-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Client not trusting server certificate are logged using the "error" log level #35004
Comments
Pinging @elastic/kibana-operations |
@kobelb , Is there any config directive to set to some level, to surpass this error ? Regards; |
Pinging @elastic/kibana-platform (Team:Platform) |
Adding platform, mostly to cc. |
can this log non-display by import .p12 file into browser? |
Can we reduce the severity of this from |
@kobelb Grooming through old issues, and it looks like we had labeled this issue as |
IMO, it's more of a medium impact issue. It's likely a considerable annoyance in a number of situations. For example, if anyone is using Kibana's server logs to monitor the number of errors that are thrown, this will skew these numbers because an incorrect logging level is used. Additionally, I've anecdotally sent developers down the path of thinking that Kibana is doing something wrong, when it's really something that the "client" is doing wrong. |
Would a regex such as |
Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com> Fix #35004
We presently only downgrade selective client errors from the "error" level to the "info" level here. We aren't presently downgrading TLS/SSL errors, so when a client connects to Kibana and doesn't trust the certificate, the following is logged:
This is just an example of the type of errors that we log, they're numerous and I'm not seeing a way to classify them easily off-hand besides using a regex, or changing the way in which Hapi classifies all tls errors as client connection errors.
The text was updated successfully, but these errors were encountered: