-
Notifications
You must be signed in to change notification settings - Fork 83
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[self-managed Fleet Server install] insecure flag not taking effect #552
Comments
From what I can tell the insecure flag is for ES over HTTP. I have attempted to use the CA as well with the same error.
I have attempted this on Windows 10 as well and it returns back this:
|
Same here. |
Same here, any potential fix for this? |
@GeetikaGopi are you using 7.13.x? Did you try with 7.14.0? |
I wanted to apologize for the delay in response and for the trouble being had. We're aware of a few bugs over the last few versions that are being fixed as fast as we can. It can be time consuming to review the nuances of each environment and usage. I can open the dialog by asking if you *have to use the --insecure flag at present for any testing you're doing? 7.13.x is not a GA version, and we're excited that 7.14.x (GA supported and its first patch release shipped just now) seems to work much better. The documentation for when to use a given flag when installing a Fleet Server vs when to use it when installing an Agent (to connect to an existing Fleet Server) are challenging words to get laid out for everyone to understand. |
No, we tested it with and without that flag, then we tried passing the CA with the flag --fleet-server-es-ca as well, but not luck so far. |
Hello, do we have an update on this one? Regards |
there is a bug. |
thank you for letting me know. I will inform the customer that this needs a fix |
We are now tracking this in 2 places, a little harder to coordinate - but Michal was follow up in the linked SDH, I have assigned him here. We can discuss (a potential fix) after we've researched / reviewed more. Just for sake of possible quicker response, Michal had asked in the SDH: They need to generate cert with CN set to hostname/domain and IP addresses in their alternative names or connect to ES using hostname and this should not require SAN in cert |
@jsoriano Replicated both with 7.14.0 and 7.14.1 with elasticsearch self generated certs
|
do we know how CN and SANs are set when generating self signed cert? |
I think the self signed cert is generated with 127.0.0.1 as CN. |
This is a duplicate of elastic/beats#27969 as it's ultimately an issue with Elastic Agent. Closing as I have a PR up for the other issue. |
we can leave this closed as a dupe - note it did not make the cut for 7.15 in the end, we are re-doing the fix and will merge it back (to 7.15.x) as possible. |
When using the
--insecure
flag the elastic agent (7.13.2) ignores it.I am trying to install this agent as a fleet server.
Tested on CentOS 7 and Windows 10.
Here is the command directly from Kibana (7.13.2) but I also added the insecure flag.
sudo ./elastic-agent install -f --fleet-server-es=https://IP:9200 --fleet-server-service-token=TOKENHERE --insecure
Here is the log that came back:
sudo ./elastic-agent install -f --fleet-server-es=https://IP:9200 --fleet-server-service-token=TOKENHERE --insecure
I have tested this on Agent version 7.13.0, 7.13.2 and 7.13.3.
The text was updated successfully, but these errors were encountered: