-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Fleet] Add support for custom Certificate Authorities, Certificate and Private keys. #73483
Comments
Pinging @elastic/ingest-management (Team:Ingest Management) |
@nchaulet Added you as the owner of this feature. |
@nchaulet We might not have complete design ready that feature in this iteration, lets collaborate with @hbharding to see how we can implements it before having the complete design. |
I ran into this when trying to set up against the APM Integration Test env which uses self-signed certs and runs a fully-generated/simulated environment in Docker containers. To get it to enroll I had to add the
I also had to add an entry to my |
Updating the action_store.yml did not seem to allow the elastic-agent to connect to ElasticSearch. I seem to see errors now at least: I have this for the output:
|
Let me ask you something, what about the elastic endpoint? Is sending correctly? Coz following your instructions I could not make to work as we get the same certificate problem. Looks like the elastic endpoint is trying to send directly to elasticsearch without the certificate. |
That is correct @francescouk , the elastic endpoint doesn't appear to connect to ElasticSearch. |
as mentioned in |
I am also having this or a very similar issue. I install and enroll elastic-agent using the --insecure mode but no data appears in datasets(presumably because there's a certificate error connecting to ES I can't see) is there a way to change the fleet config to not verify the ssl? |
I think I'm having a similar issue, I've set up Elasticsearch, Kibana, and now Elastic Agent using a self signed certificate, While getting Elastic Agent working I was getting the error that the certificate was signed by an unknown authority when I tried to add the agent to ingest manager. I modified the Elastic Agent fleet.yml to change |
don't set the insecure flag or edit the yaml, just put your ca.pem into your client's truststore by copying it to /etc/ssl/certs/ then run |
I did what you said. works, thank you. have Elasticsearch, Kibana, and Agent running encrypted all using same cert on one ubuntu machine, will try networking with windows next |
I have test it now on windows, it works. |
Could you provide the steps you took to get it working on Windows? |
Hi, Here I found a good description for you. If you have any questions please let me know. |
The same fix applied in comment above is proposed in a Discuss thread related to this same issue. |
This issue is significantly out of date and needs to be re-evaluated since the re-architecture of adding the Fleet Server component. It's possible the only remaining work here is #73487 to provide a UI for specifying custom CAs and including those CAs in the enroll command given to Elastic Agent. This feature also has some overlap with the support for self-signed CA fingerprints we added in 8.0, which we may be able to reuse/extend. |
@joshdover following up on this issue, as it pertains to putting a reverse proxy in front of an Elastic Cloud cluster so that elastic-agent deployments would need to authenticate with proxy and elastic-agents would never know the true IP of the Elastic Cloud cluster behind the proxy. Is this something we resolved in 8.0? Are there instructions on our website? |
Design
Ingest Manager
Integration Package
Beats
Endpoint security
Referenced issues
The text was updated successfully, but these errors were encountered: