From 830f2d3870c27d2f082766cf6e9f8b79088553d1 Mon Sep 17 00:00:00 2001 From: David Kilfoyle <41695641+kilfoyle@users.noreply.github.com> Date: Thu, 7 Mar 2024 09:17:28 -0500 Subject: [PATCH] Add custom settings page (#962) * Add custom settings page * Fixup * Fix whitespace; replace policy ID with placeholder (cherry picked from commit 4106015b1e80cf144ef5b7a49f8f067f8f52aba6) --- .../install-elastic-agent.asciidoc | 25 ------ docs/en/ingest-management/index.asciidoc | 2 + .../override-policy-settings.asciidoc | 78 +++++++++++++++++++ 3 files changed, 80 insertions(+), 25 deletions(-) create mode 100644 docs/en/ingest-management/override-policy-settings.asciidoc diff --git a/docs/en/ingest-management/elastic-agent/install-elastic-agent.asciidoc b/docs/en/ingest-management/elastic-agent/install-elastic-agent.asciidoc index e0f17c7f3..04b617088 100644 --- a/docs/en/ingest-management/elastic-agent/install-elastic-agent.asciidoc +++ b/docs/en/ingest-management/elastic-agent/install-elastic-agent.asciidoc @@ -80,29 +80,4 @@ During upgrades, double the disk space is required to store the new {agent} bina |=== Adding integrations will increase the memory used by the agent and its processes. -[discrete] -=== Limiting CPU usage - -If you need to limit the amount of CPU consumption you can use the `agent.limits.go_max_procs` configuration option. This parameter limits the number of operating system threads that can be executing Go code simultaneously in each Go process. The `agent.limits.go_max_procs` option accepts an integer value not less than `0`, which is the default value that stands for "all available CPUs". - -The `agent.limits.go_max_procs` limit applies independently to the agent and each underlying Go process that it supervises. For example, if {agent} is configured to supervise two {beats} with `agent.limits.go_max_procs: 2` in the policy, then the total CPU limit is six, where each of the three processes (one {agent} and two {Beats}) may execute independently on two CPUs. - -This setting is similar to the {beats} {filebeat-ref}/configuration-general-options.html#_max_procs[`max_procs`] setting. For more detail, refer to the link:https://pkg.go.dev/runtime#GOMAXPROCS[GOMAXPROCS] function in the Go runtime documentation. -To enable `agent.limits.go_max_procs`, run a <> request from the {kib} {kibana-ref}/console-kibana.html[Dev Tools console] to override your current {agent} policy and add the `go_max_procs` parameter. For example, to limit Go processes supervised by {agent} to two operating system threads each, run: - -[source,shell] --- -PUT kbn:/api/fleet/agent_policies/ -{ - "name": "", - "namespace": "default", - "overrides": { - "agent": { - "limits": { - "go_max_procs": 2 - } - } - } -} --- diff --git a/docs/en/ingest-management/index.asciidoc b/docs/en/ingest-management/index.asciidoc index 82362704b..d5ab450de 100644 --- a/docs/en/ingest-management/index.asciidoc +++ b/docs/en/ingest-management/index.asciidoc @@ -141,6 +141,8 @@ include::agent-policies.asciidoc[leveloffset=+2] include::create-agent-policies-no-UI.asciidoc[leveloffset=+3] +include::override-policy-settings.asciidoc[leveloffset=+3] + include::security/fleet-roles-and-privileges.asciidoc[leveloffset=+2] include::security/enrollment-tokens.asciidoc[leveloffset=+2] diff --git a/docs/en/ingest-management/override-policy-settings.asciidoc b/docs/en/ingest-management/override-policy-settings.asciidoc new file mode 100644 index 000000000..9bb7b478c --- /dev/null +++ b/docs/en/ingest-management/override-policy-settings.asciidoc @@ -0,0 +1,78 @@ +[[enable-custom-policy-settings]] += Enable custom settings in an agent policy + +In certain cases it can be useful to enable custom settings that are not available in {fleet}, and that override the default behavior for {agent}. Examples include limiting the amount of CPU consumed by an agent, configuring the agent download timeout, and overriding the default port used for monitoring. + +WARNING: Use these custom settings with caution as they are intended for special cases. We do not test all possible combinations of settings which will be passed down to the components of {agent}, so it is possible that certain custom configurations can result in breakages. + +* <> +* <> +* <> + +[discrete] +[[limit-cpu-usage]] +== Limit CPU usage + +If you need to limit the amount of CPU consumption you can use the `agent.limits.go_max_procs` configuration option. This parameter limits the number of operating system threads that can be executing Go code simultaneously in each Go process. The `agent.limits.go_max_procs` option accepts an integer value not less than `0`, which is the default value that stands for "all available CPUs". + +The `agent.limits.go_max_procs` limit applies independently to the agent and each underlying Go process that it supervises. For example, if {agent} is configured to supervise two {beats} with `agent.limits.go_max_procs: 2` in the policy, then the total CPU limit is six, where each of the three processes (one {agent} and two {Beats}) may execute independently on two CPUs. + +This setting is similar to the {beats} {filebeat-ref}/configuration-general-options.html#_max_procs[`max_procs`] setting. For more detail, refer to the link:https://pkg.go.dev/runtime#GOMAXPROCS[GOMAXPROCS] function in the Go runtime documentation. + +To enable `agent.limits.go_max_procs`, run a <> request from the {kib} {kibana-ref}/console-kibana.html[Dev Tools console] to override your current {agent} policy and add the `go_max_procs` parameter. For example, to limit Go processes supervised by {agent} to two operating system threads each, run: + +[source,shell] +-- +PUT kbn:/api/fleet/agent_policies/ +{ + "name": "", + "namespace": "default", + "overrides": { + "agent": { + "limits": { + "go_max_procs": 2 + } + } + } +} +-- + +[discrete] +[[configure-agent-download-timeout]] +== Configure the agent download timeout + +You can configure the the amount of time that {agent} waits for an upgrade package download to complete. This is useful in the case of a slow or intermittent network connection. + +[source,shell] +-- +PUT kbn:/api/fleet/agent_policies/ +{ + "name": "Test policy", + "namespace": "default", + "overrides": { + "agent": { + "download": { + "timeout": "120s" + } + } + } +} +-- + +[discrete] +[[override-default-monitoring-port]] +== Override the default monitoring port + +You can override the default port that {agent} uses to send monitoring data. It's useful to be able to adjust this setting if you have an application running on the machine on which the agent is deployed, and that is using the same port. + +[source,shell] +-- +PUT kbn:/api/fleet/agent_policies/ +{ + "name": "Agent policy 1", + "namespace": "default", + "overrides": { + "agent.monitoring.http.port": 6792 + } +} +--