-
Notifications
You must be signed in to change notification settings - Fork 204
Description
Describe the enhancement:
This issue has the same nature as #6285, which is created for Fleet managed agents. I've created a different issue because the way to resolve this would be different than in the case of a managed agent.
When following the doc https://www.elastic.co/guide/en/fleet/current/example-kubernetes-standalone-agent-helm.html to install an standalone agent with something like:
helm upgrade --install std-demo1 ./deploy/helm/elastic-agent \
--set kubernetes.enabled=true \
--set outputs.default.type=ESPlainAuthAPI \
--set outputs.default.url=https://monitoring-es-http:9200 \
--set outputs.default.api_key="WmNrZTBKTUJ5ei1BZUJaR1IyazY6MWxqb1djeFdRTlNfcElKdDVjTngzZw=="
The generated agents are going to fail to contact Elasticsearch if the cluster certificate is signed with private / corporate CAs, giving errors like:
{"log.level":"error","@timestamp":"2024-12-16T15:40:54.134Z","message":"Error dialing x509: certificate signed by unknown authority","component":{"binary":"metricbeat","dataset":"elastic_agent.metricbeat","id":"beat/metrics-monitoring","type":"beat/metrics"},"log":{"source":"beat/metrics-monitoring"},"network.transport":"tcp","log.logger":"esclientleg","log.origin":
The solution to this is to provide the CA certificate via ssl.certificate_authorities setting, per document https://www.elastic.co/guide/en/fleet/current/elastic-agent-ssl-configuration.html.
I would suggest to provide a way to provide ANY SSL setting supported by the Agent, for example ssl.verification_mode: none would also allow to solve this situation.
cc: @pkoutsovasilis / @nimarezainia