs] Jest Integration Tests #1 / Fleet setup preconfiguration with multiple instances Kibana preconfiguration setup sets up Fleet correctly when multiple Kibana instaces are started in serial
  • [job] [logs] Jest Integration Tests #1 / Fleet setup preconfiguration with multiple instances Kibana preconfiguration setup sets up Fleet correctly when multiple Kibana instances are started at the same time
  • [job] [logs] Jest Integration Tests #1 / Fleet setup preconfiguration with multiple instances Kibana preconfiguration setup sets up Fleet correctly with single Kibana instance
  • [job] [logs] Fleet Cypress Tests / Fleet startup Create policies should create agent policy
  • [job] [logs] Fleet Cypress Tests / Fleet startup Create policies should create agent policy
  • [job] [logs] Fleet Cypress Tests / Fleet startup Create policies should create Fleet Server policy
  • [job] [logs] Fleet Cypress Tests / Fleet startup Create policies should create Fleet Server policy
  • [job] [logs] Jest Integration Tests #1 / fleet usage telemetry should fetch usage telemetry
  • [job] [logs] FTR Configs #23 / home onboarding Welcome interstitial is displayed on a fresh install with Fleet setup executed
  • [job] [logs] FTR Configs #23 / home onboarding Welcome interstitial is displayed on a fresh install with Fleet setup executed
  • [job] [logs] Fleet Cypress Tests / Home page Agents Quick Start "before all" hook for "Get started with fleet"
  • [job] [logs] Fleet Cypress Tests / Home page Agents Quick Start "before all" hook for "Get started with fleet"
  • [job] [logs] FTR Configs #48 / Journey[cloud_security_dashboard] "before all" hook for "Go to cloud security dashboards Page"
  • [job] [logs] FTR Configs #48 / Journey[cloud_security_dashboard] "before all" hook for "Go to cloud security dashboards Page"
  • [job] [logs] FTR Configs #8 / Machine Learning modules "before all" hook in "modules"
  • [job] [logs] FTR Configs #8 / Machine Learning modules "before all" hook in "modules"
  • [job] [logs] Jest Integration Tests #3 / migration v2 completes the migration even when a full batch would exceed ES http.max_content_length
  • [job] [logs] FTR Configs #60 / Monitoring _health endpoint with integration package data "before all" hook: load archive for "returns the state of the monitoring documents"
  • [job] [logs] FTR Configs #60 / Monitoring _health endpoint with integration package data "before all" hook: load archive for "returns the state of the monitoring documents"
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Beats Beat Package (metrics-*) should load individual beat
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Beats Beat Package (metrics-*) should load individual beat
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Beats Beats Package (metrics-*) should load beats
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Beats Beats Package (metrics-*) should load beats
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Beats Overview Package (metrics-*) should summarize beats cluster with metrics
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Beats Overview Package (metrics-*) should summarize beats cluster with metrics
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch CCR Package (metrics-*) should return all followers and a grouping of stats by follower index
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch CCR Package (metrics-*) should return all followers and a grouping of stats by follower index
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch CCR Package (metrics-*) should return specific shard details
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch CCR Package (metrics-*) should return specific shard details
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Indices Package (metrics-*) should summarize all indices with stats
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Indices Package (metrics-*) should summarize all indices with stats
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Indices Package (metrics-*) should summarize index with chart metrics data for the advanced view
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Indices Package (metrics-*) should summarize index with chart metrics data for the advanced view
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Indices Package (metrics-*) should summarize index with chart metrics data for the non-advanced view
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Indices Package (metrics-*) should summarize index with chart metrics data for the non-advanced view
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Indices Package (metrics-*) should summarize the non-system indices with stats
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Indices Package (metrics-*) should summarize the non-system indices with stats
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch ML jobs Package (metrics-*) should list ml jobs
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch ML jobs Package (metrics-*) should list ml jobs
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Nodes Package (metrics-*) should list nodes
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Nodes Package (metrics-*) should list nodes
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Nodes Package (metrics-*) should summarize node with advanced metrics
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Nodes Package (metrics-*) should summarize node with advanced metrics
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Nodes Package (metrics-*) should summarize node with metrics
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Nodes Package (metrics-*) should summarize node with metrics
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Overview Package (metrics-*) should summarize elasticsearch with metrics
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Elasticsearch Overview Package (metrics-*) should summarize elasticsearch with metrics
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Logstash Nodes Package (metrics-*) should summarize logstash nodes with stats
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Logstash Nodes Package (metrics-*) should summarize logstash nodes with stats
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Logstash Nodes Package (metrics-*) should summarize the Logstash node with advanced chart data metrics
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Logstash Nodes Package (metrics-*) should summarize the Logstash node with advanced chart data metrics
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Logstash Nodes Package (metrics-*) should summarize the Logstash node with non-advanced chart data metrics
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Logstash Nodes Package (metrics-*) should summarize the Logstash node with non-advanced chart data metrics
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Logstash Overview Package (metrics-*) should summarize logstash nodes
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Logstash Overview Package (metrics-*) should summarize logstash nodes
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Logstash Pipelines Package (metrics-*) should get all pipelines after enough pagination
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Logstash Pipelines Package (metrics-*) should get all pipelines after enough pagination
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Logstash Pipelines Package (metrics-*) should return paginated pipelines
