Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Defend Workflows][8.12 port] Unblock fleet setup when cannot decrypt uninstall tokens #172058

Conversation

gergoabraham
Copy link
Contributor

@gergoabraham gergoabraham commented Nov 28, 2023

Summary

This PR is the 8.12 port of:

The original PR was opened to 8.11 to make it faster to include it in 8.12.2. Now this PR is meant to port the changes to main, so:

  • we can build upon it,
  • and can easily backport any further changes to 8.11.x

Important

The changes cannot be tested on main because they are hidden by other behaviours (namely the retry logic for reading Message SIgning key) that weren't part of 8.11. Those behaviours will be also adapted in follow up PRs.

@gergoabraham gergoabraham added release_note:skip Skip the PR/issue when compiling release notes backport:skip This commit does not require backporting Team:Defend Workflows “EDR Workflows” sub-team of Security Solution 8.12 candidate labels Nov 28, 2023
@gergoabraham gergoabraham self-assigned this Nov 28, 2023
@gergoabraham gergoabraham requested a review from a team as a code owner November 28, 2023 12:52
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-defend-workflows (Team:Defend Workflows)

@botelastic botelastic bot added the Team:Fleet Team label for Observability Data Collection Fleet team label Nov 28, 2023
@elasticmachine
Copy link
Contributor

Pinging @elastic/fleet (Team:Fleet)

@kibana-ci
Copy link
Collaborator

💛 Build succeeded, but was flaky

Failed CI Steps

Metrics [docs]

✅ unchanged

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

cc @gergoabraham

@gergoabraham gergoabraham merged commit a658233 into elastic:main Nov 28, 2023
gergoabraham added a commit that referenced this pull request Dec 1, 2023
…eet setup (#172072)

## Summary

When encryption key is rotated improperly, Message Signing key retrieval
is retried infinitely, and because this is done in Fleet setup, none of
the Fleet pages are loaded when the user tries to visit any of them.

This PR re-configures the retry logic so it now attempts significantly
less times than infinite.
Also, it changes the errors to non-fatal from the Fleet setup point of
view, similarly to these PRs:
- #171998
- #172058

## Reproducing the encryption key issue
- setup a Kibana, add at least one policy (probably Fleet policy is
enough)
- modify (or add a new) encryption key in your `kibana.dev.yml`:
```yml
xpack.encryptedSavedObjects.encryptionKey: "some-random-encryption-key-min-32-bytes"
```

## Screenshots

After ~15 sec of loading spinner, this is what the user sees:

![image](https://github.com/elastic/kibana/assets/39014407/2a29d0d9-4975-46b5-b662-bfbb6e888b0f)



### Checklist

Delete any items that are not applicable to this PR.

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
@gergoabraham gergoabraham deleted the unblock-fleet-setup-when-cannot-decrypt-uninstall-tokens-8-12 branch January 3, 2024 09:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
8.12 candidate backport:skip This commit does not require backporting release_note:skip Skip the PR/issue when compiling release notes Team:Defend Workflows “EDR Workflows” sub-team of Security Solution Team:Fleet Team label for Observability Data Collection Fleet team v8.12.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants