-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
[Cloud Posture] Remove k8s instructions for cspm policies #146843
[Cloud Posture] Remove k8s instructions for cspm policies #146843
Conversation
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security Posture) |
Pinging @elastic/fleet (Team:Fleet) |
@@ -66,4 +70,14 @@ export function useIsK8sPolicy(agentPolicy?: AgentPolicy) { | |||
return { isK8s }; | |||
} | |||
|
|||
const isK8sPackage = (pkg: PackagePolicy) => K8S_PACKAGES.has(pkg.package?.name as string); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is a bit problematic since pkg.package?
can return undefined
and will throw when used in .has()
.
💚 Build Succeeded
Metrics [docs]Public APIs missing comments
Async chunks
Page load bundle
Unknown metric groupsAPI count
ESLint disabled in files
ESLint disabled line counts
Total ESLint disabled count
History
To update your PR or re-run it, just comment with: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Summary
When installing CSPM the kubernetes deployment is not relevant and shouldn't be visible.
This PR is fixing that
How to test it
In order to install CSPM integration you use cloud_security_posture 1.1.0 which is recently available elastic/integrations#4752