  • [job] [logs] FTR Configs #39 / Monitoring Endpoints Logstash Pipelines Package (metrics-*) should return paginated pipelines
  • [job] [logs] Security Solution Tests #2 / Prebuilt rules Alerts rules, prebuilt rules "before each" hook for "Loads prebuilt rules"
  • [job] [logs] Security Solution Tests #2 / Prebuilt rules Alerts rules, prebuilt rules "before each" hook for "Loads prebuilt rules"
  • [job] [logs] Security Solution Tests #2 / Related integrations installed integrations: Amazon CloudFront, AWS CloudTrail, System, enabled integrations: Amazon CloudFront, Aws Cloudfront, System "before all" hook for "should display a badge with the installed integrations on the rule management page"
  • [job] [logs] Security Solution Tests #2 / Related integrations installed integrations: Amazon CloudFront, AWS CloudTrail, System, enabled integrations: Amazon CloudFront, Aws Cloudfront, System "before all" hook for "should display a badge with the installed integrations on the rule management page"
  • [job] [logs] Security Solution Tests #2 / Rules selection should correctly update the selection label when rules are bulk selected and then bulk un-selected
  • [job] [logs] Security Solution Tests #2 / Rules selection should correctly update the selection label when rules are bulk selected and then bulk un-selected
  • [job] [logs] Security Solution Tests #2 / Rules selection should correctly update the selection label when rules are bulk selected and then unselected via the table select all checkbox
  • [job] [logs] Security Solution Tests #2 / Rules selection should correctly update the selection label when rules are bulk selected and then unselected via the table select all checkbox
  • [job] [logs] Security Solution Tests #2 / Rules selection should correctly update the selection label when rules are individually selected and unselected
  • [job] [logs] Security Solution Tests #2 / Rules selection should correctly update the selection label when rules are individually selected and unselected
  • [job] [logs] FTR Configs #11 / security (basic license) Index Fields GET /internal/security/fields/{query} should return a list of available index mapping fields
  • [job] [logs] FTR Configs #11 / security (basic license) Index Fields GET /internal/security/fields/{query} should return a list of available index mapping fields
  • [job] [logs] FTR Configs #58 / security Index Fields GET /internal/security/fields/{query} should return a list of available index mapping fields
  • [job] [logs] FTR Configs #58 / security Index Fields GET /internal/security/fields/{query} should return a list of available index mapping fields
  • [job] [logs] Fleet Cypress Tests / should install integration without policy
  • [job] [logs] Fleet Cypress Tests / should install integration without policy
  • [job] [logs] FTR Configs #57 / Synthetics API Tests AddProjectLegacyMonitors "before all" hook for "project monitors - handles browser monitors"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests AddProjectLegacyMonitors "before all" hook for "project monitors - handles browser monitors"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests AddProjectMonitors "before all" hook for "project monitors - returns 404 for non-existing spaces"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests AddProjectMonitors "before all" hook for "project monitors - returns 404 for non-existing spaces"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests DeleteMonitorRoute "before all" hook for "deletes monitor by id"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests DeleteMonitorRoute "before all" hook for "deletes monitor by id"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests DeleteProjectMonitors "before all" hook for "only allows 250 requests at a time"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests DeleteProjectMonitors "before all" hook for "only allows 250 requests at a time"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests EditMonitor "before all" hook for "edits the monitor"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests EditMonitor "before all" hook for "edits the monitor"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests GetProjectMonitors "before all" hook for "project monitors - fetches all monitors - browser"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests GetProjectMonitors "before all" hook for "project monitors - fetches all monitors - browser"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests PrivateLocationMonitor "before all" hook for "adds a test fleet policy"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests PrivateLocationMonitor "before all" hook for "adds a test fleet policy"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests SyncGlobalParams "before all" hook for "adds a test fleet policy"
  • [job] [logs] FTR Configs #57 / Synthetics API Tests SyncGlobalParams "before all" hook for "adds a test fleet policy"
  • [job] [logs] FTR Configs #24 / transform - permissions for user with full transform access with data loaded should display controls in the edit flyout correctly
  • [job] [logs] FTR Configs #24 / transform - permissions for user with full transform access with data loaded should display controls in the edit flyout correctly
  • [job] [logs] FTR Configs #49 / transform basic license transform - permissions for user with full transform access with data loaded should display controls in the edit flyout correctly
  • [job] [logs] FTR Configs #49 / transform basic license transform - permissions for user with full transform access with data loaded should display controls in the edit flyout correctly
  • [job] [logs] Jest Integration Tests #1 / Uprade package install version with package installed with a previous format install version should upgrade package install version for outdated packages
  • [job] [logs] FTR Configs #54 / uptime uptime REST endpoints with real-world data UptimeIntegrationDeprecation should return hasIntegrationMonitors true when there are zip url policies
  • [job] [logs] FTR Configs #54 / uptime uptime REST endpoints with real-world data UptimeIntegrationDeprecation should return hasIntegrationMonitors true when there are zip url policies
  • [job] [logs] FTR Configs #27 / Verify cloud_security_posture telemetry payloads "before all" hook for "includes only KSPM findings"
  • [job] [logs] FTR Configs #27 / Verify cloud_security_posture telemetry payloads "before all" hook for "includes only KSPM findings"
  • [job] [logs] Fleet Cypress Tests / View agents list Agent filter suggestions "before all" hook for "should filter based on agent id"
  • [job] [logs] Fleet Cypress Tests / View agents list Agent filter suggestions "before all" hook for "should filter based on agent id"
  • [job] [logs] Fleet Cypress Tests / When the user has All privilege for Fleet but Read for integrations When there are agent policies "before all" hook for "Some elements in the UI are not enabled"
  • [job] [logs] Fleet Cypress Tests / When the user has All privilege for Fleet but Read for integrations When there are agent policies "before all" hook for "Some elements in the UI are not enabled"
  • [job] [logs] Fleet Cypress Tests / When the user has All privilege for Fleet but Read for integrations When there are no agent policies If fleet server is not set up, Fleet shows a callout
  • [job] [logs] Fleet Cypress Tests / When the user has All privilege for Fleet but Read for integrations When there are no agent policies If fleet server is not set up, Fleet shows a callout

Metrics [docs]

Saved Objects .kibana field count

Every field in each saved object type adds overhead to Elasticsearch. Kibana needs to keep the total field count below Elasticsearch's default limit of 1000 fields. Only specify field mappings for the fields you wish to search on or query. See https://www.elastic.co/guide/en/kibana/master/saved-objects-service.html#_mappings

id before after diff
alert 101 97 -4
endpoint:user-artifact 10 3 -7
endpoint:user-artifact-manifest 7 2 -5
epm-packages 22 21 -1
epm-packages-assets 8 7 -1
fleet-fleet-server-host 6 5 -1
fleet-proxy 8 3 -5
graph-workspace 10 9 -1
ingest_manager_settings 4 3 -1
ingest-agent-policies 23 22 -1
ingest-download-sources 5 4 -1
ingest-outputs 14 10 -4
lens 6 5 -1
query 6 3 -3
search 24 8 -16
security-solution-signals-migration 11 3 -8
space 9 8 -1
url 9 8 -1
visualization 9 4 -5
total -67

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

cc @rudolf

@rudolf rudolf assigned TinaHeiligers and unassigned rudolf Mar 21, 2023
@rudolf rudolf added the Epic:ScaleMigrations Scale upgrade migrations to millions of saved objects label Mar 21, 2023
@TinaHeiligers
Copy link
Contributor Author

closing as stale

lukasolson added a commit that referenced this pull request Apr 10, 2023
## Summary

Part of #153070.

Cleans up the saved object mappings for search session saved objects.
Removes the non-searchable/sortable properties from the `mappings`
property and introduces a `schema` property for validation.
ppisljar added a commit that referenced this pull request May 3, 2023
## Summary

Removes remaining properties that are not searched on from the mapping
for the visualizations saved object and adds a schema definition to it.

part of #153070
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:skip This commit does not require backporting Epic:ScaleMigrations Scale upgrade migrations to millions of saved objects release_note:skip Skip the PR/issue when compiling release notes v8.8.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants