Skip to content

Commit 0457764

Browse files
authored
Merge branch 'main' into log-data-sources
2 parents e4b6692 + c03a6af commit 0457764

File tree

17 files changed

+442
-146
lines changed

17 files changed

+442
-146
lines changed

deploy-manage/deploy/elastic-cloud/differences-from-other-elasticsearch-offerings.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ This table compares Observability capabilities between {{ech}} deployments and S
110110
| **APM integration** ||| Use **Managed Intake Service** (supports Elastic APM and OTLP protocols) |
111111
| [**APM Agent Central Configuration**](/solutions/observability/apm/apm-agent-central-configuration.md) ||| Not available in Serverless |
112112
| [**APM Tail-based sampling**](/solutions/observability/apm/transaction-sampling.md#apm-tail-based-sampling) ||| - Not available in Serverless <br>- Consider **OpenTelemetry** tail sampling processor as an alternative |
113-
| [**Android agent/SDK instrumentation**](opentelemetry://reference/edot-sdks/android/index.md) || | Not available in Serverless |
113+
| [**Android agent/SDK instrumentation**](opentelemetry://reference/edot-sdks/android/index.md) || | |
114114
| [**AWS Firehose integration**](/solutions/observability/cloud/monitor-amazon-web-services-aws-with-amazon-data-firehose.md) ||| |
115115
| **Custom roles for Kibana Spaces** || **Planned** | Anticipated in a future release |
116116
| [**Data stream lifecycle**](/manage-data/lifecycle/data-stream.md) ||| Primary lifecycle management method in Serverless |
@@ -119,7 +119,7 @@ This table compares Observability capabilities between {{ech}} deployments and S
119119
| **[Fleet Agent policies](/reference/fleet/agent-policy.md)** ||| |
120120
| **[Fleet server](/reference/fleet/fleet-server.md)** | - Self-hosted <br>- Hosted || Fully managed by Elastic |
121121
| [**Index lifecycle management**](/manage-data/lifecycle/index-lifecycle-management.md) ||| Use [**Data stream lifecycle**](/manage-data/lifecycle/data-stream.md) instead |
122-
| **[iOS agent/SDK instrumentation](opentelemetry://reference/edot-sdks/ios/index.md)** || | Not available in Serverless |
122+
| **[iOS agent/SDK instrumentation](opentelemetry://reference/edot-sdks/ios/index.md)** || | |
123123
| **[Kibana Alerts](/deploy-manage/monitor/monitoring-data/configure-stack-monitoring-alerts.md)** ||| |
124124
| **[LogsDB index mode](/manage-data/data-store/data-streams/logs-data-stream.md)** ||| - Reduces storage footprint <br> - Enabled by default <br>- Cannot be disabled |
125125
| **[Logs management](/solutions/observability/logs.md)** ||| |

docset.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -278,6 +278,7 @@ subs:
278278
agent-pull: "https://github.com/elastic/elastic-agent/pull/"
279279
fleet-server-issue: "https://github.com/elastic/fleet-server/issues/"
280280
fleet-server-pull: "https://github.com/elastic/fleet-server/pull/"
281+
es-pull: "https://github.com/elastic/elasticsearch/pull/"
281282
kib-pull: "https://github.com/elastic/kibana/pull/"
282283
eck_helm_minimum_version: "3.2.0"
283284
eck_resources_list: "Elasticsearch, Kibana, APM Server, Beats, Elastic Agent, Elastic Maps Server, and Logstash"

reference/security/defend-advanced-settings.md

Lines changed: 132 additions & 122 deletions
Large diffs are not rendered by default.
Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,11 @@
1+
---
2+
navigation_title: Breaking changes
3+
products:
4+
- id: cloud-serverless
5+
---
6+
7+
# {{serverless-full}} breaking changes [elastic-cloud-serverless-breaking-changes]
8+
9+
## June 23, 2025 [serverless-changelog-06232025]
10+
11+
* {{esql}}: Disallows mixed quoted/unquoted patterns in `FROM` commands [#127636]({{es-pull}}127636)
Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,5 @@
11
toc:
22
- file: index.md
3+
- file: breaking-changes.md
34
- file: known-issues.md
45
- file: deprecations.md

release-notes/fleet-elastic-agent/known-issues.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,38 @@ Known issues are significant defects or limitations that may impact your impleme
1717

1818
% :::
1919

20+
:::{dropdown} {{agents}} remain in an "Upgrade scheduled" state
21+
22+
**Applies to: {{agent}} 8.18.0, 8.18.1, 8.18.2, 8.18.3, 8.18.4, 8.19.0, 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.1.0**
23+
24+
On July 2, 2025, a known issue was discovered where {{agent}} remains in an `Upgrade scheduled` state when a scheduled {{agent}} upgrade is cancelled. Attempting to restart the upgrade on the UI returns an error: `The selected agent is not upgradeable: agent is already being upgraded.`.
25+
26+
For more information, check [Issue #8778](https://github.com/elastic/elastic-agent/issues/8778).
27+
28+
**Workaround**
29+
30+
Call the [Upgrade an agent](https://www.elastic.co/docs/api/doc/kibana/operation/operation-post-fleet-agents-agentid-upgrade) endpoint of the Kibana Fleet API with the `force` parameter set to `true` to force-upgrade the {{agent}}:
31+
32+
```powershell
33+
curl --request POST \
34+
--url https://<KIBANA_HOST>/api/fleet/agents/<AGENT_ID>/upgrade \
35+
--user "<SUPERUSER_NAME>:<SUPERUSER_PASSWORD>" \
36+
--header 'Content-Type: application/json' \
37+
--header 'kbn-xsrf: true' \
38+
--data '{"version": "<VERSION>","force": true}'
39+
```
40+
41+
To force-upgrade multiple {{agents}}, call the [Bulk upgrade agents](https://www.elastic.co/docs/api/doc/kibana/operation/operation-post-fleet-agents-bulk-upgrade) endpoint of the Kibana Fleet API with the `force` parameter set to `true`:
42+
43+
```powershell
44+
curl --request POST \
45+
--url https://<KIBANA_HOST>/api/fleet/agents/bulk_upgrade \
46+
--user "<SUPERUSER_NAME>:<SUPERUSER_PASSWORD>" \
47+
--header 'Content-Type: application/json' \
48+
--header 'kbn-xsrf: true' \
49+
--data '{"version": "<VERSION>","force": true,"agents":["<AGENT_IDS>"]}'
50+
```
51+
:::
2052

2153
:::{dropdown} [Windows] {{agent}} is unable to re-enroll into {{fleet}}
2254

solutions/security/cloud/ingest-aws-security-hub-data.md

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,13 @@ products:
1111
- id: cloud-serverless
1212
---
1313

14-
# Ingest AWS Security Hub data
14+
# AWS Security Hub
15+
This page explains how to make data from the AWS Security Hub integration appear in the following places within {{elastic-sec}}:
1516

16-
In order to enrich your {{elastic-sec}} workflows with third-party cloud security posture data collected by AWS Security Hub:
17+
- **Findings page**: Data appears on the [Misconfigurations](/solutions/security/cloud/findings-page.md) tab.
18+
- **Alert and Entity details flyouts**: Applicable data appears in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section).
19+
20+
In order for AWS Security Hub data to appear in these workflows:
1721

1822
* Follow the steps to [set up the AWS Security Hub integration](https://docs.elastic.co/en/integrations/aws/securityhub).
1923
* Make sure the integration version is at least 2.31.1.
@@ -24,7 +28,6 @@ In order to enrich your {{elastic-sec}} workflows with third-party cloud securit
2428
:alt: AWS Security Hub integration settings showing the findings toggle
2529
:::
2630

27-
After you’ve completed these steps, AWS Security Hub data will appear on the Misconfigurations tab of the [Findings](/solutions/security/cloud/findings-page.md) page.
28-
29-
Any available findings data will also appear in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section) for related alerts. If alerts are present for a user or host that has findings data from AWS Security Hub, the findings will appear on the [entity details flyout](/solutions/security/advanced-entity-analytics/view-entity-details.md#entity-details-flyout).
30-
31+
::::{note}
32+
You can ingest data from the AWS Security Hub integration for other purposes without following these steps.
33+
::::

solutions/security/cloud/ingest-cncf-falco-data.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ products:
1111
- id: cloud-serverless
1212
---
1313

14-
# Ingest CNCF Falco data
14+
# CNCF Falco
1515

1616
CNCF Falco is an open-source runtime security tool that detects anomalous activity in Linux hosts, containers, Kubernetes, and cloud environments. You can ingest Falco alerts into {{es}} to view them on {{elastic-sec}}'s Alerts page and incorporate them into your security workflows by using Falcosidekick, a proxy forwarder which can send alerts from your Falco deployments to {{es}}.
1717

solutions/security/cloud/ingest-third-party-cloud-security-data.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,5 +29,10 @@ You can ingest third-party cloud security alerts into {{elastic-sec}} to view th
2929

3030
You can ingest third-party data into {{elastic-sec}} to review and investigate it alongside data collected by {{elastic-sec}}'s native cloud security integrations. Once ingested, cloud security posture and vulnerability data appears on the [Findings](/solutions/security/cloud/findings-page.md) page, on the [Cloud Posture dashboard](/solutions/security/dashboards/cloud-security-posture-dashboard.md), and in the [entity details](/solutions/security/advanced-entity-analytics/view-entity-details.md#entity-details-flyout) and [alert details](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section) flyouts.
3131

32-
* Learn to [ingest cloud security posture data from AWS Security Hub](/solutions/security/cloud/ingest-aws-security-hub-data.md).
33-
* Learn to [ingest cloud security posture and vulnerability data from Wiz](/solutions/security/cloud/ingest-wiz-data.md).
32+
Data from each of the following integrations can feed into at least some of these workflows:
33+
34+
* [AWS Security Hub](/solutions/security/cloud/ingest-aws-security-hub-data.md).
35+
* [Wiz](/solutions/security/cloud/ingest-wiz-data.md).
36+
* [Rapid7 InsightVM](/solutions/security/cloud/integration-rapid7.md).
37+
* [Tenable VM](/solutions/security/cloud/integration-tenablevm.md).
38+
* [Qualys VMDR](/solutions/security/cloud/integration-qualys.md).

solutions/security/cloud/ingest-wiz-data.md

Lines changed: 9 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,15 @@ products:
1111
- id: cloud-serverless
1212
---
1313

14-
# Ingest Wiz data
14+
# Wiz
1515

16-
In order to enrich your {{elastic-sec}} workflows with third-party cloud security posture and vulnerability data collected by Wiz:
16+
This page explains how to make data from the Wiz integration appear in the following places within {{elastic-sec}}:
17+
18+
- **Findings page**: Data appears on the [Vulnerabilities](/solutions/security/cloud/findings-page-3.md) tab and the [Misconfiguations](/solutions/security/cloud/findings-page.md) tab.
19+
- **Alert and Entity details flyouts**: Applicable data appears in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section).
20+
21+
22+
In order for Wiz data to appear in these workflows:
1723

1824
* Follow the steps to [set up the Wiz integration](https://docs.elastic.co/en/integrations/wiz).
1925
* Make sure the integration version is at least 2.0.1.
@@ -28,10 +34,8 @@ In order to enrich your {{elastic-sec}} workflows with third-party cloud securit
2834
:alt: Wiz integration settings showing the vulnerabilities toggle
2935
:::
3036

31-
After you’ve completed these steps, Wiz data will appear on the [Misconfiguations](/solutions/security/cloud/findings-page.md) and [Vulnerabilities](/solutions/security/cloud/findings-page-3.md) tabs of the Findings page.
37+
Your Wiz data should now appear throughout {{elastic-sec}}.
3238

3339
:::{image} /solutions/images/security-wiz-findings.png
3440
:alt: Wiz data on the Findings page
3541
:::
36-
37-
Any available findings data will also appear in the [Insights section](/solutions/security/detect-and-alert/view-detection-alert-details.md#insights-section) for related alerts. If alerts are present for a user or host that has findings data from Wiz, the findings will appear on the [entity details flyout](/solutions/security/advanced-entity-analytics/view-entity-details.md#entity-details-flyout).

0 commit comments

Comments
 (0)