Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Failing test: X-Pack Detection Engine API Integration Tests.x-pack/test/detection_engine_api_integration/security_and_spaces/group10/import_export_rules·ts - detection engine api security and spaces enabled - Group 10 import_export_rules_flow should be able to reimport a rule referencing an exception list with existing comments #156095

Closed
Tracked by #161531
kibanamachine opened this issue Apr 27, 2023 · 3 comments
Labels
failed-test A test failure on a tracked branch, potentially flaky-test Team:Detection Engine Security Solution Detection Engine Area Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.

Comments

@kibanamachine
Copy link
Contributor

A test failed on a tracked branch

Error: Unexpected non 200 ok when attempting to create a rule: 403,{
    "req": {
        "method": "POST",
        "url": "http://elastic:changeme@localhost:5620/api/detection_engine/rules",
        "data": {
            "name": "Simple Rule Query",
            "description": "Simple Rule Query",
            "enabled": false,
            "risk_score": 1,
            "rule_id": "rule-1",
            "severity": "high",
            "index": [
                "auditbeat-*"
            ],
            "type": "query",
            "query": "user.name: root or user.name: admin",
            "exceptions_list": [
                {
                    "id": "9f11fae0-e530-11ed-8ec4-9157ace8e71c",
                    "list_id": "some-list-id",
                    "type": "endpoint",
                    "namespace_type": "single"
                }
            ]
        },
        "headers": {
            "user-agent": "node-superagent/3.8.3",
            "kbn-xsrf": "true",
            "content-type": "application/json",
            "authorization": "Basic ZWxhc3RpYzpjaGFuZ2VtZQ=="
        }
    },
    "header": {
        "content-type": "application/json; charset=utf-8",
        "x-content-type-options": "nosniff",
        "referrer-policy": "no-referrer-when-downgrade",
        "cross-origin-opener-policy": "same-origin",
        "content-security-policy": "script-src 'self'; worker-src blob: 'self'; style-src 'unsafe-inline' 'self'",
        "kbn-name": "kb-n2-4-spot-c5448ec158486c98",
        "kbn-license-sig": "95103c165661b14d96da5f48d024df92ad6366294b1ec1b0d4f53aecb68fffd5",
        "cache-control": "private, no-cache, no-store, must-revalidate",
        "content-length": "93",
        "date": "Thu, 27 Apr 2023 19:20:53 GMT",
        "connection": "close"
    },
    "status": 403,
    "text": "{\"message\":\"Unauthorized to create a \\\"siem.queryRule\\\" rule for \\\"siem\\\"\",\"status_code\":403}"
}
    at createRule (create_rule.ts:61:11)
    at runMicrotasks (<anonymous>)
    at processTicksAndRejections (node:internal/process/task_queues:96:5)
    at Context.<anonymous> (import_export_rules.ts:83:7)
    at Object.apply (wrap_function.js:73:16)

First failure: CI Build - 8.8

@kibanamachine kibanamachine added the failed-test A test failure on a tracked branch, potentially flaky-test label Apr 27, 2023
@botelastic botelastic bot added the needs-team Issues missing a team label label Apr 27, 2023
@kibanamachine kibanamachine added the Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. label Apr 27, 2023
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@botelastic botelastic bot removed the needs-team Issues missing a team label label Apr 27, 2023
@MadameSheema MadameSheema added Team:Detections and Resp Security Detection Response Team Team:Security Solution Platform Security Solution Platform Team labels May 2, 2023
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detections-response (Team:Detections and Resp)

@yctercero yctercero removed their assignment May 9, 2023
@yctercero yctercero added Team:Detection Engine Security Solution Detection Engine Area and removed Team:Security Solution Platform Security Solution Platform Team labels May 14, 2023
@WafaaNasr
Copy link
Contributor

After successfully running this test through the Flaky Test Runner for 100 iterations without any failures, it has been determined that the test is not truly flaky or failing. As a result, the ticket can be closed.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
failed-test A test failure on a tracked branch, potentially flaky-test Team:Detection Engine Security Solution Detection Engine Area Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc.
Projects
None yet
Development

No branches or pull requests

5 participants