-
Notifications
You must be signed in to change notification settings - Fork 204
Description
When installing the agent in Fleet Mode with something like:
helm install demo ./deploy/helm/elastic-agent \
--set agent.fleet.enabled=true \
--set agent.fleet.url=https://fleet-svc.default.svc \
--set agent.fleet.token=TTg1NHNaTUJoNkpaNzE4R3IzeGg6WXo2MUxSakJTNmVvZUE3d212V0JGUQ== \
--set agent.fleet.preset=perNode \
If the Fleet Server is configured with a certificate signed by a corporate / custom / intermediate CA the Elastic Agent should get the CA certificate configured on FLEET_CA environment variable (if I'm not mistaken, based on https://www.elastic.co/guide/en/fleet/current/agent-environment-variables.html#env-enroll-agent).
The only current workaround is to use --set agent.fleet.insecure=true to bypass the certificate check during enrollment.
Note that providing the Elasticsearch CA for a normal agent (Fleet Managed) is not needed as it will be fetched from the policy at a later stage.
In my opinion this is important to achieve before considering the helm chart GA (cc: @nimarezainia / @pkoutsovasilis ).