-
Notifications
You must be signed in to change notification settings - Fork 75
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Change Proposal] Allow deployment modes to specify allowed inputs #874
Comments
cc @qcorporation @jamiehynds @jsoriano @seanrathier WDYT? |
On a first look this seems a bit redundant to me. Policy templates define their own inputs, so in principle they are already restricted. I guess this can be an issue only if a policy template supports multiple deployment modes? In that case, if the policy template is only partially compatible with a deployment mode, wouldn't it be better to split it in two policy templates, so each one of them is fully compatible with the deployment modes they support? I mean, instead of:
Do something like this, that is more explicit and already supported, even if may lead to some duplication:
If we don't want this duplication, and we definitely want to add something to explicitly support this, I think it would be better to make this restriction part of the input:
|
That works for me
Technically multiple policy templates can work for this, but we are trying to avoid this kind of duplication. Per feedback from @qcorporation:
|
Good point 👍 |
Related to deployment modes: #738
Related to deployment modes input configuration: #805
Following discussion in #805, it was decided that Fleet will maintain a blocklist of inputs that are not allowed for agentless deployment modes. This was implemented in elastic/kibana#202091.
In elastic/kibana#211092, we saw that additional inputs needed to be blocked as new agentless integrations became available. This made us consider moving to an allowlist instead of a blocklist, but per investigation in elastic/kibana#211275, the initial allowlist was too restrictive.
With this new information, it seems unsustainable for Fleet to define what is allowed for agentless integrations. We should move this to the package spec instead so that allowed inputs can be controlled by integrations. The existing
deployment_modes
property seems to be a good place to put it:When
inputs
is specified under a deployment mode, Fleet should only show configuration for those inputs. If this field is not present, then the default behavior is to show all inputs specified by this policy template.The text was updated successfully, but these errors were encountered: