Skip to content

Commit

Permalink
Document that remote ES service token can be stored as a secret (#762)
Browse files Browse the repository at this point in the history
* Document that remote ES service token can be stored as a secret

* fixup

(cherry picked from commit 1fffeff)
  • Loading branch information
kilfoyle authored and mergify[bot] committed Dec 14, 2023
1 parent e765d1c commit 640b2ad
Showing 1 changed file with 2 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -264,6 +264,8 @@ To configure a remote {es} cluster for your {agent} monitoring data:
.. Copy the value for the generated token.

.. Back in your main cluster, paste the value you copied into the output **Service Token** field.
+
NOTE: To prevent unauthorized access the {es} Service Token is stored as a secret value. While secret storage is recommended, you can choose to override this setting and store the password as plain text in the agent policy definition. Secret storage requires {fleet-server} version 8.12 or higher. This setting can also be stored as a secret value or as plain text for preconfigured outputs. See {kibana-ref}/fleet-settings-kb.html#_preconfiguration_settings_for_advanced_use_cases[Preconfiguration settings] in the {kib} Guide to learn more.

. Choose whether or not the remote output should be the default for agent monitoring. When set, {agent}s use this output to send data if no other output is set in the <<agent-policy,agent policy>>.

Expand Down

0 comments on commit 640b2ad

Please sign in to comment.