Skip to content

Commit 79aff65

Browse files
committed
various internal docs improvements
1 parent 19d7505 commit 79aff65

26 files changed

+558
-519
lines changed

docs/docset.yml

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -44,10 +44,9 @@ toc:
4444
- folder: guide
4545
children:
4646
- file: index.md
47+
- file: working-in-docs-content.md
4748
- file: automated.md
4849
- file: tooling.md
49-
- file: bug-bash.md
50-
- file: file-structure.md
5150
- file: mapping.md
5251
- folder: configure
5352
children:
@@ -68,8 +67,8 @@ toc:
6867
- folder: syntax
6968
children:
7069
- file: index.md
71-
- file: md-extensions.md
7270
- file: admonitions.md
71+
- file: applies.md
7372
- file: automated_settings.md
7473
- file: code.md
7574
- file: comments.md
@@ -82,7 +81,6 @@ toc:
8281
- file: line_breaks.md
8382
- file: links.md
8483
- file: passthrough.md
85-
- file: applies.md
8684
- file: sidebars.md
8785
- file: substitutions.md
8886
- file: sundries.md

docs/migration/engineering.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Reference docs guidelines
1+
# New reference guidelines
22

33
## Engineering ownership of reference documentation
44

docs/migration/guide/automated.md

Lines changed: 255 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Migrate Automated Content to V3
1+
# Migrate automated docs
22

33
If you have automated documentation in Asciidoc (or any other format) that you need to migrate to Elastic docs V3, this guide walks you through the essentials. Elastic docs V3 (powered by `docs-builder`) allows engineering teams to keep code and reference docs closely integrated for easier updates and greater accuracy.
44

@@ -43,4 +43,257 @@ For more information, see [Navigation](../../configure/content-set/navigation.md
4343

