-
Notifications
You must be signed in to change notification settings - Fork 148
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Helm] Allow providing SSL settings to the Elastic Agent (standalone mode) #6344
Comments
Pinging @elastic/elastic-agent-control-plane (Team:Elastic-Agent-Control-Plane) |
@eedugon you tagged the wrong Panos 😄 could you please try to run the following and tell me if it gets you the desired outcome helm upgrade --install std-demo1 ./deploy/helm/elastic-agent \
--set kubernetes.enabled=true \
--set outputs.default.type=ESPlainAuthAPI \
--set outputs.default.url=https://monitoring-es-http:9200 \
--set outputs.default.ssl.certificate=<contents of the certificate> \
--set outputs.default.ssl.certificate_authorities=<contents of the certificate> \
--set outputs.default.<any_output_specific_key>=<...> \
--set outputs.default.api_key="WmNrZTBKTUJ5ei1BZUJaR1IyazY6MWxqb1djeFdRTlNfcElKdDVjTngzZw==" |
very good point @pkoutsovasilis , I didn't realize the settings could also be configured at the output level, so it should definitely work without any effort more than the documentation. I'll try that out and let you know the result. I will try out the btw, the certiticate_authorities setting can be provided with any of:
^^ This case is easy if we use a I'll get back to you with my test results. |
sure thing you can create a k8s Secret utilise the |
@pkoutsovasilis , as mentioned in private, the CA certificate can be added to the installation in the following way:
Note that if the previous file defines directly
I haven't checked by referencing a file and using the extraVolumes + extraVolumeMounts settings, but I think with the previous would be enough. If there's a way to add the CA cert directly with a I will prepare changes in our documented example to cover this use case. As a final comment (before determining if we close this issue or not), I'd like to mention that we are solving this by adding the CA directly at outputs.default configuration level, which is a valid approach. Offering a way to configure the |
Describe the enhancement:
This issue has the same nature as #6285, which is created for Fleet managed agents. I've created a different issue because the way to resolve this would be different than in the case of a managed agent.
When following the doc https://www.elastic.co/guide/en/fleet/current/example-kubernetes-standalone-agent-helm.html to install an standalone agent with something like:
The generated agents are going to fail to contact Elasticsearch if the cluster certificate is signed with private / corporate CAs, giving errors like:
The solution to this is to provide the CA certificate via
ssl.certificate_authorities
setting, per document https://www.elastic.co/guide/en/fleet/current/elastic-agent-ssl-configuration.html.I would suggest to provide a way to provide
ANY
SSL setting supported by the Agent, for examplessl.verification_mode: none
would also allow to solve this situation.cc: @pkoutsovasilis / @nimarezainia
The text was updated successfully, but these errors were encountered: