-
Notifications
You must be signed in to change notification settings - Fork 522
[amazon_security_lake] Add system tests for aws-s3 input #8303
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
50b0f85 to
d1680da
Compare
💔 Build Failed
Expand to view the summary
Build stats
Steps errors
Expand to view the steps failures
|
d1680da to
f3bacb3
Compare
🌐 Coverage report
|
656fabb to
9b20701
Compare
9b20701 to
43c1855
Compare
|
Checkout #7887 (comment). I think security lake uses a custom notification format to SQS instead of letting S3 write the event to SQS. |
feb4069 to
e657aaa
Compare
e657aaa to
91bcc9b
Compare
|
Depends on elastic/package-spec#662 |
|
Hi @bhapas, please update your branch with the latest contents from main branch. There was an important PR merged updating the CI pipelines. Thanks! |
82beefa to
065d5e3
Compare
065d5e3 to
bc23a4a
Compare
|
Hi! We just realized that we haven't looked into this PR in a while. We're sorry! We're labeling this issue as |
|
Hi! This PR has been stale for a while and we're going to close it as part of our cleanup procedure. We appreciate your contribution and would like to apologize if we have not been able to review it, due to the current heavy load of the team. Feel free to re-open this PR if you think it should stay open and is worth rebasing. Thank you for your contribution! |
Proposed commit message
Add system tests for
aws-s3input inamazon_security_lakeintegration by using terraform service deployer and using the SQS queue_url generated in terraform outputs.Checklist
changelog.ymlfile.How to test this PR locally
Run
elastic-package stack up -d -v && elastic-package test system -vRelated issues