diff --git a/reference/fleet/add-fleet-server-kubernetes.md b/reference/fleet/add-fleet-server-kubernetes.md index 9a2fe03bb7..beafc5bd18 100644 --- a/reference/fleet/add-fleet-server-kubernetes.md +++ b/reference/fleet/add-fleet-server-kubernetes.md @@ -302,7 +302,7 @@ Adapt and change the suggested manifests and deployment strategy to your needs, :::{tab-item} Production - ```yaml + ```yaml subs=true apiVersion: v1 kind: Service metadata: @@ -333,7 +333,7 @@ Adapt and change the suggested manifests and deployment strategy to your needs, automountServiceAccountToken: false containers: - name: elastic-agent - image: docker.elastic.co/beats/elastic-agent:9.0.0-beta1 + image: docker.elastic.co/beats/elastic-agent:{{stack-version}} env: - name: FLEET_SERVER_ENABLE value: "true" @@ -388,7 +388,7 @@ Adapt and change the suggested manifests and deployment strategy to your needs, :::{tab-item} Quick start - ```yaml + ```yaml subs=true apiVersion: v1 kind: Service metadata: @@ -419,7 +419,7 @@ Adapt and change the suggested manifests and deployment strategy to your needs, automountServiceAccountToken: false containers: - name: elastic-agent - image: docker.elastic.co/beats/elastic-agent:9.0.0-beta1 + image: docker.elastic.co/beats/elastic-agent:{{stack-version}} env: - name: FLEET_SERVER_ENABLE value: "true" diff --git a/reference/fleet/air-gapped.md b/reference/fleet/air-gapped.md index e21b167540..fe802b7a60 100644 --- a/reference/fleet/air-gapped.md +++ b/reference/fleet/air-gapped.md @@ -105,10 +105,10 @@ The {{package-registry}} can be deployed and hosted onsite using one of the avai There are different distributions available: -* 9.0.0-beta1 (recommended): `docker.elastic.co/package-registry/distribution:9.0.0-beta1` - Selection of packages from the production repository released with {{stack}} 9.0.0-beta1. -* lite-9.0.0-beta1: `docker.elastic.co/package-registry/distribution:lite-9.0.0-beta1` - Subset of the most commonly used packages from the production repository released with {{stack}} 9.0.0-beta1. This image is a good candidate to start using {{fleet}} in air-gapped environments. -* production: `docker.elastic.co/package-registry/distribution:production` - Packages available in the production registry ([https://epr.elastic.co](https://epr.elastic.co)). Please note that this image is updated every time a new version of a package gets published. -* lite: `docker.elastic.co/package-registry/distribution:lite` - Subset of the most commonly used packages available in the production registry ([https://epr.elastic.co](https://epr.elastic.co)). Please note that this image is updated every time a new version of a package gets published. +* {{stack-version}} (recommended): *docker.elastic.co/package-registry/distribution:{{stack-version}}* - Selection of packages from the production repository released with {{stack}} {{stack-version}}. +* lite-{{stack-version}}: *docker.elastic.co/package-registry/distribution:lite-{{stack-version}}* - Subset of the most commonly used packages from the production repository released with {{stack}} {{stack-version}}. This image is a good candidate to start using {{fleet}} in air-gapped environments. +* production: *docker.elastic.co/package-registry/distribution:production* - Packages available in the production registry ([https://epr.elastic.co](https://epr.elastic.co)). Please note that this image is updated every time a new version of a package gets published. +* lite: *docker.elastic.co/package-registry/distribution:lite* - Subset of the most commonly used packages available in the production registry ([https://epr.elastic.co](https://epr.elastic.co)). Please note that this image is updated every time a new version of a package gets published. To update the distribution image, re-pull the image and then restart the docker container. @@ -122,14 +122,14 @@ These steps use the standard Docker CLI, but you can create a Kubernetes manifes 1. Pull the Docker image from the public Docker registry: - ```sh - docker pull docker.elastic.co/package-registry/distribution:9.0.0-beta1 + ```sh subs=true + docker pull docker.elastic.co/package-registry/distribution:{{stack-version}} ``` 2. Save the Docker image locally: - ```sh - docker save -o package-registry-9.0.0-beta1.tar docker.elastic.co/package-registry/distribution:9.0.0-beta1 + ```sh subs=true + docker save -o package-registry-{{stack-version}}.tar docker.elastic.co/package-registry/distribution:{{stack-version}} ``` ::::{tip} @@ -138,22 +138,22 @@ These steps use the standard Docker CLI, but you can create a Kubernetes manifes 3. Transfer the image to the air-gapped environment and load it: - ```sh - docker load -i package-registry-9.0.0-beta1.tar + ```sh subs=true + docker load -i package-registry-{{stack-version}}.tar ``` 4. Run the {{package-registry}}: - ```sh - docker run -it -p 8080:8080 docker.elastic.co/package-registry/distribution:9.0.0-beta1 + ```sh subs=true + docker run -it -p 8080:8080 docker.elastic.co/package-registry/distribution:{{stack-version}} ``` 5. (Optional) You can monitor the health of your {{package-registry}} with requests to the root path: - ```sh + ```sh subs=true docker run -it -p 8080:8080 \ --health-cmd "curl -f -L http://127.0.0.1:8080/health" \ - docker.elastic.co/package-registry/distribution:9.0.0-beta1 + docker.elastic.co/package-registry/distribution:{{stack-version}} ``` @@ -173,14 +173,14 @@ You can configure the {{package-registry}} to listen on a secure HTTPS port usin For example, given a key and a certificate pair available in `/etc/ssl`, you can start the {{package-registry}} listening on the 443 port using the following command: -```sh +```sh subs=true docker run -it -p 443:443 \ -v /etc/ssl/package-registry.key:/etc/ssl/package-registry.key:ro \ -v /etc/ssl/package-registry.crt:/etc/ssl/package-registry.crt:ro \ -e EPR_ADDRESS=0.0.0.0:443 \ -e EPR_TLS_KEY=/etc/ssl/package-registry.key \ -e EPR_TLS_CERT=/etc/ssl/package-registry.crt \ - docker.elastic.co/package-registry/distribution:9.0.0-beta1 + docker.elastic.co/package-registry/distribution:{{stack-version}} ``` The {{package-registry}} supports TLS versions from 1.0 to 1.3. The minimum version accepted can be configured with `EPR_TLS_MIN_VERSION`, it defaults to 1.0. If you want to restrict the supported versions from 1.2 to 1.3, you can use `EPR_TLS_MIN_VERSION=1.2`. @@ -205,49 +205,49 @@ To make binaries available in an air-gapped environment, you can host your own c 1. Download the latest release artifacts from the public {{artifact-registry}} at `https://artifacts.elastic.co/downloads/`. For example, the following cURL commands download all the artifacts that may be needed to upgrade {{agent}}s running on Linux x86_64. You may replace `x86_64` with `arm64` for the ARM64 version. The exact list depends on which integrations you’re using. Make sure to also download the corresponding sha512, and PGP Signature (.asc) files for each binary. These are used for file integrity validations during installations and upgrades. - ```shell - curl -O https://artifacts.elastic.co/downloads/apm-server/apm-server-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/apm-server/apm-server-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/apm-server/apm-server-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/beats/auditbeat/auditbeat-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/beats/auditbeat/auditbeat-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/beats/auditbeat/auditbeat-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/beats/filebeat/filebeat-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/beats/filebeat/filebeat-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/beats/filebeat/filebeat-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/beats/heartbeat/heartbeat-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/beats/heartbeat/heartbeat-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/beats/heartbeat/heartbeat-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/beats/metricbeat/metricbeat-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/beats/metricbeat/metricbeat-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/beats/metricbeat/metricbeat-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/beats/osquerybeat/osquerybeat-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/beats/osquerybeat/osquerybeat-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/beats/osquerybeat/osquerybeat-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/beats/packetbeat/packetbeat-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/beats/packetbeat/packetbeat-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/beats/packetbeat/packetbeat-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/cloudbeat/cloudbeat-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/cloudbeat/cloudbeat-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/cloudbeat/cloudbeat-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/endpoint-dev/endpoint-security-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/endpoint-dev/endpoint-security-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/endpoint-dev/endpoint-security-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/fleet-server/fleet-server-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/fleet-server/fleet-server-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/fleet-server/fleet-server-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-host-agent-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-host-agent-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-host-agent-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-collector-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-collector-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-collector-9.0.0-beta1-linux-x86_64.tar.gz.asc - curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-symbolizer-9.0.0-beta1-linux-x86_64.tar.gz - curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-symbolizer-9.0.0-beta1-linux-x86_64.tar.gz.sha512 - curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-symbolizer-9.0.0-beta1-linux-x86_64.tar.gz.asc + ```shell subs=true + curl -O