-
Notifications
You must be signed in to change notification settings - Fork 154
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[helm] add support for creating services for agent presets #6002
[helm] add support for creating services for agent presets #6002
Conversation
|
a83b27a
to
ccb0581
Compare
Pinging @elastic/elastic-agent-control-plane (Team:Elastic-Agent-Control-Plane) |
ccb0581
to
cf31879
Compare
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me.
Something that jumps out at me in this PR is that we're making essentially the same change in the ECK and K8s templates. Could we unify that?
This is true there is enough overlapping between the two, but there are enough small differences that make me wonder if merging them is gonna add value; namely deployment, statefulset, daemonset are ECK CRDs, the agent config (secret) is referenced in the CRD and all the mounts of that are handled by the ECK operator, thus, the pod template has a different flow. But sure in the future we could investigate merging them, does this make sense? 🙂 |
(cherry picked from commit ed4f923)
…ent presets (#6463) * feat: implement support for creating services for agent presets (#6002) (cherry picked from commit ed4f923) * 2025 notice * fix: render examples --------- Co-authored-by: Panos Koutsovasilis <panos.koutsovasilis@elastic.co> Co-authored-by: Michal Pristas <michal.pristas@gmail.com>
What does this PR do?
This PR introduces support for automatically creating Kubernetes services for specific Elastic Agent presets through the Helm chart. It adds a structured and scalable mechanism for managing and exposing agent instances within the Kubernetes cluster. This enhancement allows users to define service configurations (e.g., type, ports) for push-based integrations like NetFlow.
Key changes:
values.yaml
.NodePort
service linked to a NetFlow agent preset.values.schema.json
to support new service and port configuration options.Why is it important?
This enhancement simplifies the deployment and operational management of push-based integrations by allowing users to define and scale agent services directly through Helm configurations. By enabling Kubernetes service generation, this change:
ClusterIP
,NodePort
,LoadBalancer
) to accommodate diverse user needs.Checklist
Disruptive User Impact
This PR does not introduce disruptive changes, as service creation is optional and requires explicit configuration by users in
values.yaml
. By default, no services will be created unless configured.How to test this PR locally
Follow the example introduced in this PR
Related issues