Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
43 changes: 39 additions & 4 deletions docs/release-notes/known-issues.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ Known issues are significant defects or limitations that may impact your impleme

:::{dropdown} Failed upgrades leave {{agent}} stuck until restart

**Applies to: {{agent}} 8.18.7, 9.0.7**
**Applies to: {{agent}} 8.18.7, 9.0.7**

On September 17, 2025, a known issue was discovered that can cause {{agent}} upgrades to get stuck if an upgrade attempt fails under specific conditions. This happens because the coordinator’s `overrideState` remains set, leaving the agent in a state that appears to be upgrading.

Expand All @@ -41,8 +41,8 @@ This issue is triggered if the upgrade fails during one of the early checks insi
**Symptoms**

- {{fleet}} shows the upgrade action in progress, even though the upgrade remains stuck
- No further upgrade attempts succeed
- Elastic Agent status shows an override state indicating upgrade
- No further upgrade attempts succeed
- Elastic Agent status shows an override state indicating upgrade

**Workaround**

Expand Down Expand Up @@ -132,7 +132,7 @@ Until a bug fix is available in a later release, you can resolve the issue tempo

On May 26th, 2025, a known issue was discovered that causes the `osquery` integration to fail on new {{agent}} installations on macOS. During the installation process, the required `osquery.app/` directory is removed, which prevents the integration from starting.

For more information, check [Issue #8245](https://github.com/elastic/elastic-agent/issues/8245).
For more information, check [Issue #10994](https://github.com/elastic/elastic-agent/issues/10994).

**Workaround**

Expand Down Expand Up @@ -217,3 +217,38 @@ batch:
```

:::

:::{dropdown} Upgrade failures caused by failure to reload {{agent}} download settings

**Applies to: {{agent}} 8.18.7, 8.18.8, 8.19.4, 8.19.5, 8.19.6, 9.0.7, 9.0.8, 9.1.4, 9.1.5, 9.1.6, 9.2.0**

On November 3, 2025, a known issue was discovered where {{agent}} fails to use
custom `Agent Binary Download` settings defined in the Fleet policy. The issue
occurs because the artifact downloader would not refresh its own settings to use
the latest version of the settings from policy to download. This will impact proxy
and custom binary location settings.

For more information, check [Issue #8245](https://github.com/elastic/elastic-agent/issues/8245).

**Workaround**

Possible workaround require access on the hosts to unlock the situation:

1. Temporarily define [`HTTP_PROXY`, `HTTPS_PROXY`, `NO_PROXY` env variables](docs-content://reference/fleet/host-proxy-env-vars.md) on the Elastic Agent service. Then restart Elastic Agent.

:::{important}
You will need to provide a correct `NO_PROXY` value in order to force Elastic Agent to use the proxy _only_ when accessing the URL of the artifacts, otherwise it will affect _any_ HTTP communication to go through the proxy. Then restart the Elastic Agent and re-attempt the upgrade.
:::

2. Temporarily grant access to the public Artifacts repository (or the self-hosted one) without the need of the HTTP proxy. This might imply updating firewalls or host settings.

3. Upgrade Elastic by Agent downloading the file locally via other methods. You can download the agent upgrade `.zip` or
`.tar.gz` along with the `.sha512` and `.asc` files. Then use the upgrade command with a `file://` URI to upgrade from
local disk.

```shell
# --force is needed for fleet managed agents
sudo elastic-agent upgrade 9.1.7 --force --source-uri file:///path/to/files
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we hold this PR until 9.1.7 is released?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We can use any version in the example, but the fix will be avaiable in 9.2.1, 9.1.7, and 8.19.7.

If we don't want to wait for a release, I can use something like <version> as a placeholder?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I tried this on 9.1.6 and it seems to enforce a pgp check against a file which is on a wrong path.

Error: Failed trigger upgrade of daemon: failed verification of agent binary: could not get .asc file: fetching asc file from '/opt/Elastic/Agent/data/elastic-agent-9.1.6-f7a485/downloads/elastic-agent-9.2.0-linux-arm64.tar.gz.asc': open /opt/Elastic/Agent/data/elastic-agent-9.1.6-f7a485/downloads/elastic-agent-9.2.0-linux-arm64.tar.gz.asc: no such file or directory

```

:::
Loading