Open eedugon opened 5 years ago
Pinging @elastic/es-security
Why does logstash central management need to hit the /
endpoint in ES?
Is it just using that to test whether the node is available, or does it actually need data from that endpoint?
Hitting this issue as well.
Given that:
I suggest a new "built-in user" logstash_management_ system
with the role logstash_admin
(as required by the CPM). A better user name would be logstash_admin_system
given the name of the role :)
Why does logstash central management need to hit the
/
endpoint in ES? Is it just using that to test whether the node is available, or does it actually need data from that endpoint?
@tvernum since its a payed feature it hits _xpack and needs cluster:monitor/xpack/info
That still gives issues (reporting 403 but not much more info given default log settings) and giving it the monitoring role makes it work, unsure why it's hitting something else governed by the permissions given by the monitor
role (ES 7.15)
Elasticsearch version (
bin/elasticsearch --version
): 6.5.4Plugins installed: [N/A]
JVM version (
java -version
): N/AOS version (
uname -a
if on a Unix-like system): N/ADescription of the problem including expected versus actual behavior: When following the instructions to get centralized pipeline management to work with logstash the following is mentioned:
With that role only logstash doesn't start and returns a 403 error coming from Elasticsearch:
Just adding to the user the "cluster:monitor" privilege (monitor privilege at cluster level) it works, so I believe the permission might be missing in logstash_admin role.
Steps to reproduce: Based on this document
logstash_admin
to the user.xpack.management.elasticsearch.username
setting. Add also the password, the url and set enabled to true.Workaround:
Notes: There's one other document (not aligned with the previously shared one) that includes a different message, mentioning that for central management to work, the roles
logstash_admin
and the custom rolelogstash_writer
should be added to the user.My view is that this document is probably not the right solution, because:
I have already rasied a PR to align the documents (some documents mention to include the builtin_role, others mention to add both roles), but I believe that it's better to decide first what's the root cause of this and if
logstash_admin
role is missing a permission or not.@jsvd is also aware of this.