Skip to content

Commit f36ddd4

Browse files
authored
Merge branch 'main' into enhance-and-restructure-autoops-section
2 parents a3f50b5 + 55ae752 commit f36ddd4

25 files changed

+355
-85
lines changed

deploy-manage/deploy/cloud-enterprise/ece-networking-prereq.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ For versions 2.4.0 and 2.4.1, IPv6 should remain enabled on any host with the Pr
1616

1717
* [Inbound traffic](#ece-inbound)
1818
* [Outbound traffic](#ece-outbound)
19+
* [Container communication on the same host](#ece-container-communication-on-same-host)
1920
* [Hosts in multiple data centers](#ece-multiple-data-centers)
2021

21-
2222
## Inbound traffic [ece-inbound]
2323

2424
When there are multiple hosts for each role, the inbound networking and ports can be represented by the following diagram:
@@ -68,6 +68,21 @@ Outbound traffic must also permit connections to the [snapshot repositories](../
6868
::::
6969

7070

71+
## Container communication on the same host [ece-container-communication-on-same-host]
72+
73+
The following ports need to be open for containers communicating with the host or with each other on the same host:
74+
75+
| Port(s) | Purpose | Host role |
76+
| --- | --- | --- |
77+
| 53 | DNS resolver | All roles |
78+
| 2180 | ZooKeeper admin port | All roles |
79+
| 2375 | Docker admin port | All roles |
80+
| 2191-2199 | Debug ports | Director |
81+
| 5000-5010 | Java Virtual Machine (JVM)/debug ports | All roles |
82+
| 8080-8084 | Health/monitoring ports | All roles |
83+
| 9000, 9043 | Internal proxy use | Proxy |
84+
| 9244 | Internal proxy port | All roles |
85+
7186

7287
## Hosts in multiple data centers [ece-multiple-data-centers]
7388

Lines changed: 115 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,115 @@
1+
---
2+
applies_to:
3+
deployment:
4+
self:
5+
ece:
6+
eck:
7+
navigation_title: Configure Elastic agent with custom certificate
8+
products:
9+
- id: cloud-kubernetes
10+
- id: cloud-enterprise
11+
---
12+
13+
# Configure AutoOps {{agent}} with a custom SSL certificate
14+
15+
{{agent}} might not recognize your SSL certificate if it is signed by a custom or internal Certificate Authority (CA). In this case, {{agent}} will fail to connect your self-managed cluster to AutoOps and you might encounter an error like the following:
16+
17+
```sh
18+
... x509: certificate signed by unknown authority ...
19+
```
20+
21+
This error occurs because the machine where you have installed {{agent}} does not trust your custom or internal CA. To fix this error, follow the steps on this page to configure the agent with your custom SSL certificate.
22+
23+
## Add custom certificate path to the `elastic-agent.yml` file
24+
25+
To configure {{agent}} with your custom SSL certificate, add the path to your certificate to the [`elastic-agent.yml`](/reference/fleet/configure-standalone-elastic-agents.md) policy file on the host machine where the agent is installed.
26+
27+
Complete the following steps:
28+
29+
1. On the host machine, open the `elastic-agent.yml` file. The default location is `/opt/Elastic/Agent/elastic-agent.yml`.
30+
2. In the `elastic-agent.yml` file, locate the `receivers.metricbeatreceiver.metricbeat.modules` section.
31+
3. In this section, there are two modules configured for `autoops_es`, one for metrics and one for templates. \
32+
Add the `ss.certificate_authorities` setting to both these modules using one of the following options:
33+
34+
:::::{tab-set}
35+
:group: add-cert-auth-setting-to-module
36+
37+
::::{tab-item} Use environment variable (recommended)
38+
:sync: env-variable
39+
40+
We recommend using this method because it's flexible and keeps sensitive paths out of your main configuration.
41+
42+
Add the following line to both `autoops_es` modules:
43+
44+
```yaml
45+
ssl.certificate_authorities:
46+
- ${env:AUTOOPS_CA_CERT}
47+
```
48+
After adding this line to both modules, make sure the` AUTOOPS_CA_CERT` environment variable is set on the host machine and contains the full path to your certificate file (for example: `/etc/ssl/certs/my_internal_ca.crt`).
49+
::::
50+
51+
::::{tab-item} Hardcode file path
52+
:sync: hardcode-file-path
53+
54+
Use this method to specify the path directly. This method is often simpler for fixed or test environments.
55+
56+
Edit the following line with the path to your CA and add it to both `autoops_es` modules:
57+
58+
```yaml
59+
ssl.certificate_authorities:
60+
- "/path/to/your/ca.crt"
61+
```
62+
The following codeblock shows what your final configuration should look like when you use the hardcode method.
63+
64+
```yaml
65+
receivers:
66+
metricbeatreceiver:
67+
metricbeat:
68+
modules:
69+
# Metrics
70+
- module: autoops_es
71+
hosts: ${env:AUTOOPS_ES_URL}
72+
period: 10s
73+
metricsets:
74+
- cat_shards
75+
- cluster_health
76+
- cluster_settings
77+
- license
78+
- node_stats
79+
- tasks_management
80+
# --- ADD THIS LINE ---
81+
ssl.certificate_authorities:
82+
- "/path/to/your/ca.crt"
83+
84+
# Templates
85+
- module: autoops_es
86+
hosts: ${env:AUTOOPS_ES_URL}
87+
period: 24h
88+
metricsets:
89+
- cat_template
90+
- component_template
91+
- index_template
92+
# --- ADD THIS LINE ---
93+
ssl.certificate_authorities:
94+
- "/path/to/your/ca.crt"
95+
```
96+
97+
::::
98+
99+
:::::
100+
101+
4. Save your changes to the `elastic-agent.yml` file.
102+
5. Restart {{agent}} so that the new settings can take effect.\
103+
In most systemd-based Linux environments, you can use the following command to restart the agent:
104+
```bash
105+
sudo systemctl restart elastic-agent
106+
```
107+
6. Check the agent logs again to confirm that the error is gone and that {{agent}} has successfully connected your self-managed cluster to AutoOps.
108+
109+
:::{note}
110+
If you encounter the following error in the agent logs, there might be a formatting issue in the `elastic-agent.yml` file.
111+
```sh
112+
... can not convert 'object' into 'string' ... ssl.certificate_authorities ...
113+
```
114+
To fix this error, ensure your configuration is correctly formatted. The `ss.certificate_authorities` setting must be a list item (indicated by the `-`) containing one or more strings (the respective path to your certification files).
115+
:::

deploy-manage/monitor/autoops/cc-cloud-connect-autoops-troubleshooting.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ Use this guide to troubleshoot any issues you may encounter.
2323
* [My cluster was disconnected from {{ecloud}} and I want to reconnect it.](#disconnected-cluster)
2424
* [After running the installation command, I can't move on to the next steps.](#next-steps)
2525
* [My organization's firewall may be preventing {{agent}} from collecting and sending metrics.](#firewall)
26+
* [{{agent}} is failing to connect because it doesn't recognize my SSL certificate.](#custom-cert)
2627

2728
$$$single-cloud-org$$$**I’m trying to create a Cloud organization, but I’m already part of a different one.**
2829
: :::{include} /deploy-manage/monitor/_snippets/single-cloud-org.md
@@ -40,6 +41,9 @@ $$$next-steps$$$**After running the installation command, I can't move on to the
4041
$$$firewall$$$**My organization's firewall may be preventing {{agent}} from collecting and sending metrics.**
4142
: If you're having issues with connecting your cluster to AutoOps and you suspect that a firewall may be the reason, refer to [](/deploy-manage/monitor/autoops/autoops-sm-troubleshoot-firewalls.md).
4243

