I've installed Elasticsearch, kibana and a Fleet server on a Ubuntu machine for Security testing. The main goal is to install the elastic agent with the Defend integration for XDR on a Windows machine.
The installation of Elastic, Kibana and Fleet were successful, but when I tried to install the agent, it seems not working for a "connection failure" (based in the agent from Fleet section on Kibana portal.
Trying to troubleshoot I found this information running the elastic-agent test output command:
Elasticsearch server: https://<IP_address>:9200
Status: SSL peer certificate or SSH remote key was not OK [SSL certificate problem: unable to get local issuer certificate]
Help: Host needs to trust server cert or server cert needs to be added to Elasticsearch/Fleet config
When I enrolled the elastic agent I've used the --insecure flag because I have SSL certificate selfsigned, what I'm missing?
no, is the default one, but at the same time others integration are not sending logs:
For the installation I've installed first elasticsearch, then kibana on the same host, creating the different ssl certificate (self-signed) and I can connect and elastic can reach Kibana as well.
The installation of the fleet server is healty, but I cannot see any logs coming from system integration. The path where Kibana and ES are installed are the default (/etc/..., /usr/share/....)
the fleet-server gives healthy status, instead of windows machine.
I've checked the logs and for the windows machine, the "system" folder under logs is empty, the only files that I have for logs are base don this error:
Since you needed to use --insecure, I wonder if you also need to disable certificate validation for the output connection. --insecure controls validation of the connection from Agent/Beats/Endpoint to Fleet Server, the output configuration controls the connection to Elasticsearch.
What I mean is to go to Fleet -> Settings then Edit the configuration for the Elasticsearch output your Agent's are using. In the Advanced YAML configuration see if the below verification_mode YAML solves your problem. If it does, then of course make a decision for yourself if that's acceptable long term or it has just proven you will be in good shape once you update your certificate.
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.