Skip to content

Commit ad68c1b

Browse files
authored
Merge branch 'main' into 2404-air-gapped-env-Security-AI
2 parents 9fdd5bb + 08b7fc2 commit ad68c1b

16 files changed

+182
-170
lines changed

deploy-manage/tools/snapshot-and-restore/ec-azure-snapshotting.md

Lines changed: 2 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -19,26 +19,7 @@ Configure a custom snapshot repository using your Azure Blob storage account.
1919
Follow the Microsoft documentation to [set up an Azure storage account](https://docs.microsoft.com/en-us/azure/storage/common/storage-account-create) with an access key, and then [create a container](https://docs.microsoft.com/en-us/azure/storage/blobs/storage-quickstart-blobs-portal).
2020

2121

22-
## Enable the `repository-azure` plugin in {{stack}} 7.17 and earlier [ec-enable-azure-plugin]
23-
24-
For deployments with **{{stack}} version 7.17 and earlier**, you’ll need to enable the `repository-azure` plugin to use the Azure repository type. On the Azure platform, the plugin is enabled by default. If your deployment is on AWS or GCP, follow these steps to enable the `repository-azure` plugin:
25-
26-
1. Refer to [Azure Repository Plugin](https://www.elastic.co/guide/en/elasticsearch/plugins/7.17/repository-azure.html) to download the version of the plugin that matches your {{stack}} version.
27-
2. Upload the plugin to your deployment:
28-
29-
1. Log in to the [{{ecloud}} Console](https://cloud.elastic.co?page=docs&placement=docs-body).
30-
2. From your deployment, select **Manage**.
31-
3. From the lower navigation menu, select **Extensions** and then select **Upload extension**.
32-
4. Specify the plugin name (`repository-azure`) and version.
33-
5. Select **An installable plugin (compiled, no source code)**.
34-
6. Select **Create extension**.
35-
7. Navigate back to the **Extensions** page.
36-
8. Select the extension name.
37-
9. Drag and drop to upload the `repository-azure` plugin zip file.
38-
39-
40-
41-
### Configure the keystore [ec-configure-azure-keystore]
22+
## Configure the keystore [ec-configure-azure-keystore]
4223

4324
Create an entry for the Azure client in the {{es}} keystore:
4425

@@ -52,8 +33,7 @@ Create an entry for the Azure client in the {{es}} keystore:
5233

5334
5. Select **Save**.
5435

55-
56-
### Create the repository [ec-create-azure-repository]
36+
## Create the repository [ec-create-azure-repository]
5737

5838
1. Open {{kib}} and go to **Management** > **Snapshot and Restore**.
5939
2. On the **Repositories** tab, select **Register a repository**.

deploy-manage/tools/snapshot-and-restore/ec-gcs-snapshotting.md

Lines changed: 2 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -32,26 +32,7 @@ For more detailed information on the JSON account service key, refer to [Using a
3232
Follow the Google Cloud Storage documentation to [create a GCS bucket](https://cloud.google.com/storage/docs/creating-buckets).
3333

3434

35-
## Enable the `repository-gcs` plugin in {{stack}} 7.17 and earlier [ec-enable-gcs-plugin]
36-
37-
For deployments with **{{stack}} version 7.17 and earlier**, you’ll need to enable the `repository-gcs` plugin to use the Google Cloud Storage repository type. On Google Cloud Platform, the plugin is enabled by default. If your deployment is on AWS or Azure, follow these steps to enable the `repository-gcs` plugin:
38-
39-
1. Refer to [Google Cloud Storage Repository Plugin](https://www.elastic.co/guide/en/elasticsearch/plugins/7.17/repository-gcs.html) to download the version of the plugin that matches your {{stack}} version.
40-
2. Upload the plugin to your deployment:
41-
42-
1. Log in to the [{{ecloud}} Console](https://cloud.elastic.co?page=docs&placement=docs-body).
43-
2. From your deployment, select **Manage**.
44-
3. From the lower navigation menu, select **Extensions** and then select **Upload extension**.
45-
4. Specify the plugin name (`repository-gcs`) and version.
46-
5. Select **An installable plugin (compiled, no source code)**.
47-
6. Select **Create extension**.
48-
7. Navigate back to the **Extensions** page.
49-
8. Select the extension name.
50-
9. Drag and drop to upload the `repository-gcs` plugin zip file.
51-
52-
53-
54-
### Configure the keystore [ec-configure-gcs-keystore]
35+
## Configure the keystore [ec-configure-gcs-keystore]
5536

5637
Create an entry for the GCS client in the {{es}} keystore:
5738

@@ -62,8 +43,7 @@ Create an entry for the GCS client in the {{es}} keystore:
6243
5. With **Type** set to **JSON block / file**, add your [GCS service account key JSON file](#ec-gcs-service-account-key).
6344
6. Select **Save**.
6445

65-
66-
### Create the repository [ec-create-gcs-repository]
46+
## Create the repository [ec-create-gcs-repository]
6747

6848
1. Open {{kib}} and go to **Management** > **Snapshot and Restore**.
6949
2. On the **Repositories** tab, select **Register a repository**.
106 KB
Loading
Lines changed: 15 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,48 +1,45 @@
11
---
2-
navigation_title: Manage {{agent}}s in {{fleet}}
2+
navigation_title: Manage {{agents}} in {{fleet}}
33
mapped_pages:
44
- https://www.elastic.co/guide/en/fleet/current/manage-agents-in-fleet.html
55
products:
66
- id: fleet
77
- id: elastic-agent
88
---
99

10-
# Centrally manage {{agent}}s in {{fleet}} [manage-agents-in-fleet]
10+
# Centrally manage {{agents}} in {{fleet}} [manage-agents-in-fleet]
1111

12-
13-
::::{admonition}
1412
The {{fleet}} app in {{kib}} supports both {{agent}} infrastructure management and agent policy management. You can use {{fleet}} to:
1513

16-
* Manage {{agent}} binaries and specify settings installed on the host that determine whether the {{agent}} is enrolled in {{fleet}}, what version of the agent is running, and which agent policy is used.
17-
* Manage agent policies that specify agent configuration settings, which integrations are running, whether agent monitoring is turned on, input settings, and so on.
14+
- Manage {{agent}} binaries and specify settings installed on the host that determine whether the agent is enrolled in {{fleet}}, what version of the agent is running, and which agent policy is used.
15+
- Manage agent policies that specify agent configuration settings, which integrations are running, whether agent monitoring is turned on, input settings, and more.
1816

1917
Advanced users who don’t want to use {{fleet}} for central management can use an external infrastructure management solution and [install {{agent}} in standalone mode](/reference/fleet/install-standalone-elastic-agent.md) instead.
2018

21-
::::
22-
23-
2419
::::{important}
2520
{{fleet}} currently requires a {{kib}} user with `All` privileges on {{fleet}} and {{integrations}}. Since many Integrations assets are shared across spaces, users need the {{kib}} privileges in all spaces. Refer to [Required roles and privileges](/reference/fleet/fleet-roles-privileges.md) to learn how to create a user role with the required privileges to access {{fleet}} and {{integrations}}.
26-
2721
::::
2822

23+
To learn how to add {{agents}} to {{fleet}}, refer to [Install {{fleet}}-managed {{agents}}](/reference/fleet/install-fleet-managed-elastic-agent.md).
2924

30-
To learn how to add {{agent}}s to {{fleet}}, refer to [Install {{fleet}}-managed {{agent}}s](/reference/fleet/install-fleet-managed-elastic-agent.md).
31-
32-
To use {{fleet}} go to **Management > {{fleet}}** in {{kib}}. The following table describes the main management actions you can perform in {{fleet}}:
25+
Find **{{fleet}}** in the {{kib}} navigation menu, or use the [global search field](/explore-analyze/find-and-organize/find-apps-and-objects.md). The following table describes the main management actions you can perform in {{fleet}}:
3326

