Skip to content

Commit eceb0bd

Browse files
committed
Merge branch 'main' of ssh://github.com/DataDog/datadog-agent into lenaic/CONTINT-258_new-e2e-assert
2 parents e8fbfab + 0a0da3c commit eceb0bd

32 files changed

Lines changed: 572 additions & 121 deletions

.gitlab-ci.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -169,7 +169,7 @@ variables:
169169
# To use images from test-infra-definitions dev branches, set the SUFFIX variable to -dev
170170
# and check the job creating the image to make sure you have the right SHA prefix
171171
TEST_INFRA_DEFINITIONS_BUILDIMAGES_SUFFIX: ""
172-
TEST_INFRA_DEFINITIONS_BUILDIMAGES: b3e53c405861
172+
TEST_INFRA_DEFINITIONS_BUILDIMAGES: 90df38e7541b
173173
DATADOG_AGENT_BUILDERS: v22276738-b36b132
174174

175175
DATADOG_AGENT_EMBEDDED_PATH: /opt/datadog-agent/embedded

.gitlab/e2e.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ k8s-e2e-otlp-main:
144144
E2E_KEY_PAIR_NAME: datadog-agent-ci
145145
E2E_PIPELINE_ID: $CI_PIPELINE_ID
146146
script:
147-
- inv -e new-e2e-tests.run --targets $TARGETS -c ddagent:fullImagePath=669783387624.dkr.ecr.us-east-1.amazonaws.com/agent:${CI_PIPELINE_ID}-${CI_COMMIT_SHORT_SHA} -c ddagent:clusterAgentFullImagePath=669783387624.dkr.ecr.us-east-1.amazonaws.com/cluster-agent:${CI_PIPELINE_ID}-${CI_COMMIT_SHORT_SHA} -c ddagent:imagePullRegistry=669783387624.dkr.ecr.us-east-1.amazonaws.com -c ddagent:imagePullUsername=AWS -c ddagent:imagePullPassword=$(aws ecr get-login-password) --junit-tar "junit-${CI_JOB_NAME}.tgz" ${EXTRA_PARAMS}
147+
- inv -e new-e2e-tests.run --targets $TARGETS -c ddagent:fullImagePath=669783387624.dkr.ecr.us-east-1.amazonaws.com/agent:${CI_PIPELINE_ID}-${CI_COMMIT_SHORT_SHA} -c ddagent:clusterAgentFullImagePath=669783387624.dkr.ecr.us-east-1.amazonaws.com/cluster-agent:${CI_PIPELINE_ID}-${CI_COMMIT_SHORT_SHA} -c dddogstatsd:fullImagePath=669783387624.dkr.ecr.us-east-1.amazonaws.com/dogstatsd:${CI_PIPELINE_ID}-${CI_COMMIT_SHORT_SHA} -c ddagent:imagePullRegistry=669783387624.dkr.ecr.us-east-1.amazonaws.com -c ddagent:imagePullUsername=AWS -c ddagent:imagePullPassword=$(aws ecr get-login-password) --junit-tar "junit-${CI_JOB_NAME}.tgz" ${EXTRA_PARAMS}
148148
artifacts:
149149
expire_in: 2 weeks
150150
when: always

.gitlab/install_script_testing.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ test_install_script:
99
- export GITLAB_TOKEN=$(aws ssm get-parameter --region us-east-1 --name ci.datadog-agent.gitlab_pipelines_scheduler_token --with-decryption --query "Parameter.Value" --out text)
1010
- export APT_URL=$DEB_TESTING_S3_BUCKET
1111
- export YUM_URL=$RPM_TESTING_S3_BUCKET
12-
- export APT_REPO_VERSION_AGENT6="pipeline-$CI_PIPELINE_ID-a6 6"
12+
- export APT_REPO_VERSION_AGENT6="pipeline-$CI_PIPELINE_ID-a6-x86_64 6"
1313
- export YUM_VERSION_PATH_AGENT6="testing/pipeline-$CI_PIPELINE_ID-a6/6"
14-
- export APT_REPO_VERSION_AGENT7="pipeline-$CI_PIPELINE_ID-a7 7"
14+
- export APT_REPO_VERSION_AGENT7="pipeline-$CI_PIPELINE_ID-a7-x86_64 7"
1515
- export YUM_VERSION_PATH_AGENT7="testing/pipeline-$CI_PIPELINE_ID-a7/7"
1616
- inv pipeline.trigger-child-pipeline --project-name "DataDog/agent-linux-install-script" --git-ref "main" --variables "APT_URL,YUM_URL,APT_REPO_VERSION_AGENT6,APT_REPO_VERSION_AGENT7,YUM_VERSION_PATH_AGENT6,YUM_VERSION_PATH_AGENT7"
1717
needs: ["deploy_deb_testing-a6_x64", "deploy_rpm_testing-a6_x64", "deploy_deb_testing-a7_x64", "deploy_rpm_testing-a7_x64"]

.gitlab/kitchen_deploy.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -66,10 +66,10 @@ deploy_deb_testing-a6_x64:
6666

6767
- *setup_signing_keys_package
6868

69-
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID" -m 6 -b $DEB_TESTING_S3_BUCKET -a amd64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-*_6*amd64.deb
70-
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID" -m 6 -b $DEB_TESTING_S3_BUCKET -a x86_64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-*_6*amd64.deb
71-
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID" -m 6 -b $DEB_TESTING_S3_BUCKET -a amd64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-signing-keys_${DD_PIPELINE_ID}.deb
72-
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID" -m 6 -b $DEB_TESTING_S3_BUCKET -a x86_64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-signing-keys_${DD_PIPELINE_ID}.deb
69+
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID-x86_64" -m 6 -b $DEB_TESTING_S3_BUCKET -a amd64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-*_6*amd64.deb
70+
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID-x86_64" -m 6 -b $DEB_TESTING_S3_BUCKET -a x86_64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-*_6*amd64.deb
71+
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID-x86_64" -m 6 -b $DEB_TESTING_S3_BUCKET -a amd64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-signing-keys_${DD_PIPELINE_ID}.deb
72+
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID-x86_64" -m 6 -b $DEB_TESTING_S3_BUCKET -a x86_64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-signing-keys_${DD_PIPELINE_ID}.deb
7373

7474
deploy_deb_testing-a6_arm64:
7575
rules:
@@ -83,8 +83,8 @@ deploy_deb_testing-a6_arm64:
8383

8484
- *setup_signing_keys_package
8585

86-
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID" -m 6 -b $DEB_TESTING_S3_BUCKET -a arm64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-*_6*arm64.deb
87-
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID" -m 6 -b $DEB_TESTING_S3_BUCKET -a arm64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-signing-keys_${DD_PIPELINE_ID}.deb
86+
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID-arm64" -m 6 -b $DEB_TESTING_S3_BUCKET -a arm64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-*_6*arm64.deb
87+
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID-arm64" -m 6 -b $DEB_TESTING_S3_BUCKET -a arm64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-signing-keys_${DD_PIPELINE_ID}.deb
8888

8989
.deploy_deb_testing-a7:
9090
stage: kitchen_deploy
@@ -109,10 +109,10 @@ deploy_deb_testing-a7_x64:
109109

110110
- *setup_signing_keys_package
111111

112-
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID" -m 7 -b $DEB_TESTING_S3_BUCKET -a amd64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-*_7*amd64.deb
113-
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID" -m 7 -b $DEB_TESTING_S3_BUCKET -a x86_64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-*_7*amd64.deb
114-
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID" -m 7 -b $DEB_TESTING_S3_BUCKET -a amd64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-signing-keys_${DD_PIPELINE_ID}.deb
115-
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID" -m 7 -b $DEB_TESTING_S3_BUCKET -a x86_64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-signing-keys_${DD_PIPELINE_ID}.deb
112+
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID-x86_64" -m 7 -b $DEB_TESTING_S3_BUCKET -a amd64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-*_7*amd64.deb
113+
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID-x86_64" -m 7 -b $DEB_TESTING_S3_BUCKET -a x86_64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-*_7*amd64.deb
114+
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID-x86_64" -m 7 -b $DEB_TESTING_S3_BUCKET -a amd64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-signing-keys_${DD_PIPELINE_ID}.deb
115+
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID-x86_64" -m 7 -b $DEB_TESTING_S3_BUCKET -a x86_64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-signing-keys_${DD_PIPELINE_ID}.deb
116116

117117
deploy_deb_testing-a7_arm64:
118118
rules:
@@ -126,8 +126,8 @@ deploy_deb_testing-a7_arm64:
126126

127127
- *setup_signing_keys_package
128128

129-
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID" -m 7 -b $DEB_TESTING_S3_BUCKET -a arm64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-*_7*arm64.deb
130-
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID" -m 7 -b $DEB_TESTING_S3_BUCKET -a arm64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-signing-keys_${DD_PIPELINE_ID}.deb
129+
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID-arm64" -m 7 -b $DEB_TESTING_S3_BUCKET -a arm64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-*_7*arm64.deb
130+
- echo "$APT_SIGNING_KEY_PASSPHRASE" | deb-s3 upload -c "pipeline-$DD_PIPELINE_ID-arm64" -m 7 -b $DEB_TESTING_S3_BUCKET -a arm64 --sign=$DEB_GPG_KEY_ID --gpg_options="--passphrase-fd 0 --batch --digest-algo SHA512" --preserve_versions --visibility public $OMNIBUS_PACKAGE_DIR/datadog-signing-keys_${DD_PIPELINE_ID}.deb
131131

132132
.deploy_rpm_testing-a6:
133133
stage: kitchen_deploy

omnibus/config/software/pip3.rb

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,14 +2,14 @@
22

33
# The version of pip used must be at least equal to the one bundled with the Python version we use
44
# Python 3.9.17 bundles pip 23.0.1
5-
default_version "23.0.1"
5+
default_version "23.3.1"
66

77
skip_transitive_dependency_licensing true
88

99
dependency "python3"
1010

1111
source :url => "https://github.com/pypa/pip/archive/#{version}.tar.gz",
12-
:sha256 => "8544443b6810cf1e41306f44218449524d579f4f801b6b16e46f7cabe64de155",
12+
:sha256 => "4192f1ed5f8f1e01557d8c02ffd845c64d4a4567e0864ca78b74b0b5456c0f62",
1313
:extract => :seven_zip
1414

1515
relative_path "pip-#{version}"

pkg/collector/corechecks/oracle-dbm/config/config.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,7 @@ type QueryMetricsConfig struct {
4141
DisableLastActive bool `yaml:"disable_last_active"`
4242
Lookback int64 `yaml:"lookback"`
4343
Trackers []queryMetricsTrackerConfig `yaml:"trackers"`
44+
MaxRunTime int64 `yaml:"max_run_time"`
4445
}
4546

4647
type SysMetricsConfig struct {
@@ -175,6 +176,7 @@ func NewCheckConfig(rawInstance integration.Data, rawInitConfig integration.Data
175176
instance.QueryMetrics.Enabled = true
176177
instance.QueryMetrics.CollectionInterval = defaultMetricCollectionInterval
177178
instance.QueryMetrics.DBRowsLimit = 10000
179+
instance.QueryMetrics.MaxRunTime = 20
178180

179181
instance.ExecutionPlans.Enabled = true
180182
instance.ExecutionPlans.PlanCacheRetention = 15

pkg/collector/corechecks/oracle-dbm/statements.go

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -401,7 +401,8 @@ func (c *Check) StatementMetrics() (int, error) {
401401
defer o.Stop()
402402
var diff OracleRowMonotonicCount
403403
planErrors = 0
404-
for _, statementMetricRow := range statementMetricsAll {
404+
sendPlan := true
405+
for i, statementMetricRow := range statementMetricsAll {
405406
var trace bool
406407
for _, t := range c.config.QueryMetrics.Trackers {
407408
if len(t.ContainsText) > 0 {
@@ -600,7 +601,11 @@ func (c *Check) StatementMetrics() (int, error) {
600601
c.fqtEmitted.Set(queryRow.QuerySignature, "1", cache.DefaultExpiration)
601602
}
602603

603-
if c.config.ExecutionPlans.Enabled {
604+
if c.config.ExecutionPlans.Enabled && sendPlan {
605+
if (i+1)%10 == 0 && time.Since(start).Seconds() >= float64(c.config.QueryMetrics.MaxRunTime) {
606+
sendPlan = false
607+
}
608+
604609
planCacheKey := strconv.FormatUint(statementMetricRow.PlanHashValue, 10)
605610
if c.planEmitted == nil {
606611
c.planEmitted = getPlanEmittedCache(c)
@@ -775,6 +780,7 @@ func (c *Check) StatementMetrics() (int, error) {
775780
log.Errorf("%s failed getting execution plan %s for SQL_ID: %s, plan_hash_value: %d", c.logPrompt, err, statementMetricRow.SQLID, statementMetricRow.PlanHashValue)
776781
}
777782
}
783+
778784
}
779785
}
780786
c.copyToPreviousMap(newCache)

pkg/config/config.go

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1625,7 +1625,7 @@ func setupFipsEndpoints(config Config) error {
16251625
// port_range_start + 3: profiles
16261626
// port_range_start + 4: processes
16271627
// port_range_start + 5: logs
1628-
// port_range_start + 6: databases monitoring metrics
1628+
// port_range_start + 6: databases monitoring metrics, metadata and activity
16291629
// port_range_start + 7: databases monitoring samples
16301630
// port_range_start + 8: network devices metadata
16311631
// port_range_start + 9: network devices snmp traps (unused)
@@ -1696,9 +1696,11 @@ func setupFipsEndpoints(config Config) error {
16961696
config.Set("process_config.process_dd_url", protocol+urlFor(processes))
16971697

16981698
// Database monitoring
1699-
config.Set("database_monitoring.metrics.dd_url", urlFor(databasesMonitoringMetrics))
1700-
config.Set("database_monitoring.activity.dd_url", urlFor(databasesMonitoringMetrics))
1701-
config.Set("database_monitoring.samples.dd_url", urlFor(databasesMonitoringSamples))
1699+
// Historically we used a different port for samples because the intake hostname defined in epforwarder.go was different
1700+
// (even though the underlying IPs were the same as the ones for DBM metrics intake hostname). We're keeping 2 ports for backward compatibility reason.
1701+
setupFipsLogsConfig(config, "database_monitoring.metrics.", urlFor(databasesMonitoringMetrics))
1702+
setupFipsLogsConfig(config, "database_monitoring.activity.", urlFor(databasesMonitoringMetrics))
1703+
setupFipsLogsConfig(config, "database_monitoring.samples.", urlFor(databasesMonitoringSamples))
17021704

17031705
// Network devices
17041706
config.Set("network_devices.metadata.dd_url", urlFor(networkDevicesMetadata))

pkg/config/config_test.go

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -704,11 +704,11 @@ logs_config:
704704
705705
database_monitoring:
706706
metrics:
707-
dd_url: somehost:1234
707+
logs_dd_url: somehost:1234
708708
activity:
709-
dd_url: somehost:1234
709+
logs_dd_url: somehost:1234
710710
samples:
711-
dd_url: somehost:1234
711+
logs_dd_url: somehost:1234
712712
713713
network_devices:
714714
metadata:
@@ -803,9 +803,9 @@ func assertFipsProxyExpectedConfig(t *testing.T, expectedBaseHTTPURL, expectedBa
803803
assert.Equal(t, expectedBaseHTTPURL+"10", c.GetString("apm_config.telemetry.dd_url"))
804804
assert.Equal(t, expectedBaseHTTPURL+"04", c.GetString("process_config.process_dd_url"))
805805
assert.Equal(t, expectedBaseURL+"05", c.GetString("logs_config.logs_dd_url"))
806-
assert.Equal(t, expectedBaseURL+"06", c.GetString("database_monitoring.metrics.dd_url"))
807-
assert.Equal(t, expectedBaseURL+"06", c.GetString("database_monitoring.activity.dd_url"))
808-
assert.Equal(t, expectedBaseURL+"07", c.GetString("database_monitoring.samples.dd_url"))
806+
assert.Equal(t, expectedBaseURL+"06", c.GetString("database_monitoring.metrics.logs_dd_url"))
807+
assert.Equal(t, expectedBaseURL+"06", c.GetString("database_monitoring.activity.logs_dd_url"))
808+
assert.Equal(t, expectedBaseURL+"07", c.GetString("database_monitoring.samples.logs_dd_url"))
809809
assert.Equal(t, expectedBaseURL+"08", c.GetString("network_devices.metadata.dd_url"))
810810
assert.Equal(t, expectedBaseHTTPURL+"12", c.GetString("orchestrator_explorer.orchestrator_dd_url"))
811811
assert.Equal(t, expectedBaseURL+"13", c.GetString("runtime_security_config.endpoints.logs_dd_url"))
@@ -817,9 +817,9 @@ func assertFipsProxyExpectedConfig(t *testing.T, expectedBaseHTTPURL, expectedBa
817817
assert.Equal(t, expectedBaseHTTPURL, c.GetString("apm_config.telemetry.dd_url"))
818818
assert.Equal(t, expectedBaseHTTPURL, c.GetString("process_config.process_dd_url"))
819819
assert.Equal(t, expectedBaseURL, c.GetString("logs_config.logs_dd_url"))
820-
assert.Equal(t, expectedBaseURL, c.GetString("database_monitoring.metrics.dd_url"))
821-
assert.Equal(t, expectedBaseURL, c.GetString("database_monitoring.activity.dd_url"))
822-
assert.Equal(t, expectedBaseURL, c.GetString("database_monitoring.samples.dd_url"))
820+
assert.Equal(t, expectedBaseURL, c.GetString("database_monitoring.metrics.logs_dd_url"))
821+
assert.Equal(t, expectedBaseURL, c.GetString("database_monitoring.activity.logs_dd_url"))
822+
assert.Equal(t, expectedBaseURL, c.GetString("database_monitoring.samples.logs_dd_url"))
823823
assert.Equal(t, expectedBaseURL, c.GetString("network_devices.metadata.dd_url"))
824824
assert.Equal(t, expectedBaseHTTPURL, c.GetString("orchestrator_explorer.orchestrator_dd_url"))
825825
assert.Equal(t, expectedBaseURL, c.GetString("runtime_security_config.endpoints.logs_dd_url"))

pkg/gohai/go.mod

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ require (
1010
github.com/moby/sys/mountinfo v0.6.2
1111
github.com/shirou/gopsutil/v3 v3.23.9
1212
github.com/stretchr/testify v1.8.4
13-
golang.org/x/sys v0.12.0
13+
golang.org/x/sys v0.13.0
1414
)
1515

1616
require (

0 commit comments

Comments
 (0)