Skip to content

Conversation

@louis-cqrl
Copy link
Contributor

What does this PR do? What is the motivation?

This PR adds a new FAQ entry covering the upcoming Sectigo Root CA rotation that will impact Datadog Agent v5 users in May 2026.
Older Agent v5 versions (particularly those below 5.32.7) may fail SSL verification once Datadog updates its certificates.
The new documentation provides both automated and manual remediation steps for affected users on Linux and Windows.

Key additions

  • Adds a new FAQ page: agent-5-sectigo-root-ca-rotation.md
  • Updates the main Agent FAQ index to include a link to this new page
  • Includes timeline, troubleshooting, and long-term upgrade recommendations

Merge instructions

  • Ready to merge once reviewed by the Documentation team
  • Can be merged via Squash and Merge once all checks pass

Additional notes

This documentation aligns with Datadog’s ongoing certificate lifecycle management communications and ensures that legacy Agent users are prepared ahead of the May 2026 CA change.

@louis-cqrl louis-cqrl requested a review from a team as a code owner November 4, 2025 08:40
@github-actions github-actions bot added the FAQ Content impacting a FAQ label Nov 4, 2025
@github-actions
Copy link
Contributor

github-actions bot commented Nov 4, 2025

@louis-cqrl louis-cqrl changed the title Add Agent v5 documentation for Sectigo Root CA rotation (2025–2026) [AGENTRUN-871] Add Agent v5 documentation for Sectigo Root CA rotation (2025–2026) Nov 4, 2025
Copy link
Contributor

@janine-c janine-c left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks great! I made some comments for editing and for structure, so let me know if I can help implement any of it, or if I can clarify anything 🙂

You are affected if:
- You are running **Datadog Agent v5**, particularly **versions below 5.32.7**
- Your agent installation does not include the Datadog embedded certificate bundle
- Your agent is not configured to use the operating system's certificate store (via `use_curl_http_client: true`)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Your agent is not configured to use the operating system's certificate store (via `use_curl_http_client: true`)
- Your agent is not configured to use the operating system's certificate store (using `use_curl_http_client: true`)


## Solution

### Automated Solution
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
### Automated Solution
### Automated solution