3427
| Component | Management actions |
3528
| --- | --- |
36-
| [{{fleet}} settings](/reference/fleet/fleet-settings.md) | Configure global settings available to all {{agent}}s managed by {{fleet}},including {{fleet-server}} hosts and output settings. |
37-
| [{{agent}}s](/reference/fleet/manage-agents.md) | Enroll, unenroll, upgrade, add tags, and view {{agent}} status and logs. |
29+
| [{{fleet}} settings](/reference/fleet/fleet-settings.md) | Configure global settings available to all {{agents}} managed by {{fleet}}, including {{fleet-server}} hosts and output settings. |
30+
| [{{agents}}](/reference/fleet/manage-agents.md) | Enroll, unenroll, upgrade, add tags, and view {{agent}} status and logs. |
3831
| [Policies](/reference/fleet/agent-policy.md) | Create and edit agent policies and add integrations to them. |
3932
| [{{fleet}} enrollment tokens](/reference/fleet/fleet-enrollment-tokens.md) | Create and revoke enrollment tokens. |
4033
| [Uninstall tokens](/solutions/security/configure-elastic-defend/prevent-elastic-agent-uninstallation.md) | ({{elastic-defend}} integration only) Access tokens to allow uninstalling {{agent}} from endpoints with Agent tamper protection enabled. |
4134
| [Data streams](/reference/fleet/data-streams.md) | View data streams and navigate to dashboards to analyze your data. |
4235

36+
## Global {{fleet}} management
4337

38+
In {{fleet}} deployments where {{agents}} are installed in diverse locations and where data must be stored in local clusters, operators need a unified view of all agents and a central management interface for tasks like upgrades, policy organization, and metrics collection. {{fleet}} offers features to facilitate this deployment model:
4439

40+
- [Remote {{es}} output](/reference/fleet/remote-elasticsearch-output.md): Configure {{agents}} to send data to remote {{es}} clusters while still sending their check-in payloads to the management cluster. This allows {{fleet}} on the management cluster to maintain a global view of all agents while the ingested data is routed to the agents' respective local clusters.
41+
- [Automatic integrations synchronization](/reference/fleet/automatic-integrations-synchronization.md) {applies_to}`stack: ga 9.1.0`: Install an integration once in the management cluster and use {{fleet}} to synchronize and update the integration across all remote clusters. This enables you to initiate services like [OSquery](integration-docs://reference/osquery-intro.md) from the management cluster, and to collect and display responses from dispersed agents in {{fleet}} on the central management cluster.
4542

46-
47-
48-
43+
:::{image} images/manage-agents-global-fleet.png
44+
:alt: A diagram showing Elastic Agents connected to remote data clusters and to a Fleet management cluster
45+
:::

reference/fleet/upgrade-elastic-agent.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,7 @@ You can do rolling upgrades to avoid exhausting network resources when updating
101101

102102
5. Upgrade the agents.
103103

104+
Note that agents in a rollout period have the status `Updating` until the upgrade is complete, even if the upgrade has not started yet.
104105

105106
## Schedule an upgrade [schedule-agent-upgrade]
106107

@@ -245,7 +246,9 @@ To configure an automatic rollout of a new minor or patch version to a percentag
245246
7. You can then add a different target version, and specify the percentage of agents you want to be upgraded to that version. The total percentage of agents to be upgraded cannot exceed 100%.
246247
8. Click **Save**.
247248

248-
Once the configuration is saved, an asynchronous task runs every 30 minutes, gradually upgrading the agents in the policy to the specified target version.
249+
Once the configuration is saved, an asynchronous task runs every 30 minutes, upgrading the agents in the policy to the specified target version.
250+
251+
If the number of agents to be upgraded is greater than or equal to 10, a rollout period is automatically applied. The rollout duration is either 10 minutes or `nAgents * 0.03` seconds, whichever is greater.
249252

250253
In case of any failed upgrades, the upgrades are retried with exponential backoff mechanism until the upgrade is successful, or the maximum number of retries is reached. Note that the maximum number of retries is the number of [configured retry delays](#auto-upgrade-settings).
251254

174 KB
Loading
-75.9 KB
Loading
-17 KB
Loading
-182 KB
Loading
-180 KB
Loading

0 commit comments

Comments
 (0)