Hello all, I have an agent deployed via fleet on red hat server and I want to use the endpoint security there. I did add the endpoint security integration under the policy the red hat agent is bound to. Now it seems like the endpoint security integration is deployed on the red har server, but its not sending any data. When looking into /opt/Elastic/Endpoint/state/log/endpoint-000000.log I see the following:
{"@timestamp":"2022-09-29T17:04:51.505793025Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"notice","origin":{"file":{"line":86,"name":"BulkQueueConsumer.cpp"}}},"message":"BulkQueueConsumer.cpp:86 Elasticsearch connection is down","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:04:56.584886045Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"error","origin":{"file":{"line":327,"name":"Http.cpp"}}},"message":"Http.cpp:327 CURL error 60: SSL peer certificate or SSH remote key was not OK [SSL certificate problem: self signed certificate in certificate chain]","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:04:56.585562335Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"notice","origin":{"file":{"line":86,"name":"BulkQueueConsumer.cpp"}}},"message":"BulkQueueConsumer.cpp:86 Elasticsearch connection is down","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:05:01.650654765Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"error","origin":{"file":{"line":327,"name":"Http.cpp"}}},"message":"Http.cpp:327 CURL error 60: SSL peer certificate or SSH remote key was not OK [SSL certificate problem: self signed certificate in certificate chain]","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:05:01.651124587Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"notice","origin":{"file":{"line":86,"name":"BulkQueueConsumer.cpp"}}},"message":"BulkQueueConsumer.cpp:86 Elasticsearch connection is down","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:05:05.7893431Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"info","origin":{"file":{"line":71,"name":"Logging.cpp"}}},"message":"Logging.cpp:71 Logging directory cleaned up, current size: 4276961","process":{"pid":13348,"thread":{"id":13352}}}
{"@timestamp":"2022-09-29T17:05:06.716216337Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"error","origin":{"file":{"line":327,"name":"Http.cpp"}}},"message":"Http.cpp:327 CURL error 60: SSL peer certificate or SSH remote key was not OK [SSL certificate problem: self signed certificate in certificate chain]","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:05:06.716744821Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"notice","origin":{"file":{"line":86,"name":"BulkQueueConsumer.cpp"}}},"message":"BulkQueueConsumer.cpp:86 Elasticsearch connection is down","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:05:11.783569857Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"error","origin":{"file":{"line":327,"name":"Http.cpp"}}},"message":"Http.cpp:327 CURL error 60: SSL peer certificate or SSH remote key was not OK [SSL certificate problem: self signed certificate in certificate chain]","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:05:11.784023597Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"notice","origin":{"file":{"line":86,"name":"BulkQueueConsumer.cpp"}}},"message":"BulkQueueConsumer.cpp:86 Elasticsearch connection is down","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:05:16.868162401Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"error","origin":{"file":{"line":327,"name":"Http.cpp"}}},"message":"Http.cpp:327 CURL error 60: SSL peer certificate or SSH remote key was not OK [SSL certificate problem: self signed certificate in certificate chain]","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:05:16.868579418Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"notice","origin":{"file":{"line":86,"name":"BulkQueueConsumer.cpp"}}},"message":"BulkQueueConsumer.cpp:86 Elasticsearch connection is down","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:05:21.93507682Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"error","origin":{"file":{"line":327,"name":"Http.cpp"}}},"message":"Http.cpp:327 CURL error 60: SSL peer certificate or SSH remote key was not OK [SSL certificate problem: self signed certificate in certificate chain]","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:05:21.935224018Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"notice","origin":{"file":{"line":86,"name":"BulkQueueConsumer.cpp"}}},"message":"BulkQueueConsumer.cpp:86 Elasticsearch connection is down","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:05:26.998394775Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"error","origin":{"file":{"line":327,"name":"Http.cpp"}}},"message":"Http.cpp:327 CURL error 60: SSL peer certificate or SSH remote key was not OK [SSL certificate problem: self signed certificate in certificate chain]","process":{"pid":13348,"thread":{"id":13355}}}
{"@timestamp":"2022-09-29T17:05:26.998512665Z","agent":{"id":"9c3f597a-6b98-41a1-a68f-b80a605506b8","type":"endpoint"},"ecs":{"version":"1.11.0"},"log":{"level":"notice","origin":{"file":{"line":86,"name":"BulkQueueConsumer.cpp"}}},"message":"BulkQueueConsumer.cpp:86 Elasticsearch connection is down","process":{"pid":13348,"thread":{"id":13355}}}
This seems to me like all I need to do is to add the Elasticsearch http_ca.crt to the red hat server and customize the elastic-endpoint.yaml file with something like:
output:
elasticsearch:
api_key: _8zfiIMBLpY_2jDpd3tG:_r-kPp04Ql6KKA91yhJniA
hosts:
- https://10.212.25.197:9200
protocol: http
reporting:
check_frequency_sec: 30
threshold: 10000
ssl:
certificate_authorities:
- /opt/Elastic/certs/http_ca.crt
renegotiation: never
verification_mode: full
timeout: 10m0s
But when I restarted the endpoint service, the .yaml file was rewriten to the default config. Can someone explain how should this work? Thank you!