-
Notifications
You must be signed in to change notification settings - Fork 140
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add policies #1282
base: main
Are you sure you want to change the base?
Add policies #1282
Conversation
Is the intent for this to simply be a plural of the existing |
@mikeradka We considered this but |
|
Thanks @zschmerber and @brieger-atlassian that is pretty straightforward. |
I think this change could be confusing for log publishers. If I were creating one of these objects new, even if I had one policy, I would wonder why there seem to be two fields to represent it. We have the ability to deprecate fields without removing them from the schema to aid in backwards compatibility. See, for example, Lines 14 to 20 in 178bc27
Should we aim to do that here, to more explicitly indicate that |
@alanisaac this is a good point. Deprecation is certainly an option, though I think we have been trying to avoid deprecation if we can. I am not sure the correct answer here, but I do want to highlight another option that was brought up in the past and I don't think a decision was reached - a while back, a proposal for an Deprecation is certainly the path of least resistance, but I didn't want to overlook the array profile discussion that was in flight. I suppose my question to this approach would be: is this one of those instances where we set ourselves up for more deprecations in the future when arrays are needed over singletons? |
I agree with @alanisaac here. Leaving both Schema modelling aside, a separate question. How do existing Activity IDs correlate to the target policy? For example, for Attach/Detach Policy activity, which policy in the policy array is the target of this attachment/detachment? Or is it the case that GCP populates multiple policy objects only when multiple policies were affected and a singleton otherwise? |
@mikeradka regarding the profile for arrays topic, adding a few thoughts. Interested to hear more perspectives on it. @pagbabian-splunk @zschmerber @alanisaac @Aniak5 I am guessing the array profile idea is similar in spirit to the Additionally, thinking about downstream consumption, it will be very tricky for consumers if producers apply an array profile for one event and not for the other in the same stream of events. Overall, I think making array decisions explicitly wherever required makes sense, instead of an automated profile addition. We can deprecate singletons along the way as necessary. |
We have many places where we use this methodology of adding an array to a singleton field in the past. @floydtree should we consider a framework adjustment to fix this PR and all the others that have worked this way ? |
Not sure what you mean here, mind elaborating based on the series of other conversations above? Because there's a ton of context in those that I don't want to lose. |
We must have posted at about the same time or i missed the above. I agree with the statement: |
Currently the IAM account change class only allows for a single policy. We needed multiple policies to exist for GCP Account Change log, so we're adding a policies attribute.