Capture Elastic Agent diagnostics
Elastic's diagnostic tools capture point-in-time snapshots of Fleet and Elastic Agent related statistics and logs. They work against all product versions.
Their information can be used to troubleshoot problems with your setup. You can generate diagnostic information using this tool before escalating to us to minimize turnaround time.
As explained under What is Fleet Server?, for Fleet-managed Elastic Agent, related settings and states can by surfaced by:
- Kibana from the Kibana Fleet APIs
- Elastic Agent and Fleet from their command reference
Standalone Elastic Agents are not associated to Kibana nor Fleet, but their diagnostics are still accessible from the CLI.
To pull data from the respective applicable locations, you will refer to:
- Capture Kibana diagnostics
- Collect Elastic Agent diagnostics (below)
-
If you need to pull an Elastic Agent diagnostic for the Fleet Server, as a hosted service you cannot access the CLI directly so will need to grab the diagnostic using the Fleet UI. The Fleet agent will be associated to the managed Agent policy named "Elastic Cloud agent policy". :::
You will need to determine which diagnostic types are needed to investigate your specific issue. The following are common troubleshooting situations and which diagnostics are commonly associated:
| Situation | Kibana | Elastic Agent | Fleet |
|---|---|---|---|
| Kibana reports no Fleet server | Yes | No | Yes |
| Elastic Agent unable to connect to Fleet | No | Yes | Yes |
| Elastic Agent component or integration errors | No | Yes | No |
| Elastic Agent update issues or desynced status | Yes | Yes | No |
When in doubt, start with the Kibana and Elastic Agent diagnostics.
Some Elastic Agent configuration issues only appear in their start-up debug logs. This is more common for cloud-connecting Elastic Integrations which maintain checkpoints. This can cause later logs to only document that the subprocess has stopped or that it has not changed state from an earlier error. In these situations, you will want to
- Enable
debuglogging. - Restart Elastic Agent.
- Wait 10 minutes for changes to sync from Fleet server to Elastic Agent and for it to restart.
- Pull the Elastic Agent diagnostic using prefered method.
- Disable
debuglogging.
Elastic Agent comes bundled with a diagnostics command which generates a zip archive containing troubleshooting diagnostic information. This export is intended only for debugging purposes and its structure can change between releases.
The Fleet UI provides the ability to remotely generate and gather an Elastic Agent's diagnostics bundle if it is online in a Healthy or Unhealthy status. For Elastic Agents in other statuses, you must use the CLI to grab their diagnostic.
Diagnostics and logs mainly emit product metadata and settings, but they might expose sensitive data which needs to be redacted before being shared outside of your organization. Refer to Sanitize
The diagnostics are sent to Fleet Server which in turn adds it into Elasticsearch. Therefore, this works even with Elastic Agents that are not using the Elasticsearch output. To download the diagnostics bundle for local viewing:
In Fleet, open the Agents tab.
In the Host column, click the agent’s name.
Select the Diagnostics tab and click the Request diagnostics .zip button.
In the Request Diagnostics pop-up, select Collect additional CPU metrics if you’d like detailed CPU data.
Click the Request diagnostics button.
When available, the new diagnostic bundle will be listed on this page, as well as any in-progress or previously collected bundles for the Elastic Agent.
Note that the bundles are stored in Elasticsearch and are removed automatically after 7 days. You can also delete any previously created bundle by clicking the trash can icon.
Run the diagnostics command in the Elastic Agent's install directory. For your convenience, we have outlined pulling the Elastic Agent diagnostic with default install directory for the most common Operating Systems:
Linux-based systems
cd /opt/Elastic/Agent .elastic-agent diagnosticsWindows Powershell
cd "C:\Program Files\Elastic\Agent" .\elastic-agent.exe diagnosticsApple MacOS
sudo -i cd /Library/Elastic/Agent ./elastic-agent diagnosticsDocker
- Determine the container ID with Docker
ps.
docker ps | grep "beats/elastic-agent"- Docker
execrun the diagnostic, replacing placeholderCONTAINER_ID.
docker exec -it CONTAINER_ID elastic-agent diagnosticsTake note of the output diagnostic filename and location.
- Docker
cpthe outputted diagnostic filename to your local machine, replacing placeholdersCONTAINER_IDandFILE_NAME.
docker cp CONTAINER_ID:/usr/share/elastic-agent/FILE_NAME FILE_NAME- Determine the container ID with Docker
Kubernetes
- Determine the container ID with
get.
kubectl get pods --all-namespaces | grep agent- Run the diagnostic with
exec, replacing placeholdersNAMESPACEandPOD_NAME.
kubectl exec --stdin --tty POD_NAME -n NAMESPACE -- elastic-agent diagnosticsTake note of the output diagnostic filename and location.
cpthe outputted diagnostic filename to your local machine, replacing placeholdersNAMESPACE,POD_NAME. andFILE_NAME.
kubectl cp NAMESPACE/POD_NAME:FILE_NAME FILE_NAME- Determine the container ID with
Elastic Agent attempts to automatically redact credentials and API keys when creating its diagnostic files. Review the contents of the archive before sharing to ensure that all forms of organizationally-private information is censored as needed. For example, ensure:
There are no credentials in plain text in its
*.yamldiagnostic files.The raw form of event's failing to output can show under
*.ndjson. By default onlywarnlog. When thedebuglogging level is enabled, all events are logged. If you want to omit the raw events from the diagnostic, add the flag--exclude-events.