-
Notifications
You must be signed in to change notification settings - Fork 151
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Load fleet.ssl.certificate
and fleet.ssl.key
from agent policy
#2248
Comments
We will need to use the same precedence rules defined in #2304 (comment) to avoid problems, we need to ensure that if the certificate_authorities received from Fleet are empty or invalid we fall back to the ones used at enrollment if possible. |
Pinging @elastic/elastic-agent-control-plane (Team:Elastic-Agent-Control-Plane) |
@ycombinator @pierrehilbert can I assume they both can be completed in sp29? |
I'm reasonably confident you can, given the time left in the sprint and where @pchila is pretty much done with #3090. But let's wait for @pchila to give us a better assessment once he's had a chance to look into all the mTLS issues and PRs on his plate this sprint. |
Similar to #2172 we need to support respecting the
certificate
andkey
values provided in an agent policy from Fleet which will be added in elastic/kibana#150709 for the next release. This is to support mTLS with proxies when connecting to Fleet.The policy from Fleet will have the form:
See the parent (private) issue for more details.
The text was updated successfully, but these errors were encountered: