We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document information about how Fleet handles secrets in agent policies after work in elastic/kibana#154715 is completed.
Contact: @hop-dev
The text was updated successfully, but these errors were encountered:
Thank you for opening this issue, @jen-huang. Is this related to #148?
Sorry, something went wrong.
@karenzone This is separate feature from what #148 explains, but related under the general concept of how Fleet + Elastic Agent handles secrets/sensitive info management. Another doc under that topic, regarding encryption on the edge, exists here: https://www.elastic.co/guide/en/fleet/current/_elastic_agent_configuration_encryption.html
Thank you for the explanation, @jen. Helpful!
kilfoyle
Successfully merging a pull request may close this issue.
Document information about how Fleet handles secrets in agent policies after work in elastic/kibana#154715 is completed.
Contact: @hop-dev
The text was updated successfully, but these errors were encountered: