-
Notifications
You must be signed in to change notification settings - Fork 148
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handle new action for switching Agent from privileged to unprivileged mode #4973
Comments
Pinging @elastic/elastic-agent-control-plane (Team:Elastic-Agent-Control-Plane) |
I think it would be useful to do a bit of technical definition for this feature, covering not just the responsibilities of Agent but also the associated responsibilities of Fleet UI and Fleet Server so we have a holistic design in place before starting to implement this feature. |
Switching the other way will technically be impossible but I agree we should make it clear from the UI when we will add this feature there. |
To add some details on the technical implementation for this work. The flow of this should work as the following:
|
@blakerouse WDYT about replacing the ack'ing mechanism with reporting as part of the check-in payload whether the Agent is running as privileged or not, perhaps as part of the |
@ycombinator Actually that would be better. |
As a random user I just found this issue and I highly appreciate it!
Enforcing the agent to run as "root" (compared to the Beats) was a major concern for some of my supervisors and the reason why we are still stuck with the Beats. Thank you for working on this! Is there any estimation when this might be relased? |
Hey @j-koehler |
Oh hi @pierrehilbert - appreciate the response and the heads up on the focus of this issue.
This isn't rolled out yet, is it? I tried with Elastic Agent 8.14.2 and I did not find any flags on the |
Yes indeed, this will be available in 8.15. |
@michalpristas has written an RFC for this issue and sent it out to the team for review on December 12, 2024, with a deadline of January 6, 2025. Once we have consensus on the RFC, this issue should be moved from |
@nimarezainia @strawgate do we want to enable this scenario for enrolled but not installed agents? |
@michalpristas We should prevent that unless the Elastic Agent is installed, both running the command as well as having the action sent from Fleet. |
Im not sure what it would mean for us to switch an agent that wasn't installed to unprivileged as when the agent is not installed the user is responsible for providing the user context of the process. An agent that is not installed should be able to run as unprivileged but switching doesn't make sense to me |
Describe the enhancement:
Elastic Agents have the ability to run in either privileged mode, i.e. with a privileged user like
root
on Linux systems, or unprivileged mode, i.e. with an unprivileged user.Moreover, Agents running in privileged mode have the ability to switch themselves to unprivileged mode. This ability is being exposed via the Agent CLI. We now wish to expose this same ability using the Fleet UI.
For this, Agent will need to handle a new action from Fleet.
Describe a specific use case for the feature:
Security: Allowing users to reduce the privileges required to run Elastic Agent.
What is the definition of done?
The text was updated successfully, but these errors were encountered: