Skip to content

[Helm] Allow providing SSL settings to the Elastic Agent (standalone mode) #6344

@eedugon

Description

@eedugon

Describe the enhancement:
This issue has the same nature as #6285, which is created for Fleet managed agents. I've created a different issue because the way to resolve this would be different than in the case of a managed agent.

When following the doc https://www.elastic.co/guide/en/fleet/current/example-kubernetes-standalone-agent-helm.html to install an standalone agent with something like:

helm upgrade --install std-demo1 ./deploy/helm/elastic-agent \
--set kubernetes.enabled=true \
--set outputs.default.type=ESPlainAuthAPI \
--set outputs.default.url=https://monitoring-es-http:9200 \
--set outputs.default.api_key="WmNrZTBKTUJ5ei1BZUJaR1IyazY6MWxqb1djeFdRTlNfcElKdDVjTngzZw=="

The generated agents are going to fail to contact Elasticsearch if the cluster certificate is signed with private / corporate CAs, giving errors like:

{"log.level":"error","@timestamp":"2024-12-16T15:40:54.134Z","message":"Error dialing x509: certificate signed by unknown authority","component":{"binary":"metricbeat","dataset":"elastic_agent.metricbeat","id":"beat/metrics-monitoring","type":"beat/metrics"},"log":{"source":"beat/metrics-monitoring"},"network.transport":"tcp","log.logger":"esclientleg","log.origin":

The solution to this is to provide the CA certificate via ssl.certificate_authorities setting, per document https://www.elastic.co/guide/en/fleet/current/elastic-agent-ssl-configuration.html.

I would suggest to provide a way to provide ANY SSL setting supported by the Agent, for example ssl.verification_mode: none would also allow to solve this situation.

cc: @pkoutsovasilis / @nimarezainia

Metadata

Metadata

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions