Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CSP rule template are not deleted after deleting integration assets #137023

Closed
ofiriro3 opened this issue Jul 24, 2022 · 5 comments
Closed

CSP rule template are not deleted after deleting integration assets #137023

ofiriro3 opened this issue Jul 24, 2022 · 5 comments
Labels
bug Fixes for quality problems that affect the customer experience Team:Cloud Security Cloud Security team related

Comments

@ofiriro3
Copy link
Contributor

Describe the bug:
Rule templates are not deleted after deleting the CSP benchmark integration.

Steps to reproduce:

  1. Create CIS Kubernetes Benchmark integration.

  2. Remove all integration policies:
    a. Open CIS Kubernetes Benchmark integration page
    b. Navigate to the Integration policies tab
    c. delete the integration from all agents

  3. Uninstall the integration:
    a. Open CIS Kubernetes Benchmark integration page
    b. Navigate to the Settings tab
    c. Press on Uninstall CIS Kubernetes benchmark

  4. Go to the Saved objects page and filter by csp-rule-template type.

  5. 123 saved objects were found.

image

Expected behavior:
All saved objects should be deleted after the integration was deleted.

Desktop (please complete the following information):

  • OS: MacOs
  • Browser: chrome
  • Kibana Version: 8.4, Build 54789, Commit af3a3cb
  • Endpoint Version:
  • Other Version:
@ofiriro3 ofiriro3 added the bug Fixes for quality problems that affect the customer experience label Jul 24, 2022
@botelastic botelastic bot added the needs-team Issues missing a team label label Jul 24, 2022
@ofiriro3 ofiriro3 added the Team:Cloud Security Cloud Security team related label Jul 24, 2022
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security Posture)

@botelastic botelastic bot removed the needs-team Issues missing a team label label Jul 24, 2022
@kfirpeled kfirpeled assigned orouz and unassigned kfirpeled Jul 26, 2022
@tehilashn
Copy link

This is not mandatory for 8.4 (it will be for 8.5), changing the labels

@simonliska
Copy link

Any update ?

@kfirpeled
Copy link
Contributor

Hi @simonliska sorry for the late response.

We haven't prioritized this issue, and frankly, I'm not sure if it is still relevant or not.

Out of curiosity, do you mind elaborating on how this affects you/your work with elastic's Cloud Security?

@maxcold
Copy link
Contributor

maxcold commented Feb 18, 2025

closing since there is no update for a while

@maxcold maxcold closed this as not planned Won't fix, can't repro, duplicate, stale Feb 18, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Fixes for quality problems that affect the customer experience Team:Cloud Security Cloud Security team related
Projects
None yet
Development

No branches or pull requests

8 participants