You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -823,8 +823,22 @@ tags, you must unenroll the {agent}, then re-enroll it using new tags.
823
823
Run {agent} without full superuser privileges.
824
824
This option is useful in organizations that limit `root` access on Linux or macOS systems, or `admin` access on Windows systems.
825
825
For details and limitations for running {agent} in this mode, refer to {fleet-guide}/elastic-agent-unprivileged.html[Run {agent} without administrative privileges].
826
-
826
+
+
827
827
Note that changing to `unprivileged` mode is prevented if the agent is currently enrolled in a policy that includes an integration that requires administrative access, such as the {elastic-defend} integration.
828
+
+
829
+
[technical preview] To run {agent} without superuser privileges as a pre-existing user or group, for instance under an Active Directory account, you can specify the user or group, and the password to use.
{fleet-server} URL to use to enroll the {agent} into {fleet}.
@@ -1177,14 +1191,32 @@ For details and limitations for running {agent} in this mode, refer to {fleet-gu
1177
1191
1178
1192
Note that changing a running {agent} to `unprivileged` mode is prevented if the agent is currently enrolled with a policy that contains the {elastic-defend} integration.
1179
1193
1194
+
[technical preview] To run {agent} without superuser privileges as a pre-existing user or group, for instance under an Active Directory account, add either a `--user` or `--group` parameter together with a `--password` parameter.
1195
+
1180
1196
[discrete]
1181
1197
=== Examples
1182
1198
1199
+
Run {agent} without administrative privileges:
1200
+
1183
1201
[source,shell]
1184
1202
----
1185
1203
elastic-agent unprivileged
1186
1204
----
1187
1205
1206
+
Run {agent} without administrative privileges, as a pre-existing user: [technical preview]
Copy file name to clipboardExpand all lines: docs/en/ingest-management/elastic-agent/elastic-agent-unprivileged-mode.asciidoc
+39Lines changed: 39 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,7 @@ Refer to <<unprivileged-command-behaviors>> and <<unprivileged-running>> for the
16
16
* <<unprivileged-integrations>>
17
17
* <<unprivileged-view-mode>>
18
18
* <<unprivileged-change-mode>>
19
+
* <<unprivileged-preexisting-user>>
19
20
20
21
[discrete]
21
22
[[unprivileged-running]]
@@ -227,3 +228,41 @@ For example:
227
228
. When you install {agent} with the `--unprivileged` setting, the `elastic-agent-user` user and the `elastic-agent` group are created automatically.
228
229
. If you then want your user `myuser` to be able to run an {agent} command such as `elastic-agent status`, add the `myuser` user to the `elastic-agent` group.
229
230
. Then, once added to the group, the `elastic-agent status` command will work. Prior to that, the user `myuser` running the command will result in a permission error that indicates a problem communicating with the control socket.
231
+
232
+
[discrete]
233
+
[[unprivileged-preexisting-user]]
234
+
== Using `unprivileged` mode with a pre-existing user and group
235
+
236
+
preview::[]
237
+
238
+
In certain cases you may want to install {agent} in `unprivileged` mode, with the agent running as a pre-existing user or as part of a pre-existing group.
239
+
For example, on a Windows system you may have a service account in Active Directory and you'd like {agent} to run under that account.
240
+
241
+
To install {agent} in `unprivileged` mode as a specific user, add the `--user` and `--password` parameters to the install command:
Alternatively, if you have {agent} already installed with administrative privileges, you can change the agent to use `unprivileged` mode and to run as a specific user or in a specific group.
0 commit comments