.\windows.ps1
```

### Manual Solution
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
### Manual Solution
### Manual solution

Comment on lines +41 to +43
#### Linux

**Requirement**:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
#### Linux
**Requirement**:
{{< tabs >}}
{{% tab "Linux" %}}
#### Requirement

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tabs are usually a go-to when we're documenting mutually exclusive options of doing the same thing, like OS, so I thought I'd try it here. they can be a bit finicky, so let me know if you need help getting them to render properly!

You could also consider things like expanders to house the automatic/manual solutions, but they're not super long and I thought users might want to scope out the differences, so that's not super important for me.

Comment on lines +57 to +59
#### Windows

**Requirement**:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
#### Windows
**Requirement**:
{{% /tab %}}
{{% tab "Windows" %}}
#### Requirement

Comment on lines +35 to +39
1. Download the updated Datadog certificate bundle
2. Install the certificate in the correct location for your Agent installation
3. Update your `datadog.conf` to enable `use_curl_http_client: true` (allows the agent to use OS-provided certificates)
4. Restart the Datadog Agent to apply changes
5. Verify connectivity and check logs for any certificate errors
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
1. Download the updated Datadog certificate bundle
2. Install the certificate in the correct location for your Agent installation
3. Update your `datadog.conf` to enable `use_curl_http_client: true` (allows the agent to use OS-provided certificates)
4. Restart the Datadog Agent to apply changes
5. Verify connectivity and check logs for any certificate errors
1. Download the updated Datadog certificate bundle.
2. Install the certificate in the correct location for your Agent installation.
3. Update your `datadog.conf` to enable `use_curl_http_client: true` (allows the agent to use OS-provided certificates).
4. Restart the Datadog Agent to apply changes.
5. Verify connectivity and check logs for any certificate errors.

{{< partial name="whats-next/whats-next.html" >}}

[1]: /agent/guide/upgrade_agent_fleet_automation
[2]: /help
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
[2]: /help
[2]: /help
[3]: https://github.com/DataDog/dd-agent/blob/master/datadog-cert.pem

Comment on lines +74 to +85
1. Download the updated Datadog certificate bundle at `https://github.com/DataDog/dd-agent/blob/master/datadog-cert.pem`
2. Install the certificate in the correct location for your Agent installation
- **Linux**: `/opt/datadog-agent/agent/datadog-cert.pem`
- **Windows**:
- v5.12+: `C:\Program Files\Datadog\Datadog Agent\agent\datadog-cert.pem`
- v5.11 and below (64-bit OS): `C:\Program Files (x86)\Datadog\Datadog Agent\files\datadog-cert.pem`
- v5.11 and below (32-bit OS): `C:\Program Files\Datadog\Datadog Agent\files\datadog-cert.pem`
3. Update your `datadog.conf` to enable `use_curl_http_client: true` (allows the agent to use OS-provided certificates)
- **Linux**: `/etc/dd-agent/datadog.conf`
- **Windows**: `C:\ProgramData\Datadog\datadog.conf`
4. Restart the Datadog Agent to apply changes
5. Verify connectivity and check logs for any certificate errors
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
1. Download the updated Datadog certificate bundle at `https://github.com/DataDog/dd-agent/blob/master/datadog-cert.pem`
2. Install the certificate in the correct location for your Agent installation
- **Linux**: `/opt/datadog-agent/agent/datadog-cert.pem`
- **Windows**:
- v5.12+: `C:\Program Files\Datadog\Datadog Agent\agent\datadog-cert.pem`
- v5.11 and below (64-bit OS): `C:\Program Files (x86)\Datadog\Datadog Agent\files\datadog-cert.pem`
- v5.11 and below (32-bit OS): `C:\Program Files\Datadog\Datadog Agent\files\datadog-cert.pem`
3. Update your `datadog.conf` to enable `use_curl_http_client: true` (allows the agent to use OS-provided certificates)
- **Linux**: `/etc/dd-agent/datadog.conf`
- **Windows**: `C:\ProgramData\Datadog\datadog.conf`
4. Restart the Datadog Agent to apply changes
5. Verify connectivity and check logs for any certificate errors
1. Download the [updated Datadog certificate bundle][3].
2. Install the certificate in the correct location for your Agent installation.
- **Linux**: `/opt/datadog-agent/agent/datadog-cert.pem`
- **Windows**:
- v5.12+: `C:\Program Files\Datadog\Datadog Agent\agent\datadog-cert.pem`
- v5.11 and below (64-bit OS): `C:\Program Files (x86)\Datadog\Datadog Agent\files\datadog-cert.pem`
- v5.11 and below (32-bit OS): `C:\Program Files\Datadog\Datadog Agent\files\datadog-cert.pem`
3. Update your `datadog.conf` to enable `use_curl_http_client: true` (allows the Agent to use OS-provided certificates).
- **Linux**: `/etc/dd-agent/datadog.conf`
- **Windows**: `C:\ProgramData\Datadog\datadog.conf`
4. Restart the Datadog Agent to apply changes.
5. Verify connectivity and check logs for any certificate errors.


## Overview

In May 2026, Datadog will deploy SSL certificates signed by a new certificate authority (Sectigo Root CA). **If you are running Datadog Agent v5 (especially versions below 5.32.7)**, your agents may lose connectivity with Datadog due to SSL certificate verification failures.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't have the context to know which version of "agents" you're talking about, but we should always capitalize "Agent" when talking about the Datadog Agent. All other "agents" can be lowercase. If you've already done this, awesome!

4. Restart the Datadog Agent to apply changes
5. Verify connectivity and check logs for any certificate errors

## Important considerations
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would consider moving this whole section higher on the page. The timelines seem important for customers to know how they're affected, and it would help them decide what to do about it. Especially if we really would prefer that customers upgrade to v7, it would make sense to me that we would list that as a possibility first, and then if they really don't want to do that, they could keep reading through other available solutions.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

FAQ Content impacting a FAQ

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants