Skip to content

Commit 98f2dc8

Browse files
authored
Merge branch 'main' into leemthompo/esql-explore-analyze-this-starring-robert-deniro
2 parents bc8197e + 8bcfe8f commit 98f2dc8

File tree

4 files changed

+55
-6
lines changed

4 files changed

+55
-6
lines changed

deploy-manage/autoscaling.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,9 @@ Cluster autoscaling supports:
3939
The available resources of self-managed deployments are static, so trained model autoscaling is not applicable. However, available resources are still segmented based on the settings described in this section.
4040
:::
4141

42-
Trained model autoscaling automatically adjusts the resources allocated to trained model deployments based on demand. This feature is available on all cloud deployments (ECE, ECK, ECH) and {{serverless-short}}. See [Trained model autoscaling](/deploy-manage/autoscaling/trained-model-autoscaling.md) for details.
42+
Trained model autoscaling automatically adjusts the resources allocated to trained model deployments based on demand. This feature is available on all cloud deployments (ECE, ECK, ECH) and {{serverless-short}}. Refer to [Trained model autoscaling](/deploy-manage/autoscaling/trained-model-autoscaling.md) for details.
43+
44+
To ensure availability and avoid unnecessary scaling, trained model deployments operate with defined [cooldown periods](/deploy-manage/autoscaling/trained-model-autoscaling.md#cooldown-periods).
4345

4446
Trained model autoscaling supports:
4547
* Scaling trained model deployments

deploy-manage/autoscaling/trained-model-autoscaling.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ There are two ways to enable autoscaling:
2222
* through APIs by enabling adaptive allocations
2323
* in {{kib}} by enabling adaptive resources
2424

25-
For {{serverless-short}} projects, trained model autoscaling is automatically enabled and cannot be disabled.
25+
For {{serverless-short}} projects, trained model autoscaling is always enabled and cannot be turned off.
2626

2727
::::{important}
2828
To fully leverage model autoscaling in {{ech}}, {{ece}}, and {{eck}}, it is highly recommended to enable [{{es}} deployment autoscaling](../../deploy-manage/autoscaling.md).
@@ -36,6 +36,16 @@ The available resources of self-managed deployments are static, so trained model
3636

3737
{{serverless-full}} Security and Observability projects are only charged for data ingestion and retention. They are not charged for processing power (VCU usage), which is used for more complex operations, like running advanced search models. For example, in Search projects, models such as ELSER require significant processing power to provide more accurate search results.
3838

39+
## Cooldown periods [cooldown-periods]
40+
41+
Trained model deployments remain active for 24 hours after the last inference request. After that, they scale down to zero. When scaled up again, they stay active for 5 minutes before they can scale down. These cooldown periods prevent unnecessary scaling and ensure models are available when needed.
42+
43+
::::{important}
44+
During these cooldown periods, you will continue to be billed for the active resources.
45+
::::
46+
47+
For {{ech}}, {{eck}} and {{ece}} deployments, you can change the length of this period with the `xpack.ml.trained_models.adaptive_allocations.scale_to_zero_time` cluster setting (minimum 1 minute). For {{serverless-short}} projects, this period is fixed and cannot be changed.
48+
3949
## Enabling autoscaling through APIs - adaptive allocations [enabling-autoscaling-through-apis-adaptive-allocations]
4050

4151
$$$nlp-model-adaptive-resources$$$

deploy-manage/cloud-organization/billing/elasticsearch-billing-dimensions.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,9 @@ You can control costs using the following strategies:
4444

4545
* **Search Power setting:** [Search Power](../../deploy/elastic-cloud/project-settings.md#elasticsearch-manage-project-search-power-settings) controls the speed of searches against your data. With Search Power, you can improve search performance by adding more resources for querying, or you can reduce provisioned resources to cut costs.
4646
* **Search boost window**: By limiting the number of days of [time series data](../../../solutions/search/ingest-for-search.md#elasticsearch-ingest-time-series-data) that are available for caching, you can reduce the number of search VCUs required.
47+
* **Machine learning trained model autoscaling:** [Trained model autoscaling](/deploy-manage/autoscaling/trained-model-autoscaling.md) is always enabled and cannot be disabled, ensuring efficient resource usage, reduced costs, and optimal performance without manual configuration.
48+
49+
Trained model deployments automatically scale down to zero allocations after 24 hours without any inference requests. When they scale up again, they remain active for 5 minutes before they can scale down. During these cooldown periods, you will continue to be billed for the active resources.
4750

4851
* **Indexing Strategies:** Consider your indexing strategies and how they might impact overall VCU usage and costs:
4952

release-notes/fleet-elastic-agent/known-issues.md

Lines changed: 38 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,7 @@ navigation_title: Known issues
33
---
44

55
# {{fleet}} and {{agent}} known issues [fleet-elastic-agent-known-issues]
6+
67
Known issues are significant defects or limitations that may impact your implementation. These issues are actively being worked on and will be addressed in a future release. Review the {{fleet}} and {{agent}} known issues to help you make informed decisions, such as upgrading to a new version.
78

89
% Use the following template to add entries to this page.
@@ -17,9 +18,42 @@ Known issues are significant defects or limitations that may impact your impleme
1718

1819
% :::
1920

21+
:::{dropdown} Manual DEB/RPM upgrades of {{fleet}}-managed agents fail when "Agent tamper protection" is enabled
22+
23+
**Applies to**: {{agent}} 8.19.2, 9.1.2
24+
25+
On August 19, 2025, a known issue was discovered where manual DEB/RPM upgrades of {{fleet}}-managed {{agents}} fail if the {{elastic-defend}} integration is installed and **Agent tamper protection** is enabled in the agent policy. When this occurs, the log contains an output similar to the following:
26+
27+
```
28+
Invalid uninstall token: exit status 28
29+
```
30+
31+
This issue only impacts manual DEB/RPM upgrades from {{agent}} 8.19.2 or 9.1.2. Managed upgrades performed through {{fleet}} are not affected.
32+
33+
For more information, refer to [PR #9462](https://github.com/elastic/elastic-agent/pull/9462).
34+
35+
**Workaround**
36+
37+
You can use one of the following workarounds to resolve the issue:
38+
39+
- Stop the `elastic-agent` service:
40+
41+
Before installing the {{agent}} DEB/RPM package, run `systemctl stop elastic-agent`, then proceed with the installation. This solution works even when reinstalling the same version of {{agent}}.
42+
43+
- Temporarily remove the {{elastic-defend}} integration:
44+
45+
Before upgrading, move the agent to an agent policy without the {{elastic-defend}} integration. Wait for the change to take effect, proceed with the upgrade, then move the agent to its previous policy.
46+
47+
- Disable **Agent tamper protection**:
48+
49+
Before upgrading, disable **Agent tamper protection** in the agent policy. Wait for the change to take effect, proceed with the upgrade, then move the agent back to its previous policy.
50+
51+
**Fixed in**: {{agent}} 8.19.3, 9.1.3
52+
:::
53+
2054
:::{dropdown} [Windows] {{agent}} does not process Windows security events
2155

22-
**Applies to: {{agent}} 8.19.0, 9.1.0 (Windows only)**
56+
**Applies to**: {{agent}} 8.19.0, 9.1.0 (Windows only)
2357

2458
On August 1, 2025, a known issue was discovered where {{agent}} does not process Windows security events on hosts running Windows 10, Windows 11, and Windows Server 2022.
2559

@@ -32,7 +66,7 @@ No workaround is available at the moment, but a fix is expected to be available
3266

3367
:::{dropdown} {{agents}} remain in an "Upgrade scheduled" state
3468

35-
**Applies to: {{agent}} 8.18.0, 8.18.1, 8.18.2, 8.18.3, 8.18.4, 8.19.0, 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.1.0**
69+
**Applies to**: {{agent}} 8.18.0, 8.18.1, 8.18.2, 8.18.3, 8.18.4, 8.19.0, 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.1.0
3670

3771
On July 2, 2025, a known issue was discovered where {{agent}} remains in an `Upgrade scheduled` state when a scheduled {{agent}} upgrade is cancelled. Attempting to restart the upgrade on the UI returns an error: `The selected agent is not upgradeable: agent is already being upgraded.`.
3872

@@ -65,7 +99,7 @@ curl --request POST \
6599

66100
:::{dropdown} [Windows] {{agent}} is unable to re-enroll into {{fleet}}
67101

68-
**Applies to: {{agent}} 9.0.0, 9.0.1, 9.0.2 (Windows only)**
102+
**Applies to**: {{agent}} 9.0.0, 9.0.1, 9.0.2 (Windows only)
69103

70104
On April 9, 2025, a known issue was discovered where an {{agent}} installed on Windows and previously enrolled into {{fleet}} is unable to re-enroll. Attempting to enroll the {{agent}} fails with the following error:
71105

@@ -91,7 +125,7 @@ Until a bug fix is available in a later release, you can resolve the issue tempo
91125

92126
:::{dropdown} [macOS] Osquery integration fails to start on fresh agent installs
93127

94-
**Applies to: {{agent}} 9.0.0 and 9.0.1 (macOS only)**
128+
**Applies to**: {{agent}} 9.0.0 and 9.0.1 (macOS only)
95129

96130
On May 26th, 2025, a known issue was discovered that causes the `osquery` integration to fail on new {{agent}} installations on macOS. During the installation process, the required `osquery.app/` directory is removed, which prevents the integration from starting.
97131

0 commit comments

Comments
 (0)