-
Notifications
You must be signed in to change notification settings - Fork 145
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Fleet]: On making changes to elastic defend Endpoints get unhealthy. #5754
Comments
Pinging @elastic/elastic-agent-control-plane (Team:Elastic-Agent-Control-Plane) |
@amolnater-qasource Kindly review |
Secondary Review for this ticket is Done. |
@harshitgupta-qasource could you please confirm to me this is not happening when added to only one policy? |
Thank you for looking into this issue. We have attempted to reproduce this issue while adding Elastic Defend to a single agent policy on latest 8.16.0 SNAPSHOT kibana cloud environment and found it not reproducible.
Screenshot: Build details: Agents Logs Please let us know if anything else is required from our end. |
No issue can be found on Endpoint side from the attached diagnostics. endpoint config
endpoint policy response
PS. too bad the failed
oh |
in the first zip, Endpoint indeed indicated output failure
the config
log:
|
it's weird as in both zips the Agent
Unfortunately Endpoint is not logging the original form of the config as received via V2, we can make an ad-hoc build with the log if needed, let me know @pierrehilbert |
Hi Team While testing on latest 8.16.0 Latest SNAPSHOT Kibana cloud build we had further observations: Observation
Agents Logs Build details: Please let us know if anything else is required from our end. |
@harshitgupta-qasource - Could you provide the full agent policy YML from Fleet via the "show policy" button? I'd like to try and see if this is an issue with Fleet's policy compilation, or if the output configuration breaks farther along in Fleet Server/Agent. |
Hi @kpollich, Thanks |
Thank you! I think this is the relevant section of the policy YML id: 1d1d61e3-9f45-4e27-9235-418a8fcfb6cb
revision: 5
outputs:
default:
type: elasticsearch
hosts:
- >-
https://4a68fa885ccd4fee90c8da91b3ebdf9e.us-west2.gcp.elastic-cloud.com:443
preset: balanced
fleet:
hosts:
- >-
https://07f4ecface6f4a3c8b4b591b5d9c4adf.fleet.us-west2.gcp.elastic-cloud.com:443 This looks correct to me on first glance, but I wonder if the YML multiline character prefixing the output is causing issues here when endpoint parses it out? AFAIK this is the existing behavior (at least my 8.15.0 cloud cluster produces the outputs block in the exact same way), but I wonder if there is a regression somewhere related to parsing out these output blocks when preceded by |
I believe this is fixed now (via https://github.com/elastic/endpoint-dev/pull/15144) The fix is live in BC2. Can you please retest with BC2 and see if the issue is resolved? |
Hi Team, We have re-validated this issue on the latest 8.16.0 BC2 Kibana cloud environment and found it fixed now. Observations:
Build details: Screen-shot: Agents Logs Hence, we are marking this issue as QA: Validated. Thanks |
Kibana Build details:
Artifact: https://snapshots.elastic.co/8.16.0-106cdbc2/downloads/beats/elastic-agent/elastic-agent-8.16.0-SNAPSHOT-windows-x86_64.zip
Host: Windows 10 - Test Signing ON
Preconditions:
Steps to reproduce:
Expected Result:
On adding elastic defend as shared integration, Endpoints should remain healthy.
Note:
Screenshots:
Agents Logs
elastic-agent-diagnostics-2024-10-10T09-41-16Z-00.zip
The text was updated successfully, but these errors were encountered: