-
Notifications
You must be signed in to change notification settings - Fork 148
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
All communication with components should occur using unix sockets / named pipes #3998
Comments
Pinging @elastic/elastic-agent (Team:Elastic-Agent) |
This would be useful for users on Openshift who have Red Hat OpenShift Data Foundation Managed Service, as it uses the port 6789 for Ceph Monitor |
In progress in #4249 |
I would love to see this being configurable as well. |
@aleksmaus in which version will this be included? |
There is follow up work to do before we can enable this by default and recommend it to users: #4899 It isn't enabled by default yet, Defend doesn't support it properly, and we haven't turned it on in our testing framework. All the plumbing through agent to enable it is done though. In 8.15 you should be able to try this out, but it isn't GA functionality yet. |
Can't try it without changing Agent code in 8.15, the code was commented out or changed until gRPC via domain sockets is fully supported by Endpoint. Let me know if need a branch/PR before that, that enables this functionality, so you could build your own Agent and try it out. |
As long as we aren't testing it let's keep it disabled to avoid unpleasant surprises for people. |
Hello @cmacknz If I correctly understand, this option would remove the use of the management port |
Yes
We are blocked behind the gRPC library used in Defend not support Windows named pipes, so we can use this everywhere by default once that is resolved. Until that is fixed being able to use this feature is integration and OS dependent. |
(the tracking issue will be private since the endpoint security implementation is not open source). |
Perfect! Thank you @cmacknz for the clarifications. I'll follow the internal one. |
How can we manage these parameters for fleet managed agents? |
Today the control protocol uses local TCP on port 6789 to communicate with components.
elastic-agent/elastic-agent.yml
Lines 165 to 169 in 3a3d31c
We regularly see issues where a firewall or iptables rules are configured to drop all traffic except for ports that have explicitly been whitelisted. The symptoms of this problem are not obvious in the agent logs and require uses to take extra steps to have Elastic Agent run at all.
We can solve this problem and a few others by moving away from local TCP to using Unix sockets or Windows named pipes to communicate with subprocesses.
This change should be made for:
https://github.com/elastic/elastic-agent-client/blob/f57f63489dbbce98522c174dae00158f895ddc84/elastic-agent-client.proto#L458-L463
elastic-agent/pkg/component/runtime/conn_info_server.go
Lines 31 to 43 in 3a3d31c
The text was updated successfully, but these errors were encountered: