Commit graph

72 commits

Author SHA1 Message Date
Liam Thompson
de448aa51b
[DOCS] Delete old asciidoc preview URL action (#123909) 2025-03-04 10:46:03 +01:00
Liam Thompson
731a412326
Revert "Revert "[docs] Add the new docs CI checks"" (#123585)
* Revert "Revert "Add new docs actions (#123506)" (#123570)"

This reverts commit ee31c5a92d.

* [CI] Auto commit changes from spotless

---------

Co-authored-by: elasticsearchmachine <infra-root+elasticsearchmachine@elastic.co>
2025-02-27 11:23:50 +01:00
Liam Thompson
ee31c5a92d
Revert "Add new docs actions (#123506)" (#123570)
This reverts commit 4d5f9b2332.
2025-02-27 09:04:04 +01:00
Colleen McGinnis
4d5f9b2332
Add new docs actions (#123506) 2025-02-26 17:04:12 +01:00
Ryan Ernst
db176a2175
Add entitlements lib to core/infra codeowners (#122611) 2025-02-14 21:37:25 +01:00
Jan Calanog
f211838859
github-action: Add AsciiDoc freeze warning (#121032) 2025-01-30 13:58:28 +01:00
Simon Cooper
d28ff746db
Add common libraries to core/infra codeowners (#114211) 2024-11-07 14:53:35 +00:00
Mark Vieira
18a57d8a39
Remove sync to jdk branch github workflow 2024-10-31 12:15:47 -07:00
Rene Groeschke
f774d0ee82
Remove Delivery team as codeowners for gradle build scripts (#115523) 2024-10-24 23:58:37 +11:00
Brian Seeders
b03fbac557
[github] actions should only run for the elastic repo (#113888) 2024-10-01 13:43:57 -04:00
Iván Cea Fontenla
0a54661143
Remove Analytical engine CODEOWNERS (#113178)
Reverts https://github.com/elastic/elasticsearch/pull/112465

After a week and a half trying the team CODEOWNERS, there are some
problems with not being able to (easily?) identify the direct, personal
review requests from team requests in notifications.

Unless it's solved, and given that these CODEOWNERS are more like an
"auto-documentation" tool right now, we are better reverting it.
2024-09-24 02:23:14 +10:00
Victor Martinez
6d18607cd4
ci(bump automation): bump ubi9 for ironbank (#112298)
### What

Enable updatecli
[policies](https://www.updatecli.io/blog/shareable-policies) to bump the
Ironbank versions automatically, then 
https://github.com/elastic/elasticsearch/pull/111743 won't be manually
created but when a new ubit9 version is released and available in the
Ironbank system.

Those policies can be found at
[elastic/oblt-updatecli-policies@main/updatecli/policies/](https://github.com/elastic/oblt-updatecli-policies/tree/main/updatecli/policies/?rgh-link-date=2024-08-28T16%3A30%3A04Z)
(NOTE: This is a private repository only accessible by Elastic
employees)

#### How to test this PR locally

1. `gh pr checkout 112298`
2. Install [updatecli](https://www.updatecli.io/docs/prologue/installation/)
3. Login to [ghcr.io](https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry#authenticating-to-the-container-registry)
4. Diff (dry-run)

```bash
$ GITHUB_TOKEN=$(gh auth token) updatecli compose diff --experimental
```

5. Create Pull Request if new changes

```bash
$ GITHUB_REPOSITORY=elastic/elasticsearch \
   GITHUB_ACTOR=v1v \
   GITHUB_TOKEN=$(gh auth token) \
updatecli compose apply --experimental
```
2024-09-12 18:58:23 +10:00
Iván Cea Fontenla
2424846780
Add ESQL codeowners (#112465) 2024-09-09 10:02:40 +02:00
Mark Vieira
d59ca365cf
Update cron schedule 2024-09-03 11:45:47 -07:00
Mark Vieira
699194844e
Remove from branch and just use current branch 2024-09-03 10:55:44 -07:00
Mark Vieira
aefdd7680f
Fix branch name in github action nworkflow 2024-09-03 10:51:44 -07:00
Mark Vieira
42ac585e7f
Allow for manual invocation 2024-09-03 10:47:02 -07:00
Mark Vieira
b0a00561d1
Add Github action for keeping jdk upgrade branch in sync 2024-09-03 10:42:29 -07:00
Gergely Kalapos
4e1a84c883
x-pack/plugin/otel: introduce x-pack-otel plugin (#111091)
* Add YamlTemplateRegistry and OtelIndexTemplateRegistry with resource YAML files

* Fix traces-otel template

* Adding first yml tests

* Base APMIndexTemplateRegistry on YamlTemplateRegistry

* Update OTelPlugin.java

* Update APMIndexTemplateRegistry.java

* Update YamlIngestPipelineConfig.java

* Adding traces tests

* Update x-pack/plugin/otel-data/src/main/resources/component-templates/ecs-tsdb@mappings.yaml

Co-authored-by: Felix Barnsteiner <felixbarny@users.noreply.github.com>

* Add mapper-version

* Fix code-style

* Rename `status.status_code` to `status.code`

* Update otel@mappings.yaml

Revert back to date due to missing support in ES|QL for date_nanos

* Move dynamic_templates to metrics@mappings in core

* Run gradlew :x-pack:plugin:core:spotlessApply

* Update x-pack/plugin/otel-data/src/main/resources/component-templates/metrics-otel@mappings.yaml

Co-authored-by: Carson Ip <carsonip@users.noreply.github.com>

* Update 20_metic_tests.yml

Workaround for TSDB timestamp issue: we push a custom template with higher priority and set  time_series.start_time.

* Update CODEOWNERS

Adding obs-ds-intake-services as owner of the new otel-data plugin.

Since we had some changes, also updating the owner of apm-data to the same team.

* Change dynamic: strict to false

* Skip "Reject invalid top level field" test

* Update 20_metic_tests.yml

* Add boolean as dimension test (skipping it for now)

* Add booleans_to_keywords and enable corresponding test

* Remove processor.event top level mapping

Reason: for metrics and logs we can rely on the name of the datastream. For spans vs. transactions there are other fields we can use.

* Remove booleans_to_keywords

Because booleans are supported now as dimension on TSDB

* Add alias service.language.name -> telemetry.sdk.language

* cleanup

* Update README.md

* Update README.md

* Update docs/changelog/111091.yaml

* Move traces@settings and traces@mappings to core

* Update traces-otel@mappings.yaml

* Review feedback

* Adapt `match` style in tests

* Update docs/changelog/111091.yaml

* Apply suggestions from code review

Co-authored-by: Vishal Raj <vishal.raj@elastic.co>

* Update x-pack/plugin/otel-data/src/main/resources/component-templates/traces-otel@mappings.yaml

Co-authored-by: Carson Ip <carsonip@users.noreply.github.com>

* Changing trace_flags to long

Related discussion: https://github.com/elastic/elasticsearch/pull/111091#discussion_r1706698491

* Remove trace_flags

see: https://github.com/elastic/opentelemetry-dev/pull/368#pullrequestreview-2229633970

* Apply suggestions from code review

Co-authored-by: Andrew Wilkins <axwalk@gmail.com>

* Review feedback

* Add store_array_source for span links

* Define constant `data_stream.type` in `template.yaml`s

* Create package-info.java

* Move ecs-tsdb@mappings to index template

Add test to verify that @custom template can add dynamic templates with a higher precedence

* Update metrics@mappings.json

Remove summary_gauge and summary_counter since they are covered by summary_metrics

* Move clusterService.getClusterSettings().addSettingsUpdateConsumer to registry

* Fix code-style

* Update x-pack/plugin/otel-data/src/yamlRestTest/resources/rest-api-spec/test/20_logs.tests.yml

Co-authored-by: Felix Barnsteiner <felixbarny@users.noreply.github.com>

* Enable logsdb

* Update traces@settings.json

No lifecycle needed for OTel at this point

---------

Co-authored-by: Felix Barnsteiner <felixbarny@users.noreply.github.com>
Co-authored-by: Carson Ip <carsonip@users.noreply.github.com>
Co-authored-by: Vishal Raj <vishal.raj@elastic.co>
Co-authored-by: Andrew Wilkins <axwalk@gmail.com>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
Co-authored-by: Felix Barnsteiner <felix.barnsteiner@elastic.co>
2024-08-19 09:24:47 +02:00
Ry Biesemeyer
ea4ad5e7de
[logstash bridge]: stableapi bootstrap (#108171)
* [logstash bridge]: stableapi bootstrap

Adds a new `logstash-bridge` project in `/libs` that exports api-stable
wrappers for the elasticsearch-internal types that Logstash's Elastic
Integration Filter relies on to provide ingest pipeline execution inside
of Logstash.

These bridge classes prevent Elasticsearch-internal refactorings from
breaking the Logstash-owned project.

* Update docs/changelog/108171.yaml

* rename StableAPI -> StableBridgeAPI
2024-06-13 10:32:46 -07:00
Nikolaj Volgushev
43019d12bd
Make ES security codeowners for privilege definitions (#108552)
This PR makes the ES security code-owners of privilege-related source
files. This covers named cluster and index privileges. We may extend
code-ownership to other security-related files, but this feels like a
reasonable start.
2024-05-21 06:09:44 -04:00
Athena Brown
ff91ce024c
Update and pin gradle wrapper validation action (#106635)
This commit updates the Gradle wrapper validation action to the latest
release and pins it to that version by hash per our company best
practices for GitHub Workflows & Actions.
2024-03-21 19:17:25 -04:00
Simon Cooper
1b8f2cf8ac
Add some initial github codeowners for core/infra (#106314) 2024-03-14 10:11:09 +00:00
Mark Vieira
dbc653e4fd
Update docs preview link 2024-02-14 08:46:09 -08:00
Paul Bianciardi
5b7b1421b5
Update CODEOWNERS with separate Stack Monitoring team (#104828)
Adds [stack-monitoring](https://github.com/orgs/elastic/teams/stack-monitoring) and removes `@elastic/infra-monitoring-ui` (as being decommissioned), to review Stack Monitoring changes.
2024-01-29 10:52:59 +00:00
Rene Groeschke
2f4f6925b5
Add codeowners configuration for delivery team (#103422) 2023-12-18 14:43:56 +01:00
Andrew Wilkins
3c28dc0d69
CODEOWNERS: reduce scope of elastic/apm-server (#103368)
Cross-cutting refactoring often pings the apm-server team
and we're not really the best placed for reviewing these
changes. The apm-data plugin is structured so the apm-server
team can work on the templates and ingest pipelines without
touching any Java code, so reduce the scope to just the
assets and YAML REST tests.
2023-12-14 07:28:47 +08:00
Andrew Wilkins
4223cadc6d
x-pack/plugin/apm: introduce x-pack-apm plugin (#97546)
* x-pack/plugin/apm: introduce x-pack-apm plugin

* Dependency fix and tests

* Restore addition to ESRestTestCase

* Replace IngestPipelineConfig instantiation

* Update DataStreamUpgradeRestIT to expect logs-apm.error

* Adding rollover functionality

* Extend basic rollover funtionality tests

* Start adding integration test

* Hide rollup data streams

* Apm ingest fixes

- Map transaction.duration.us independently of span.duration.us,
  fix ingest pipeline. We might consider aliasing later.
- Set event.ingested
- Set processor.event, using constant_keyword where possible

* Fix error.grouping_name script

* Only set event.ingested for traces-apm.sampled

* Enabling APMRolloverIT

* Spotless...

* Assertion change

* Wait a bit before assertBusy

* Adjust template and pipeline names to convention

See https://github.com/elastic/elasticsearch/issues/96267#issuecomment-1662129512

- Index templates have a "@template" suffix
- Component templates are split into settings and mappings,
  and have a @settings and @mappings suffix respectively
- Ingest pipelines generally have a @pipeline suffix,
  except for one special case where we use @default-pipeline

We no longer have a component template for every data stream, rather we
have reusable component templates where it makes sense. For example, we
now have metrics-apm@settings and metrics-apm@mappings, which are
included by all APM metrics data streams.

We now set both default_pipeline and final_pipeline in the index
templates, preventing users from overriding them completely. The
default pipeline is always apm@default-pipeline, which performs
some rerouting of legacy data, and invokes user-defined @custom
pipelines based on the data_stream.type and data_stream.dataset
fields. The final pipeline just performs built-in processing.

* No need for manual cluster change events anymore

* Fix test

* Lower template priority to 110

Certain index templates installed by Fleet are given
a priority of 150, so lower the priority to avoid
conflicts.

See a18c68f7ac/x-pack/plugins/fleet/server/services/epm/elasticsearch/template/template.ts (L58)

* Add logging

* Remove explicit timeout for rollovers

* Add _meta to component templates too

* Increase template priorities to 140

This goes closer to the Fleet-installed template priorities,
allowing for more builtin templates to be introduced without
affecting APM.

* Test multiple index template upgrades with rollovers

* Enfore correct component template versions

* Rename to x-pack-apm-data, default to disabled

Because there's already an "apm" plugin,
we haven't yet solved all issues with rollovers,
and the templates need some more love.

* Fix checkstyle

* Fix more checkstyle

* Fix even more linting issues

* Adjust test to disabled by default

* remove todo

* Fixing test

* Refactor leftovers

* Fix constant keyword mapping conflict

* Fix after merge

* Comment fixes

* Rename ApmIngestPipelineConfig to YamlIngestPipelineConfig

* Always return a registry

* spotless, what else

* Add rollover integration test to core

* Remove APMRolloverIT

* Refactor in renamed components

---------

Co-authored-by: eyalkoren <41850454+eyalkoren@users.noreply.github.com>
2023-10-31 13:05:06 +08:00
Milton Hultgren
403bcb366a
Update CODEOWNER paths for Stack Monitoring mappings (#99428) 2023-09-12 14:11:30 +02:00
Nikolaj Volgushev
7d23c98cb1
Track kibana system role in CODEOWNERS (#97603)
The ES security team currently manually tags the Kibana security team
for reviews on changes to the Kibana system role definition. This PR
aims to automate via codeowners.
2023-07-12 16:16:47 -04:00
Kyle Pollich
405328f041
[Fleet] Update CODEOWNERS for Fleet/Agent resources (#91670)
Point Fleet/Agent ES files to Fleet team instead of Agent Control Plane team.

Co-authored-by: Josh Dover <1813008+joshdover@users.noreply.github.com>
2023-01-27 08:24:13 -08:00
David Turner
75424c0416 Fix up whitespace after #91955 2022-11-28 15:54:48 +00:00
David Turner
4b06d9ce86
Link bug report template to EOL page (#91955)
Adds links to https://www.elastic.co/support/eol to the Github bug
report template to reduce bug reports involving EOL versions.
2022-11-28 15:50:14 +00:00
Alex
7fc0a571f4
GitHub Workflows security hardening (#90124) 2022-10-03 13:04:11 -07:00
Varun Sharma
c2b34a9405
Add GitHub token permissions for workflow (#89490) 2022-08-31 14:28:20 -07:00
debadair
58fae25490
Auto-generate preview links for DOC PRs (#89670)
* Auto-generate preview links for DOC PRs

* Removed direct link to guide

* Limited to just doc changes/
2022-08-26 12:56:05 -07:00
GabyCT
d248fa4b94
[DOCS] Update pull request template URLs (#89290)
This PR updates the pull request template to refer to main instead
of master as well as it updates some URLs.

Signed-off-by: Gabriela Cervantes <gabriela.cervantes.tellez@intel.com>
2022-08-16 11:13:14 -07:00
Julien Lind
5233229bfb
Update CODEOWNERS (#89155) 2022-08-09 15:54:35 +02:00
Mark Vieira
17265e4db6 Remove GitHub action for syncing main branch with master 2022-07-22 16:19:58 -07:00
Milton Hultgren
168ab2ec9d
Make infra-monitoring-ui codeowners of Stack Monitoring templates 2022-07-22 11:41:49 +02:00
Rick Boyd
2b36b52fa6
Update test-failure Issue Template to include "needs:triage" label #83226 2022-01-27 18:42:12 -05:00
Ryan Ernst
86174d6add
Use github issue template forms (#83177)
Currently we use GitHub issue templates containing markdown for each
template. This was an improvement over the single issue template before
that, and there are several bits of information that we ask for, but
filling out the template is cumbersome because it is completely
markdown, and users often leave bits of markdown comments meant for them
to read in the resulting issue.

This commit converts the existing issue templates to use the new github
issue template forms. These are configured through yml, and present an
html form to the user that is customized for each issue type.
2022-01-26 12:59:45 -08:00
Ryan Ernst
97f010d16a
Remove duplicate security vulnerability section from issue template (#82987)
The Elasticsearch project has a security policy set on it, which causes
a "Report a security vulnerability" section in the new issue template
with a link to the security policy. This commit removes the older link
to sending an email to the security list, since it is confusing whether
a user should look at the policy (which references the security email)
or directly click the fake "Open" button.
2022-01-24 15:34:12 -08:00
Mark Vieira
80817d0fcd Add GitHub action for synchronizing commits from master to main branch 2021-08-24 15:51:33 -07:00
Mark Vieira
b58416cd60 Delete backport GitHub action 2021-08-11 11:46:00 -07:00
Mark Vieira
98ce2d2c0a Revert "Delete backport GitHub action"
This reverts commit 3d0b8efb78.
2021-08-11 07:42:47 -07:00
Mark Vieira
3d0b8efb78 Delete backport GitHub action 2021-08-10 13:49:54 -07:00
Mark Vieira
f9e8849991 Consolidate GitHub action backport configuration 2021-08-03 16:17:41 -07:00
Mark Vieira
feed41e871 Add GitHub action workflow for auto-backport-and-merge label 2021-08-03 14:40:43 -07:00
Mark Vieira
10a89c50db Give GitHub action a proper name 2021-06-30 10:45:26 -07:00