-
Notifications
You must be signed in to change notification settings - Fork 168
Add Pipeline to deploy custom agent image for FIPS testing #8035
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
buildkite test this |
@v1v @pazone, can you take a look at this, we need permissions in order to push a custom image to use in the CFT region
|
Can you share the URL link to the error? I'm not familiar with the current user and namespace, but as far as I see, those details are stored at https://github.com/elastic/elastic-agent/blob/aa224536eadf49f8b9b962df240c0caa4861970e/.buildkite/hooks/pre-command#l17.
I see you have enabled the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Left a few suggestions but overall this looks good.
CI, specifically the
Looks like the |
/test |
|
||
IMAGE_UBUNTU_2404_ARM_64: "platform-ingest-elastic-agent-ubuntu-2404-aarch64-1744855248" | ||
IMAGE_UBUNTU_2404_X86_64: "platform-ingest-elastic-agent-ubuntu-2404-1744855248" | ||
IMAGE_UBUNTU_X86_64_FIPS: "platform-ingest-fleet-server-ubuntu-2204-fips" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there a known reason why we use a fleet-server image here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think that the images were created as a result of some experimentation that was being done with the fleet-server repo
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should I create FIPS-compliant images for elastic-agent to avoid possible problems?
This pull request is now in conflicts. Could you fix it? 🙏
|
image: "docker.elastic.co/ci-agent-images/platform-ingest/buildkite-agent-beats-ci-with-hooks:0.5" | ||
useCustomGlobalHooks: true | ||
|
||
- group: "fips:Stateful:Ubuntu" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do I understand correctly that we run a set integration test groups in the same way and the only difference is in the VM image and the FIPS=true
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
VM image, and i think that FIPS=true
results in -integration.fips=true
being sent
command: | | ||
#!/usr/bin/env bash | ||
set -euo pipefail | ||
mage cloud:image |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
cloud:image
invokes the Package() function that packages the agent again. This step takes a considerable amount of time (~15 minutes). Can we download the artifacts produced by the packaging step and reuse them?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We can try, but I'm not sure if the Image step will use artifacts that are already present, @pkoutsovasilis do you know if it will?
|
What does this PR do?
Add a new buildkite pipeline to build a custom agent image and use it in an ECH deployment for testing.
Why is it important?
FIPS integration tests will require a custom agent running in the CFT region.
Checklist
I have made corresponding changes to the documentationI have made corresponding change to the default configuration filesI have added tests that prove my fix is effective or that my feature worksI have added an entry in./changelog/fragments
using the changelog toolDisruptive User Impact
N/A