Skip to content

[Fleet] Fix ssl config overridden from advanced yaml in full agent policy#219902

Merged
juliaElastic merged 2 commits intoelastic:mainfrom
juliaElastic:fix-output-ssl-advanced-yaml
May 6, 2025
Merged

[Fleet] Fix ssl config overridden from advanced yaml in full agent policy#219902
juliaElastic merged 2 commits intoelastic:mainfrom
juliaElastic:fix-output-ssl-advanced-yaml

Conversation

@juliaElastic
Copy link
Contributor

@juliaElastic juliaElastic commented May 2, 2025

Summary

Issue reported by users, when ssl config is added in advanced yaml in Logstash output, it is not there in full agent policy.

To verify:

  • create Logstash output with Advanced YAML config:
ssl:
  verification_mode: "none" 
  • use output in agent policy, go to View policy
  • check that the full policy yaml includes verification_mode
image

Checklist

@juliaElastic juliaElastic self-assigned this May 2, 2025
@juliaElastic juliaElastic requested a review from a team as a code owner May 2, 2025 08:58
@botelastic botelastic bot added the Team:Fleet Team label for Observability Data Collection Fleet team label May 2, 2025
@elasticmachine
Copy link
Contributor

Pinging @elastic/fleet (Team:Fleet)

@prodsecmachine
Copy link
Collaborator

prodsecmachine commented May 2, 2025

🎉 Snyk checks have passed. No issues have been found so far.

security/snyk check is complete. No issues have been found. (View Details)

license/snyk check is complete. No issues have been found. (View Details)

Copy link
Contributor

@criamico criamico left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@juliaElastic juliaElastic enabled auto-merge (squash) May 6, 2025 06:44
@juliaElastic juliaElastic merged commit b8d5276 into elastic:main May 6, 2025
9 checks passed
@elasticmachine
Copy link
Contributor

💚 Build Succeeded

Metrics [docs]

✅ unchanged

History

cc @juliaElastic

@kibanamachine
Copy link
Contributor

Starting backport for target branches: 8.17, 8.18, 8.19, 9.0

https://github.com/elastic/kibana/actions/runs/14855914164

@kibanamachine
Copy link
Contributor

💔 All backports failed

Status Branch Result
8.17 Backport failed because of merge conflicts
8.18 Backport failed because of merge conflicts
8.19 Backport failed because of merge conflicts
9.0 Backport failed because of merge conflicts

Manual backport

To create the backport manually run:

node scripts/backport --pr 219902

Questions ?

Please refer to the Backport tool documentation

@kibanamachine kibanamachine added the backport missing Added to PRs automatically when the are determined to be missing a backport. label May 7, 2025
@kibanamachine
Copy link
Contributor

Friendly reminder: Looks like this PR hasn’t been backported yet.
To create automatically backports add a backport:* label or prevent reminders by adding the backport:skip label.
You can also create backports manually by running node scripts/backport --pr 219902 locally
cc: @juliaElastic

juliaElastic added a commit to juliaElastic/kibana that referenced this pull request May 7, 2025
…licy (elastic#219902)

Issue reported by users, when ssl config is added in advanced yaml in
Logstash output, it is not there in full agent policy.

To verify:
- create Logstash output with Advanced YAML config:
```
ssl:
  verification_mode: "none"
```
- use output in agent policy, go to View policy
- check that the full policy yaml includes `verification_mode`

<img width="447" alt="image"
src="https://github.com/user-attachments/assets/4aeaa51d-64b3-4555-a8f6-44b83106c8ae"
/>

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
juliaElastic added a commit to juliaElastic/kibana that referenced this pull request May 7, 2025
…licy (elastic#219902)

Issue reported by users, when ssl config is added in advanced yaml in
Logstash output, it is not there in full agent policy.

To verify:
- create Logstash output with Advanced YAML config:
```
ssl:
  verification_mode: "none"
```
- use output in agent policy, go to View policy
- check that the full policy yaml includes `verification_mode`

<img width="447" alt="image"
src="https://github.com/user-attachments/assets/4aeaa51d-64b3-4555-a8f6-44b83106c8ae"
/>

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
juliaElastic added a commit to juliaElastic/kibana that referenced this pull request May 7, 2025
…licy (elastic#219902)

Issue reported by users, when ssl config is added in advanced yaml in
Logstash output, it is not there in full agent policy.

To verify:
- create Logstash output with Advanced YAML config:
```
ssl:
  verification_mode: "none"
```
- use output in agent policy, go to View policy
- check that the full policy yaml includes `verification_mode`

<img width="447" alt="image"
src="https://github.com/user-attachments/assets/4aeaa51d-64b3-4555-a8f6-44b83106c8ae"
/>

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
juliaElastic added a commit to juliaElastic/kibana that referenced this pull request May 7, 2025
…licy (elastic#219902)

Issue reported by users, when ssl config is added in advanced yaml in
Logstash output, it is not there in full agent policy.

To verify:
- create Logstash output with Advanced YAML config:
```
ssl:
  verification_mode: "none"
```
- use output in agent policy, go to View policy
- check that the full policy yaml includes `verification_mode`

<img width="447" alt="image"
src="https://github.com/user-attachments/assets/4aeaa51d-64b3-4555-a8f6-44b83106c8ae"
/>

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
juliaElastic added a commit that referenced this pull request May 8, 2025
juliaElastic added a commit that referenced this pull request May 8, 2025
juliaElastic added a commit that referenced this pull request May 8, 2025
juliaElastic added a commit that referenced this pull request May 8, 2025
@kibanamachine kibanamachine removed the backport missing Added to PRs automatically when the are determined to be missing a backport. label May 8, 2025
akowalska622 pushed a commit to akowalska622/kibana that referenced this pull request May 29, 2025
…licy (elastic#219902)

## Summary

Issue reported by users, when ssl config is added in advanced yaml in
Logstash output, it is not there in full agent policy.

To verify:
- create Logstash output with Advanced YAML config: 
```
ssl:
  verification_mode: "none" 
```
- use output in agent policy, go to View policy
- check that the full policy yaml includes `verification_mode`

<img width="447" alt="image"
src="https://github.com/user-attachments/assets/4aeaa51d-64b3-4555-a8f6-44b83106c8ae"
/>


### Checklist

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
qn895 pushed a commit to qn895/kibana that referenced this pull request Jun 3, 2025
…licy (elastic#219902)

## Summary

Issue reported by users, when ssl config is added in advanced yaml in
Logstash output, it is not there in full agent policy.

To verify:
- create Logstash output with Advanced YAML config: 
```
ssl:
  verification_mode: "none" 
```
- use output in agent policy, go to View policy
- check that the full policy yaml includes `verification_mode`

<img width="447" alt="image"
src="https://github.com/user-attachments/assets/4aeaa51d-64b3-4555-a8f6-44b83106c8ae"
/>


### Checklist

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
juliaElastic added a commit that referenced this pull request Aug 4, 2025
## Summary

Fix bug introduced with #219902.
SSL config was not added to full agent policy from elasticsearch output
types

To verify:
- Add output preconfig to `kibana.yml`
```
xpack.fleet.outputs:
  - hosts:
    - https://localhost:9200
    id: eck-fleet-agent-output-elasticsearch
    name: eck-elasticsearch
    ssl:
      certificate_authorities:
      - /test/ca.crt
    type: elasticsearch
```
- Create agent policy and use preconfigured output
- Check full agent policy (View policy on UI) that ssl config is under
outputs

<img width="624" height="666" alt="image"
src="https://github.com/user-attachments/assets/a8342646-d2db-4791-a6f9-4b7a602f240f"
/>


### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
- [ ] Review the [backport
guidelines](https://docs.google.com/document/d/1VyN5k91e5OVumlc0Gb9RPa3h1ewuPE705nRtioPiTvY/edit?usp=sharing)
and apply applicable `backport:*` labels.

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Aug 4, 2025
## Summary

Fix bug introduced with elastic#219902.
SSL config was not added to full agent policy from elasticsearch output
types

To verify:
- Add output preconfig to `kibana.yml`
```
xpack.fleet.outputs:
  - hosts:
    - https://localhost:9200
    id: eck-fleet-agent-output-elasticsearch
    name: eck-elasticsearch
    ssl:
      certificate_authorities:
      - /test/ca.crt
    type: elasticsearch
```
- Create agent policy and use preconfigured output
- Check full agent policy (View policy on UI) that ssl config is under
outputs

<img width="624" height="666" alt="image"
src="https://github.com/user-attachments/assets/a8342646-d2db-4791-a6f9-4b7a602f240f"
/>

### Checklist

Check the PR satisfies following conditions.

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
- [ ] Review the [backport
guidelines](https://docs.google.com/document/d/1VyN5k91e5OVumlc0Gb9RPa3h1ewuPE705nRtioPiTvY/edit?usp=sharing)
and apply applicable `backport:*` labels.

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...

(cherry picked from commit 4ef6c5d)
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Aug 4, 2025
## Summary

Fix bug introduced with elastic#219902.
SSL config was not added to full agent policy from elasticsearch output
types

To verify:
- Add output preconfig to `kibana.yml`
```
xpack.fleet.outputs:
  - hosts:
    - https://localhost:9200
    id: eck-fleet-agent-output-elasticsearch
    name: eck-elasticsearch
    ssl:
      certificate_authorities:
      - /test/ca.crt
    type: elasticsearch
```
- Create agent policy and use preconfigured output
- Check full agent policy (View policy on UI) that ssl config is under
outputs

<img width="624" height="666" alt="image"
src="https://github.com/user-attachments/assets/a8342646-d2db-4791-a6f9-4b7a602f240f"
/>

### Checklist

Check the PR satisfies following conditions.

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
- [ ] Review the [backport
guidelines](https://docs.google.com/document/d/1VyN5k91e5OVumlc0Gb9RPa3h1ewuPE705nRtioPiTvY/edit?usp=sharing)
and apply applicable `backport:*` labels.

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...

(cherry picked from commit 4ef6c5d)
szaffarano pushed a commit to szaffarano/kibana that referenced this pull request Aug 5, 2025
## Summary

Fix bug introduced with elastic#219902.
SSL config was not added to full agent policy from elasticsearch output
types

To verify:
- Add output preconfig to `kibana.yml`
```
xpack.fleet.outputs:
  - hosts:
    - https://localhost:9200
    id: eck-fleet-agent-output-elasticsearch
    name: eck-elasticsearch
    ssl:
      certificate_authorities:
      - /test/ca.crt
    type: elasticsearch
```
- Create agent policy and use preconfigured output
- Check full agent policy (View policy on UI) that ssl config is under
outputs

<img width="624" height="666" alt="image"
src="https://github.com/user-attachments/assets/a8342646-d2db-4791-a6f9-4b7a602f240f"
/>


### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
- [ ] Review the [backport
guidelines](https://docs.google.com/document/d/1VyN5k91e5OVumlc0Gb9RPa3h1ewuPE705nRtioPiTvY/edit?usp=sharing)
and apply applicable `backport:*` labels.

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...
delanni pushed a commit to delanni/kibana that referenced this pull request Aug 5, 2025
## Summary

Fix bug introduced with elastic#219902.
SSL config was not added to full agent policy from elasticsearch output
types

To verify:
- Add output preconfig to `kibana.yml`
```
xpack.fleet.outputs:
  - hosts:
    - https://localhost:9200
    id: eck-fleet-agent-output-elasticsearch
    name: eck-elasticsearch
    ssl:
      certificate_authorities:
      - /test/ca.crt
    type: elasticsearch
```
- Create agent policy and use preconfigured output
- Check full agent policy (View policy on UI) that ssl config is under
outputs

<img width="624" height="666" alt="image"
src="https://github.com/user-attachments/assets/a8342646-d2db-4791-a6f9-4b7a602f240f"
/>


### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
- [ ] Review the [backport
guidelines](https://docs.google.com/document/d/1VyN5k91e5OVumlc0Gb9RPa3h1ewuPE705nRtioPiTvY/edit?usp=sharing)
and apply applicable `backport:*` labels.

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...
juliaElastic added a commit to juliaElastic/kibana that referenced this pull request Aug 6, 2025
## Summary

Fix bug introduced with elastic#219902.
SSL config was not added to full agent policy from elasticsearch output
types

To verify:
- Add output preconfig to `kibana.yml`
```
xpack.fleet.outputs:
  - hosts:
    - https://localhost:9200
    id: eck-fleet-agent-output-elasticsearch
    name: eck-elasticsearch
    ssl:
      certificate_authorities:
      - /test/ca.crt
    type: elasticsearch
```
- Create agent policy and use preconfigured output
- Check full agent policy (View policy on UI) that ssl config is under
outputs

<img width="624" height="666" alt="image"
src="https://github.com/user-attachments/assets/a8342646-d2db-4791-a6f9-4b7a602f240f"
/>


### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
- [ ] Review the [backport
guidelines](https://docs.google.com/document/d/1VyN5k91e5OVumlc0Gb9RPa3h1ewuPE705nRtioPiTvY/edit?usp=sharing)
and apply applicable `backport:*` labels.

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...
juliaElastic added a commit to juliaElastic/kibana that referenced this pull request Aug 6, 2025
## Summary

Fix bug introduced with elastic#219902.
SSL config was not added to full agent policy from elasticsearch output
types

To verify:
- Add output preconfig to `kibana.yml`
```
xpack.fleet.outputs:
  - hosts:
    - https://localhost:9200
    id: eck-fleet-agent-output-elasticsearch
    name: eck-elasticsearch
    ssl:
      certificate_authorities:
      - /test/ca.crt
    type: elasticsearch
```
- Create agent policy and use preconfigured output
- Check full agent policy (View policy on UI) that ssl config is under
outputs

<img width="624" height="666" alt="image"
src="https://github.com/user-attachments/assets/a8342646-d2db-4791-a6f9-4b7a602f240f"
/>


### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
- [ ] Review the [backport
guidelines](https://docs.google.com/document/d/1VyN5k91e5OVumlc0Gb9RPa3h1ewuPE705nRtioPiTvY/edit?usp=sharing)
and apply applicable `backport:*` labels.

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...
juliaElastic added a commit to juliaElastic/kibana that referenced this pull request Aug 6, 2025
## Summary

Fix bug introduced with elastic#219902.
SSL config was not added to full agent policy from elasticsearch output
types

To verify:
- Add output preconfig to `kibana.yml`
```
xpack.fleet.outputs:
  - hosts:
    - https://localhost:9200
    id: eck-fleet-agent-output-elasticsearch
    name: eck-elasticsearch
    ssl:
      certificate_authorities:
      - /test/ca.crt
    type: elasticsearch
```
- Create agent policy and use preconfigured output
- Check full agent policy (View policy on UI) that ssl config is under
outputs

<img width="624" height="666" alt="image"
src="https://github.com/user-attachments/assets/a8342646-d2db-4791-a6f9-4b7a602f240f"
/>


### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
- [ ] Review the [backport
guidelines](https://docs.google.com/document/d/1VyN5k91e5OVumlc0Gb9RPa3h1ewuPE705nRtioPiTvY/edit?usp=sharing)
and apply applicable `backport:*` labels.

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...
juliaElastic added a commit that referenced this pull request Aug 6, 2025
backport #230211

## Release note

Fix preconfigured SSL config missing from agent policy output config,
introduced with #219902
juliaElastic added a commit that referenced this pull request Aug 6, 2025
backport #230211

## Release note

Fix preconfigured SSL config missing from agent policy output config,
introduced with #219902
juliaElastic added a commit that referenced this pull request Aug 6, 2025
backport #230211

## Release note

Fix preconfigured SSL config missing from agent policy output config,
introduced with #219902
NicholasPeretti pushed a commit to NicholasPeretti/kibana that referenced this pull request Aug 18, 2025
## Summary

Fix bug introduced with elastic#219902.
SSL config was not added to full agent policy from elasticsearch output
types

To verify:
- Add output preconfig to `kibana.yml`
```
xpack.fleet.outputs:
  - hosts:
    - https://localhost:9200
    id: eck-fleet-agent-output-elasticsearch
    name: eck-elasticsearch
    ssl:
      certificate_authorities:
      - /test/ca.crt
    type: elasticsearch
```
- Create agent policy and use preconfigured output
- Check full agent policy (View policy on UI) that ssl config is under
outputs

<img width="624" height="666" alt="image"
src="https://github.com/user-attachments/assets/a8342646-d2db-4791-a6f9-4b7a602f240f"
/>


### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [ ] Any text added follows [EUI's writing
guidelines](https://elastic.github.io/eui/#/guidelines/writing), uses
sentence case text and includes [i18n
support](https://github.com/elastic/kibana/blob/main/src/platform/packages/shared/kbn-i18n/README.md)
- [ ]
[Documentation](https://www.elastic.co/guide/en/kibana/master/development-documentation.html)
was added for features that require explanation or tutorials
- [ ] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios
- [ ] If a plugin configuration key changed, check if it needs to be
allowlisted in the cloud and added to the [docker
list](https://github.com/elastic/kibana/blob/main/src/dev/build/tasks/os_packages/docker_generator/resources/base/bin/kibana-docker)
- [ ] This was checked for breaking HTTP API changes, and any breaking
changes have been approved by the breaking-change committee. The
`release_note:breaking` label should be applied in these situations.
- [ ] [Flaky Test
Runner](https://ci-stats.kibana.dev/trigger_flaky_test_runner/1) was
used on any tests changed
- [ ] The PR description includes the appropriate Release Notes section,
and the correct `release_note:*` label is applied per the
[guidelines](https://www.elastic.co/guide/en/kibana/master/contributing.html#kibana-release-notes-process)
- [ ] Review the [backport
guidelines](https://docs.google.com/document/d/1VyN5k91e5OVumlc0Gb9RPa3h1ewuPE705nRtioPiTvY/edit?usp=sharing)
and apply applicable `backport:*` labels.

### Identify risks

Does this PR introduce any risks? For example, consider risks like hard
to test bugs, performance regression, potential of data loss.

Describe the risk, its severity, and mitigation for each identified
risk. Invite stakeholders and evaluate how to proceed before merging.

- [ ] [See some risk
examples](https://github.com/elastic/kibana/blob/main/RISK_MATRIX.mdx)
- [ ] ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

release_note:fix Team:Fleet Team label for Observability Data Collection Fleet team v9.1.0

5 participants