You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A {{fleet}} enrollment token (referred to as an `enrollment API key` in the {{fleet}} API documentation) is an {{es}} API key that you use to enroll one or more {{agent}}s in {{fleet}}. The enrollment token enrolls the {{agent}} in a specific agent policy that defines the data to be collected by the agent. You can use the token as many times as required. It will remain valid until you revoke it.
11
+
A {{fleet}} enrollment token (referred to as an `enrollment API key` in the {{fleet}} API documentation) is an {{es}} API key that you use to enroll one or more {{agent}}s in {{fleet}}. The enrollment token enrolls the {{agent}} in a specific agent policy that defines the data to be collected by the agent and which output to use. You can use the token as many times as needed. It will remain valid until you revoke it.
12
12
13
-
The enrollment token is used for the initial communication between {{agent}} and {{fleet-server}}. After the initial connection request from the {{agent}}, the {{fleet-server}} passes two API keys to the {{agent}}:
13
+
The enrollment token is used for the initial communication between {{agent}} and {{fleet-server}}. After the initial connection request from {{agent}}, {{fleet-server}} passes a communication API key to the agent. This API key includes only the necessary permissions to communicate with {{fleet-server}}. If the API key is invalid, {{fleet-server}} stops communicating with {{agent}}.
14
14
15
-
* An output API key
15
+
Depending on the output of the agent policy with which the enrollment token is associated, {{fleet-server}} also passes additional data to {{agent}}:
16
+
17
+
* For the {{es}} and remote {{es}} outputs, it passes an output API key.
18
+
19
+
This API key is used to send data to {{es}}. It has the minimal permissions needed to ingest all the data specified by the agent policy. If the API key is invalid, {{agent}} stops ingesting data into {{es}}.
16
20
17
-
This API key is used to send data to {{es}}. It has the minimal permissions needed to ingest all the data specified by the agent policy. If the API key is invalid, the {{agent}} stops ingesting data into {{es}}.
21
+
* For the Kafka output, it passes authentication parameters.
18
22
19
-
* A communication API key
23
+
The authentication parameters are defined in the authentication settings of the Kafka output and are used by {{agent}} to authenticate with the Kafka cluster before sending data to it.
20
24
21
-
This API key is used to communicate with the {{fleet-server}}. It has only the permissions needed to communicate with the {{fleet-server}}. If the API key is invalid, {{fleet-server}} stops communicating with the {{agent}}.
25
+
* For the {{ls}} output, it passes SSL/TLS configuration details.
22
26
27
+
The SSL/TLS configuration details such as the SSL certificate authority, the SSL certificate, and the SSL certificate key are defined during {{ls}} output creation. {{agent}} uses SSL/TLS client authentication to authenticate with the {{ls}} pipeline before sending data to it.
23
28
29
+
:::{note}
30
+
Although an API key is generated during {{ls}} output creation, this key is not passed to {{agent}} by {{fleet-server}}. If the {{ls}} pipeline uses the {{es}} output, this API key is used by {{ls}} to authenticate with the {{es}} cluster before sending data to it.
Copy file name to clipboardExpand all lines: solutions/security/cloud/cnvm-frequently-asked-questions-faq.md
+1-5Lines changed: 1 addition & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,13 +16,9 @@ products:
16
16
17
17
Frequently asked questions about the Cloud Native Vulnerability Management (CNVM) integration and features.
18
18
19
-
**Which security data sources does the CNVM integration use to identify vulnerabilities?**
20
-
21
-
The CNVM integration uses various security data sources. The complete list can be found [here](https://github.com/aquasecurity/trivy/blob/v0.35.0/docs/docs/vulnerability/detection/data-source.md).
22
-
23
19
**What’s the underlying scanner used by CNVM integration?**
24
20
25
-
CNVM uses the open source scanner [Trivy](https://github.com/aquasecurity/trivy) v0.35.
21
+
CNVM uses the open source scanner [Trivy](https://github.com/aquasecurity/trivy).
Copy file name to clipboardExpand all lines: solutions/security/cloud/get-started-with-cspm-for-gcp.md
+11-11Lines changed: 11 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,21 +28,21 @@ This page explains how to get started monitoring the security posture of your GC
28
28
29
29
## Set up CSPM for GCP [cspm-setup-gcp]
30
30
31
-
You can set up CSPM for GCP either by enrolling a single project, or by enrolling an organization containing multiple projects. Either way, you need to first add the CSPM integration, then enable cloud account access.
31
+
You can set up CSPM for GCP either by enrolling a single project, or by enrolling an organization containing multiple projects. Either way, you need to first add the CSPM integration, then enable cloud access.
32
32
33
33
Two deployment technologies are available: agentless and agent-based.
34
34
35
35
*[Agentless deployment](/solutions/security/cloud/asset-disc-azure.md#cad-azure-agentless) allows you to collect cloud posture data without having to manage the deployment of an agent in your cloud.
36
-
*[Agent-based deployment](/solutions/security/cloud/asset-disc-azure.md#cad-azure-agent-based) requires you to deploy and manage an agent in the cloud account you want to monitor.
36
+
*[Agent-based deployment](/solutions/security/cloud/asset-disc-azure.md#cad-azure-agent-based) requires you to deploy and manage an agent in the cloud project or projects you want to monitor.
37
37
38
38
39
39
## Agentless deployment [cspm-gcp-agentless]
40
40
41
41
1. Find **Integrations** in the navigation menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
4. Under **Configure integration**, select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Project** to onboard an individual account.
45
-
5. Give your integration a name and description that match the purpose or team of the GCP subscription/organization you want to monitor, for example, `dev-gcp-account`.
44
+
4. Under **Configure integration**, select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Project** to onboard an individual project.
45
+
5. Give your integration a name and description that match the purpose or team of the GCP subscription/organization you want to monitor, for example, `dev-gcp-project`.
46
46
6. (Optional) Expand **Advanced options** and add a `Namespace` to the integration's data stream.
47
47
48
48
:::{include} _snippets/cspm-namespace.md
@@ -60,8 +60,8 @@ Two deployment technologies are available: agentless and agent-based.
60
60
1. Find **Integrations** in the navigation menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
4. For **Configure integration**, select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Project** to onboard an individual account.
64
-
5. Give your integration a name and description that match the purpose or team of the GCP account you want to monitor, for example, `dev-gcp-project`.
63
+
4. For **Configure integration**, select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Project** to onboard an individual project.
64
+
5. Give your integration a name and description that match the purpose or team of the GCP project you want to monitor, for example, `dev-gcp-project`.
65
65
6. (Optional) Expand the **Advanced options** menu and add a `Namespace` to the integration's data stream.
66
66
67
67
::::{include} _snippets/cspm-namespace.md
@@ -76,7 +76,7 @@ To set up CSPM for a GCP project, you need admin privileges for the project.
76
76
::::
77
77
78
78
79
-
For most users, the simplest option is to use a Google Cloud Shell script to automatically provision the necessary resources and permissions in your GCP account. This method, as well as two manual options, are described next on this page.
79
+
For most users, the simplest option is to use a Google Cloud Shell script to automatically provision the necessary GCP resources and permissions. This method, as well as two manual options, are described next on this page.
@@ -85,8 +85,8 @@ For most users, the simplest option is to use a Google Cloud Shell script to aut
85
85
2. In **Where to add this integration**:
86
86
87
87
1. Select **New Hosts**.
88
-
2. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud account or accounts you want to monitor. For example, `dev-gcp-account`.
89
-
3. Click **Save and continue**, then **Add {{agent}} to your hosts**. The **Add agent** wizard appears and provides {{agent}} binaries, which you can download and deploy to a VM in your GCP account.
88
+
2. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud project or projects you want to monitor. For example, `dev-gcp-project`.
89
+
3. Click **Save and continue**, then **Add {{agent}} to your hosts**. The **Add agent** wizard appears and provides {{agent}} binaries, which you can download and deploy to a VM in GCP.
90
90
91
91
3. Click **Save and continue**.
92
92
4. Copy the command that appears, then click **Launch Google Cloud Shell**. It opens in a new window.
@@ -160,7 +160,7 @@ Provide credentials to the CSPM integration:
160
160
2. Enter your GCP **Organization ID**. Enter the GCP **Project ID** of the project where you want to provision the compute instance that will run CSPM.
161
161
3. Select **Credentials JSON**, and enter the value you generated earlier.
162
162
4. For **Where to add this integration**, select **New Hosts**.
163
-
5. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud account or accounts you want to monitor. For example, `dev-gcp-account`.
163
+
5. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud project or projects you want to monitor. For example, `dev-gcp-project`.
164
164
6. Click **Save and continue**, then follow the instructions to install {{agent}} in your chosen GCP project.
165
165
166
166
Wait for the confirmation that {{kib}} received data from your new integration. Then you can click **View Assets** to see your data.
@@ -217,7 +217,7 @@ Provide credentials to the CSPM integration:
217
217
2. Enter your GCP **Project ID**.
218
218
3. Select **Credentials JSON**, and enter the value you generated earlier.
219
219
4. For **Where to add this integration**, select **New Hosts**.
220
-
5. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud account or accounts you want to monitor. For example, `dev-gcp-account`.
220
+
5. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud project or projects you want to monitor. For example, `dev-gcp-project`.
221
221
6. Click **Save and continue**, then follow the instructions to install {{agent}} in your chosen GCP project.
222
222
223
223
Wait for the confirmation that {{kib}} received data from your new integration. Then you can click **View Assets** to see your data.
Copy file name to clipboardExpand all lines: solutions/security/get-started/agentless-integrations.md
+18-7Lines changed: 18 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,20 +16,31 @@ products:
16
16
Agentless integrations provide a means to ingest data while avoiding the orchestration, management, and maintenance needs associated with standard ingest infrastructure. Using agentless integrations makes manual agent deployment unnecessary, allowing you to focus on your data instead of the agent that collects it.
17
17
18
18
::::{important}
19
-
There are currently no additional costs associated with deploying agentless integrations.
20
-
There is currently a limit of 5 agentless integrations per project.
19
+
During technical preview, there are no additional costs associated with deploying agentless integrations.
20
+
There is a limit of 5 agentless integrations per project.
21
21
::::
22
22
23
23
## Generally available (GA) agentless integrations
24
24
25
-
We fully support agentless deployment for Cloud security posture management (CSPM). Using this integration’s agentless deployment option, you can enable Elastic’s CSPM capabilities just by providing the necessary credentials. Agentless CSPM deployments support AWS, Azure, and GCP accounts.
25
+
Elastic fully supports agentless deployment for the Cloud Security Posture Management (CSPM) integration. Using this integration’s agentless deployment option, you can enable Elastic’s CSPM capabilities just by providing the necessary credentials. Agentless CSPM deployments support AWS, Azure, and GCP accounts.
26
+
27
+
To learn more about agentless CSPM deployments, refer to the getting started guides for CSPM on [AWS](../cloud/get-started-with-cspm-for-aws.md), [Azure](../cloud/get-started-with-cspm-for-azure.md), or [GCP](../cloud/get-started-with-cspm-for-gcp.md)
26
28
27
-
To learn more about agentless CSPM deployments, refer to the getting started guides for CSPM on [AWS](../cloud/get-started-with-cspm-for-aws.md), [Azure](../cloud/get-started-with-cspm-for-azure.md), or [GCP](../cloud/get-started-with-cspm-for-gcp.md)
28
29
29
30
## Beta agentless integrations
30
31
31
-
::::{warning}
32
32
Agentless deployment for other integrations is in beta and is subject to change. The design and code is less mature than official GA features and is being provided as-is with no warranties. Beta features are not subject to the support SLA of official GA features.
33
-
::::
34
33
35
-
For setup guides and to learn more about Elastic's integrations, including whether each one supports agentless deployment, refer to [Elastic integrations](https://docs.elastic.co/en/integrations/).
34
+
For setup guides and to learn more about Elastic's integrations, including whether each supports agentless deployment, refer to [Elastic integrations](https://docs.elastic.co/en/integrations/).
35
+
36
+
## Filter the integrations page to find agentless integrations
37
+
38
+
```{applies_to}
39
+
stack: ga 9.2
40
+
serverless: ga
41
+
```
42
+
43
+
To identify which integrations support agentless deployment:
44
+
45
+
1. In {{kib}}, go to **Integrations**.
46
+
2. On the left, enable the **Only agentless integrations** toggle.
0 commit comments