Troubleshoot common problems
editTroubleshoot common problems
editThis functionality is in beta and is subject to change. The design and code is less mature than official GA features and is being provided as-is with no warranties. Beta features are not subject to the support SLA of official GA features.
We have collected the most common known problems and listed them here. If your problem is not described here, please review the open issues in the following GitHub repositories:
Have a question? Read our FAQ, or contact us in the discuss forum. Your feedback is valuable to us.
When using Elastic Cloud, Fleet Server is not listed in Kibana
editIf you are unable to see Fleet Server in Kibana, make sure it’s set up.
To set up Fleet Server on Elastic Cloud:
- Go to your deployment on Elastic Cloud.
- Follow the Elastic Cloud prompts to set up APM & Fleet. Once complete, the Fleet Server Elastic Agent will show up in Fleet.
To enable Fleet and set up Fleet Server on a self-managed cluster:
-
In the Elasticsearch configuration file,
config/elasticsearch.yml
, set the following security settings to enable security and API keys:xpack.security.enabled: true xpack.security.authc.api_key.enabled: true
-
In the Kibana configuration file,
config/kibana.yml
, enable Fleet and specify your user credentials:xpack.encryptedSavedObjects.encryptionKey: "something_at_least_32_characters" xpack.security.enabled: true elasticsearch.username: "my_username" elasticsearch.password: "my_password"
To set up passwords, you can use the documented Elasticsearch APIs or the
elasticsearch-setup-passwords
command. For example,./bin/elasticsearch-setup-passwords auto
After running the command:
- Copy the Elastic user name to the Kibana configuration file.
- Restart Kibana.
- Follow the documented steps for setting up a self-managed Fleet Server.
The /api/fleet/setup
endpoint can’t reach the package registry
editTo install Integrations, the Fleet app requires a connection to an external service called the Elastic Package Registry.
For this to work, the Kibana server must connect to https://epr.elastic.co
on port 443
.
Fleet in Kibana crashes
edit- To investigate the error, open your browser’s development console.
-
Select the Network tab, and refresh the page.
One of the requests to the Fleet API will most likely have returned an error. If the error message doesn’t give you enough information to fix the problem, please contact us in the discuss forum.
Elastic Agent enrollment fails on the host with Client.Timeout exceeded
message
editTo enroll in Fleet, Elastic Agent must connect to the Fleet Server instance. If the agent is unable to connect, you see the following failure:
fail to enroll: fail to execute request to {fleet-server}:Post http://fleet-server:8220/api/fleet/agents/enroll?: net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)
Here are several steps to help you troubleshoot the problem.
-
Check for networking problems. From the host, run the
ping
command to confirm that it can reach the Fleet Server instance. -
Additionally,
curl
the/status
api of Fleet Server:curl -f http://<fleet-server-url>:8220/api/status
-
Verify that you have specified the correct Kibana Fleet settings URL and port for your environment.
By default, HTTPS protocol and port 8220 is expected by Fleet Server to communicate with Elasticsearch unless you have explicitly set it otherwise.
-
Check that you specified a valid enrollment key during enrollment. To do this:
- In Fleet, select Agents and then click Enrollment tokens.
- To view the secret, click the eyeball icon. The secret should match the string that you used to enroll Elastic Agent on your host.
-
If the secret doesn’t match, create a new enrollment token and use this
token when you run the
elastic-agent enroll
command.
Many Fleet Server problems can be triaged and fixed with the below tips
editWhen creating an issue or sending a support forum communication, this section can help you identify what is required.
Fleet Server allows Elastic Agent to connect to Elasticsearch, which is the same as the connection to Kibana in prior releases. However, because Fleet Server is on the edge host, it may result in additional networking setup and troubleshooting.
Retrieve the Elastic Agent version
edit-
If you installed the Elastic Agent, run the following command (the example is for POSIX based systems):
elastic-agent version
-
If you have not installed the Elastic Agent and you are running it as a temporary process, you can run:
./elastic-agent version
Both of the above commands are accessible via Windows or macOS with their OS-specific slight variation in how you call them. If needed, please refer to Install Elastic Agents for examples of how to adjust them.
Check the Elastic Agent status
editRun the following command to view the current status of the Elastic Agent.
elastic-agent status
Based on the information returned, you can take further action.
If Elastic Agent is running, but you do not see what you expect, here are some items to review:
- In Fleet, click Agents. Check which policy is associated with the running Elastic Agent. If it is not the policy you expected, you can change it.
-
In Fleet, click Agents, and then select the Elastic Agent policy. Check for the integrations that should be included.
For example, if you want to include system data, make sure the System integration is included in the policy.
-
Confirm if the Collect agent logs and Collect agent metrics options are selected.
- In Fleet, click Agents, and then select the Elastic Agent policy.
-
Select the Settings tab. If you want to collect agent logs or metrics, select these options.
The Elastic Cloud agent policy is created only in Elastic Cloud deployments and, by default, does not include the collection of logs of metrics.
You can collect other files to assess and pass to the Elastic team for review for some more advanced debugging cases.
These files should all be in the Elastic Agent directory on disk: state.yml
, fleet.yml
and elastic-agent.yml
.
Some problems occur so early that insufficient logging is available
editIf some problems occur early and insufficient logging is available, run the following command:
./elastic-agent install -f
The stand-alone install command installs the Elastic Agent, and all of the service configuration is set up. You can now run the enrollment command. For example:
elastic-agent enroll -f --fleet-server-es=https://<es-url>:443 --fleet-server-service-token=<token> --fleet-server-policy=<policy-id>
Note: Port 443
is commonly used in Elastic Cloud. However, with self-managed deployments, your Elasticsearch may run on port 9200
or something entirely different.
For information on where to find agent logs, see our FAQ.
The Elastic Agent is cited as Healthy
but still has set up problems sending data to Elasticsearch
edit-
To confirm that the Elastic Agent is running and its status is
Healthy
, select the Agents tab.If you previously selected the Collect agent logs option, you can now look at the agent logs.
-
Click the agent name and then select the Logs tab.
If there are no logs displayed, it suggests a communication problem between your host and Elasticsearch. The possible reason for this is that the port is already in use.
-
You can check the port usage using tools like Wireshark or netstat. On a POSIX system, you can run the following command:
netstat -nat | grep :8220
Any response data indicates that the port is in use. This could be correct or not if you had intended to uninstall the Fleet Server. In which case, re-check and continue.
Fleet Server is running and healthy with data, but other Agents cannot use it to connect to Elasticsearch
editSome settings are only used when you have multiple Elastic Agents. If this is the case, it may help to check that the hosts can communicate with the Fleet Server.
From the non-Fleet Server host, run the following command:
curl -f http://<fleet-server-ip>:8220/api/status
The response may yield errors that you can be debug further, or it may work and show that communication ports and networking are not the problems.
One common problem is that the default Fleet Server port of 8220
isn’t open on the Fleet Server
host to communicate. You can review and correct this using common tools in alignment with any
networking and security concerns you may have.
Elasticsearch authentication service fails with Authentication using apikey failed
message
editTo save API keys and encrypt them in Elasticsearch, Fleet requires an encryption key.
To provide an API key, in the kibana.yml
configuration file, set the xpack.encryptedSavedObjects.encryptionKey
property.
xpack.encryptedSavedObjects.encryptionKey: "something_at_least_32_characters"
Elastic Agent fails with Agent process is not root/admin or validation failed
message
editEnsure the user running Elastic Agent has root privileges as some integrations require root privileges to collect sensitive data.
If you’re running Elastic Agent in the foreground (and not as a service) on Linux or macOS, run the
agent under the root user: sudo
or su
.
If you’re using the Endpoint Security integration, make sure you’re running Elastic Agent under the SYSTEM account.
If you install Elastic Agent as a service as described in Install Elastic Agents, Elastic Agent runs under the SYSTEM account by default.
To run Elastic Agent under the SYSTEM account, you can do the following:
-
Download PsExec
and extract the contents to a folder. For example,
d:\tools
. - Open a command prompt as an Administrator (right-click the command prompt icon and select Run As Administrator).
-
From the command prompt, run Elastic Agent under the SYSTEM account:
d:\tools\psexec.exe -sid "C:\Program Files\Elastic-Agent\elastic-agent.exe" run
Elastic Agent hangs while unenrolling
editWhen unenrolling Elastic Agent, Fleet waits for acknowledgement from the agent
before it completes the unenroll process. If Fleet doesn’t receive an
acknowledgement, the status hangs at unenrolling.
You can unenroll an agent to invalidate all API keys related to the agent and change the status to
inactive
so that the agent no longer appears in Fleet.
- In Fleet, select Agents.
- Under Agents, choose Unenroll agent from the Actions menu next to the agent you want to unenroll.
- Click Force unenroll.
On Fleet Server startup, ERROR seen with State changed to CRASHED: exited with code: 1
editYou may see this error message for a number of different reasons. A common reason is when attempting production-like usage and the ca.crt file passed in cannot be found. To verify if this is the problem, bootstrap Fleet Server without passing a ca.crt file. This implies you would test any subsequent Elastic Agent installs temporarily with {fleet-sever}'s own self-signed cert.
Tip: Ensure to pass in the full path to the ca.crt file. A relative path is not viable.
You will know if your Fleet Server is set up with its testing oriented self-signed certificate usage, when you see the following error during Elastic Agent installs:
Error: fail to enroll: fail to execute request to fleet-server: x509: certificate signed by unknown authority Error: enroll command failed with exit code: 1
To install or enroll against a self-signed cert Fleet Server Elastic Agent, add in the --insecure
option to the
command:
sudo ./elastic-agent install -f --url=https://<fleet-server-ip>:8220 --enrollment-token=<token> --insecure
Elastic Endpoint uninstallation fails
editWhen you uninstall Elastic Agent, all the programs managed by Elastic Agent, such as Elastic Endpoint, are also removed. If uninstallation fails, Elastic Endpoint might remain on your system.
To remove Elastic Endpoint, run the following commands:
cd /tmp cp /Library/Elastic/Endpoint/elastic-endpoint elastic-endpoint sudo ./elastic-endpoint uninstall rm elastic-endpoint
cd /tmp cp /opt/Elastic/Endpoint/elastic-endpoint elastic-endpoint sudo ./elastic-endpoint uninstall rm elastic-endpoint
cd %TEMP% copy "c:\Program Files\Elastic\Endpoint\elastic-endpoint.exe" elastic-endpoint.exe .\elastic-endpoint.exe uninstall del .\elastic-endpoint.exe
API key is unauthorized to send telemetry to .logs-endpoint.diagnostic.collection-*
indices
editBy default, telemetry is turned on in the Elastic Stack to helps us learn about the features that our users are most interested in. This helps us to focus our efforts on making features even better.
If you’ve recently upgraded from version 7.10
to 7.11
, you might see the
following message when you view Endpoint Security logs:
action [indices:admin/auto_create] is unauthorized for API key id [KbvCi3YB96EBa6C9k2Cm] of user [fleet_enroll] on indices [.logs-endpoint.diagnostic.collection-default]
The above message indicates that Elastic Endpoint does not have the correct permissions to send telemetry. This is a known problem in 7.11 that will be fixed in an upcoming patch release.
To remove this message from your logs, you can turn off telemetry for the Endpoint Security integration until the next patch release is available.
- In Fleet, click Integrations, and then select the Installed integrations tab.
- Click Endpoint Security, and then select the Policies tab to view all the installed integrations.
- Click the integration to edit it.
-
Under advanced settings, set
windows.advanced.diagnostic.enabled
tofalse
, and then save the integration.