-
Notifications
You must be signed in to change notification settings - Fork 171
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Question]: Agent installation using "Production" mode of security on a Cloud build. #1008
Comments
Pinging @elastic/agent (Team:Agent) |
@manishgupta-qasource Please review. |
Reviewed & assigned to @andresrc CC: @EricDavisX |
Thanks for raising this. We should likely offer a better experience on this. I suggest we move this to the Kibana repo and ping the Fleet team on it as I don't think the Elastic Agent can do anything here. @mostlyjason @jen-huang |
Pinging @elastic/fleet (Team:Fleet) |
@amolnater-qasource what did you select as your agent policy in this example? You should not be able to choose Elastic Cloud agent policy in the dropdown box. Also, what do you mean by "cloud build"? |
Just tested with a cloud deployment I had around and you cannot select the default cloud policy from the add agent Flyout You will have this issue if you add fleet server to another policy and select that policy. |
Hi @mostlyjason
I added Fleet Server integration to a New Policy[User Created] and selected that policy.
Cloud build refer to the builds we deploy from: https://staging.found.no/login?redirectTo=%2Fhome
Yes, @nchaulet we refer to this only. Thanks |
It seems like a near term fix is to update our docs to include use cases where the cluster is running Elastic Cloud and the user adds a self-managed Fleet server. This could instruct the user to download the binaries. I think some other language on the page needs to be updated such as the title which says "Encrypt traffic in a self-managed cluster". It should probably say "Encrypt traffic with a self-managed Fleet Server" and it should discuss both self-managed and cloud-managed clusters. I'll add this to our docs tracking board. Long term, we are looking at ways to simplify this so users don't need to add certs manually https://github.com/elastic/beats/issues/25705 |
<ignore my comments - was just testing the add to project workflow> |
Hi @mostlyjason As per guides it is suggest to run the certs command from
Note:
Please let us know if we are missing anything, as we are still not able to install fleet-server on cloud-staging kibana using production mode of security. cc: @EricDavisX Thanks |
The issue here, @amolnater-qasource will point to the other needed setup items for production usage of security:
|
Description
We have successfully installed an agent using "Production" mode of security on a self managed environment as per ticket https://github.com/elastic/observability-test-plans/issues/218 and guide available at https://www.elastic.co/guide/en/fleet/current/secure-connections.html
elasticsearch\bin
folder.Question?
We have observed that when we add Fleet Server integration to a policy, "Production" mode of security option is also available on Cloud build under Add Agent flyout.
Do we have any other steps for agent installation using "Production" mode on cloud builds as we don't have
elasticsearch\bin
location for cloud builds?Collaboration
Contact Person:
(We need to have a contact person in the product/development team to provide information about how the item to be documented works.)
@amolnater-qasource @mostlyjason
Suggested Target Release
TBD
The text was updated successfully, but these errors were encountered: