Skip to content

Latest commit

 

History

History
346 lines (285 loc) · 18.1 KB

air-gapped.asciidoc

File metadata and controls

346 lines (285 loc) · 18.1 KB

Air-gapped environments

When running {agent}s in a restricted or closed network, you need to take extra steps to make sure:

  • {kib} is able to reach the {package-registry} to download package metadata and content.

  • {agent}s are able to download binaries during upgrades from the {artifact-registry}.

The {package-registry} must therefore be accessible from {kib} via an HTTP Proxy and/or self-hosted.

The {artifact-registry} must therefore be accessible from {kib} via an HTTP Proxy and/or self-hosted.

Tip

See the {elastic-sec} Solution documentation for air-gapped {security-guide}/offline-endpoint.html[offline endpoints].

When upgrading all the components in an air-gapped environment, it is recommended that you upgrade in the following order:

  1. Upgrade the {package-registry}.

  2. Upgrade the {stack} including {kib}.

  3. Upgrade the {artifact-registry} and ensure the latest {agent} binaries are available.

  4. Upgrade the on-premise {fleet-server}.

  5. In {fleet}, issue an upgrade for all the {agent}s.

Enable air-gapped mode for {fleet}

Set the following property in {kib} to enable air-gapped mode in {fleet}. This allows {fleet} to intelligently skip certain requests or operations that shouldn’t be attempted in air-gapped environments.

xpack.fleet.isAirGapped: true

Configure {agents} to download a PGP/GPG key from {fleet-server}

Starting from version 8.9.0, when {agent} tries to perform an upgrade, it first verifies the binary signature with the key bundled in the agent. This process has a backup mechanism that will use the key coming from https://artifacts.elastic.co/GPG-KEY-elastic-agent instead of the one it already has.

In an air-gapped environment, an {agent} which doesn’t have access to a PGP/GPG key from https://artifacts.elastic.co/GPG-KEY-elastic-agent would fail to be upgraded. For versions 8.9.0 to 8.10.3, you can resolve this problem following the steps described in the associated known issue documentation.

Starting in version 8.10.4, you can resolve this problem by configuring {agents} to download the PGP/GPG key from {fleet-server}.

Starting in version 8.10.4, {agent} will:

  1. Verify the binary signature with the key bundled in the agent.

  2. If the verification doesn’t pass, the agent will download the PGP/GPG key from https://artifacts.elastic.co/GPG-KEY-elastic-agent and verify it.

  3. If that verification doesn’t pass, the agent will download the PGP/GPG key from {fleet-server} and verify it.

  4. If that verification doesn’t pass, the upgrade is blocked.

By default, {fleet-server} serves {agents} with the key located in FLEETSERVER_BINARY_DIR/elastic-agent-upgrade-keys/default.pgp. The key is served through the {fleet-server} endpoint GET /api/agents/upgrades/{major}.{minor}.{patch}/pgp-public-key.

If there isn’t a default.pgp key in the FLEETSERVER_BINARY_DIR/elastic-agent-upgrade-keys/default.pgp directory, {fleet-server} instead will attempt to retrieve a PGP/GPG key from the URL that you can specify with the server.pgp.upstream_url setting.

You can prevent {fleet} from downloading the PGP/GPG key from server.pgp.upstream_url by manually downloading it from https://artifacts.elastic.co/GPG-KEY-elastic-agent and storing it at FLEETSERVER_BINARY_DIR/elastic-agent-upgrade-keys/default.pgp.

To set a custom URL for {fleet-server} to access a PGP/GPG key and make it available to {agents}:

  1. In {kib}, go to Management > {fleet} > Agent policies.

  2. Select a policy for the agents that you want to upgrade.

  3. On the policy page, in the Actions menu for the {fleet-server} integration, select Edit integration.

  4. In the {fleet-server} settings section expand Change defaults and Advanced options.

  5. In the Custom fleet-server configurations field, add the setting server.pgp.upstream_url with the full URL where the PGP/GPG key can be accessed. For example:

server.pgp.upstream_url: <http://my-web-server:8080/default.pgp>

The setting server.pgp.upstream_url must point to a web server hosting the PGP/GPG key, which must be reachable by the host where {fleet-server} is installed.

Note that:

  • server.pgp.upstream_url may be specified as an http endpoint (instead of https).

  • For an https endpoint, the CA for {fleet-server} to connect to server.pgp.upstream_url must be trusted by {fleet-server} using the --certificate-authorities setting that is used globally for {agent}.

Use a proxy server to access the {package-registry}

By default {kib} downloads package metadata and content from the public {package-registry} at epr.elastic.co.

If you can route traffic to the public endpoint of the {package-registry} through a network gateway, set the following property in {kib} to use a proxy server:

xpack.fleet.registryProxyUrl: your-nat-gateway.corp.net

For more information, refer to [fleet-agent-proxy-support].

Host your own {package-registry}

Note
The {package-registry} packages include signatures used in package verification. By default, {fleet} uses the Elastic public GPG key to verify package signatures. If you ever need to change this GPG key, use the xpack.fleet.packageVerification.gpgKeyPath setting in kibana.yml. For more information, refer to {kibana-ref}/fleet-settings-kb.html[{fleet} settings].

If routing traffic through a proxy server is not an option, you can host your own {package-registry}.

The {package-registry} can be deployed and hosted onsite using one of the available Docker images. These docker images include the {package-registry} and a selection of packages.

There are different distributions available:

  • {version} (recommended): docker.elastic.co/package-registry/distribution:{version} - Selection of packages from the production repository released with {stack} {version}.

  • lite-{version}: docker.elastic.co/package-registry/distribution:lite-{version} - Subset of the most commonly used packages from the production repository released with {stack} {version}. This image is a good candidate to start using {fleet} in air-gapped environments.

  • production: docker.elastic.co/package-registry/distribution:production - Packages available in the production registry (https://epr.elastic.co). Please note that this image is updated every time a new version of a package gets published.

  • lite: docker.elastic.co/package-registry/distribution:lite - Subset of the most commonly used packages available in the production registry (https://epr.elastic.co). Please note that this image is updated every time a new version of a package gets published.

To update the distribution image, re-pull the image and then restart the docker container.

Every distribution contains packages that can be used by different versions of the {stack}. The {package-registry} API exposes a {kib} version constraint that allows for filtering packages that are compatible with a particular version.

Note
These steps use the standard Docker CLI, but you can create a Kubernetes manifest based on this information. These images can also be used with other container runtimes compatible with Docker images.
  1. Pull the Docker image from the public Docker registry:

    docker pull docker.elastic.co/package-registry/distribution:{version}
  2. Save the Docker image locally:

    docker save -o package-registry-{version}.tar docker.elastic.co/package-registry/distribution:{version}
    Tip
    Check the image size to ensure that you have enough disk space.
  3. Transfer the image to the air-gapped environment and load it:

    docker load -i package-registry-{version}.tar
  4. Run the {package-registry}:

    docker run -it -p 8080:8080 docker.elastic.co/package-registry/distribution:{version}
  5. (Optional) You can monitor the health of your {package-registry} with requests to the root path:

    docker run -it -p 8080:8080 \
        --health-cmd "curl -f -L http://127.0.0.1:8080/health" \
        docker.elastic.co/package-registry/distribution:{version}

Connect {kib} to your hosted {package-registry}

Use the xpack.fleet.registryUrl property in the {kib} config to set the URL of your hosted package registry. For example:

xpack.fleet.registryUrl: "http://package-registry.corp.net:8080"

TLS configuration of the {package-registry}

You can configure the {package-registry} to listen on a secure HTTPS port using TLS.

For example, given a key and a certificate pair available in /etc/ssl, you can start the {package-registry} listening on the 443 port using the following command:

docker run -it -p 443:443 \
  -v /etc/ssl/package-registry.key:/etc/ssl/package-registry.key:ro \
  -v /etc/ssl/package-registry.crt:/etc/ssl/package-registry.crt:ro \
  -e EPR_ADDRESS=0.0.0.0:443 \
  -e EPR_TLS_KEY=/etc/ssl/package-registry.key \
  -e EPR_TLS_CERT=/etc/ssl/package-registry.crt \
  docker.elastic.co/package-registry/distribution:{version}

The {package-registry} supports TLS versions from 1.0 to 1.3. The minimum version accepted can be configured with EPR_TLS_MIN_VERSION, it defaults to 1.0. If you want to restrict the supported versions from 1.2 to 1.3, you can use EPR_TLS_MIN_VERSION=1.2.

Using custom CA certificates

If you are using self-signed certificates or certificates issued by a custom Certificate Authority (CA), you need to set the file path to your CA in the NODE_EXTRA_CA_CERTS environment variable in the {kib} startup files.

NODE_EXTRA_CA_CERTS="/etc/kibana/certs/ca-cert.pem"

Host your own artifact registry for binary downloads

{agent}s must be able to access the {artifact-registry} to download binaries during upgrades. By default {agent}s download artifacts from https://artifacts.elastic.co/downloads/.

To make binaries available in an air-gapped environment, you can host your own custom artifact registry, and then configure {agent}s to download binaries from it.

  1. Create a custom artifact registry in a location accessible to your {agent}s:

    1. Download the latest release artifacts from the public {artifact-registry} at https://artifacts.elastic.co/downloads/. For example, the following cURL commands download all the artifacts that may be needed to upgrade {agent}s running on Linux x86_64. You may replace x86_64 with arm64 for the ARM64 version. The exact list depends on which integrations you’re using. Make sure to also download the corresponding sha512, and PGP Signature (.asc) files for each binary. These are used for file integrity validations during installations and upgrades.

      curl -O https://artifacts.elastic.co/downloads/apm-server/apm-server-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/apm-server/apm-server-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/apm-server/apm-server-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/beats/auditbeat/auditbeat-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/beats/auditbeat/auditbeat-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/beats/auditbeat/auditbeat-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/beats/elastic-agent/elastic-agent-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/beats/filebeat/filebeat-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/beats/filebeat/filebeat-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/beats/filebeat/filebeat-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/beats/heartbeat/heartbeat-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/beats/heartbeat/heartbeat-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/beats/heartbeat/heartbeat-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/beats/metricbeat/metricbeat-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/beats/metricbeat/metricbeat-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/beats/metricbeat/metricbeat-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/beats/osquerybeat/osquerybeat-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/beats/osquerybeat/osquerybeat-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/beats/osquerybeat/osquerybeat-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/beats/packetbeat/packetbeat-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/beats/packetbeat/packetbeat-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/beats/packetbeat/packetbeat-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/cloudbeat/cloudbeat-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/cloudbeat/cloudbeat-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/cloudbeat/cloudbeat-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/endpoint-dev/endpoint-security-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/endpoint-dev/endpoint-security-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/endpoint-dev/endpoint-security-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/fleet-server/fleet-server-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/fleet-server/fleet-server-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/fleet-server/fleet-server-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-host-agent-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-host-agent-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-host-agent-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-collector-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-collector-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-collector-{version}-linux-x86_64.tar.gz.asc
      curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-symbolizer-{version}-linux-x86_64.tar.gz
      curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-symbolizer-{version}-linux-x86_64.tar.gz.sha512
      curl -O https://artifacts.elastic.co/downloads/prodfiler/pf-elastic-symbolizer-{version}-linux-x86_64.tar.gz.asc
    2. On your HTTP file server, group the artifacts into directories and sub-directories that follow the same convention used by the {artifact-registry}:

      <source_uri>/<artifact_type>/<artifact_name>-<version>-<arch>-<package_type>

      Where:

      • <artifact_type> is in the format beats/elastic-agent, fleet-server, endpoint-dev, and so on.

      • <artifict_name> is in the format elastic-agent, endpoint-security, or fleet-server and so on.

      • arch-package-type is in the format linux-x86_64, linux-arm64, windows_x86_64, darwin_x86_64, or darwin_aarch64`.

      • If you’re using the DEB package manager:

        • The 64bit variant has the format <artifact_name>-<version>-amd64.deb.

        • The aarch64 variant has the format <artifact_name>-<version>-arm64.deb.

      • If you’re using the RPM package manager:

        • The 64bit variant has a format <artifact_name>-<version>-x86_64.rpm.

        • The aarch64 variant has a format <artifact_name>-<version>-aarch64.rpm.

    Tip
    • If you’re ever in doubt, visit the {agent} download page to see what URL the various binaries are downloaded from.

    • Make sure you have a plan or automation in place to update your artifact registry when new versions of {agent} are available.

  2. Add the agent binary download location to {fleet} settings:

    1. Open {fleet} → Settings.

    2. Under Agent Binary Download, click Add agent binary source to add the location of your artifact registry. For more detail about these settings, refer to [fleet-agent-binary-download-settings]. If you want all {agent}s to download binaries from this location, set it as the default.

  3. If your artifact registry is not the default, edit your agent policies to override the default:

    1. Go to {fleet} → Agent policies and click the policy name to edit it.

    2. Click Settings.

    3. Under Agent Binary Download, select your artifact registry.

      When you trigger an upgrade for any {agent}s enrolled in the policy, the binaries are downloaded from your artifact registry instead of the public repository.

Not using {fleet}? For standalone {agent}s, you can set the binary download location under agent.download.sourceURI in the elastic-agent.yml file, or run the elastic-agent upgrade command with the --source-uri flag specified.