Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Question]: Standalone agent support with Endpoint Integration. #2525

Closed
harshitgupta-qasource opened this issue Apr 20, 2023 · 7 comments
Closed
Assignees
Labels
QA:Validated Validated by the QA Team question Further information is requested Team:Elastic-Agent-Control-Plane Label for the Agent Control Plane team

Comments

@harshitgupta-qasource
Copy link

harshitgupta-qasource commented Apr 20, 2023

Query Description

  • Install the standalone agent of Windows and Linux OS with endpoint integration in the policy.

  • As per the last information, the standalone agents don't support endpoint integration.

  • However, we are getting data for endpoint integration for an installed standalone agent.

Could you please confirm if there are any changes in standalone agents?

Screenshot

  • Windows Standalone Agent Datastream.
    image

  • Linux Standalone Agent Datastream.
    image

Build Details

VERSION: 8.7.1
BUILD: 61192
COMMIT: e33260d70181feecc89dc4f623c694856de380d8

Agent Policy:
Policy.zip

@harshitgupta-qasource harshitgupta-qasource added the question Further information is requested label Apr 20, 2023
@amolnater-qasource amolnater-qasource added the Team:Elastic-Agent-Control-Plane Label for the Agent Control Plane team label Apr 20, 2023
@amolnater-qasource
Copy link

Secondary review for this ticket is Done.

FYI @cmacknz

@cmacknz
Copy link
Member

cmacknz commented Apr 20, 2023

Was this a Fleet managed agent that was converted to standalone? Was the agent policy here generated with Fleet?

Is endpoint healthy or just sending data? Can you attach agent diagnostics from the standalone agent that is running endpoint security?

I think if you created a policy in Fleet with Elastic Defend installed and then copied it to a standalone agent, then agent would start the endpoint security process. I don't expect that endpoint security would work properly in this case without a connection back to Fleet though.

@harshitgupta-qasource
Copy link
Author

Hi @cmacknz

Thanks for looking into this issue.

We have directly installed the standalone agent without converting Fleet based agent.

We have followed

Steps to reproduce

  • Create an Agent policy without any integration.
  • Add the endpoint Integration to the Agent policy.
  • Click on the Add agent and Select standalone agent.
  • Download the Agent policy for installing the standalone agent
  • Replace the elastic-agent.yml with newly downloaded elastic-agent.yml file.
  • Run install command for the standalone agent.

Agent Diagnostics reports

8.7.1 Logs:

elastic-agent-diagnostics-8.7.1.zip

8.2.3

elastic-agent-diagnostics-8.2.3.zip

We also revalidated this issue on 8.2.3 release build and we found that the issue is not occurring on the 8.2.3 release build.

  • We are not getting endpoint data under data streams on 8.2.3.

Screenshot

  • 8.2.3
    image
  • 8.7.1
    image

Please let us know if anything else is required from our end.

Thanks!

@blakerouse
Copy link
Contributor

I believe that running an Elastic Agent in standalone mode should not even allow endpoint to run. I think we need to add something to the runtime protections for endpoint so it cannot run on a standalone Elastic Agent.

Let me know if they use case has changed and I am unaware.

@cmacknz
Copy link
Member

cmacknz commented Apr 21, 2023

I believe that running an Elastic Agent in standalone mode should not even allow endpoint to run. I think we need to add something to the runtime protections for endpoint so it cannot run on a standalone Elastic Agent.

Let me know if they use case has changed and I am unaware.

Correct, we shouldn't allow it to run. The use case is the same, endpoint should only run when the agent is Fleet managed.

Possibly we lost this in 8.6 when the length(${fleet}) > 0 constraint was dropped from the spec file.

when: length(${fleet}) > 0 and length(${inputs}) > 0 and hasKey(${output}, 'elasticsearch', 'logstash')

@blakerouse blakerouse self-assigned this Apr 25, 2023
@jlind23
Copy link
Contributor

jlind23 commented May 27, 2024

@harshitgupta-qasource @amolnater-qasource is this issue still happening? If not, I think we can close it.

@harshitgupta-qasource
Copy link
Author

harshitgupta-qasource commented May 28, 2024

Hi Team,

We have re-validated this issue on the latest 8.14.0 BC5 Kibana cloud environment and found it fixed now.

Observations:

  • We are not getting endpoint data under data streams for standalone agent on 8.14.0 BC5 Build.

Build details:
VERSION: 8.14.0 BC5
BUILD: 73931
COMMIT: 7ea00b6178d67183a4def9bdd060b062cced043e

Screen-Shot:
image

Hence, we are closing this issue and marking as QA: Validated.

Thanks.

@harshitgupta-qasource harshitgupta-qasource added the QA:Validated Validated by the QA Team label May 28, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
QA:Validated Validated by the QA Team question Further information is requested Team:Elastic-Agent-Control-Plane Label for the Agent Control Plane team
Projects
None yet
Development

No branches or pull requests

5 participants