You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: deploy-manage/autoscaling.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,9 @@ Cluster autoscaling supports:
39
39
The available resources of self-managed deployments are static, so trained model autoscaling is not applicable. However, available resources are still segmented based on the settings described in this section.
40
40
:::
41
41
42
-
Trained model autoscaling automatically adjusts the resources allocated to trained model deployments based on demand. This feature is available on all cloud deployments (ECE, ECK, ECH) and {{serverless-short}}. See [Trained model autoscaling](/deploy-manage/autoscaling/trained-model-autoscaling.md) for details.
42
+
Trained model autoscaling automatically adjusts the resources allocated to trained model deployments based on demand. This feature is available on all cloud deployments (ECE, ECK, ECH) and {{serverless-short}}. Refer to [Trained model autoscaling](/deploy-manage/autoscaling/trained-model-autoscaling.md) for details.
43
+
44
+
To ensure availability and avoid unnecessary scaling, trained model deployments operate with defined [cooldown periods](/deploy-manage/autoscaling/trained-model-autoscaling.md#cooldown-periods).
Copy file name to clipboardExpand all lines: deploy-manage/autoscaling/trained-model-autoscaling.md
+11-1Lines changed: 11 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ There are two ways to enable autoscaling:
22
22
* through APIs by enabling adaptive allocations
23
23
* in {{kib}} by enabling adaptive resources
24
24
25
-
For {{serverless-short}} projects, trained model autoscaling is automatically enabled and cannot be disabled.
25
+
For {{serverless-short}} projects, trained model autoscaling is always enabled and cannot be turned off.
26
26
27
27
::::{important}
28
28
To fully leverage model autoscaling in {{ech}}, {{ece}}, and {{eck}}, it is highly recommended to enable [{{es}} deployment autoscaling](../../deploy-manage/autoscaling.md).
@@ -36,6 +36,16 @@ The available resources of self-managed deployments are static, so trained model
36
36
37
37
{{serverless-full}} Security and Observability projects are only charged for data ingestion and retention. They are not charged for processing power (VCU usage), which is used for more complex operations, like running advanced search models. For example, in Search projects, models such as ELSER require significant processing power to provide more accurate search results.
38
38
39
+
## Cooldown periods [cooldown-periods]
40
+
41
+
Trained model deployments remain active for 24 hours after the last inference request. After that, they scale down to zero. When scaled up again, they stay active for 5 minutes before they can scale down. These cooldown periods prevent unnecessary scaling and ensure models are available when needed.
42
+
43
+
::::{important}
44
+
During these cooldown periods, you will continue to be billed for the active resources.
45
+
::::
46
+
47
+
For {{ech}}, {{eck}} and {{ece}} deployments, you can change the length of this period with the `xpack.ml.trained_models.adaptive_allocations.scale_to_zero_time` cluster setting (minimum 1 minute). For {{serverless-short}} projects, this period is fixed and cannot be changed.
48
+
39
49
## Enabling autoscaling through APIs - adaptive allocations [enabling-autoscaling-through-apis-adaptive-allocations]
Copy file name to clipboardExpand all lines: deploy-manage/cloud-organization/billing/elasticsearch-billing-dimensions.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -44,6 +44,9 @@ You can control costs using the following strategies:
44
44
45
45
***Search Power setting:**[Search Power](../../deploy/elastic-cloud/project-settings.md#elasticsearch-manage-project-search-power-settings) controls the speed of searches against your data. With Search Power, you can improve search performance by adding more resources for querying, or you can reduce provisioned resources to cut costs.
46
46
***Search boost window**: By limiting the number of days of [time series data](../../../solutions/search/ingest-for-search.md#elasticsearch-ingest-time-series-data) that are available for caching, you can reduce the number of search VCUs required.
47
+
***Machine learning trained model autoscaling:**[Trained model autoscaling](/deploy-manage/autoscaling/trained-model-autoscaling.md) is always enabled and cannot be disabled, ensuring efficient resource usage, reduced costs, and optimal performance without manual configuration.
48
+
49
+
Trained model deployments automatically scale down to zero allocations after 24 hours without any inference requests. When they scale up again, they remain active for 5 minutes before they can scale down. During these cooldown periods, you will continue to be billed for the active resources.
47
50
48
51
***Indexing Strategies:** Consider your indexing strategies and how they might impact overall VCU usage and costs:
Copy file name to clipboardExpand all lines: release-notes/fleet-elastic-agent/known-issues.md
+38-4Lines changed: 38 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,7 @@ navigation_title: Known issues
3
3
---
4
4
5
5
# {{fleet}} and {{agent}} known issues [fleet-elastic-agent-known-issues]
6
+
6
7
Known issues are significant defects or limitations that may impact your implementation. These issues are actively being worked on and will be addressed in a future release. Review the {{fleet}} and {{agent}} known issues to help you make informed decisions, such as upgrading to a new version.
7
8
8
9
% Use the following template to add entries to this page.
@@ -17,9 +18,42 @@ Known issues are significant defects or limitations that may impact your impleme
17
18
18
19
% :::
19
20
21
+
:::{dropdown} Manual DEB/RPM upgrades of {{fleet}}-managed agents fail when "Agent tamper protection" is enabled
22
+
23
+
**Applies to**: {{agent}} 8.19.2, 9.1.2
24
+
25
+
On August 19, 2025, a known issue was discovered where manual DEB/RPM upgrades of {{fleet}}-managed {{agents}} fail if the {{elastic-defend}} integration is installed and **Agent tamper protection** is enabled in the agent policy. When this occurs, the log contains an output similar to the following:
26
+
27
+
```
28
+
Invalid uninstall token: exit status 28
29
+
```
30
+
31
+
This issue only impacts manual DEB/RPM upgrades from {{agent}} 8.19.2 or 9.1.2. Managed upgrades performed through {{fleet}} are not affected.
32
+
33
+
For more information, refer to [PR #9462](https://github.com/elastic/elastic-agent/pull/9462).
34
+
35
+
**Workaround**
36
+
37
+
You can use one of the following workarounds to resolve the issue:
38
+
39
+
- Stop the `elastic-agent` service:
40
+
41
+
Before installing the {{agent}} DEB/RPM package, run `systemctl stop elastic-agent`, then proceed with the installation. This solution works even when reinstalling the same version of {{agent}}.
42
+
43
+
- Temporarily remove the {{elastic-defend}} integration:
44
+
45
+
Before upgrading, move the agent to an agent policy without the {{elastic-defend}} integration. Wait for the change to take effect, proceed with the upgrade, then move the agent to its previous policy.
46
+
47
+
- Disable **Agent tamper protection**:
48
+
49
+
Before upgrading, disable **Agent tamper protection** in the agent policy. Wait for the change to take effect, proceed with the upgrade, then move the agent back to its previous policy.
50
+
51
+
**Fixed in**: {{agent}} 8.19.3, 9.1.3
52
+
:::
53
+
20
54
:::{dropdown} [Windows] {{agent}} does not process Windows security events
21
55
22
-
**Applies to: {{agent}} 8.19.0, 9.1.0 (Windows only)**
On August 1, 2025, a known issue was discovered where {{agent}} does not process Windows security events on hosts running Windows 10, Windows 11, and Windows Server 2022.
25
59
@@ -32,7 +66,7 @@ No workaround is available at the moment, but a fix is expected to be available
32
66
33
67
:::{dropdown} {{agents}} remain in an "Upgrade scheduled" state
On July 2, 2025, a known issue was discovered where {{agent}} remains in an `Upgrade scheduled` state when a scheduled {{agent}} upgrade is cancelled. Attempting to restart the upgrade on the UI returns an error: `The selected agent is not upgradeable: agent is already being upgraded.`.
38
72
@@ -65,7 +99,7 @@ curl --request POST \
65
99
66
100
:::{dropdown} [Windows] {{agent}} is unable to re-enroll into {{fleet}}
67
101
68
-
**Applies to: {{agent}} 9.0.0, 9.0.1, 9.0.2 (Windows only)**
On April 9, 2025, a known issue was discovered where an {{agent}} installed on Windows and previously enrolled into {{fleet}} is unable to re-enroll. Attempting to enroll the {{agent}} fails with the following error:
71
105
@@ -91,7 +125,7 @@ Until a bug fix is available in a later release, you can resolve the issue tempo
91
125
92
126
:::{dropdown} [macOS] Osquery integration fails to start on fresh agent installs
93
127
94
-
**Applies to: {{agent}} 9.0.0 and 9.0.1 (macOS only)**
128
+
**Applies to**: {{agent}} 9.0.0 and 9.0.1 (macOS only)
95
129
96
130
On May 26th, 2025, a known issue was discovered that causes the `osquery` integration to fail on new {{agent}} installations on macOS. During the installation process, the required `osquery.app/` directory is removed, which prevents the integration from starting.
0 commit comments