Skip to content

Commit 9fcf5da

Browse files
committed
Incorporates Brandon's review
1 parent 59c4591 commit 9fcf5da

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

release-notes/elastic-cloud-serverless/known-issues.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,14 +17,14 @@ Known issues are significant defects or limitations that may impact your impleme
1717
## Active
1818

1919
:::{dropdown} Deploying integrations using AWS CloudFormation doesn't work
20-
On November 10, 2025 it was discovered that new deployments of integrations such as Asset Discovery and Cloud Security Posture Management that collect data from cloud service providers do not work when deployed to AWS using the AWS CloudFormation deployment option. The problem results from a malformed CloudFormation parameter: `ElasticAgentVersion`. The default value for `ElasticAgentVersion` has a `space` instead of a `+`. This produces an invalid agent version value.
20+
New deployments of integrations that collect data from cloud service providers, such as Asset Discovery and Cloud Security Posture Management, do not work when deployed to AWS using agent-based deployment and the AWS CloudFormation deployment option. The problem results from a malformed CloudFormation parameter: `ElasticAgentVersion`. The default value for `ElasticAgentVersion` has a space instead of a `+`. This produces an invalid agent version value.
2121

22-
For more information, check [#14627](https://github.com/elastic/security-team/issues/14627).
22+
For more information, check [#14627](https://github.com/elastic/kibana/pull/242365).
2323

2424

2525
**Workaround**<br>
2626

27-
To work around this issue, update the default CloudFormation template by replacing the `space` in the `ElasticAgentVersion` parameter with a `+`.
27+
To work around this issue, update the default CloudFormation template by replacing the space in the `ElasticAgentVersion` parameter with a `+`.
2828

2929
:::
3030

release-notes/elastic-security/known-issues.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,14 +20,14 @@ Known issues are significant defects or limitations that may impact your impleme
2020
Applies to: 9.2.0 and 9.2.1
2121

2222
**Impact**<br>
23-
New deployments of integrations such as Asset Discovery and Cloud Security Posture Management that collect data from cloud service providers do not work when deployed to AWS using the AWS CloudFormation deployment option. The problem results from a malformed CloudFormation parameter: `ElasticAgentVersion`. The default value for `ElasticAgentVersion` has a `space` instead of a `+`. This produces an invalid agent version value.
23+
New deployments of integrations that collect data from cloud service providers, such as Asset Discovery and Cloud Security Posture Management, do not work when deployed to AWS using agent-based deployment and the AWS CloudFormation deployment option. The problem results from a malformed CloudFormation parameter: `ElasticAgentVersion`. The default value for `ElasticAgentVersion` has a space instead of a `+`. This produces an invalid agent version value.
2424

25-
For more information, check [#14627](https://github.com/elastic/security-team/issues/14627).
25+
For more information, check [#14627](https://github.com/elastic/kibana/pull/242365).
2626

2727

2828
**Workaround**<br>
2929

30-
To work around this issue, update the default CloudFormation template by replacing the `space` in the `ElasticAgentVersion` parameter with a `+`.
30+
To work around this issue, update the default CloudFormation template by replacing the space in the `ElasticAgentVersion` parameter with a `+`.
3131

3232
**Resolved**<br>
3333

0 commit comments

Comments
 (0)