https://artifacts.elastic.co/downloads/apm-server/apm-server-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/apm-server/apm-server-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/apm-server/apm-server-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/beats/auditbeat/auditbeat-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/beats/auditbeat/auditbeat-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/beats/auditbeat/auditbeat-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/beats/filebeat/filebeat-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/beats/filebeat/filebeat-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/beats/filebeat/filebeat-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/beats/heartbeat/heartbeat-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/beats/heartbeat/heartbeat-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/beats/heartbeat/heartbeat-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/beats/metricbeat/metricbeat-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/beats/metricbeat/metricbeat-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/beats/metricbeat/metricbeat-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/beats/osquerybeat/osquerybeat-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/beats/osquerybeat/osquerybeat-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/beats/osquerybeat/osquerybeat-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/beats/packetbeat/packetbeat-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/beats/packetbeat/packetbeat-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/beats/packetbeat/packetbeat-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/cloudbeat/cloudbeat-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/cloudbeat/cloudbeat-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/cloudbeat/cloudbeat-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/endpoint-dev/endpoint-security-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/endpoint-dev/endpoint-security-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/endpoint-dev/endpoint-security-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/fleet-server/fleet-server-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/fleet-server/fleet-server-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/fleet-server/fleet-server-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-host-agent-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-host-agent-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-host-agent-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-collector-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-collector-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-collector-{{stack-version}}-linux-x86_64.tar.gz.asc + curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-symbolizer-{{stack-version}}-linux-x86_64.tar.gz + curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-symbolizer-{{stack-version}}-linux-x86_64.tar.gz.sha512 + curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-symbolizer-{{stack-version}}-linux-x86_64.tar.gz.asc ``` 2. On your HTTP file server, group the artifacts into directories and sub-directories that follow the same convention used by the {{artifact-registry}}: diff --git a/reference/fleet/elastic-agent-container.md b/reference/fleet/elastic-agent-container.md index bbc150c6c2..ed39a324fe 100644 --- a/reference/fleet/elastic-agent-container.md +++ b/reference/fleet/elastic-agent-container.md @@ -38,25 +38,25 @@ There are two images for Elastic Agent, elastic-agent and elastic-agent-complete Run the `docker pull` command against the Elastic Docker registry: -```terminal -docker pull docker.elastic.co/elastic-agent/elastic-agent:9.0.0-beta1 +```terminal subs=true +docker pull docker.elastic.co/elastic-agent/elastic-agent:{{stack-version}} ``` Alternately, you can use the hardened [Wolfi](https://github.com/wolfi-dev/) image. Using Wolfi images requires Docker version 20.10.10 or later. For details about why the Wolfi images have been introduced, refer to our article [Reducing CVEs in Elastic container images](https://www.elastic.co/blog/reducing-cves-in-elastic-container-images). -```terminal -docker pull docker.elastic.co/elastic-agent/elastic-agent-wolfi:9.0.0-beta1 +```terminal subs=true +docker pull docker.elastic.co/elastic-agent/elastic-agent-wolfi:{{stack-version}} ``` If you want to run Synthetics tests, run the docker pull command to fetch the elastic-agent-complete image: -```terminal -docker pull docker.elastic.co/elastic-agent/elastic-agent-complete:9.0.0-beta1 +```terminal subs=true +docker pull docker.elastic.co/elastic-agent/elastic-agent-complete:{{stack-version}} ``` To run Synthetics tests using the hardened [Wolfi](https://github.com/wolfi-dev/) image, run: -```terminal -docker pull docker.elastic.co/elastic-agent/elastic-agent-complete-wolfi:9.0.0-beta1 +```terminal subs=true +docker pull docker.elastic.co/elastic-agent/elastic-agent-complete-wolfi:{{stack-version}} ``` ## Step 2: Optional: Verify the image [_step_2_optional_verify_the_image] @@ -65,25 +65,25 @@ Although it’s optional, we highly recommend verifying the signatures included Elastic images are signed with Cosign which is part of the [Sigstore](https://www.sigstore.dev) project. Cosign supports container signing, verification, and storage in an OCI registry. Install the appropriate Cosign application for your operating system. -Run the following commands to verify the **elastic-agent** container image signature for Elastic Agent v9.0.0-beta1: +Run the following commands to verify the **elastic-agent** container image signature for Elastic Agent v{{stack-version}}: -```terminal +```terminal subs=true wget https://artifacts.elastic.co/cosign.pub <1> -cosign verify --key cosign.pub docker.elastic.co/elastic-agent/elastic-agent:9.0.0-beta1 <2> +cosign verify --key cosign.pub docker.elastic.co/elastic-agent/elastic-agent:{{stack-version}} <2> ``` 1. Download the Elastic public key to verify container signature 2. Verify the container against the Elastic public key If you’re using the elastic-agent-complete image, run the commands as follows: -```terminal +```terminal subs=true wget https://artifacts.elastic.co/cosign.pub -cosign verify --key cosign.pub docker.elastic.co/elastic-agent/elastic-agent-complete:9.0.0-beta1 +cosign verify --key cosign.pub docker.elastic.co/elastic-agent/elastic-agent-complete:{{stack-version}} ``` The command prints the check results and the signature payload in JSON format, for example: -```terminal -Verification for docker.elastic.co/elastic-agent/elastic-agent-complete:9.0.0-beta1 -- +```terminal subs=true +Verification for docker.elastic.co/elastic-agent/elastic-agent-complete:{{stack-version}} -- The following checks were performed on each of these signatures: - The cosign claims were validated - Existence of the claims in the transparency log was verified offline @@ -94,8 +94,8 @@ The following checks were performed on each of these signatures: The Elastic Agent container command offers a wide variety of options. To see the full list, run: -```terminal -docker run --rm docker.elastic.co/elastic-agent/elastic-agent:9.0.0-beta1 elastic-agent container -h +```terminal subs=true +docker run --rm docker.elastic.co/elastic-agent/elastic-agent:{{stack-version}} elastic-agent container -h ``` ## Step 4: Run the Elastic Agent image [_step_4_run_the_elastic_agent_image] @@ -105,12 +105,12 @@ docker run --rm docker.elastic.co/elastic-agent/elastic-agent:9.0.0-beta1 elasti :::{tab-item} Elastic Cloud -```terminal +```terminal subs=true docker run \ --env FLEET_ENROLL=1 \ <1> --env FLEET_URL= \ <2> --env FLEET_ENROLLMENT_TOKEN= \ <3> - --rm docker.elastic.co/elastic-agent/elastic-agent:9.0.0-beta1 <4> + --rm docker.elastic.co/elastic-agent/elastic-agent:{{stack-version}} <4> ``` 1. Set to 1 to enroll the {{agent}} into {{fleet-server}}. @@ -125,14 +125,14 @@ Refer to [Environment variables](/reference/fleet/agent-environment-variables.md If you’re running a self-managed cluster and want to run your own {{fleet-server}}, run the following command, which will spin up both {{agent}} and {{fleet-server}} in a container: -```terminal +```terminal subs=true docker run \ --env FLEET_SERVER_ENABLE=true \ <1> --env FLEET_SERVER_ELASTICSEARCH_HOST= \ <2> --env FLEET_SERVER_SERVICE_TOKEN= \ <3> --env FLEET_SERVER_POLICY_ID= \ <4> -p 8220:8220 \ <5> - --rm docker.elastic.co/elastic-agent/elastic-agent:9.0.0-beta1 <6> + --rm docker.elastic.co/elastic-agent/elastic-agent:{{stack-version}} <6> ``` 1. Set to 1 to bootstrap Fleet Server on this Elastic Agent. @@ -167,8 +167,8 @@ If you’d like to run {{agent}} in a Docker container on a read-only file syste For example: -```bash -docker run --rm --mount source=$(pwd)/state,destination=/state -e {STATE_PATH}=/state --read-only docker.elastic.co/elastic-agent/elastic-agent:9.0.0-beta1 <1> +```bash subs=true +docker run --rm --mount source=$(pwd)/state,destination=/state -e {STATE_PATH}=/state --read-only docker.elastic.co/elastic-agent/elastic-agent:{{stack-version}} <1> ``` 1. Where `{STATE_PATH}` is the path to a stateful directory to mount where {{agent}} application data can be stored. @@ -210,11 +210,11 @@ You can also add `type=tmpfs` to the mount parameter (`--mount type=tmpfs,destin You can run {{agent}} in docker-compose. The example below shows how to enroll an {{agent}}: -```yaml +```yaml subs=true version: "3" services: elastic-agent: - image: docker.elastic.co/elastic-agent/elastic-agent:9.0.0-beta1 <1> + image: docker.elastic.co/elastic-agent/elastic-agent:{{stack-version}} <1> container_name: elastic-agent restart: always user: root <2> diff --git a/reference/fleet/filter-agent-list-by-tags.md b/reference/fleet/filter-agent-list-by-tags.md index 7bc2537c24..1b9fcfb617 100644 --- a/reference/fleet/filter-agent-list-by-tags.md +++ b/reference/fleet/filter-agent-list-by-tags.md @@ -67,13 +67,13 @@ For the full command synopsis, refer to [elastic-agent install](/reference/fleet The following command applies the `docker` and `dev` tags to {{agent}} running in a Docker container: -```yaml +```yaml subs=true docker run \ --env FLEET_ENROLL=1 \ --env FLEET_URL= \ --env FLEET_ENROLLMENT_TOKEN= \ --env ELASTIC_AGENT_TAGS=docker,dev - --rm docker.elastic.co/elastic-agent/elastic-agent:9.0.0-beta1 + --rm docker.elastic.co/elastic-agent/elastic-agent:{{stack-version}} ``` For more information about running on containers, refer to the guides under [Install {{agent}}s in a containerized environment](/reference/fleet/install-elastic-agents-in-containers.md).