-
Notifications
You must be signed in to change notification settings - Fork 712
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to update agentPolicies within Kibana CRD #7290
Comments
I can confirm this behaviour. I create a policy with only 1 integration, then added a second one without effect. I had to rename the policy to get the 2 expected integrations displayed in the Kibana UI: Note that:
|
This is because while a new enrollment token is created and injected in the |
Related issue in Kibana: elastic/kibana#111401 |
As mentioned in #8109 (comment) using xpack.fleet.agentPolicies:
- name: Fleet Server on ECK policy
id: eck-fleet-server
namespace: default
is_managed: true ## <---- here
monitoring_enabled:
- logs
- metrics
unenroll_timeout: 900
package_policies:
- name: fleet_server-1
id: fleet_server-1
package:
name: fleet_server
- name: Elastic Agent on ECK policy
id: eck-agent1
namespace: default
is_managed: true ## <---- here
monitoring_enabled:
- logs
- metrics
unenroll_timeout: 900
package_policies:
- package:
name: kubernetes
name: kubernetes-1
id: kubernetes-1
- name: system-1
id: system-1
package:
name: system We should update our examples to include this setting. |
Bug Report
What did you do?
Setup Kibana like in the resource definition part below.
Then change something in the agent policy.
What did you expect to see?
The agent policy to update according to the setting in
xpack.fleet.agentPolicies
What did you see instead? Under which circumstances?
Agent policy not updated.
Environment
ECK version: 2.9.0
Kubernetes information: RKE v1.3.3 on bare metal servers k8s: 1.23.8
The text was updated successfully, but these errors were encountered: