-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Elastic Agent Docker: agent always picks up the newest policy #23928
Comments
Pinging @elastic/fleet (Team:Fleet) |
@mtojek Are you using the token associated with the Default policy? |
No, I'm not passing any enrollment key and I expect from the Dockerized app to pick up the default one. |
I've talked with @mtojek on slack, and the logic defined in our shell script lead to inconsistent behavior. The pseudo logic should be something like this.
@mtojek WDYT ^? |
Yes, this would be the ideal flow. |
There is for sure a bug in the docker script but I am wondering if it’s the docker image we publicly distribute if yes, I think we should really avoid the user to provide the Kibana username and password and we should probably only allow to provide the enrollment token. |
One more point about tooling. We use auto-enrollment feature in elastic-package to test integrations, so it would be backward-incompatible to enforce providing the enrollment token. |
++ to pseudo-logic suggested by @ph in #23928 (comment). It will lead to deterministic behavior, which is a good thing. |
@ph @nchaulet could you please provide ETA on this issue? I'd like to know whether I should introduce a workaround for this bug in elastic/elastic-package#246 . I'm fine with keeping the discussion whether the option is good or not, but it would be convenient to detach it from fixing for the reported issue. |
Pinging @elastic/agent (Team:Agent) |
I think we can close this will the recent changes for the Elastic Agent and Fleet server? |
Hi,
I'm working on the Kubernetes integration and just spotted a weird issue. Steps to reproduce:
If I'm working on a policy which is not ready yet and suddenly a new agent boots up, it should pick up the Default policy.
The text was updated successfully, but these errors were encountered: