Skip to content

Conversation

@maximpn
Copy link
Contributor

@maximpn maximpn commented Jul 25, 2025

Resolves: #227454
Resolves: #224511
Resolves: #220971
Resolves: #220536
Resolves: #217903
Resolves: #205777

Summary

This PR fixes import custom rules flaky integration tests. This is done by refactoring the tests and getting rid of esArchiver.

Details

Investigation of the flakes specified in the tickets above revealed that the culprit is esArchiver. It removes the target indexes before loading the documents and applies migrations. In fact it turns out it removes just installed mock prebuilt rules package forcing installing a real prebuilt rules package from the production EPR. Where usage of production EPR has been known to cause flakiness.

On top of just getting rid of esArchiver this PR refactors the importing custom rules integrations tests. The main goal is to make the tests structure clear and transparent. Previously flaky tests were moved to the different sections. And some of the tests testing Kibana v7.14 connectors were removed since esArchiver performs connectors migration so importing rules tests interact with the migrated connections.

Flaky test runner

How to test the fix?

  • Add --xpack.fleet.registryUrl=http://non-existent to config.base.ts for ESS or config.base.ts for Serverless.
  • run import custom rules integration tests in the main branch and observe test failures
  • run import custom rules integration tests in this PR and observe all tests have passed

@maximpn maximpn self-assigned this Jul 25, 2025
@maximpn maximpn added impact:high Addressing this issue will have a high level of impact on the quality/strength of our product. v9.0.0 Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Detection Rule Management Security Detection Rule Management Team Feature:Rule Import/Export Security Solution Detection Rule Import & Export workflow backport:version Backport to applied version labels v8.18.0 v9.1.0 v8.19.0 v9.2.0 labels Jul 25, 2025
@maximpn maximpn force-pushed the refactor-import-rules-integration-tests branch 2 times, most recently from e3a46db to 3e2f234 Compare July 28, 2025 10:59
@kibanamachine
Copy link
Contributor

Flaky Test Runner Stats

🎉 All tests passed! - kibana-flaky-test-suite-runner#8884

[✅] x-pack/test/security_solution_api_integration/test_suites/detections_response/rules_management/rule_import_export/trial_license_complete_tier/configs/serverless.config.ts: 200/200 tests passed.

see run history

@kibanamachine
Copy link
Contributor

Flaky Test Runner Stats

🎉 All tests passed! - kibana-flaky-test-suite-runner#8883

[✅] x-pack/test/security_solution_api_integration/test_suites/detections_response/rules_management/rule_import_export/trial_license_complete_tier/configs/ess.config.ts: 200/200 tests passed.

see run history

@maximpn maximpn requested a review from nikitaindik July 28, 2025 13:24
@maximpn maximpn marked this pull request as ready for review July 28, 2025 13:24
@maximpn maximpn requested review from a team as code owners July 28, 2025 13:24
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detections-response (Team:Detections and Resp)

@maximpn maximpn requested a review from rylnd July 28, 2025 13:24
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detection-rule-management (Team:Detection Rule Management)

Copy link
Member

@dmlemeshko dmlemeshko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, please check my comment regarding directory deprecation (ETA: end of August)

// @ts-ignore not ts yet
import { EsSupertestWithoutAuthProvider } from './es_supertest_without_auth';
import { SecuritySolutionApiProvider } from './security_solution_api.gen';
import { SecuritySolutionApiProvider as SecuritySolutionExceptionsApiProvider } from './security_solution_exceptions_api.gen';
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we are about to deprecate x-pack/test and I already moved most of the services out of x-pack/test/api_integration/services path.

Maybe you can create a follow-up PR and move all the Security Solution FTR services and utils (x-pack/test/common/utils/security_solution) directly into x-pack/test/security_solution_api_integration dir, this way moving the whole directory to x-pack/solutions/security/test will be less challenging with imports update?

@maximpn maximpn added the release_note:skip Skip the PR/issue when compiling release notes label Jul 28, 2025
maximpn added a commit that referenced this pull request Aug 4, 2025
…es integration tests (#229492) (#230287)

# Backport

This will backport the following commits from `main` to `8.18`:
- [[Security Solution] Get rid of esArchiver in import custom rules
integration tests
(#229492)](#229492)

<!--- Backport version: 10.0.1 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Maxim
Palenov","email":"[email protected]"},"sourceCommit":{"committedDate":"2025-07-31T15:16:08Z","message":"[Security
Solution] Get rid of esArchiver in import custom rules integration tests
(#229492)\n\n**Resolves:
https://github.com/elastic/kibana/issues/227454**\n**Resolves:
https://github.com/elastic/kibana/issues/224511**\n**Resolves:
https://github.com/elastic/kibana/issues/220971**\n**Resolves:
https://github.com/elastic/kibana/issues/220536**\n**Resolves:
https://github.com/elastic/kibana/issues/217903**\n**Resolves:
https://github.com/elastic/kibana/issues/205777**\n\n## Summary\n\nThis
PR fixes import custom rules flaky integration tests. This is done by
refactoring the tests and getting rid of `esArchiver`.\n\n##
Details\n\nInvestigation of the flakes specified in the tickets above
revealed that the culprit is `esArchiver`. It removes the target indexes
before loading the documents and applies migrations. In fact it turns
out it removes just installed mock prebuilt rules package forcing
installing a real prebuilt rules package from the production EPR. Where
usage of production EPR has been known to cause flakiness.\n\nOn top of
just getting rid of `esArchiver` this PR refactors the importing custom
rules integrations tests. The main goal is to make the tests structure
clear and transparent. Previously flaky tests were moved to the
different sections. And some of the tests testing Kibana v7.14
connectors were removed since `esArchiver` performs connectors migration
so importing rules tests interact with the migrated connections.\n\n##
Flaky test runner\n\n- ✅ [ESS 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)\n-
✅ [Serverless 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)\n\n##
How to test the fix?\n\n- Add
`--xpack.fleet.registryUrl=http://non-existent` to
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts)
for ESS or
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts)
for Serverless.\n- run import custom rules integration tests in the
`main` branch and observe test failures\n- run import custom rules
integration tests in this PR and observe all tests have
passed","sha":"6403fd42ee060736f849af276b63183db247ea7c","branchLabelMapping":{"^v9.2.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","impact:high","v9.0.0","Team:Detections
and Resp","Team: SecuritySolution","Team:Detection Rule
Management","Feature:Rule
Import/Export","backport:version","v8.18.0","v9.1.0","v8.19.0","v9.2.0"],"title":"[Security
Solution] Get rid of esArchiver in import custom rules integration
tests","number":229492,"url":"https://github.com/elastic/kibana/pull/229492","mergeCommit":{"message":"[Security
Solution] Get rid of esArchiver in import custom rules integration tests
(#229492)\n\n**Resolves:
https://github.com/elastic/kibana/issues/227454**\n**Resolves:
https://github.com/elastic/kibana/issues/224511**\n**Resolves:
https://github.com/elastic/kibana/issues/220971**\n**Resolves:
https://github.com/elastic/kibana/issues/220536**\n**Resolves:
https://github.com/elastic/kibana/issues/217903**\n**Resolves:
https://github.com/elastic/kibana/issues/205777**\n\n## Summary\n\nThis
PR fixes import custom rules flaky integration tests. This is done by
refactoring the tests and getting rid of `esArchiver`.\n\n##
Details\n\nInvestigation of the flakes specified in the tickets above
revealed that the culprit is `esArchiver`. It removes the target indexes
before loading the documents and applies migrations. In fact it turns
out it removes just installed mock prebuilt rules package forcing
installing a real prebuilt rules package from the production EPR. Where
usage of production EPR has been known to cause flakiness.\n\nOn top of
just getting rid of `esArchiver` this PR refactors the importing custom
rules integrations tests. The main goal is to make the tests structure
clear and transparent. Previously flaky tests were moved to the
different sections. And some of the tests testing Kibana v7.14
connectors were removed since `esArchiver` performs connectors migration
so importing rules tests interact with the migrated connections.\n\n##
Flaky test runner\n\n- ✅ [ESS 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)\n-
✅ [Serverless 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)\n\n##
How to test the fix?\n\n- Add
`--xpack.fleet.registryUrl=http://non-existent` to
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts)
for ESS or
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts)
for Serverless.\n- run import custom rules integration tests in the
`main` branch and observe test failures\n- run import custom rules
integration tests in this PR and observe all tests have
passed","sha":"6403fd42ee060736f849af276b63183db247ea7c"}},"sourceBranch":"main","suggestedTargetBranches":["8.18","8.19"],"targetPullRequestStates":[{"branch":"9.0","label":"v9.0.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"url":"https://github.com/elastic/kibana/pull/230282","number":230282,"state":"OPEN"},{"branch":"8.18","label":"v8.18.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"9.1","label":"v9.1.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"url":"https://github.com/elastic/kibana/pull/230279","number":230279,"state":"OPEN"},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v9.2.0","branchLabelMappingKey":"^v9.2.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/229492","number":229492,"mergeCommit":{"message":"[Security
Solution] Get rid of esArchiver in import custom rules integration tests
(#229492)\n\n**Resolves:
https://github.com/elastic/kibana/issues/227454**\n**Resolves:
https://github.com/elastic/kibana/issues/224511**\n**Resolves:
https://github.com/elastic/kibana/issues/220971**\n**Resolves:
https://github.com/elastic/kibana/issues/220536**\n**Resolves:
https://github.com/elastic/kibana/issues/217903**\n**Resolves:
https://github.com/elastic/kibana/issues/205777**\n\n## Summary\n\nThis
PR fixes import custom rules flaky integration tests. This is done by
refactoring the tests and getting rid of `esArchiver`.\n\n##
Details\n\nInvestigation of the flakes specified in the tickets above
revealed that the culprit is `esArchiver`. It removes the target indexes
before loading the documents and applies migrations. In fact it turns
out it removes just installed mock prebuilt rules package forcing
installing a real prebuilt rules package from the production EPR. Where
usage of production EPR has been known to cause flakiness.\n\nOn top of
just getting rid of `esArchiver` this PR refactors the importing custom
rules integrations tests. The main goal is to make the tests structure
clear and transparent. Previously flaky tests were moved to the
different sections. And some of the tests testing Kibana v7.14
connectors were removed since `esArchiver` performs connectors migration
so importing rules tests interact with the migrated connections.\n\n##
Flaky test runner\n\n- ✅ [ESS 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)\n-
✅ [Serverless 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)\n\n##
How to test the fix?\n\n- Add
`--xpack.fleet.registryUrl=http://non-existent` to
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts)
for ESS or
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts)
for Serverless.\n- run import custom rules integration tests in the
`main` branch and observe test failures\n- run import custom rules
integration tests in this PR and observe all tests have
passed","sha":"6403fd42ee060736f849af276b63183db247ea7c"}}]}]
BACKPORT-->
maximpn added a commit that referenced this pull request Aug 4, 2025
…s integration tests (#229492) (#230282)

# Backport

This will backport the following commits from `main` to `9.0`:
- [[Security Solution] Get rid of esArchiver in import custom rules
integration tests
(#229492)](#229492)

<!--- Backport version: 10.0.1 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Maxim
Palenov","email":"[email protected]"},"sourceCommit":{"committedDate":"2025-07-31T15:16:08Z","message":"[Security
Solution] Get rid of esArchiver in import custom rules integration tests
(#229492)\n\n**Resolves:
https://github.com/elastic/kibana/issues/227454**\n**Resolves:
https://github.com/elastic/kibana/issues/224511**\n**Resolves:
https://github.com/elastic/kibana/issues/220971**\n**Resolves:
https://github.com/elastic/kibana/issues/220536**\n**Resolves:
https://github.com/elastic/kibana/issues/217903**\n**Resolves:
https://github.com/elastic/kibana/issues/205777**\n\n## Summary\n\nThis
PR fixes import custom rules flaky integration tests. This is done by
refactoring the tests and getting rid of `esArchiver`.\n\n##
Details\n\nInvestigation of the flakes specified in the tickets above
revealed that the culprit is `esArchiver`. It removes the target indexes
before loading the documents and applies migrations. In fact it turns
out it removes just installed mock prebuilt rules package forcing
installing a real prebuilt rules package from the production EPR. Where
usage of production EPR has been known to cause flakiness.\n\nOn top of
just getting rid of `esArchiver` this PR refactors the importing custom
rules integrations tests. The main goal is to make the tests structure
clear and transparent. Previously flaky tests were moved to the
different sections. And some of the tests testing Kibana v7.14
connectors were removed since `esArchiver` performs connectors migration
so importing rules tests interact with the migrated connections.\n\n##
Flaky test runner\n\n- ✅ [ESS 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)\n-
✅ [Serverless 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)\n\n##
How to test the fix?\n\n- Add
`--xpack.fleet.registryUrl=http://non-existent` to
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts)
for ESS or
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts)
for Serverless.\n- run import custom rules integration tests in the
`main` branch and observe test failures\n- run import custom rules
integration tests in this PR and observe all tests have
passed","sha":"6403fd42ee060736f849af276b63183db247ea7c","branchLabelMapping":{"^v9.2.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","impact:high","v9.0.0","Team:Detections
and Resp","Team: SecuritySolution","Team:Detection Rule
Management","Feature:Rule
Import/Export","backport:version","v8.18.0","v9.1.0","v8.19.0","v9.2.0"],"title":"[Security
Solution] Get rid of esArchiver in import custom rules integration
tests","number":229492,"url":"https://github.com/elastic/kibana/pull/229492","mergeCommit":{"message":"[Security
Solution] Get rid of esArchiver in import custom rules integration tests
(#229492)\n\n**Resolves:
https://github.com/elastic/kibana/issues/227454**\n**Resolves:
https://github.com/elastic/kibana/issues/224511**\n**Resolves:
https://github.com/elastic/kibana/issues/220971**\n**Resolves:
https://github.com/elastic/kibana/issues/220536**\n**Resolves:
https://github.com/elastic/kibana/issues/217903**\n**Resolves:
https://github.com/elastic/kibana/issues/205777**\n\n## Summary\n\nThis
PR fixes import custom rules flaky integration tests. This is done by
refactoring the tests and getting rid of `esArchiver`.\n\n##
Details\n\nInvestigation of the flakes specified in the tickets above
revealed that the culprit is `esArchiver`. It removes the target indexes
before loading the documents and applies migrations. In fact it turns
out it removes just installed mock prebuilt rules package forcing
installing a real prebuilt rules package from the production EPR. Where
usage of production EPR has been known to cause flakiness.\n\nOn top of
just getting rid of `esArchiver` this PR refactors the importing custom
rules integrations tests. The main goal is to make the tests structure
clear and transparent. Previously flaky tests were moved to the
different sections. And some of the tests testing Kibana v7.14
connectors were removed since `esArchiver` performs connectors migration
so importing rules tests interact with the migrated connections.\n\n##
Flaky test runner\n\n- ✅ [ESS 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)\n-
✅ [Serverless 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)\n\n##
How to test the fix?\n\n- Add
`--xpack.fleet.registryUrl=http://non-existent` to
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts)
for ESS or
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts)
for Serverless.\n- run import custom rules integration tests in the
`main` branch and observe test failures\n- run import custom rules
integration tests in this PR and observe all tests have
passed","sha":"6403fd42ee060736f849af276b63183db247ea7c"}},"sourceBranch":"main","suggestedTargetBranches":["9.0","8.18","9.1","8.19"],"targetPullRequestStates":[{"branch":"9.0","label":"v9.0.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.18","label":"v8.18.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"9.1","label":"v9.1.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v9.2.0","branchLabelMappingKey":"^v9.2.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/229492","number":229492,"mergeCommit":{"message":"[Security
Solution] Get rid of esArchiver in import custom rules integration tests
(#229492)\n\n**Resolves:
https://github.com/elastic/kibana/issues/227454**\n**Resolves:
https://github.com/elastic/kibana/issues/224511**\n**Resolves:
https://github.com/elastic/kibana/issues/220971**\n**Resolves:
https://github.com/elastic/kibana/issues/220536**\n**Resolves:
https://github.com/elastic/kibana/issues/217903**\n**Resolves:
https://github.com/elastic/kibana/issues/205777**\n\n## Summary\n\nThis
PR fixes import custom rules flaky integration tests. This is done by
refactoring the tests and getting rid of `esArchiver`.\n\n##
Details\n\nInvestigation of the flakes specified in the tickets above
revealed that the culprit is `esArchiver`. It removes the target indexes
before loading the documents and applies migrations. In fact it turns
out it removes just installed mock prebuilt rules package forcing
installing a real prebuilt rules package from the production EPR. Where
usage of production EPR has been known to cause flakiness.\n\nOn top of
just getting rid of `esArchiver` this PR refactors the importing custom
rules integrations tests. The main goal is to make the tests structure
clear and transparent. Previously flaky tests were moved to the
different sections. And some of the tests testing Kibana v7.14
connectors were removed since `esArchiver` performs connectors migration
so importing rules tests interact with the migrated connections.\n\n##
Flaky test runner\n\n- ✅ [ESS 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)\n-
✅ [Serverless 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)\n\n##
How to test the fix?\n\n- Add
`--xpack.fleet.registryUrl=http://non-existent` to
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts)
for ESS or
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts)
for Serverless.\n- run import custom rules integration tests in the
`main` branch and observe test failures\n- run import custom rules
integration tests in this PR and observe all tests have
passed","sha":"6403fd42ee060736f849af276b63183db247ea7c"}}]}]
BACKPORT-->

---------

Co-authored-by: kibanamachine <[email protected]>
maximpn added a commit that referenced this pull request Aug 5, 2025
…s integration tests (#229492) (#230279)

# Backport

This will backport the following commits from `main` to `9.1`:
- [[Security Solution] Get rid of esArchiver in import custom rules
integration tests
(#229492)](#229492)

<!--- Backport version: 10.0.1 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Maxim
Palenov","email":"[email protected]"},"sourceCommit":{"committedDate":"2025-07-31T15:16:08Z","message":"[Security
Solution] Get rid of esArchiver in import custom rules integration tests
(#229492)\n\n**Resolves:
https://github.com/elastic/kibana/issues/227454**\n**Resolves:
https://github.com/elastic/kibana/issues/224511**\n**Resolves:
https://github.com/elastic/kibana/issues/220971**\n**Resolves:
https://github.com/elastic/kibana/issues/220536**\n**Resolves:
https://github.com/elastic/kibana/issues/217903**\n**Resolves:
https://github.com/elastic/kibana/issues/205777**\n\n## Summary\n\nThis
PR fixes import custom rules flaky integration tests. This is done by
refactoring the tests and getting rid of `esArchiver`.\n\n##
Details\n\nInvestigation of the flakes specified in the tickets above
revealed that the culprit is `esArchiver`. It removes the target indexes
before loading the documents and applies migrations. In fact it turns
out it removes just installed mock prebuilt rules package forcing
installing a real prebuilt rules package from the production EPR. Where
usage of production EPR has been known to cause flakiness.\n\nOn top of
just getting rid of `esArchiver` this PR refactors the importing custom
rules integrations tests. The main goal is to make the tests structure
clear and transparent. Previously flaky tests were moved to the
different sections. And some of the tests testing Kibana v7.14
connectors were removed since `esArchiver` performs connectors migration
so importing rules tests interact with the migrated connections.\n\n##
Flaky test runner\n\n- ✅ [ESS 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)\n-
✅ [Serverless 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)\n\n##
How to test the fix?\n\n- Add
`--xpack.fleet.registryUrl=http://non-existent` to
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts)
for ESS or
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts)
for Serverless.\n- run import custom rules integration tests in the
`main` branch and observe test failures\n- run import custom rules
integration tests in this PR and observe all tests have
passed","sha":"6403fd42ee060736f849af276b63183db247ea7c","branchLabelMapping":{"^v9.2.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","impact:high","v9.0.0","Team:Detections
and Resp","Team: SecuritySolution","Team:Detection Rule
Management","Feature:Rule
Import/Export","backport:version","v8.18.0","v9.1.0","v8.19.0","v9.2.0"],"title":"[Security
Solution] Get rid of esArchiver in import custom rules integration
tests","number":229492,"url":"https://github.com/elastic/kibana/pull/229492","mergeCommit":{"message":"[Security
Solution] Get rid of esArchiver in import custom rules integration tests
(#229492)\n\n**Resolves:
https://github.com/elastic/kibana/issues/227454**\n**Resolves:
https://github.com/elastic/kibana/issues/224511**\n**Resolves:
https://github.com/elastic/kibana/issues/220971**\n**Resolves:
https://github.com/elastic/kibana/issues/220536**\n**Resolves:
https://github.com/elastic/kibana/issues/217903**\n**Resolves:
https://github.com/elastic/kibana/issues/205777**\n\n## Summary\n\nThis
PR fixes import custom rules flaky integration tests. This is done by
refactoring the tests and getting rid of `esArchiver`.\n\n##
Details\n\nInvestigation of the flakes specified in the tickets above
revealed that the culprit is `esArchiver`. It removes the target indexes
before loading the documents and applies migrations. In fact it turns
out it removes just installed mock prebuilt rules package forcing
installing a real prebuilt rules package from the production EPR. Where
usage of production EPR has been known to cause flakiness.\n\nOn top of
just getting rid of `esArchiver` this PR refactors the importing custom
rules integrations tests. The main goal is to make the tests structure
clear and transparent. Previously flaky tests were moved to the
different sections. And some of the tests testing Kibana v7.14
connectors were removed since `esArchiver` performs connectors migration
so importing rules tests interact with the migrated connections.\n\n##
Flaky test runner\n\n- ✅ [ESS 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)\n-
✅ [Serverless 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)\n\n##
How to test the fix?\n\n- Add
`--xpack.fleet.registryUrl=http://non-existent` to
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts)
for ESS or
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts)
for Serverless.\n- run import custom rules integration tests in the
`main` branch and observe test failures\n- run import custom rules
integration tests in this PR and observe all tests have
passed","sha":"6403fd42ee060736f849af276b63183db247ea7c"}},"sourceBranch":"main","suggestedTargetBranches":["9.0","8.18","9.1","8.19"],"targetPullRequestStates":[{"branch":"9.0","label":"v9.0.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.18","label":"v8.18.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"9.1","label":"v9.1.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v9.2.0","branchLabelMappingKey":"^v9.2.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/229492","number":229492,"mergeCommit":{"message":"[Security
Solution] Get rid of esArchiver in import custom rules integration tests
(#229492)\n\n**Resolves:
https://github.com/elastic/kibana/issues/227454**\n**Resolves:
https://github.com/elastic/kibana/issues/224511**\n**Resolves:
https://github.com/elastic/kibana/issues/220971**\n**Resolves:
https://github.com/elastic/kibana/issues/220536**\n**Resolves:
https://github.com/elastic/kibana/issues/217903**\n**Resolves:
https://github.com/elastic/kibana/issues/205777**\n\n## Summary\n\nThis
PR fixes import custom rules flaky integration tests. This is done by
refactoring the tests and getting rid of `esArchiver`.\n\n##
Details\n\nInvestigation of the flakes specified in the tickets above
revealed that the culprit is `esArchiver`. It removes the target indexes
before loading the documents and applies migrations. In fact it turns
out it removes just installed mock prebuilt rules package forcing
installing a real prebuilt rules package from the production EPR. Where
usage of production EPR has been known to cause flakiness.\n\nOn top of
just getting rid of `esArchiver` this PR refactors the importing custom
rules integrations tests. The main goal is to make the tests structure
clear and transparent. Previously flaky tests were moved to the
different sections. And some of the tests testing Kibana v7.14
connectors were removed since `esArchiver` performs connectors migration
so importing rules tests interact with the migrated connections.\n\n##
Flaky test runner\n\n- ✅ [ESS 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)\n-
✅ [Serverless 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)\n\n##
How to test the fix?\n\n- Add
`--xpack.fleet.registryUrl=http://non-existent` to
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts)
for ESS or
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts)
for Serverless.\n- run import custom rules integration tests in the
`main` branch and observe test failures\n- run import custom rules
integration tests in this PR and observe all tests have
passed","sha":"6403fd42ee060736f849af276b63183db247ea7c"}}]}]
BACKPORT-->

---------

Co-authored-by: Nikita Indik <[email protected]>
@kibanamachine kibanamachine added v9.1.1 and removed backport missing Added to PRs automatically when the are determined to be missing a backport. labels Aug 5, 2025
delanni pushed a commit to delanni/kibana that referenced this pull request Aug 5, 2025
…gration tests (elastic#229492)

**Resolves: elastic#227454
**Resolves: elastic#224511
**Resolves: elastic#220971
**Resolves: elastic#220536
**Resolves: elastic#217903
**Resolves: elastic#205777

## Summary

This PR fixes import custom rules flaky integration tests. This is done by refactoring the tests and getting rid of `esArchiver`.

## Details

Investigation of the flakes specified in the tickets above revealed that the culprit is `esArchiver`. It removes the target indexes before loading the documents and applies migrations. In fact it turns out it removes just installed mock prebuilt rules package forcing installing a real prebuilt rules package from the production EPR. Where usage of production EPR has been known to cause flakiness.

On top of just getting rid of `esArchiver` this PR refactors the importing custom rules integrations tests. The main goal is to make the tests structure clear and transparent. Previously flaky tests were moved to the different sections. And some of the tests testing Kibana v7.14 connectors were removed since `esArchiver` performs connectors migration so importing rules tests interact with the migrated connections.

## Flaky test runner

- ✅  [ESS 200 runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)
- ✅  [Serverless 200 runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)

## How to test the fix?

- Add `--xpack.fleet.registryUrl=http://non-existent` to [config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts) for ESS or [config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts) for Serverless.
- run import custom rules integration tests in the `main` branch and observe test failures
- run import custom rules integration tests in this PR and observe all tests have passed
@maximpn
Copy link
Contributor Author

maximpn commented Aug 6, 2025

@banderror we don't have 8.19 backport yet. It requires SKA PRs being backported to 8.19 first (#229914 and #229750). @dmlemeshko has been working on that but it takes more time due to multiple conflicts.

@banderror
Copy link
Contributor

@maximpn @dmlemeshko Hey guys, any updates? We need to backport it to 8.19!

@maximpn
Copy link
Contributor Author

maximpn commented Sep 2, 2025

Hey guys, any updates? We need to backport it to 8.19!

Hey @banderror,

I helped @dmlemeshko with addressing multiple issues in the manually created backport. In particular I reapplied my PR merged into main to auto-generated API integration test clients.

At the moment there are still some tricky typing issues blocking the CI. @dmlemeshko plans to find a solution.

maximpn added a commit to maximpn/kibana that referenced this pull request Sep 10, 2025
…gration tests (elastic#229492)

**Resolves: elastic#227454
**Resolves: elastic#224511
**Resolves: elastic#220971
**Resolves: elastic#220536
**Resolves: elastic#217903
**Resolves: elastic#205777

## Summary

This PR fixes import custom rules flaky integration tests. This is done by refactoring the tests and getting rid of `esArchiver`.

## Details

Investigation of the flakes specified in the tickets above revealed that the culprit is `esArchiver`. It removes the target indexes before loading the documents and applies migrations. In fact it turns out it removes just installed mock prebuilt rules package forcing installing a real prebuilt rules package from the production EPR. Where usage of production EPR has been known to cause flakiness.

On top of just getting rid of `esArchiver` this PR refactors the importing custom rules integrations tests. The main goal is to make the tests structure clear and transparent. Previously flaky tests were moved to the different sections. And some of the tests testing Kibana v7.14 connectors were removed since `esArchiver` performs connectors migration so importing rules tests interact with the migrated connections.

## Flaky test runner

- ✅  [ESS 200 runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)
- ✅  [Serverless 200 runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)

## How to test the fix?

- Add `--xpack.fleet.registryUrl=http://non-existent` to [config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts) for ESS or [config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts) for Serverless.
- run import custom rules integration tests in the `main` branch and observe test failures
- run import custom rules integration tests in this PR and observe all tests have passed

(cherry picked from commit 6403fd4)

# Conflicts:
#	src/platform/packages/shared/kbn-es-archiver/src/fixtures/override_saved_objects_index/exception_list.json
#	x-pack/solutions/security/plugins/cloud_defend/public/pages/index.ts
#	x-pack/solutions/security/test/common/utils/spaces.ts
#	x-pack/solutions/security/test/security_solution_api_integration/test_suites/detections_response/rules_management/rule_import_export/trial_license_complete_tier/import_rules.ts
#	x-pack/solutions/security/test/security_solution_api_integration/test_suites/lists_and_exception_lists/utils.ts
#	x-pack/solutions/security/test/security_solution_api_integration/tsconfig.json
#	x-pack/test/api_integration/services/index.ts
#	x-pack/test_serverless/shared/services/deployment_agnostic_services.ts
@maximpn
Copy link
Contributor Author

maximpn commented Sep 10, 2025

💚 All backports created successfully

Status Branch Result
8.19

Note: Successful backport PRs will be merged automatically after passing CI.

Questions ?

Please refer to the Backport tool documentation

maximpn added a commit to maximpn/kibana that referenced this pull request Sep 11, 2025
…gration tests (elastic#229492)

**Resolves: elastic#227454
**Resolves: elastic#224511
**Resolves: elastic#220971
**Resolves: elastic#220536
**Resolves: elastic#217903
**Resolves: elastic#205777

This PR fixes import custom rules flaky integration tests. This is done by refactoring the tests and getting rid of `esArchiver`.

Investigation of the flakes specified in the tickets above revealed that the culprit is `esArchiver`. It removes the target indexes before loading the documents and applies migrations. In fact it turns out it removes just installed mock prebuilt rules package forcing installing a real prebuilt rules package from the production EPR. Where usage of production EPR has been known to cause flakiness.

On top of just getting rid of `esArchiver` this PR refactors the importing custom rules integrations tests. The main goal is to make the tests structure clear and transparent. Previously flaky tests were moved to the different sections. And some of the tests testing Kibana v7.14 connectors were removed since `esArchiver` performs connectors migration so importing rules tests interact with the migrated connections.

- ✅  [ESS 200 runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)
- ✅  [Serverless 200 runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)

- Add `--xpack.fleet.registryUrl=http://non-existent` to [config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts) for ESS or [config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts) for Serverless.
- run import custom rules integration tests in the `main` branch and observe test failures
- run import custom rules integration tests in this PR and observe all tests have passed

(cherry picked from commit 6403fd4)
maximpn added a commit that referenced this pull request Sep 11, 2025
…es integration tests (#229492) (#234561)

# Backport

This will backport the following commits from `main` to `8.19`:
- [[Security Solution] Get rid of esArchiver in import custom rules
integration tests
(#229492)](#229492)

<!--- Backport version: 10.0.2 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Maxim
Palenov","email":"[email protected]"},"sourceCommit":{"committedDate":"2025-07-31T15:16:08Z","message":"[Security
Solution] Get rid of esArchiver in import custom rules integration tests
(#229492)\n\n**Resolves:
https://github.com/elastic/kibana/issues/227454**\n**Resolves:
https://github.com/elastic/kibana/issues/224511**\n**Resolves:
https://github.com/elastic/kibana/issues/220971**\n**Resolves:
https://github.com/elastic/kibana/issues/220536**\n**Resolves:
https://github.com/elastic/kibana/issues/217903**\n**Resolves:
https://github.com/elastic/kibana/issues/205777**\n\n## Summary\n\nThis
PR fixes import custom rules flaky integration tests. This is done by
refactoring the tests and getting rid of `esArchiver`.\n\n##
Details\n\nInvestigation of the flakes specified in the tickets above
revealed that the culprit is `esArchiver`. It removes the target indexes
before loading the documents and applies migrations. In fact it turns
out it removes just installed mock prebuilt rules package forcing
installing a real prebuilt rules package from the production EPR. Where
usage of production EPR has been known to cause flakiness.\n\nOn top of
just getting rid of `esArchiver` this PR refactors the importing custom
rules integrations tests. The main goal is to make the tests structure
clear and transparent. Previously flaky tests were moved to the
different sections. And some of the tests testing Kibana v7.14
connectors were removed since `esArchiver` performs connectors migration
so importing rules tests interact with the migrated connections.\n\n##
Flaky test runner\n\n- ✅ [ESS 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)\n-
✅ [Serverless 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)\n\n##
How to test the fix?\n\n- Add
`--xpack.fleet.registryUrl=http://non-existent` to
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts)
for ESS or
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts)
for Serverless.\n- run import custom rules integration tests in the
`main` branch and observe test failures\n- run import custom rules
integration tests in this PR and observe all tests have
passed","sha":"6403fd42ee060736f849af276b63183db247ea7c","branchLabelMapping":{"^v9.2.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","impact:high","Team:Detections
and Resp","Team: SecuritySolution","Team:Detection Rule
Management","Feature:Rule
Import/Export","backport:version","v8.19.0","v9.2.0","v9.0.5","v8.18.5","v9.1.2"],"title":"[Security
Solution] Get rid of esArchiver in import custom rules integration
tests","number":229492,"url":"https://github.com/elastic/kibana/pull/229492","mergeCommit":{"message":"[Security
Solution] Get rid of esArchiver in import custom rules integration tests
(#229492)\n\n**Resolves:
https://github.com/elastic/kibana/issues/227454**\n**Resolves:
https://github.com/elastic/kibana/issues/224511**\n**Resolves:
https://github.com/elastic/kibana/issues/220971**\n**Resolves:
https://github.com/elastic/kibana/issues/220536**\n**Resolves:
https://github.com/elastic/kibana/issues/217903**\n**Resolves:
https://github.com/elastic/kibana/issues/205777**\n\n## Summary\n\nThis
PR fixes import custom rules flaky integration tests. This is done by
refactoring the tests and getting rid of `esArchiver`.\n\n##
Details\n\nInvestigation of the flakes specified in the tickets above
revealed that the culprit is `esArchiver`. It removes the target indexes
before loading the documents and applies migrations. In fact it turns
out it removes just installed mock prebuilt rules package forcing
installing a real prebuilt rules package from the production EPR. Where
usage of production EPR has been known to cause flakiness.\n\nOn top of
just getting rid of `esArchiver` this PR refactors the importing custom
rules integrations tests. The main goal is to make the tests structure
clear and transparent. Previously flaky tests were moved to the
different sections. And some of the tests testing Kibana v7.14
connectors were removed since `esArchiver` performs connectors migration
so importing rules tests interact with the migrated connections.\n\n##
Flaky test runner\n\n- ✅ [ESS 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)\n-
✅ [Serverless 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)\n\n##
How to test the fix?\n\n- Add
`--xpack.fleet.registryUrl=http://non-existent` to
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts)
for ESS or
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts)
for Serverless.\n- run import custom rules integration tests in the
`main` branch and observe test failures\n- run import custom rules
integration tests in this PR and observe all tests have
passed","sha":"6403fd42ee060736f849af276b63183db247ea7c"}},"sourceBranch":"main","suggestedTargetBranches":["8.19"],"targetPullRequestStates":[{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v9.2.0","branchLabelMappingKey":"^v9.2.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/229492","number":229492,"mergeCommit":{"message":"[Security
Solution] Get rid of esArchiver in import custom rules integration tests
(#229492)\n\n**Resolves:
https://github.com/elastic/kibana/issues/227454**\n**Resolves:
https://github.com/elastic/kibana/issues/224511**\n**Resolves:
https://github.com/elastic/kibana/issues/220971**\n**Resolves:
https://github.com/elastic/kibana/issues/220536**\n**Resolves:
https://github.com/elastic/kibana/issues/217903**\n**Resolves:
https://github.com/elastic/kibana/issues/205777**\n\n## Summary\n\nThis
PR fixes import custom rules flaky integration tests. This is done by
refactoring the tests and getting rid of `esArchiver`.\n\n##
Details\n\nInvestigation of the flakes specified in the tickets above
revealed that the culprit is `esArchiver`. It removes the target indexes
before loading the documents and applies migrations. In fact it turns
out it removes just installed mock prebuilt rules package forcing
installing a real prebuilt rules package from the production EPR. Where
usage of production EPR has been known to cause flakiness.\n\nOn top of
just getting rid of `esArchiver` this PR refactors the importing custom
rules integrations tests. The main goal is to make the tests structure
clear and transparent. Previously flaky tests were moved to the
different sections. And some of the tests testing Kibana v7.14
connectors were removed since `esArchiver` performs connectors migration
so importing rules tests interact with the migrated connections.\n\n##
Flaky test runner\n\n- ✅ [ESS 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8883)\n-
✅ [Serverless 200
runs](https://buildkite.com/elastic/kibana-flaky-test-suite-runner/builds/8884)\n\n##
How to test the fix?\n\n- Add
`--xpack.fleet.registryUrl=http://non-existent` to
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/ess/config.base.ts)
for ESS or
[config.base.ts](https://github.com/elastic/kibana/blob/main/x-pack/test/security_solution_api_integration/config/serverless/config.base.ts)
for Serverless.\n- run import custom rules integration tests in the
`main` branch and observe test failures\n- run import custom rules
integration tests in this PR and observe all tests have
passed","sha":"6403fd42ee060736f849af276b63183db247ea7c"}},{"branch":"9.0","label":"v9.0.5","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"url":"https://github.com/elastic/kibana/pull/230282","number":230282,"state":"MERGED","mergeCommit":{"sha":"c1c72bbe352a0e09417ff5b2a0edb369ce64ae7d","message":"[9.0]
[Security Solution] Get rid of esArchiver in import custom rules
integration tests (#229492) (#230282)\n\n# Backport\n\nThis will
backport the following commits from `main` to `9.0`:\n- [[Security
Solution] Get rid of esArchiver in import custom rules\nintegration
tests\n(#229492)](https://github.com/elastic/kibana/pull/229492)\n\n\n\n###
Questions ?\nPlease refer to the [Backport
tool\ndocumentation](https://github.com/sorenlouv/backport)\n\n\n\n---------\n\nCo-authored-by:
kibanamachine
<[email protected]>"}},{"branch":"8.18","label":"v8.18.5","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"url":"https://github.com/elastic/kibana/pull/230287","number":230287,"state":"MERGED","mergeCommit":{"sha":"bdc2a70f4785d3220c78e8d0bc42f0f6e82e9c08","message":"[8.18]
[Security Solution] Get rid of esArchiver in import custom rules
integration tests (#229492) (#230287)\n\n# Backport\n\nThis will
backport the following commits from `main` to `8.18`:\n- [[Security
Solution] Get rid of esArchiver in import custom rules\nintegration
tests\n(#229492)](https://github.com/elastic/kibana/pull/229492)\n\n\n\n###
Questions ?\nPlease refer to the [Backport
tool\ndocumentation](https://github.com/sorenlouv/backport)\n\n"}},{"branch":"9.1","label":"v9.1.2","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"url":"https://github.com/elastic/kibana/pull/230279","number":230279,"state":"MERGED","mergeCommit":{"sha":"79ac090d20ae5a69043b4ce6886dfeddb1fe5c07","message":"[9.1]
[Security Solution] Get rid of esArchiver in import custom rules
integration tests (#229492) (#230279)\n\n# Backport\n\nThis will
backport the following commits from `main` to `9.1`:\n- [[Security
Solution] Get rid of esArchiver in import custom rules\nintegration
tests\n(#229492)](https://github.com/elastic/kibana/pull/229492)\n\n\n\n###
Questions ?\nPlease refer to the [Backport
tool\ndocumentation](https://github.com/sorenlouv/backport)\n\n\n\n---------\n\nCo-authored-by:
Nikita Indik <[email protected]>"}}]}] BACKPORT-->
@banderror banderror removed the v8.19.0 label Sep 12, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport:version Backport to applied version labels Feature:Rule Import/Export Security Solution Detection Rule Import & Export workflow impact:high Addressing this issue will have a high level of impact on the quality/strength of our product. release_note:skip Skip the PR/issue when compiling release notes Team:Detection Rule Management Security Detection Rule Management Team Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. v8.18.5 v8.19.4 v9.0.5 v9.1.2 v9.2.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Failing test: Rules Management - Rule Import And Export Integration Tests - ESS Env - Trial License.x-pack/test/security_solution_api_integration/test_suites/detections_response/rules_management/rule_import_export/trial_license_complete_tier/import_rules·ts - Rules Management - Rule import export API @ess @serverless @skipInServerlessMKI import_rules importing rules with an index @skipInServerless migrate pre-8.0 action connector ids should be imported into the non-default space should import a non-default-space 7.16 rule with a connector made in the non-default space Failing test: Rules Management - Rule Import And Export Integration Tests - ESS Env - Trial License.x-pack/test/security_solution_api_integration/test_suites/detections_response/rules_management/rule_import_export/trial_license_complete_tier/import_rules·ts - Rules Management - Rule import export API @ess @serverless @skipInServerlessMKI import_rules importing rules with an index @skipInServerless migrate pre-8.0 action connector ids should be imported into the non-default space importing a non-default-space 7.16 rule with a connector made in the non-default space should result in a 200 Failing test: Rules Management - Rule Import/Export Integration Tests - ESS Env - Basic License.x-pack/test/security_solution_api_integration/test_suites/detections_response/rules_management/rule_import_export/basic_license_essentials_tier/import_rules·ts - Rules Management - Rule Import & Export APIs @ess @serverless @serverlessQA import_rules importing rules with an index should set the response content types to be expected Failing test: Rules Management - Rule Import And Export Integration Tests - ESS Env - Trial License.x-pack/test/security_solution_api_integration/test_suites/detections_response/rules_management/rule_import_export/trial_license_complete_tier/import_rules·ts - Rules Management - Rule import export API @ess @serverless @skipInServerlessMKI import_rules importing rules with an index @skipInServerless migrate pre-8.0 action connector ids should be imported into the default space should import a default-space 7.16 rule with a connector made in the default space into a non-default space successfully Failing test: Rules Management - Rule Import And Export Integration Tests - ESS Env - Trial License.x-pack/test/security_solution_api_integration/test_suites/detections_response/rules_management/rule_import_export/trial_license_complete_tier/import_rules·ts - Rules Management - Rule import export API @ess @serverless @skipInServerlessMKI import_rules importing rules with an index @skipInServerless migrate pre-8.0 action connector ids "before each" hook for "importing a non-default-space 7.16 rule with a connector made in the non-default space into the default space should result in a 404 if the file does not contain connectors"

8 participants