-
Notifications
You must be signed in to change notification settings - Fork 8.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
No longer setting certs and keys for proxied calls to Elasticsearch #17804
Conversation
💚 Build Succeeded |
If I'm understanding this change correctly, one of the effects is that Elasticsearch's Is this intended behavior? If so (and if I'm not missing something), it might be worthwhile to update our documentation to reflect that. In my testing, I could no longer get Kibana to function properly with client auth required on the ES side. Here's my console output when running with X-Pack:
Here's my console output when running without X-Pack:
|
That's correct, we can no longer run Elasticsearch requiring certificates because they aren't present for the requests that we proxy through Kibana for end-users, they must set it to "optional". This limitation will be noted in the release notes. |
Reviewing now, sorry for the delay. @kobelb when you get a chance can you rebase so we get a CI run with the x-pack changes? |
Should these settings be removed from https://www.elastic.co/guide/en/kibana/current/settings.html? |
We still want those settings, and the cert/key is used when handling connections from the Kibana server itself to ES (that aren't proxied end-user requests). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for clarifying @kobelb -- LGTM once we go green!
💚 Build Succeeded |
💚 Build Succeeded |
When proxying requests for end-users (callWithRequest, elasticsearch Proxy, etc) through the kibana server we shouldn't be including the cert/key when establishing this connection and we should only be using the certificate authority.
"Release Note: Resolved issue with using PKI to authenticate the internal server user against Elasticsearch when X-Pack Security is disabled or the realms in Elasticsearch are configured with PKI taking precedence to basic authentication"