4444
## Next steps
4545

46-
That’s all you need to get started migrating automated docs to V3. As you add more pages or custom features, refer to the linked resources for details on configuring your docset, refining navigation, and leveraging the full power of V3 directives.
46+
That’s all you need to get started migrating automated docs to V3. As you add more pages or custom features, refer to the linked resources for details on configuring your docset, refining navigation, and leveraging the full power of V3 directives.
47+
48+
# Troubleshoot {{elastic-defend}} [ts-management]
49+
50+
51+
This topic covers common troubleshooting issues when using {{elastic-defend}}'s [endpoint management tools](../../../solutions/security/manage-elastic-defend.md).
52+
53+
54+
## Endpoints [ts-endpoints]
55+
56+
:::::{dropdown} Unhealthy {{agent}} status
57+
:name: ts-unhealthy-agent
58+
59+
In some cases, an `Unhealthy` {{agent}} status may be caused by a failure in the {{elastic-defend}} integration policy. In this situation, the integration and any failing features are flagged on the agent details page in {{fleet}}. Expand each section and subsection to display individual responses from the agent.
60+
61+
::::{tip}
62+
Integration policy response information is also available from the **Endpoints** page in the {{security-app}} (**Manage****Endpoints**, then click the link in the **Policy status** column).
63+
::::
64+
65+
66+
:::{image} ../../../images/security-unhealthy-agent-fleet.png
67+
:alt: Agent details page in {{fleet}} with Unhealthy status and integration failures
68+
:class: screenshot
69+
:::
70+
71+
Common causes of failure in the {{elastic-defend}} integration policy include missing prerequisites or unexpected system configuration. Consult the following topics to resolve a specific error:
72+
73+
* [Approve the system extension for {{elastic-endpoint}}](../../../solutions/security/configure-elastic-defend/enable-access-for-macos-monterey.md#system-extension-endpoint) (macOS)
74+
* [Enable Full Disk Access for {{elastic-endpoint}}](../../../solutions/security/configure-elastic-defend/enable-access-for-macos-monterey.md#enable-fda-endpoint) (macOS)
75+
* [Resolve a potential system deadlock](../../../troubleshoot/security/elastic-defend.md#linux-deadlock) (Linux)
76+
77+
::::{tip}
78+
If the {{elastic-defend}} integration policy is not the cause of the `Unhealthy` agent status, refer to [{{fleet}} troubleshooting](../../../troubleshoot/ingest/fleet/common-problems.md) for help with the {{agent}}.
79+
::::
80+
81+
82+
:::::
83+
84+
85+
:::::{dropdown} Disabled to avoid potential system deadlock (Linux)
86+
:name: linux-deadlock
87+
88+
If you have an `Unhealthy` {{agent}} status with the message `Disabled due to potential system deadlock`, that means malware protection was disabled on the {{elastic-defend}} integration policy due to errors while monitoring a Linux host.
89+
90+
You can resolve the issue by configuring the policy’s [advanced settings](../../../solutions/security/configure-elastic-defend/configure-linux-file-system-monitoring.md) related to **fanotify**, a Linux feature that monitors file system events. By default, {{elastic-defend}} works with fanotify to monitor specific file system types that Elastic has tested for compatibility, and ignores other unknown file system types.
91+
92+
If your network includes nonstandard, proprietary, or otherwise unrecognized Linux file systems that cause errors while being monitored, you can configure {{elastic-defend}} to ignore those file systems. This allows {{elastic-defend}} to resume monitoring and protecting the hosts on the integration policy.
93+
94+
::::{warning}
95+
Ignoring file systems can create gaps in your security coverage. Use additional security layers for any file systems ignored by {{elastic-defend}}.
96+
::::
97+
98+
99+
To resolve the potential system deadlock error:
100+
101+
1. Go to **Manage****Policies**, then click a policy’s name.
102+
2. Scroll to the bottom of the policy and click **Show advanced settings**.
103+
3. In the setting `linux.advanced.fanotify.ignored_filesystems`, enter a comma-separated list of file system names to ignore, as they appear in `/proc/filesystems` (for example: `ext4,tmpfs`). Refer to [Find file system names](../../../solutions/security/configure-elastic-defend/configure-linux-file-system-monitoring.md#find-file-system-names) for more on determining the file system names.
104+
4. Click **Save**.
105+
106+
Once you save the policy, malware protection is re-enabled.
107+
108+
109+
:::::
110+
111+
112+
:::::{dropdown} Required transform failed
113+
:name: ts-transform-failed
114+
115+
If you encounter a `“Required transform failed”` notice on the Endpoints page, you can usually resolve the issue by restarting the transform. Refer to [Transforming data](../../../explore-analyze/transforms.md) for more information about transforms.
116+
117+
:::{image} ../../../images/security-endpoints-transform-failed.png
118+
:alt: Endpoints page with Required transform failed notice
119+
:class: screenshot
120+
:::
121+
122+
To restart a transform that’s not running:
123+
124+
1. Go to **Kibana****Stack Management****Data****Transforms**.
125+
2. Enter `endpoint.metadata` in the search box to find the transforms for {{elastic-defend}}.
126+
3. Click the **Actions** menu (**…​**) and do one of the following for each transform, depending on the value in the **Status** column:
127+
128+
* `stopped`: Select **Start** to restart the transform.
129+
* `failed`: Select **Stop** to first stop the transform, and then select **Start** to restart it.
130+
131+
:::{image} ../../../images/security-transforms-start.png
132+
:alt: Transforms page with Start option selected
133+
:class: screenshot
134+
:::
135+
136+
4. On the confirmation message that displays, click **Start** to restart the transform.
137+
5. The transform’s status changes to `started`. If it doesn’t change, refresh the page.
138+
139+
:::::
140+
141+
142+
:::::{dropdown} {agent} and Endpoint connection issues
143+
:name: ts-agent-connection
144+
145+
After {{agent}} installs Endpoint, Endpoint connects to {{agent}} over a local relay connection to report its health status and receive policy updates and response action requests. If that connection cannot be established, the {{elastic-defend}} integration will cause {{agent}} to be in an `Unhealthy` status, and Endpoint won’t operate properly.
146+
147+
148+
### Identify if the issue is happening [_identify_if_the_issue_is_happening]
149+
150+
You can identify if this issue is happening in the following ways:
151+
152+
* Run {{agent}}'s status command:
153+
154+
* `sudo /opt/Elastic/Agent/elastic-agent status` (Linux)
155+
* `sudo /Library/Elastic/Agent/elastic-agent status` (macOS)
156+
* `c:\Program Files\Elastic\Agent\elastic-agent.exe status` (Windows)
157+
158+
If the status result for `endpoint-security` says that Endpoint has missed check-ins or `localhost:6788` cannot be bound to, it might indicate this problem is occurring.
159+
160+
* If the problem starts happening right after installing Endpoint, check the value of `fleet.agent.id` in the following file:
161+
162+
* `/opt/Elastic/Endpoint/elastic-endpoint.yaml` (Linux)
163+
* `/Library/Elastic/Endpoint/elastic-endpoint.yaml` (macOS)
164+
* `c:\Program Files\Elastic\Endpoint\elastic-endpoint.yaml` (Windows)
165+
166+
* If the value of `fleet.agent.id` is `00000000-0000-0000-0000-000000000000`, this indicates this problem is occurring.
167+
168+
::::{note}
169+
If this problem starts happening after Endpoint has already been installed and working properly, then this value will have changed even though the problem is happening.
170+
::::
171+
172+
### Examine Endpoint logs [_examine_endpoint_logs]
173+
174+
If you’ve confirmed that the issue is happening, you can look at Endpoint log messages to identify the cause:
175+
176+
* `Failed to find connection to validate. Is Agent listening on 127.0.0.1:6788?` or `Failed to validate connection. Is Agent running as root/admin?` means that Endpoint is not able to create an initial connection to {{agent}} over port `6788`.
177+
* `Unable to make GRPC connection in deadline(60s). Fetching connection info again` means that Endpoint’s original connection to {{agent}} over port `6788` worked, but the connection over port `6789` is failing.
178+
179+
180+
### Resolve the issue [_resolve_the_issue]
181+
182+
To debug and resolve the issue, follow these steps:
183+
184+
1. Since 8.7.0, Endpoint diagnostics contain a file named `analysis.txt` that contains information about what may cause this issue. As of 8.11.2, {{agent}} diagnostics automatically include Endpoint diagnostics. For previous versions, you can gather Endpoint diagnostics by running:
185+
186+
* `sudo /opt/Elastic/Endpoint/elastic-endpoint diagnostics` (Linux)
187+
* `sudo /Library/Elastic/Endpoint/elastic-endpoint diagnostics` (macOS)
188+
* `c:\Program Files\Elastic\Endpoint\elastic-endpoint.exe diagnostics` (Windows)
189+
190+
2. Make sure nothing else on your device is listening on ports `6788` or `6789` by running:
191+
192+
* `sudo netstat -anp --tcp` (Linux)
193+
* `sudo netstat -an -f inet` (macOS)
194+
* `netstat -an` (Windows)
195+
196+
3. Make sure `localhost` can be resolved to `127.0.0.1` by running:
197+
198+
* `ping -4 -c 1 localhost` (Linux)
199+
* `ping -c 1 localhost` (macOS)
200+
* `ping -4 localhost` (Windows)
201+
202+
203+
:::::
204+
205+
206+
::::{dropdown} {elastic-defend} deployment issues
207+
:name: defend-deployment
208+
209+
After deploying {{elastic-defend}}, you might encounter warnings or errors in the endpoint’s **Policy status** in {{fleet}} if your mobile device management (MDM) is misconfigured or certain permissions for {{elastic-endpoint}} aren’t granted. The following sections explain issues that can cause warnings or failures in the endpoint’s policy status.
210+
211+
212+
### Connect Kernel has failed [_connect_kernel_has_failed]
213+
214+
This means that the system extension or kernel extension was not approved. Consult the following topics for approving the system extension with or without MDM:
215+
216+
* [Approve the system extension with MDM](../../../solutions/security/configure-elastic-defend/deploy-on-macos-with-mdm.md#system-extension-jamf)
217+
* [Approve the system extension without MDM](../../../solutions/security/configure-elastic-defend/enable-access-for-macos-monterey.md#system-extension-endpoint)
218+
219+
You can validate the system extension is loaded by running:
220+
221+
```shell
222+
sudo systemextensionsctl list | grep co.elastic.systemextension
223+
```
224+
225+
In the command output, the system extension should be marked as "active enabled".
226+
227+
228+
### Connect Kernel has failed and the system extension is loaded [_connect_kernel_has_failed_and_the_system_extension_is_loaded]
229+
230+
If the system extension is loaded and kernel connection still fails, this means that Full Disk Access was not granted. {{elastic-endpoint}} requires Full Disk Access to subscribe to system events through the {{elastic-defend}} framework, which is one of the primary sources of eventing information used by {{elastic-endpoint}}. Consult the following topics for granting Full Disk Access with or without MDM:
231+
232+
* [Enable Full Disk Access with MDM](../../../solutions/security/configure-elastic-defend/deploy-on-macos-with-mdm.md#fda-jamf)
233+
* [Enable Full Disk Access without MDM](../../../solutions/security/configure-elastic-defend/enable-access-for-macos-ventura-higher.md#enable-fda-endpoint-ven)
234+
235+
You can validate that Full Disk Access is approved by running
236+
237+
```shell
238+
sudo /Library/Elastic/Endpoint/elastic-endpoint test install
239+
```
240+
241+
If the command output doesn’t contain a message about enabling Full Disk Access, the approval was successful.
242+
243+
244+
### Detect Network Events has failed [_detect_network_events_has_failed]
245+
246+
This means that the network extension content filtering was not approved. Consult the following topics for approving network content filtering with or without MDM:
247+
248+
* [Approve network content filtering with MDM](../../../solutions/security/configure-elastic-defend/deploy-on-macos-with-mdm.md#content-filtering-jamf)
249+
* [Approve network content filtering without MDM](../../../solutions/security/configure-elastic-defend/enable-access-for-macos-ventura-higher.md#allow-filter-content-ven)
250+
251+
You can validate that network content filtering is approved by running
252+
253+
```shell
254+
sudo /Library/Elastic/Endpoint/elastic-endpoint test install
255+
```
256+
257+
If the command output doesn’t contain a message about approving network content filtering, the approval was successful.
258+
259+
260+
### Full Disk Access has a warning [_full_disk_access_has_a_warning]
261+
262+
This means that Full Disk Access was not granted for one or all {{elastic-endpoint}} components. Consult the following topics for granting Full Disk Access with or without MDM:
263+
264+
* [Enable Full Disk Access with MDM](../../../solutions/security/configure-elastic-defend/deploy-on-macos-with-mdm.md#fda-jamf)
265+
* [Enable Full Disk Access without MDM](../../../solutions/security/configure-elastic-defend/enable-access-for-macos-ventura-higher.md#enable-fda-endpoint-ven)
266+
267+
You can validate that Full Disk Access is approved by running
268+
269+
```shell
270+
sudo /Library/Elastic/Endpoint/elastic-endpoint test install
271+
```
272+
273+
If the command output doesn’t contain a message about enabling Full Disk Access, the approval was successful.
274+
275+
::::
276+
277+
278+
::::{dropdown} Disable {{elastic-defend}}'s self-healing feature on Windows
279+
:name: disable-self-healing
280+
281+
282+
### Volume Snapshot Service issues [self-healing-vss-issues]
283+
284+
{{elastic-defend}}'s self-healing feature rolls back recent filesystem changes when a prevention alert is triggered. This feature uses the Windows Volume Snapshot Service. Although it’s uncommon for this to cause issues, you can turn off this {{elastic-defend}} feature if needed.
285+
286+
If issues occur and the self-healing feature is enabled, you can turn it off by setting `windows.advanced.alerts.rollback.self_healing.enabled` to `false` in the integration policy advanced settings. Refer to [Configure self-healing rollback for Windows endpoints](../../../solutions/security/configure-elastic-defend/configure-self-healing-rollback-for-windows-endpoints.md) for more information.
287+
288+
{{elastic-defend}} may also use the Volume Snapshot Service to ensure the feature works properly even when it’s turned off. To opt out of this, set `windows.advanced.diagnostic.rollback_telemetry_enabled` to `false` in the same settings.
289+
290+
291+
### Known compatibility issues [self-healing-compatibility-issues]
292+
293+
There are some known compatibility issues between {{elastic-defend}}'s self-healing feature and filesystem replication features, including [DFS Replication](https://learn.microsoft.com/en-us/windows-server/storage/dfs-replication/dfsr-overview) and Veeam Replication. This may manifest as `DFSR Event ID 1102`:
294+
295+
`The DFS Replication service has temporarily stopped replication because another application is performing a backup or restore operation. Replication will resume after the backup or restore operation has finished.`
296+
297+
There are no known workarounds for this issue other than to turn off the self-healing feature.
298+
299+
::::

docs/migration/guide/bug-bash.md

Lines changed: 0 additions & 58 deletions
This file was deleted.

0 commit comments

Comments
 (0)