The source files for the general Elastic Agent documentation are currently stored in the observability-docs repo. The following docs are only focused on getting developers started building code for Elastic Agent.
The changelog for the Elastic Agent is generated and maintained using the elastic-agent-changelog-tool. Read the installation and usage instructions to get started.
The changelog tool produces fragement files that are consolidated to generate a changelog for each release. Each PR containing a change with user impact (new feature, bug fix, etc.) must contain a changelog fragement describing the change. There is a GitHub action in CI that will fail if a PR does not contain a changelog fragment. For PRs that should not have a changelog entry, use the "skip-changelog" label to bypass this check.
A simple example of a changelog fragment is below for reference:
kind: bug-fix
summary: Fix a panic caused by a race condition when installing the Elastic Agent.
pr: https://github.com/elastic/elastic-agent/pull/823
Prerequisites:
- installed mage
- Docker
- X-pack to pre-exist in the parent folder of the local Git repository checkout
- elastic-agent-changelog-tool to add changelog fragments for changelog generation
To build a local version of the agent for development, run the command below. The following platforms are supported:
- darwin/amd64
- darwin/arm64
- linux/amd64
- linux/arm64
- windows/amd64
# DEV=true disable signature verification to allow replacing binaries in the components sub-directory of the package.
# EXTERNAL=true downloads the matching version of the binaries that are packaged with agent (Beats for example).
# SNAPSHOT=true indicates that this is a snapshot version and not a release version.
# PLATFORMS=linux/amd64 builds an agent that will run on 64 bit Linux systems.
# PACKAGES=tar.gz produces a tar.gz package
DEV=true EXTERNAL=true SNAPSHOT=true PLATFORMS=linux/amd64 PACKAGES=tar.gz mage -v package
The resulting package will be produced in the build/distributions directory. The version is controlled by the value in version.go. To install the agent extract the package and run the install command:
cd build/distributions
tar xvfz build/distributions/elastic-agent-8.8.0-SNAPSHOT-darwin-aarch64.tar.gz
cd build/distributions/elastic-agent-8.8.0-SNAPSHOT-darwin-aarch64
sudo elastic-agent install
For basic use the agent binary can be run directly, with the sudo elastic-agent run
command.
Running Elastic Agent in a docker container is a common use case. To build the Elastic Agent and create a docker image run the following command:
# Use PLATFORMS=linux/arm64 if you are using an ARM based Mac.
DEV=true SNAPSHOT=true PLATFORMS=linux/amd64 PACKAGES=docker mage package
If you are in the 7.13 branch, this will create the docker.elastic.co/beats/elastic-agent:7.13.0-SNAPSHOT
image in your local environment. Now you can use this to for example test this container with the stack in elastic-package:
elastic-package stack up --version=7.13.0-SNAPSHOT -v
Please note that the docker container is built in both standard and 'complete' variants. The 'complete' variant contains extra files, like the chromium browser, that are too large for the standard variant.
- create kubernetes cluster using kind, check here for details
- deploy kube-state-metrics, check here for details
- deploy required infrastructure:
- for elastic agent in standalone mode: EK stack or use elastic cloud, check here for details
- for managed mode: use elastic cloud or bring up the stack on docker and then connect docker network with kubernetes kind nodes:
elastic-package stack up -d -v docker network connect elastic-package-stack_default <kind_container_id>
- Build elastic-agent:
DEV=true PLATFORMS=linux/amd64 PACKAGES=docker mage package
Use environmental variables GOHOSTOS
and GOHOSTARCH
to specify PLATFORMS variable accordingly. eg.
❯ go env GOHOSTOS
darwin
❯ go env GOHOSTARCH
amd64
- Build docker image:
cd build/package/elastic-agent/elastic-agent-linux-amd64.docker/docker-build
docker build -t custom-agent-image .
- Load this image in your kind cluster:
kind load docker-image custom-agent-image:latest
- Deploy agent with that image:
- download all-in-ome manifest for elastic-agent in standalone or managed mode, change version if needed
ELASTIC_AGENT_VERSION="8.0"
ELASTIC_AGENT_MODE="standalone" # ELASTIC_AGENT_MODE="managed"
curl -L -O https://raw.githubusercontent.com/elastic/elastic-agent/${ELASTIC_AGENT_VERSION}/deploy/kubernetes/elastic-agent-${ELASTIC_AGENT_MODE}-kubernetes.yaml
-
Modify downloaded manifest:
- change image name to the one, that was created in the previous step and add
imagePullPolicy: Never
:
containers: - name: elastic-agent image: custom-agent-image:latest imagePullPolicy: Never
- set environment variables accordingly to the used setup.
Elastic-agent in standalone mode: set
ES_USERNAME
,ES_PASSWORD
,ES_HOST
.Elastic-agent in managed mode: set
FLEET_URL
andFLEET_ENROLLMENT_TOKEN
. - change image name to the one, that was created in the previous step and add
-
create
kubectl apply -f elastic-agent-${ELASTIC_AGENT_MODE}-kubernetes.yaml
- Check status of elastic-agent:
kubectl -n kube-system get pods -l app=elastic-agent
Elastic employees can create an Elastic Cloud deployment with a locally
built Elastic Agent, by pushing images to an internal Docker repository. The images will be
based on the SNAPSHOT images with the version defined in version/version.go
.
Prerequisite to running following commands is having terraform
installed and running terraform init
from within testing/environments/cloud
.
Running a shorthand make deploy_local
in testing/environments/cloud
will build Agent, tag the docker image correctly, push it to the repository and deploy to Elastic Cloud.
For more advanced scenarios:
Running make build_elastic_agent_docker_image
in testing/environments/cloud
will build and push the images.
Running make push_elastic_agent_docker_image
in testing/environments/cloud
will publish built docker image to CI docker repository.
Once docker images are published you can run EC_API_KEY=your_api_key make apply
from testing/environments/cloud
directory to deploy them to Elastic Cloud.
To get EC_API_KEY
follow this guide
The custom images are tagged with the current version, commit and timestamp. The timestamp is included to force a new Docker image to be used, which enables pushing new binaries without recreating the deployment.
To specify custom images create your docker_image.auto.tfvars
file similar to docker_image.auto.tfvars.sample
.
You can also use mage cloud:image
and mage cloud:push
respectively from repo root directory.
To deploy your changes use make apply
(from testing/environments/cloud
) with EC_API_KEY
instead of make deploy_local
described above.
SNAPSHOT images are used by default. To use non-snapshot image specify SNAPSHOT=false
explicitly.
Even though we prefer mage
to our automation, we still have some
rules implemented on our Makefile
as well as CI will use the
Makefile
. CI will run make check-ci
, so make sure to run it
locally before submitting any PRs to have a quicker feedback instead
of waiting for a CI failure.
To do so, just run make notice
, this is also part of the make check-ci
and is the same check our CI will do.
At some point we will migrate it to mage (see discussion on elastic#1108 and on elastic#1107). However until we have the mage automation sorted out, it has been removed to avoid confusion.