-
Notifications
You must be signed in to change notification settings - Fork 103
Open
Labels
Team:Elastic-Agent-Control-PlaneLabel for the Agent Control Plane teamLabel for the Agent Control Plane teambugSomething isn't workingSomething isn't working
Description
Fleet-managed policies with OTel configuration can include secrets, these secrets are not being processed.
Looking to code it looks like Fleet Server only processes secrets when they appear under some specific keys (outputs, inputs, agent, fleet...), but they don't include the ones that are relevant for OTel (receivers, processors, exporters...).
See
| func NewParsedPolicy(ctx context.Context, bulker bulk.Bulk, p model.Policy) (*ParsedPolicy, error) { |
More info in these conversations:
- [postgresql_input_otel] PostgreSQL Input Package integrations#17186 (comment)
- Add Prometheus OpenTelemetry Input Package integrations#17117 (comment)
For confirmed bugs, please report:
- Version: All versions since 9.2, where support for OTel packages was introduced.
- Operating System: N/A
- Steps to Reproduce:
- Create a policy for an OTel package that includes secrets, for example the one in Add Prometheus OpenTelemetry Input Package integrations#17117.
- Configure one of the secret variables.
- Check that collection is failing, and the generated configuration didn't resolve the secrets.
As temporary workaround, it is possible to set secret: false in variables, and Fleet Server will be able to migrate them when the issue is fixed.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
Team:Elastic-Agent-Control-PlaneLabel for the Agent Control Plane teamLabel for the Agent Control Plane teambugSomething isn't workingSomething isn't working