Skip to content

Commit 20a2e81

Browse files
Add known issue for orphaned status blocking upgrades (#1566) (#1568)
* Add known issue for orphaned status blocking upgrades * Update docs/en/ingest-management/release-notes/release-notes-8.16.asciidoc * Update docs/en/ingest-management/release-notes/release-notes-8.16.asciidoc * Update docs/en/ingest-management/release-notes/release-notes-8.16.asciidoc * Update docs/en/ingest-management/release-notes/release-notes-8.17.asciidoc --------- Co-authored-by: David Kilfoyle <[email protected]> (cherry picked from commit 241d839) Co-authored-by: Michel Laterman <[email protected]>
1 parent fa28ca3 commit 20a2e81

File tree

2 files changed

+112
-4
lines changed

2 files changed

+112
-4
lines changed

docs/en/ingest-management/release-notes/release-notes-8.16.asciidoc

Lines changed: 82 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,34 @@ Also see:
3333
3434
Review important information about the {fleet} and {agent} 8.16.2 release.
3535
36+
[discrete]
37+
[[known-issues-8.16.2]]
38+
=== Known Issues
39+
40+
[discrete]
41+
[[known-issue-6213-8-16-2]]
42+
.An {agent} with the Defend integration may report an Orphaned status and will not be able to be issued an upgrade action through {fleet}.
43+
[%collapsible]
44+
====
45+
*Details* +
46+
A known issue in the {agent} may prevent it from being targetted with an upgrade action for a future release.
47+
This may occur if the Defend integration is used and the agent is stopped on a running instance for too long.
48+
An agent may be stopped as part of an upgrade process.
49+
50+
*Impact* +
51+
A bug fix is present in the 8.16.3 and 8.17.1 releases of {fleet} that will prevent this from occuring.
52+
53+
If you have agents that are affected, the workaround is as follows:
54+
[source,shell]
55+
----
56+
# Get a Token to issue an update_by_query request:
57+
curl -XPOST --user elastic:${SUPERUSER_PASS} -H 'x-elastic-product-origin:fleet' -H'content-type:application/json' "https://${ELASTICSEARCH_HOST}/_security/service/elastic/fleet-server/credential/token/fix-unenrolled"
58+
59+
# Issue an update_by_query request that targets effected agents:
60+
curl -XPOST -H 'Authorization: Bearer ${TOKEN}' -H 'x-elastic-product-origin:fleet' -H 'content-type:application/json' "https://${ELASTICSEARCH_HOST}/.fleet-agents/_update_by_query" -d '{"query": {"bool": {"must": [{ "exists": { "field": "unenrolled_at" } }],"must_not": [{ "term": { "active": "false" } }]}},"script": {"source": "ctx._source.unenrolled_at = null;","lang": "painless"}}'
61+
----
62+
====
63+
3664
[discrete]
3765
[[enhancements-8.16.2]]
3866
=== Enhancements
@@ -56,6 +84,34 @@ In this release we've introduced an image based on the hardened link:https://git
5684

5785
Review important information about the {fleet} and {agent} 8.16.1 release.
5886

87+
[discrete]
88+
[[known-issues-8.16.1]]
89+
=== Known Issues
90+
91+
[discrete]
92+
[[known-issue-6213-8-16-1]]
93+
.An {agent} with the Defend integration may report an Orphaned status and will not be able to be issued an upgrade action through {fleet}.
94+
[%collapsible]
95+
====
96+
*Details* +
97+
A known issue in the {agent} may prevent it from being targetted with an upgrade action for a future release.
98+
This may occur if the Defend integration is used and the agent is stopped on a running instance for too long.
99+
An agent may be stopped as part of an upgrade process.
100+
101+
*Impact* +
102+
A bug fix is present in the 8.16.3 and 8.17.1 releases of the {fleet} that will prevent this from occuring.
103+
104+
If you have agents that are affected, the workaround is as follows:
105+
[source,shell]
106+
----
107+
# Get a Token to issue an update_by_query request:
108+
curl -XPOST --user elastic:${SUPERUSER_PASS} -H 'x-elastic-product-origin:fleet' -H'content-type:application/json' "https://${ELASTICSEARCH_HOST}/_security/service/elastic/fleet-server/credential/token/fix-unenrolled"
109+
110+
# Issue an update_by_query request that targets effected agents:
111+
curl -XPOST -H 'Authorization: Bearer ${TOKEN}' -H 'x-elastic-product-origin:fleet' -H 'content-type:application/json' "https://${ELASTICSEARCH_HOST}/.fleet-agents/_update_by_query" -d '{"query": {"bool": {"must": [{ "exists": { "field": "unenrolled_at" } }],"must_not": [{ "term": { "active": "false" } }]}},"script": {"source": "ctx._source.unenrolled_at = null;","lang": "painless"}}'
112+
----
113+
====
114+
59115
[discrete]
60116
[[bug-fixes-8.16.1]]
61117
=== Bug fixes
@@ -110,7 +166,7 @@ This error can happen if the {agents} being searched and listed in the UI are us
110166
111167
*Impact* +
112168
113-
As a workaround for the issue, you can upgrade your {stack} to verion 8.16.1. The issue has been resolved by {kib} link:https://github.com/elastic/kibana/pull/199325[#199325].
169+
As a workaround for the issue, you can upgrade your {stack} to verion 8.16.1. The issue has been resolved by {kib} link:https://github.com/elastic/kibana/pull/199325[#199325].
114170
115171
====
116172

@@ -160,6 +216,30 @@ As a workaround, we recommend trying again to uninstall the agent.
160216
161217
====
162218

219+
[discrete]
220+
[[known-issue-6213-8-16-0]]
221+
.An {agent} with the Defend integration may report an Orphaned status and will not be able to be issued an upgrade action through {fleet}.
222+
[%collapsible]
223+
====
224+
*Details* +
225+
A known issue in the {agent} may prevent it from being targetted with an upgrade action for a future release.
226+
This may occur if the Defend integration is used and the agent is stopped on a running instance for too long.
227+
An agent may be stopped as part of an upgrade process.
228+
229+
*Impact* +
230+
A bug fix is present in the 8.16.3 and 8.17.1 releases of {fleet} that will prevent this from occuring.
231+
232+
If you have agents that are affected, the workaround is as follows:
233+
[source,shell]
234+
----
235+
# Get a Token to issue an update_by_query request:
236+
curl -XPOST --user elastic:${SUPERUSER_PASS} -H 'x-elastic-product-origin:fleet' -H'content-type:application/json' "https://${ELASTICSEARCH_HOST}/_security/service/elastic/fleet-server/credential/token/fix-unenrolled"
237+
238+
# Issue an update_by_query request that targets effected agents:
239+
curl -XPOST -H 'Authorization: Bearer ${TOKEN}' -H 'x-elastic-product-origin:fleet' -H 'content-type:application/json' "https://${ELASTICSEARCH_HOST}/.fleet-agents/_update_by_query" -d '{"query": {"bool": {"must": [{ "exists": { "field": "unenrolled_at" } }],"must_not": [{ "term": { "active": "false" } }]}},"script": {"source": "ctx._source.unenrolled_at = null;","lang": "painless"}}'
240+
----
241+
====
242+
163243
[discrete]
164244
[[new-features-8.16.0]]
165245
=== New features
@@ -178,7 +258,7 @@ The 8.16.0 release Added the following new and notable features.
178258

179259
{fleet-server}::
180260
* Add `/api/fleet/agents/:id/audit/unenroll` API that an {agent} or Endpoint process may use to report that an agent was uninstalled or unenrolled to {fleet}. {fleet-server-pull}3818[#3818] {agent-issue}484[#484]
181-
* Add a `secret_paths` attribute to the policy data sent to agents. This attribute is a list of keys that {fleet-server} has replaced with a reference to a secret value. {fleet-server-pull}3908[#3908] {fleet-server-issue}3657[#3657]
261+
* Add a `secret_paths` attribute to the policy data sent to agents. This attribute is a list of keys that {fleet-server} has replaced with a reference to a secret value. {fleet-server-pull}3908[#3908] {fleet-server-issue}3657[#3657]
182262

183263
{agent}::
184264
* Uninstalling a {fleet}-managed {agent} instance will now do a best-effort attempt to notify {fleet-server} of the agent removal so the agent status appears correctly in the {fleet} UI (related to {fleet-server-pull}3818[#3818] above). {agent-pull}5302[#5302] {agent-issue}484[#484]

docs/en/ingest-management/release-notes/release-notes-8.17.asciidoc

Lines changed: 30 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,34 @@ impact to your application.
3939
{agent}::
4040
* {agent} is now compiled using Debian 11 and linked against glibc 2.31 instead of 2.19. Drops support for Debian 10. {agent-pull}5847[#5847]
4141

42+
[discrete]
43+
[[known-issues-8.17.0]]
44+
=== Known Issues
45+
46+
[discrete]
47+
[[known-issue-6213-8-17-0]]
48+
.An {agent} with the Defend integration may report an Orphaned status and will not be able to be issued an upgrade action through {fleet}.
49+
[%collapsible]
50+
====
51+
*Details* +
52+
A known issue in the {agent} may prevent it from being targetted with an upgrade action for a future release.
53+
This may occur if the Defend integration is used and the agent is stopped on a running instance for too long.
54+
An agent may be stopped as part of an upgrade process.
55+
56+
*Impact* +
57+
A bug fix is present in the 8.17.1 release of {fleet} that will prevent this from occuring.
58+
59+
If you have agents that are affected, the workaround is as follows:
60+
[source,shell]
61+
----
62+
# Get a Token to issue an update_by_query request:
63+
curl -XPOST --user elastic:${SUPERUSER_PASS} -H 'x-elastic-product-origin:fleet' -H'content-type:application/json' "https://${ELASTICSEARCH_HOST}/_security/service/elastic/fleet-server/credential/token/fix-unenrolled"
64+
65+
# Issue an update_by_query request that targets effected agents:
66+
curl -XPOST -H 'Authorization: Bearer ${TOKEN}' -H 'x-elastic-product-origin:fleet' -H 'content-type:application/json' "https://${ELASTICSEARCH_HOST}/.fleet-agents/_update_by_query" -d '{"query": {"bool": {"must": [{ "exists": { "field": "unenrolled_at" } }],"must_not": [{ "term": { "active": "false" } }]}},"script": {"source": "ctx._source.unenrolled_at = null;","lang": "painless"}}'
67+
----
68+
====
69+
4270
[discrete]
4371
[[new-features-8.17.0]]
4472
=== New features
@@ -50,7 +78,7 @@ The 8.17.0 release Added the following new and notable features.
5078

5179
{agent}::
5280
* Add support for running as a pre-existing user when installing in unprivileged mode, with technical preview support for pre-existing Windows Active Directory users. {agent-pull}5988[#5988] {agent-issue}4585[#4585]
53-
* Add a new custom link:https://github.com/elastic/integrations/tree/main/packages/filestream[Filestream logs integration]. This will enable migration from the custom log integration which is based on a log input that is planned for deprecation. https://github.com/elastic/integrations/pull/11332[#11332].
81+
* Add a new custom link:https://github.com/elastic/integrations/tree/main/packages/filestream[Filestream logs integration]. This will enable migration from the custom log integration which is based on a log input that is planned for deprecation. https://github.com/elastic/integrations/pull/11332[#11332].
5482

5583
[discrete]
5684
[[enhancements-8.17.0]]
@@ -67,7 +95,7 @@ The 8.17.0 release Added the following new and notable features.
6795
* Enable persistence in the configuration provided with our OTel Collector distribution. {agent-pull}5549[#5549]
6896
* Restrict using the CLI to upgrade for {fleet}-managed {agents}. {agent-pull}5864[#5864] {agent-issue}4890[#4890]
6997
* Add `os_family`, `os_platform` and `os_version` to the {agent} host provider, enabling differentiating Linux distributions. This is required to support Debian 12 and other distributions that are moving away from traditional log files in favour of Journald. {agent-pull}5941[#5941] https://github.com/elastic/integrations/issues/10797[10797] https://github.com/elastic/integrations/pull/11618[11618]
70-
* Emit Pod data only for Pods that are running in the Kubernetes provider. {agent-pull}6011[#6011] {agent-issue}5835[#5835] {agent-issue}5991[#5991]
98+
* Emit Pod data only for Pods that are running in the Kubernetes provider. {agent-pull}6011[#6011] {agent-issue}5835[#5835] {agent-issue}5991[#5991]
7199
* Remove {endpoint-sec} from Linux container images. {endpoint-sec} cannot run in containers since it has a systemd dependency. {agent-pull}6016[#6016] {agent-issue}5495[#5495]
72100
* Update OTel components to v0.114.0. {agent-pull}6113[#6113]
73101
* Redact common secrets like API keys and passwords in the output from `elastic-agent inspect` command. {agent-pull}6224[#6224]

0 commit comments

Comments
 (0)