Skip to content

Commit

Permalink
Revert "[agentbeat] Fix agentbeat capabilities" (#40510)
Browse files Browse the repository at this point in the history
* Revert "[agentbeat] Fix agentbeat capabilities (#40466)"

This reverts commit 36cef2f.

* Update main.go

(cherry picked from commit f6b8701)
  • Loading branch information
blakerouse authored and mergify[bot] committed Aug 21, 2024
1 parent 3121948 commit 041b1b6
Show file tree
Hide file tree
Showing 4 changed files with 5 additions and 109 deletions.
5 changes: 5 additions & 0 deletions CHANGELOG.next.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,11 @@ https://github.com/elastic/beats/compare/v8.8.1\...main[Check the HEAD diff]
*Affecting all Beats*

- Elevate effective capability set to match the Permitted set for agentbeat {pull}40466[40466]
- Update Go version to 1.22.5. {pull}40082[40082]
- Fix FQDN being lowercased when used as `host.hostname` {issue}39993[39993]
- Beats won't log start up information when running under the Elastic Agent {40390}40390[40390]
- Filebeat now needs `dup3`, `faccessat2`, `prctl` and `setrlimit` syscalls to run the journald input. If this input is not being used, the syscalls are not needed. All Beats have those syscalls allowed now because the default seccomp policy is global to all Beats. {pull}40061[40061]
- Beats will rate limit the logs about errors when indexing events on Elasticsearch, logging a summary every 10s. The logs sent to the event log is unchanged. {issue}40157[40157]

*Auditbeat*

Expand Down
96 changes: 0 additions & 96 deletions x-pack/agentbeat/capabilities_linux.go

This file was deleted.

9 changes: 0 additions & 9 deletions x-pack/agentbeat/capabilities_other.go

This file was deleted.

4 changes: 0 additions & 4 deletions x-pack/agentbeat/main.go
Original file line number Diff line number Diff line change
Expand Up @@ -71,10 +71,6 @@ func prepareCommand(rootCmd *cmd.BeatsRootCmd) *cobra.Command {
if err != nil {
panic(fmt.Errorf("failed to set default config file path: %w", err))
}

// elevate Effective capabilities to match the Permitted set.
// required for unprivileged mode
initCapabilities()
return nil
}
return &rootCmd.Command
Expand Down

0 comments on commit 041b1b6

Please sign in to comment.