fleet/docs/Contributing/guides/cli/fleetctl-apply.md

16 KiB

fleetctl apply

The fleectl apply command and YAML interface is used for one-off imports and backwards compatibility GitOps.

To use Fleet's best practice GitOps, check out the GitOps docs.

Queries

The queries YAML file controls queries in Fleet.

You can define one or more queries in the same file with ---.

The following example file includes several queries:

---
apiVersion: v1
kind: query
spec:
  name: osquery_info
  description: A heartbeat counter that reports general performance (CPU, memory) and version.
  query: select i.*, p.resident_size, p.user_time, p.system_time, time.minutes as counter from osquery_info i, processes p, time where p.pid = i.pid;
  team: ""
  interval: 3600 # 1 hour
  observer_can_run: true
  automations_enabled: true
  discard_data: false
---
apiVersion: v1 
kind: query 
spec: 
  name: Get serial number of a laptop 
  description: Returns the serial number of a laptop, which can be useful for asset tracking.
  query: SELECT hardware_serial FROM system_info; 
  team: Workstations
  interval: 0
  observer_can_run: true
  discard_data: false
--- 
apiVersion: v1 
kind: query 
spec: 
  name: Get recently added or removed USB drives 
  description: Report event publisher health and track event counters. 
  query: |-
    SELECT action, DATETIME(time, 'unixepoch') AS datetime, vendor, mounts.path 
    FROM disk_events 
    LEFT JOIN mounts 
      ON mounts.device = disk_events.device
    ;    
  team: Workstations (Canary)
  interval: 86400 # 24 hours
  observer_can_run: false
  min_osquery_version: 5.4.0
  platform: darwin,windows
  automations_enabled: true
  logging: differential
  discard_data: true

Continued edits and applications to this file will update the queries.

If you want to change the name of a report, you must first create a new report with the new name and then delete the report with the old name via the UI or API.

Labels

The following file describes the labels which hosts should be automatically grouped into. The label resource should include the actual SQL query so that the label is self-contained:

apiVersion: v1
kind: label
spec:
  name: slack_not_running
  query: >
    SELECT * FROM system_info
    WHERE NOT EXISTS (
      SELECT *
      FROM processes
      WHERE name LIKE "%Slack%"
    );    

Labels can also be manually managed. When defining a manual label, reference hosts by hostname:

apiVersion: v1
kind: label
spec:
  name: Manually Managed Example
  label_membership_type: manual
  hosts:
    - hostname1
    - hostname2
    - hostname3

Enroll secrets

The following file shows how to configure enroll secrets. Enroll secrets are valid until you delete them.

apiVersion: v1
kind: enroll_secret
spec:
  secrets:
    - secret: RzTlxPvugG4o4O5IKS/HqEDJUmI1hwBoffff
    - secret: YBh0n4pvRplKyWiowv9bf3zp6BBOJ13O

Osquery provides the enroll secret only during the enrollment process. Once a host is enrolled, the node key it receives remains valid for authentication independent from the enroll secret.

Currently enrolled hosts do not necessarily need enroll secrets updated, as the existing enrollment will continue to be valid as long as the host is not deleted from Fleet and the osquery store on the host remains valid. Any newly enrolling hosts must have the new secret.

Deploying a new enroll secret cannot be done centrally from Fleet.

Enroll secrets must be alphanumeric and should not contain special characters.

Multiple enroll secrets

Fleet allows the abiility to maintain multiple enroll secrets. Some organizations have internal goals around rotating secrets. Having multiple secrets allows some of them to work at the same time the rotation is happening. Another reason you might want to use multiple enroll secrets is to use a certain fleet enroll secret to auto-enroll hosts into a specific fleet (Fleet Premium).

Rotating enroll secrets

  1. In Fleet, head to Hosts > Manage enroll secret and add a new secret.
  2. Create a fleetd agent with the new enroll secret and install it on hosts.
  3. Delete the old enroll secret.

Fleets

Applies only to Fleet Premium.

The team YAML file controls a fleet of hosts.

You can define one or more fleet in the same file with ---.

The following example file includes one fleet:

apiVersion: v1
kind: team
spec:
  team:
    name: "💻 Workstations"
    agent_options:
      config:
        decorators:
          load:
          - SELECT uuid AS host_uuid FROM system_info;
          - SELECT hostname AS hostname FROM system_info;
        options:
          disable_distributed: false
          distributed_interval: 10
          distributed_plugin: tls
          distributed_tls_max_attempts: 3
          logger_tls_endpoint: /api/osquery/log
          logger_tls_period: 10
          pack_delimiter: /
      update_channels:
        desktop: edge
        orbit: edge
        osqueryd: edge
    features:
      enable_host_users: true
      enable_software_inventory: true
    host_expiry_settings:
      host_expiry_enabled: false
      host_expiry_window: 0
    integrations:
      conditional_access_enabled: null
      google_calendar:
        enable_calendar_events: false
        webhook_url: ""
    mdm:
      android_settings:
        certificates: null
        custom_settings: null
      enable_disk_encryption: true
      ios_updates:
        deadline: null
        minimum_version: null
        update_new_hosts: null
      ipados_updates:
        deadline: null
        minimum_version: null
        update_new_hosts: null
      macos_settings:
        custom_settings: []
      macos_setup:
        bootstrap_package: ""
        enable_end_user_authentication: true
        enable_release_device_manually: false
        macos_setup_assistant: ""
        manual_agent_install: false
        require_all_software_macos: false
        script: ""
        software: []
      macos_updates:
        deadline: ""
        minimum_version: ""
        update_new_hosts: null
      windows_require_bitlocker_pin: null
      windows_settings:
        custom_settings: null
      windows_updates:
        deadline_days: null
        grace_period_days: null
    scripts:
    - /home/runner/work/fleet/fleet/it-and-security/lib/macos/scripts/uninstall-fleetd-macos.sh
    - /home/runner/work/fleet/fleet/it-and-security/lib/windows/scripts/uninstall-fleetd-windows.ps1
    - /home/runner/work/fleet/fleet/it-and-security/lib/linux/scripts/uninstall-fleetd-linux.sh
    - /home/runner/work/fleet/fleet/it-and-security/lib/linux/scripts/install-fleet-desktop-required-extension.sh
    secrets:
    - created_at: "2026-02-08T05:25:21Z"
      secret: tTavYeEwmUYzdnRlPICwVcFtPszkIvkf
      team_id: 310
    software:
      app_store_apps: null
      fleet_maintained_apps:
      - categories: null
        icon:
          path: ""
        install_script:
          path: ""
        labels_exclude_any: null
        labels_include_any: null
        post_install_script:
          path: ""
        pre_install_query:
          path: ""
        self_service: true
        setup_experience: null
        slug: santa/darwin
        uninstall_script:
          path: ""
      - categories: null
        icon:
          path: ""
        install_script:
          path: ""
        labels_exclude_any: null
        labels_include_any: null
        post_install_script:
          path: ""
        pre_install_query:
          path: ""
        self_service: true
        setup_experience: null
        slug: vnc-viewer/darwin
        uninstall_script:
          path: ""
      - categories: null
        icon:
          path: ""
        install_script:
          path: ""
        labels_exclude_any: null
        labels_include_any: null
        post_install_script:
          path: ""
        pre_install_query:
          path: ""
        self_service: true
        setup_experience: null
        slug: beyond-compare/darwin
        uninstall_script:
          path: ""
      - categories: null
        icon:
          path: ""
        install_script:
          path: ""
        labels_exclude_any: null
        labels_include_any: null
        post_install_script:
          path: ""
        pre_install_query:
          path: ""
        self_service: true
        setup_experience: null
        slug: iterm2/darwin
        uninstall_script:
          path: ""
      packages: null
    webhook_settings:
      failing_policies_webhook: null
      host_status_webhook:
        days_count: 0
        destination_url: ""
        enable_host_status_webhook: false
        host_percentage: 0

Fleet-level agent options

The fleet-level agent options specify options that only apply to this fleet. When fleet-specific agent options have been specified, the agent options specified at the organization level are ignored for this fleet.

The documentation for this section is identical to the Agent options documentation for the organization settings, except that the YAML section where it is set must be as follows. (Note the kind: team key and the location of the agent_options key under team must have a name key to identify the team to configure.)

apiVersion: v1
kind: team
spec:
  team:
    name: Client Platform Engineering
    agent_options:
      # the team-specific options go here

Fleet-level secrets

The secrets section provides the list of enroll secrets that will be valid for this fleet. When a new fleet is created via fleetctl apply, an enroll secret is automatically generated for it. If the section is missing, the existing secrets are left unmodified. Otherwise, they are replaced with this list of secrets for this fleet.

  • Optional setting (array of dictionaries)
  • Default value: none (empty)
  • Config file format:
    team:
      name: Client Platform Engineering
      secrets:
        - secret: RzTlxPvugG4o4O5IKS/HqEDJUmI1hwBoffff
        - secret: JZ/C/Z7ucq22dt/zjx2kEuDBN0iLjqfz
    

Modify an existing fleet

You can modify an existing fleet by applying a new fleet configuration file with the same name as an existing fleet. The new fleet configuration will completely replace the previous configuration. In order to avoid overriding existing settings, we recommend retrieving the existing configuration and modifying it.

Retrieve the fleet configuration and output to a YAML file:

% fleetctl get teams --name Workstations --yaml > workstation_config.yml

After updating the generated YAML, apply the changes:

% fleetctl apply -f workstation_config.yml

Depending on your Fleet version, you may see unsupported key errors for the following keys when applying the new fleet configuration:

id
user_count
host_count
integrations
webhook_settings
description
agent_options
created_at
user_count
host_count
integrations
webhook_settings

You can bypass these errors by removing the key from your YAML or adding the --force flag. This flag will apply the changes without validation and should be used with caution.

mdm.macos_settings.custom_settings, mdm.windows_settings.custom_settings, mdm.macos_setup, mdm.volume_purchasing_program, and scripts only include the settings applied using fleetctl apply. To list settings added in the UI or API, use the List configuration profiles, GET endpoints from Setup experience, List Volume Purchasing Program (VPP) tokens, or List scripts instead.

Mobile device management (MDM) settings for fleets

The mdm section of this configuration YAML lets you control MDM settings for each fleet.

To specify fleet MDM configuration, as opposed to Organization-wide MDM configuration, follow the below YAML format. Note the kind: team field, as well as the name and mdm fields under team.

apiVersion: v1
kind: team
spec:
  team:
    name: Client Platform Engineering
    mdm:
      # the team-specific mdm options go here

Fleet-level scripts

List of saved scripts that can be run on hosts that are part of the fleet.

  • Default value: none
  • Config file format:
apiVersion: v1
kind: team
spec:
  team:
    name: Client Platform Engineering
    scripts:
      - path/to/script1.sh
      - path/to/script2.sh

Organization settings

The config YAML file controls Fleet's organization settings and MDM features for hosts that are "Unassigned."

The following example file shows the default organization settings:

apiVersion: v1
kind: config
spec:
  agent_options:
    config:
      decorators:
        load:
          - SELECT uuid AS host_uuid FROM system_info;
          - SELECT hostname AS hostname FROM system_info;
      options:
        disable_distributed: false
        distributed_interval: 10
        distributed_plugin: tls
        distributed_tls_max_attempts: 3
        logger_tls_endpoint: /api/osquery/log
        logger_tls_period: 10
        pack_delimiter: /
    overrides: {}
    command_line_flags: {}
  features:
    enable_host_users: true
    enable_software_inventory: true
  fleet_desktop:
    transparency_url: https://fleetdm.com/transparency
  host_expiry_settings:
    host_expiry_enabled: false
    host_expiry_window: 0
  integrations:
    jira: null
    zendesk: null
  org_info:
    org_logo_url: ""
    org_logo_url_light_background: ""
    contact_url: ""
    org_name: Fleet
  server_settings:
    deferred_save_host: false
    enable_analytics: true
    live_query_disabled: false
    query_reports_disabled: false
    scripts_disabled: false
    server_url: ""
  smtp_settings:
    authentication_method: authmethod_plain
    authentication_type: authtype_username_password
    domain: ""
    enable_smtp: false
    enable_ssl_tls: true
    enable_start_tls: true
    password: ""
    port: 587
    sender_address: ""
    server: ""
    user_name: ""
    verify_ssl_certs: true
  sso_settings:
    enable_jit_provisioning: false
    enable_sso: false
    enable_sso_idp_login: false
    entity_id: ""
    idp_image_url: ""
    idp_name: ""
    issuer_uri: ""
    metadata: ""
    metadata_url: ""
  vulnerabilities:
    databases_path: "/tmp/vulndbs"
    periodicity: 1h
    cpe_database_url: ""
    cpe_translations_url: ""
    cve_feed_prefix_url: ""
    disable_schedule: false
    disable_data_sync: false
    recent_vulnerability_max_age: 30d
    disable_win_os_vulnerabilities: false
  webhook_settings:
    failing_policies_webhook:
      destination_url: ""
      enable_failing_policies_webhook: false
      host_batch_size: 0
      policy_ids: null
    host_status_webhook:
      days_count: 0
      destination_url: ""
      enable_host_status_webhook: false
      host_percentage: 0
    interval: 24h
    vulnerabilities_webhook:
      destination_url: ""
      enable_vulnerabilities_webhook: false
      host_batch_size: 0
  mdm:
    apple_bm_default_team: ""
    windows_enabled_and_configured: false
    macos_updates:
      minimum_version: ""
      deadline: ""
    macos_settings:
      custom_settings:
        - path: '/path/to/profile1.mobileconfig'
        - path: '/path/to/profile2.mobileconfig'
        - path: '/path/to/profile3.mobileconfig'
      enable_disk_encryption: true
    windows_settings:
      custom_settings:
        - path: '/path/to/profile4.xml'
        - path: '/path/to/profile5.xml'

Settings

For possible options, see the parameter for the parameters of the Modify configuration API endpoint.

Each section's key must be one level below the spec key, indented with spaces (not <tab> characters) as required by the YAML format.

For example, when adding the host_expiry_settings.host_expiry_enabled setting, you'd specify the host_expiry_settings section one level below the spec key:

apiVersion: v1
kind: config
spec:
  host_expiry_settings:
    host_expiry_enabled: true