Skip to content

Commit 9806662

Browse files
Merge branch 'main' into esql-increase-history-size
2 parents abb4bac + 60573b7 commit 9806662

File tree

5 files changed

+47
-30
lines changed

5 files changed

+47
-30
lines changed

reference/fleet/fleet-enrollment-tokens.md

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,19 +8,27 @@ products:
88

99
# Fleet enrollment tokens [fleet-enrollment-tokens]
1010

11-
A {{fleet}} enrollment token (referred to as an `enrollment API key` in the {{fleet}} API documentation) is an {{es}} API key that you use to enroll one or more {{agent}}s in {{fleet}}. The enrollment token enrolls the {{agent}} in a specific agent policy that defines the data to be collected by the agent. You can use the token as many times as required. It will remain valid until you revoke it.
11+
A {{fleet}} enrollment token (referred to as an `enrollment API key` in the {{fleet}} API documentation) is an {{es}} API key that you use to enroll one or more {{agent}}s in {{fleet}}. The enrollment token enrolls the {{agent}} in a specific agent policy that defines the data to be collected by the agent and which output to use. You can use the token as many times as needed. It will remain valid until you revoke it.
1212

13-
The enrollment token is used for the initial communication between {{agent}} and {{fleet-server}}. After the initial connection request from the {{agent}}, the {{fleet-server}} passes two API keys to the {{agent}}:
13+
The enrollment token is used for the initial communication between {{agent}} and {{fleet-server}}. After the initial connection request from {{agent}}, {{fleet-server}} passes a communication API key to the agent. This API key includes only the necessary permissions to communicate with {{fleet-server}}. If the API key is invalid, {{fleet-server}} stops communicating with {{agent}}.
1414

15-
* An output API key
15+
Depending on the output of the agent policy with which the enrollment token is associated, {{fleet-server}} also passes additional data to {{agent}}:
16+
17+
* For the {{es}} and remote {{es}} outputs, it passes an output API key.
18+
19+
This API key is used to send data to {{es}}. It has the minimal permissions needed to ingest all the data specified by the agent policy. If the API key is invalid, {{agent}} stops ingesting data into {{es}}.
1620

17-
This API key is used to send data to {{es}}. It has the minimal permissions needed to ingest all the data specified by the agent policy. If the API key is invalid, the {{agent}} stops ingesting data into {{es}}.
21+
* For the Kafka output, it passes authentication parameters.
1822

19-
* A communication API key
23+
The authentication parameters are defined in the authentication settings of the Kafka output and are used by {{agent}} to authenticate with the Kafka cluster before sending data to it.
2024

21-
This API key is used to communicate with the {{fleet-server}}. It has only the permissions needed to communicate with the {{fleet-server}}. If the API key is invalid, {{fleet-server}} stops communicating with the {{agent}}.
25+
* For the {{ls}} output, it passes SSL/TLS configuration details.
2226

27+
The SSL/TLS configuration details such as the SSL certificate authority, the SSL certificate, and the SSL certificate key are defined during {{ls}} output creation. {{agent}} uses SSL/TLS client authentication to authenticate with the {{ls}} pipeline before sending data to it.
2328

29+
:::{note}
30+
Although an API key is generated during {{ls}} output creation, this key is not passed to {{agent}} by {{fleet-server}}. If the {{ls}} pipeline uses the {{es}} output, this API key is used by {{ls}} to authenticate with the {{es}} cluster before sending data to it.
31+
:::
2432

2533
## Create enrollment tokens [create-fleet-enrollment-tokens]
2634

solutions/security/apis.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,10 @@ applies_to:
33
stack: all
44
serverless:
55
security: all
6+
navigation_title: APIs
67
---
78

8-
# APIs
9+
# {{elastic-sec}} APIs
910

1011
You can use these APIs to interface with {{elastic-sec}} features:
1112

@@ -21,3 +22,4 @@ You can use these APIs to interface with {{elastic-sec}} features:
2122
* [Osquery API](https://www.elastic.co/docs/api/doc/kibana/group/endpoint-security-osquery-api): Manage live queries, packs, and saved queries.
2223
* [Timeline API](https://www.elastic.co/docs/api/doc/kibana/group/endpoint-security-timeline-api): Manage, import, and export Timelines.
2324

25+
To view other APIs, such as {{kib}} or {{es}} APIs, refer to [Elastic APIs]({{apis}}).

solutions/security/cloud/cnvm-frequently-asked-questions-faq.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,13 +16,9 @@ products:
1616

1717
Frequently asked questions about the Cloud Native Vulnerability Management (CNVM) integration and features.
1818

19-
**Which security data sources does the CNVM integration use to identify vulnerabilities?**
20-
21-
The CNVM integration uses various security data sources. The complete list can be found [here](https://github.com/aquasecurity/trivy/blob/v0.35.0/docs/docs/vulnerability/detection/data-source.md).
22-
2319
**What’s the underlying scanner used by CNVM integration?**
2420

25-
CNVM uses the open source scanner [Trivy](https://github.com/aquasecurity/trivy) v0.35.
21+
CNVM uses the open source scanner [Trivy](https://github.com/aquasecurity/trivy).
2622

2723
**What system architectures are supported?**
2824

solutions/security/cloud/get-started-with-cspm-for-gcp.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -28,21 +28,21 @@ This page explains how to get started monitoring the security posture of your GC
2828

2929
## Set up CSPM for GCP [cspm-setup-gcp]
3030

31-
You can set up CSPM for GCP either by enrolling a single project, or by enrolling an organization containing multiple projects. Either way, you need to first add the CSPM integration, then enable cloud account access.
31+
You can set up CSPM for GCP either by enrolling a single project, or by enrolling an organization containing multiple projects. Either way, you need to first add the CSPM integration, then enable cloud access.
3232

3333
Two deployment technologies are available: agentless and agent-based.
3434

3535
* [Agentless deployment](/solutions/security/cloud/asset-disc-azure.md#cad-azure-agentless) allows you to collect cloud posture data without having to manage the deployment of an agent in your cloud.
36-
* [Agent-based deployment](/solutions/security/cloud/asset-disc-azure.md#cad-azure-agent-based) requires you to deploy and manage an agent in the cloud account you want to monitor.
36+
* [Agent-based deployment](/solutions/security/cloud/asset-disc-azure.md#cad-azure-agent-based) requires you to deploy and manage an agent in the cloud project or projects you want to monitor.
3737

3838

3939
## Agentless deployment [cspm-gcp-agentless]
4040

4141
1. Find **Integrations** in the navigation menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
4242
2. Search for `CSPM`, then click on the result.
4343
3. Click **Add Cloud Security Posture Management (CSPM)**.
44-
4. Under **Configure integration**, select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Project** to onboard an individual account.
45-
5. Give your integration a name and description that match the purpose or team of the GCP subscription/organization you want to monitor, for example, `dev-gcp-account`.
44+
4. Under **Configure integration**, select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Project** to onboard an individual project.
45+
5. Give your integration a name and description that match the purpose or team of the GCP subscription/organization you want to monitor, for example, `dev-gcp-project`.
4646
6. (Optional) Expand **Advanced options** and add a `Namespace` to the integration's data stream.
4747

4848
:::{include} _snippets/cspm-namespace.md
@@ -60,8 +60,8 @@ Two deployment technologies are available: agentless and agent-based.
6060
1. Find **Integrations** in the navigation menu or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md).
6161
2. Search for `CSPM`, then click on the result.
6262
3. Click **Add Cloud Security Posture Management (CSPM)**.
63-
4. For **Configure integration**, select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Project** to onboard an individual account.
64-
5. Give your integration a name and description that match the purpose or team of the GCP account you want to monitor, for example, `dev-gcp-project`.
63+
4. For **Configure integration**, select **GCP**, then either **GCP Organization** to onboard your whole organization, or **Single Project** to onboard an individual project.
64+
5. Give your integration a name and description that match the purpose or team of the GCP project you want to monitor, for example, `dev-gcp-project`.
6565
6. (Optional) Expand the **Advanced options** menu and add a `Namespace` to the integration's data stream.
6666

6767
::::{include} _snippets/cspm-namespace.md
@@ -76,7 +76,7 @@ To set up CSPM for a GCP project, you need admin privileges for the project.
7676
::::
7777

7878

79-
For most users, the simplest option is to use a Google Cloud Shell script to automatically provision the necessary resources and permissions in your GCP account. This method, as well as two manual options, are described next on this page.
79+
For most users, the simplest option is to use a Google Cloud Shell script to automatically provision the necessary GCP resources and permissions. This method, as well as two manual options, are described next on this page.
8080

8181

8282
## Cloud Shell script setup (recommended) [cspm-set-up-cloudshell]
@@ -85,8 +85,8 @@ For most users, the simplest option is to use a Google Cloud Shell script to aut
8585
2. In **Where to add this integration**:
8686

8787
1. Select **New Hosts**.
88-
2. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud account or accounts you want to monitor. For example, `dev-gcp-account`.
89-
3. Click **Save and continue**, then **Add {{agent}} to your hosts**. The **Add agent** wizard appears and provides {{agent}} binaries, which you can download and deploy to a VM in your GCP account.
88+
2. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud project or projects you want to monitor. For example, `dev-gcp-project`.
89+
3. Click **Save and continue**, then **Add {{agent}} to your hosts**. The **Add agent** wizard appears and provides {{agent}} binaries, which you can download and deploy to a VM in GCP.
9090

9191
3. Click **Save and continue**.
9292
4. Copy the command that appears, then click **Launch Google Cloud Shell**. It opens in a new window.
@@ -160,7 +160,7 @@ Provide credentials to the CSPM integration:
160160
2. Enter your GCP **Organization ID**. Enter the GCP **Project ID** of the project where you want to provision the compute instance that will run CSPM.
161161
3. Select **Credentials JSON**, and enter the value you generated earlier.
162162
4. For **Where to add this integration**, select **New Hosts**.
163-
5. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud account or accounts you want to monitor. For example, `dev-gcp-account`.
163+
5. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud project or projects you want to monitor. For example, `dev-gcp-project`.
164164
6. Click **Save and continue**, then follow the instructions to install {{agent}} in your chosen GCP project.
165165

166166
Wait for the confirmation that {{kib}} received data from your new integration. Then you can click **View Assets** to see your data.
@@ -217,7 +217,7 @@ Provide credentials to the CSPM integration:
217217
2. Enter your GCP **Project ID**.
218218
3. Select **Credentials JSON**, and enter the value you generated earlier.
219219
4. For **Where to add this integration**, select **New Hosts**.
220-
5. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud account or accounts you want to monitor. For example, `dev-gcp-account`.
220+
5. Name the {{agent}} policy. Use a name that matches the purpose or team of the cloud project or projects you want to monitor. For example, `dev-gcp-project`.
221221
6. Click **Save and continue**, then follow the instructions to install {{agent}} in your chosen GCP project.
222222

223223
Wait for the confirmation that {{kib}} received data from your new integration. Then you can click **View Assets** to see your data.

solutions/security/get-started/agentless-integrations.md

Lines changed: 18 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,20 +16,31 @@ products:
1616
Agentless integrations provide a means to ingest data while avoiding the orchestration, management, and maintenance needs associated with standard ingest infrastructure. Using agentless integrations makes manual agent deployment unnecessary, allowing you to focus on your data instead of the agent that collects it.
1717

1818
::::{important}
19-
There are currently no additional costs associated with deploying agentless integrations.
20-
There is currently a limit of 5 agentless integrations per project.
19+
During technical preview, there are no additional costs associated with deploying agentless integrations.
20+
There is a limit of 5 agentless integrations per project.
2121
::::
2222

2323
## Generally available (GA) agentless integrations
2424

25-
We fully support agentless deployment for Cloud security posture management (CSPM). Using this integration’s agentless deployment option, you can enable Elastic’s CSPM capabilities just by providing the necessary credentials. Agentless CSPM deployments support AWS, Azure, and GCP accounts.
25+
Elastic fully supports agentless deployment for the Cloud Security Posture Management (CSPM) integration. Using this integration’s agentless deployment option, you can enable Elastic’s CSPM capabilities just by providing the necessary credentials. Agentless CSPM deployments support AWS, Azure, and GCP accounts.
26+
27+
To learn more about agentless CSPM deployments, refer to the getting started guides for CSPM on [AWS](../cloud/get-started-with-cspm-for-aws.md), [Azure](../cloud/get-started-with-cspm-for-azure.md), or [GCP](../cloud/get-started-with-cspm-for-gcp.md)
2628

27-
To learn more about agentless CSPM deployments, refer to the getting started guides for CSPM on [AWS](../cloud/get-started-with-cspm-for-aws.md), [Azure](../cloud/get-started-with-cspm-for-azure.md), or [GCP](../cloud/get-started-with-cspm-for-gcp.md)
2829

2930
## Beta agentless integrations
3031

31-
::::{warning}
3232
Agentless deployment for other integrations is in beta and is subject to change. The design and code is less mature than official GA features and is being provided as-is with no warranties. Beta features are not subject to the support SLA of official GA features.
33-
::::
3433

35-
For setup guides and to learn more about Elastic's integrations, including whether each one supports agentless deployment, refer to [Elastic integrations](https://docs.elastic.co/en/integrations/).
34+
For setup guides and to learn more about Elastic's integrations, including whether each supports agentless deployment, refer to [Elastic integrations](https://docs.elastic.co/en/integrations/).
35+
36+
## Filter the integrations page to find agentless integrations
37+
38+
```{applies_to}
39+
stack: ga 9.2
40+
serverless: ga
41+
```
42+
43+
To identify which integrations support agentless deployment:
44+
45+
1. In {{kib}}, go to **Integrations**.
46+
2. On the left, enable the **Only agentless integrations** toggle.

0 commit comments

Comments
 (0)