44+
$$$custom-cert$$$**{{agent}} is failing to connect because it doesn't recognize my SSL certificate.**
45+
: If {{agent}} is failing to connect your self-managed cluster to AutoOps because it doesn't recognize your SSL certificate, refer to [](/deploy-manage/monitor/autoops/autoops-sm-custom-certification.md).
46+
4347
## Potential errors
4448

4549
The following table shows the errors you might encounter if something goes wrong while you set up and use AutoOps on your clusters.
@@ -58,3 +62,4 @@ The following table shows the errors you might encounter if something goes wrong
5862
| `VERSION_MISMATCH` | {{es}} version is unsupported | Upgrade your cluster to a [supported version](https://www.elastic.co/support/eol). |
5963
| `UNKNOWN_ERROR` | Installation failed | {{agent}} couldn't be installed due to an unknown issue. Consult the troubleshooting guide or contact [Elastic support](https://support.elastic.co/) for more help. |
6064
| | Failed to register Cloud Connected Mode: cluster license type is not supported | The cluster you are trying to connect doesn't have the required license to connect to AutoOps. For more information, refer to the [prerequisites](/deploy-manage/monitor/autoops/cc-connect-self-managed-to-autoops.md#prerequisites). |
65+
| `x509` | Certificate signed by unknown authority | {{agent}} couldn't connect. SSL certificate signed by unknown authority. |

deploy-manage/toc.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -689,6 +689,7 @@ toc:
689689
children:
690690
- file: monitor/autoops/cc-connect-self-managed-to-autoops.md
691691
- file: monitor/autoops/cc-connect-local-dev-to-autoops.md
692+
- file: monitor/autoops/autoops-sm-custom-certification.md
692693
- file: monitor/autoops/cc-manage-users.md
693694
- file: monitor/autoops/use-autoops-in-sm-cluster.md
694695
- file: monitor/autoops/cc-cloud-connect-autoops-troubleshooting.md

docset.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -97,7 +97,6 @@ subs:
9797
es-serverless: "Elasticsearch Serverless"
9898
obs-serverless: "Elastic Observability Serverless"
9999
sec-serverless: "Elastic Security Serverless"
100-
ess-leadin-short: "Our hosted Elasticsearch Service is available on AWS, GCP, and Azure, and you can try it for free: https://cloud.elastic.co/registration."
101100
apm-app: "APM app"
102101
uptime-app: "Uptime app"
103102
synthetics-app: "Synthetics app"

explore-analyze/discover/discover-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -334,7 +334,7 @@ To manage and organize your tabs, you can:
334334
:::{tip}
335335
If you want to discard all open tabs, you can also start a {icon}`plus` **New session** from the toolbar. When you use this option, any unsaved changes to your current session are lost.
336336
:::
337-
- Reopen recently closed tabs: If you close a tab by mistake, you can retrieve it by selecting the {icon}`boxes_vertical` **Tabs bar menu** icon located at the end of the tab bar.
337+
- Reopen recently closed tabs: If you close a tab by mistake, you can retrieve it by selecting the {icon}`boxes_vertical` **Tabs menu** icon located at the end of the tab bar.
338338

339339
To keep all of your tabs for later, you can [Save your Discover session](#save-discover-search). All currently open tabs are saved within the session and will be there when you open it again.
340340

manage-data/ingest/ingest-reference-architectures.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ We offer a variety of ingest architectures to serve a wide range of use cases an
1313
To ingest data into {{es}}, use the *simplest option that meets your needs* and satisfies your use case. For many users and use cases, the simplest approach is ingesting data with {{agent}} and sending it to {{es}}. {{agent}} and [{{agent}} integrations](https://www.elastic.co/integrations/) are available for many popular platforms and services, and are a good place to start.
1414

1515
::::{tip}
16-
You can host {{es}} on your own hardware or send your data to {{es}} on {{ecloud}}. For most users, {{agent}} writing directly to {{es}} on {{ecloud}} provides the easiest and fastest time to value. {{ess-leadin-short}}
16+
You can host {{es}} on your own hardware or send your data to {{es}} on {{ecloud}}. For most users, {{agent}} writing directly to {{es}} on {{ecloud}} provides the easiest and fastest time to value. {{ech}} is available on {{aws}}, GCP, and Azure, and you can [try it for free](https://cloud.elastic.co/registration).
1717
::::
1818

1919
**Decision tree**

manage-data/ingest/tools.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,8 +48,8 @@ Refer to our [Ingestion](/manage-data/ingest.md) overview for some guidelines to
4848
| Integrations | Ingest data using a variety of Elastic integrations. | [Elastic Integrations](integration-docs://reference/index.md) |
4949
| File upload | Upload data from a file and inspect it before importing it into {{es}}. | [Upload data files](/manage-data/ingest/upload-data-files.md) |
5050
| APIs | Ingest data through code by using the APIs of one of the language clients or the {{es}} HTTP APIs. | [Document APIs](https://www.elastic.co/docs/api/doc/elasticsearch/group/endpoint-document) |
51-
| OpenTelemetry | Collect and send your telemetry data to Elastic Observability | [Elastic Distributions of OpenTelemetry](opentelemetry://reference/index.md). |
52-
| Fleet and Elastic Agent | Add monitoring for logs, metrics, and other types of data to a host using Elastic Agent, and centrally manage it using Fleet. | [Fleet and {{agent}} overview](/reference/fleet/index.md) <br> [{{fleet}} and {{agent}} restrictions (Serverless)](/reference/fleet/fleet-agent-serverless-restrictions.md) <br> [{{beats}} and {{agent}} capabilities](/reference/fleet/beats-agent-comparison.md)||
51+
| OpenTelemetry | Collect and send your telemetry data to Elastic Observability | [Elastic Distributions of OpenTelemetry](opentelemetry://reference/index.md) |
52+
| Fleet and Elastic Agent | Add monitoring for logs, metrics, and other types of data to a host using Elastic Agent, and centrally manage it using Fleet. | [Fleet and {{agent}} overview](/reference/fleet/index.md) <br> [{{fleet}} and {{agent}} restrictions (Serverless)](/reference/fleet/fleet-agent-serverless-restrictions.md) <br> [{{beats}} and {{agent}} capabilities](/reference/fleet/beats-agent-comparison.md)|
5353
| {{elastic-defend}} | {{elastic-defend}} provides organizations with prevention, detection, and response capabilities with deep visibility for EPP, EDR, SIEM, and Security Analytics use cases across Windows, macOS, and Linux operating systems running on both traditional endpoints and public cloud environments. | [Configure endpoint protection with {{elastic-defend}}](/solutions/security/configure-elastic-defend.md) |
5454
| {{ls}} | Dynamically unify data from a wide variety of data sources and normalize it into destinations of your choice with {{ls}}. | [Logstash](logstash://reference/index.md) |
5555
| {{beats}} | Use {{beats}} data shippers to send operational data to Elasticsearch directly or through Logstash. | [{{beats}}](beats://reference/index.md) |

reference/fleet/agent-provider.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,8 @@
11
---
22
mapped_pages:
33
- https://www.elastic.co/guide/en/fleet/current/agent-provider.html
4+
applies_to:
5+
stack: ga
46
products:
57
- id: fleet
68
- id: elastic-agent

reference/fleet/docker-provider.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,14 @@
11
---
22
mapped_pages:
33
- https://www.elastic.co/guide/en/fleet/current/docker-provider.html
4+
applies_to:
5+
stack: ga
46
products:
57
- id: fleet
68
- id: elastic-agent
79
---
810

9-
# Docker Provider [docker-provider]
11+
# Docker provider [docker-provider]
1012

1113
Provides inventory information from Docker. The available dynamic variables are:
1214

0 commit comments

Comments
 (0)