- Fleet and Elastic Agent Guide: other versions:
- Fleet and Elastic Agent overview
- Beats and Elastic Agent capabilities
- Quick starts
- Migrate from Beats to Elastic Agent
- Deployment models
- Install Elastic Agents
- Install Fleet-managed Elastic Agents
- Install standalone Elastic Agents
- Install Elastic Agents in a containerized environment
- Run Elastic Agent in a container
- Run Elastic Agent on Kubernetes managed by Fleet
- Install Elastic Agent on Kubernetes using Helm
- Example: Install standalone Elastic Agent on Kubernetes using Helm
- Example: Install Fleet-managed Elastic Agent on Kubernetes using Helm
- Advanced Elastic Agent configuration managed by Fleet
- Configuring Kubernetes metadata enrichment on Elastic Agent
- Run Elastic Agent on GKE managed by Fleet
- Run Elastic Agent on Amazon EKS managed by Fleet
- Run Elastic Agent on Azure AKS managed by Fleet
- Run Elastic Agent Standalone on Kubernetes
- Scaling Elastic Agent on Kubernetes
- Using a custom ingest pipeline with the Kubernetes Integration
- Environment variables
- Run Elastic Agent as an OTel Collector
- Run Elastic Agent without administrative privileges
- Install Elastic Agent from an MSI package
- Installation layout
- Air-gapped environments
- Using a proxy server with Elastic Agent and Fleet
- Uninstall Elastic Agents from edge hosts
- Start and stop Elastic Agents on edge hosts
- Elastic Agent configuration encryption
- Secure connections
- Manage Elastic Agents in Fleet
- Configure standalone Elastic Agents
- Create a standalone Elastic Agent policy
- Structure of a config file
- Inputs
- Providers
- Outputs
- SSL/TLS
- Logging
- Feature flags
- Agent download
- Config file examples
- Grant standalone Elastic Agents access to Elasticsearch
- Example: Use standalone Elastic Agent with Elastic Cloud Serverless to monitor nginx
- Example: Use standalone Elastic Agent with Elasticsearch Service to monitor nginx
- Debug standalone Elastic Agents
- Kubernetes autodiscovery with Elastic Agent
- Monitoring
- Reference YAML
- Manage integrations
- Package signatures
- Add an integration to an Elastic Agent policy
- View integration policies
- Edit or delete an integration policy
- Install and uninstall integration assets
- View integration assets
- Set integration-level outputs
- Upgrade an integration
- Managed integrations content
- Best practices for integrations assets
- Data streams
- Define processors
- Processor syntax
- add_cloud_metadata
- add_cloudfoundry_metadata
- add_docker_metadata
- add_fields
- add_host_metadata
- add_id
- add_kubernetes_metadata
- add_labels
- add_locale
- add_network_direction
- add_nomad_metadata
- add_observer_metadata
- add_process_metadata
- add_tags
- community_id
- convert
- copy_fields
- decode_base64_field
- decode_cef
- decode_csv_fields
- decode_duration
- decode_json_fields
- decode_xml
- decode_xml_wineventlog
- decompress_gzip_field
- detect_mime_type
- dissect
- dns
- drop_event
- drop_fields
- extract_array
- fingerprint
- include_fields
- move_fields
- parse_aws_vpc_flow_log
- rate_limit
- registered_domain
- rename
- replace
- script
- syslog
- timestamp
- translate_sid
- truncate_fields
- urldecode
- Command reference
- Troubleshoot
- Release notes
Upgrade an Elastic Agent integration
editUpgrade an Elastic Agent integration
editBy default, Kibana requires an internet connection to download
integration packages from the Elastic Package Registry. Make sure the Kibana
server can connect to https://epr.elastic.co
on port 443
. If network
restrictions prevent Kibana from reaching the public Elastic Package Registry,
you can use a proxy server or host your own Elastic Package Registry. To learn
more, refer to Air-gapped environments.
Elastic releases Elastic Agent integration updates periodically. To use new features and capabilities, upgrade the installed integration to the latest version and optionally upgrade integration policies to use the new version.
In larger deployments, you should test integration upgrades on a sample Elastic Agent before rolling out a larger upgrade initiative.
Upgrade an integration to the latest version
edit- In Kibana, go to the Integrations page and open the Installed integrations tab. Search for and select the integration you want to upgrade. Notice there is a warning icon next to the version number to indicate a new version is available.
-
Click the Settings tab and notice the message about the new version.
-
Before upgrading the integration, decide whether to upgrade integration policies to the latest version, too. To use new features and capabilities, you’ll need to upgrade existing integration policies. However, the upgrade may introduce changes, such as field changes, that require you to resolve conflicts.
- Select Upgrade integration policies to upgrade any eligible integration policies when the integration is upgraded.
- To continue using the older package version, deselect Upgrade integration policies. You can still choose to upgrade integration policies manually later on.
-
Click Upgrade to latest version.
If you selected Upgrade integration policies and there are conflicts, upgrade integration policies manually and resolve the conflicts in the policy editor.
- After the upgrade is complete, verify that the installed version and latest version match.
You must upgrade standalone agents separately. If you used Kibana to create and download your standalone agent policy, see Upgrade standalone agent policies after upgrading an integration.
Keep integration policies up to date automatically
editSome integration packages, like System, are installed by default during Fleet setup. These integrations are upgraded automatically when Fleet detects that a new version is available.
The following integrations are installed automatically when you select certain options in the Fleet UI. All of them have an option to upgrade integration policies automatically, too:
- Elastic Agent - installed automatically when the default Collect agent logs or Collect agent metrics option is enabled in an Elastic Agent policy).
- Fleet Server - installed automatically when Fleet Server is set up through the Fleet UI.
- System - installed automatically when the default Collect system logs and metrics option is enabled in an Elastic Agent policy).
The Elastic Defend integration also has an option to upgrade installation policies automatically.
Note that for the following integrations, when the integration is updated automatically the integration policy is upgraded automatically as well. This behavior cannot be disabled.
For integrations that support the option to auto-upgrade the integration policy, when this option is selected (the default), Fleet automatically upgrades your policies when a new version of the integration is available. If there are conflicts during the upgrade, your integration policies will not be upgraded, and you’ll need to upgrade integration policies manually.
To keep integration policies up to data automatically:
- In Kibana, go to the Integrations page and open the Installed integrations tab. Search for and select the integration you want to configure.
-
Click Settings and make sure Keep integration policies up to data automatically is selected.
If this option isn’t available on the Settings tab, this feature is not available for the integration you’re viewing.
Upgrade integration policies manually
editIf you can’t upgrade integration policies when you upgrade the integration, upgrade them manually.
-
Click the Policies tab and find the integration policies you want to upgrade.
-
Click Upgrade to begin the upgrade process.
The upgrade will open in the policy editor.
- Make any required configuration changes and, if necessary, resolve conflicts. For more information, refer to Resolve conflicts.
- Repeat this process for each policy with an out-of-date integration.
Too many conflicts to resolve? Refer to the troubleshooting docs for manual steps.
Resolve conflicts
editWhen attempting to upgrade an integration policy, it’s possible that breaking changes or conflicts exist between versions of an integration. For example, if a new version of an integration has a required field and doesn’t specify a default value, Fleet cannot perform the upgrade without user input. Conflicts are also likely if an experimental package greatly restructures its fields and configuration settings between releases.
If Fleet detects a conflict while automatically upgrading an integration policy, it will not attempt to upgrade it. You’ll need to:
- Upgrade the integration policy manually.
-
Use the policy editor to fix any conflicts or errors.
-
Under Review field conflicts, notice that you can click previous configuration to view the raw JSON representation of the old integration policy and compare values. This feature is useful when fields have been deprecated or removed between releases.
- In the policy editor, fix any errors and click Upgrade integration.
-
On this page