Skip to content

Conversation

@kubasobon
Copy link
Member

@kubasobon kubasobon commented Oct 21, 2024

Proposed commit message

Improve Cloud Asset Inventory installation screen by denoting which types of credentials to provide.

Checklist

  • I have reviewed tips for building integrations and this pull request is aligned with them.
  • I have verified that all data streams collect metrics or logs.
  • I have added an entry to my package's changelog.yml file.
  • I have verified that Kibana version constraints are current according to guidelines.
  • I have verified that any added dashboard complies with Kibana's Dashboard good practices

Related issues

Breakout from #11398

Screenshots

image

image

@kubasobon kubasobon added enhancement New feature or request Integration:cloud_asset_inventory Cloud Asset Discovery Team:Cloud Security Cloud Security team [elastic/cloud-security-posture] labels Oct 21, 2024
@kubasobon kubasobon self-assigned this Oct 21, 2024
@kubasobon kubasobon marked this pull request as ready for review October 21, 2024 14:33
@kubasobon kubasobon requested a review from a team as a code owner October 21, 2024 14:33
@kubasobon kubasobon requested a review from a team October 21, 2024 15:08
description: Template URL to Cloud Formation Quick Create Stack
# ACCOUNT_TYPE value should be either "single-account" or "organization-account"
default: https://console.aws.amazon.com/cloudformation/home#/stacks/quickcreate?templateURL=https://elastic-cspm-cft.s3.eu-central-1.amazonaws.com/cloudformation-cspm-ACCOUNT_TYPE-8.15.0.yml&stackName=Elastic-Cloud-Security-Posture-Management&param_EnrollmentToken=FLEET_ENROLLMENT_TOKEN&param_FleetUrl=FLEET_URL&param_ElasticAgentVersion=KIBANA_VERSION&param_ElasticArtifactServer=https://artifacts.elastic.co/downloads/beats/elastic-agent
default: https://console.aws.amazon.com/cloudformation/home#/stacks/quickcreate?templateURL=https://elastic-cspm-cft.s3.eu-central-1.amazonaws.com/cloudformation-asset-inventory-ACCOUNT_TYPE-8.15.0.yml&stackName=Elastic-Cloud-Security-Posture-Management&param_EnrollmentToken=FLEET_ENROLLMENT_TOKEN&param_FleetUrl=FLEET_URL&param_ElasticAgentVersion=KIBANA_VERSION&param_ElasticArtifactServer=https://artifacts.elastic.co/downloads/beats/elastic-agent
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i thought users can't use cloud formation in the current setup. if that's true, maybe we don't need these vars at all (yet)

same for ARM template i assume

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure, does not hurt to update them, even thought they are hidden.

Comment on lines +112 to +118
options:
- text: Managed Identity
value: managed_identity
- text: Service Principal with Client Secret
value: service_principal_with_client_secret
- text: Service Principal with Client Certificate
value: service_principal_with_client_certificate
Copy link
Contributor

@orouz orouz Oct 22, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

as discussed, showing the dropdown means showing all of the inputs for every option, which is a bit messy. just to clarify - we decided that's better than sticking with a single option (client secret) ?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We discussed in the daily that we'll keep the dropdown.

@oren-zohar oren-zohar requested a review from orouz October 22, 2024 09:48
Copy link
Contributor

@orouz orouz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

some questions

Comment on lines 37 to 43
- text: Assume Role (manual)
value: assume_role
- text: Direct Access Keys (manual)
value: direct_access_keys
- text: Temporary Keys (manual)
value: temporary_keys
- text: Shared Credentials (manual)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- text: Assume Role (manual)
value: assume_role
- text: Direct Access Keys (manual)
value: direct_access_keys
- text: Temporary Keys (manual)
value: temporary_keys
- text: Shared Credentials (manual)
- text: Assume Role (Manual)
value: assume_role
- text: Direct Access Keys (Manual)
value: direct_access_keys
- text: Temporary Keys (Manual)
value: temporary_keys
- text: Shared Credentials (Manual)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it even needed to mention it's manual if there's no automated option?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Since I'm hiding/removing CloudFormation from this update, do you want me to drop the (Manual) marker?

@kubasobon kubasobon requested review from oren-zohar and orouz October 22, 2024 10:10
@elastic-sonarqube
Copy link

Quality Gate failed Quality Gate failed

Failed conditions
0.0% Coverage on New Code (required ≥ 80%)

See analysis details on SonarQube

@elasticmachine
Copy link

💚 Build Succeeded

History

cc @kubasobon

@kubasobon kubasobon merged commit 28a3e03 into main Oct 22, 2024
@kubasobon kubasobon deleted the asset-inventory-improve-ui branch October 22, 2024 10:59
@elastic-vault-github-plugin-prod

Package cloud_asset_inventory - 0.4.0 containing this change is available at https://epr.elastic.co/search?package=cloud_asset_inventory

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request Integration:cloud_asset_inventory Cloud Asset Discovery Team:Cloud Security Cloud Security team [elastic/cloud-security-posture]

5 participants