-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update go mod elatic/beats reference with newer commit #970
update go mod elatic/beats reference with newer commit #970
Conversation
💚 Build Succeeded
Expand to view the summary
Build stats
Test stats 🧪
🤖 GitHub commentsTo re-run your PR in the CI, just comment with:
|
3955f2a
to
297ace7
Compare
41e91b6
to
213e9bf
Compare
I've created #971 to track updating the module properly once |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
was able to do an end to end test on my machine with 8.0. I had to add the |
* update go mod elatic/beats reference with newer commit * Add license overrides * Fix broken integration test * Use libbeat BuildServerConfig (cherry picked from commit 7706e2b)
* update go mod elatic/beats reference with newer commit * Add license overrides * Fix broken integration test * Use libbeat BuildServerConfig (cherry picked from commit 7706e2b) Co-authored-by: Michel Laterman <[email protected]>
What is the problem this PR solves?
Update the version of elastic/beats to from
v7.11.1
to a more recent one. Specifically elastic/beats@4641f75 off the8.0
branch.How does this PR solve the problem?
Updated module includes libbeat support
ssl.ca_trusted_fingerprint
(elastic/beats#29229). This option is used by libbeat to trust a self-signed CA when bootstrapping a secure by default cluster in 8.0.The fleet-server will use this option when connecting to ES.
How to test this PR locally
The elastic-agent modifications to support/pass this option to fleet-server can be found with: elastic/beats#29128.
Create a snapshot build of the agent, and fleet-server.
start an 8.0+ ES node and Kibana
go to Kibana and setup fleet (ensure that the elasticsearch scheme is
https
.enroll the fleet server with the command and the
--fleet-server-es-ca-trusted-fingerprint
flag, using thesha256
fingerprint that elasticsearch outputs on startup. i.e.:Related issues