Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unclear error with multi.allow_explicit_index disabled in ES #8449

Closed
mohantnr opened this issue Sep 23, 2016 · 8 comments
Closed

Unclear error with multi.allow_explicit_index disabled in ES #8449

mohantnr opened this issue Sep 23, 2016 · 8 comments
Labels
enhancement New value added to drive a business result good first issue low hanging fruit Team:Core Core services & architecture: plugins, logging, config, saved objects, http, ES client, i18n, etc

Comments

@mohantnr
Copy link

Kibana version:kibana-4.5.1

Elasticsearch version:elasticsearch-2.3.3-1

Server OS version:Centos6.7

Browser version:Google Chrome Version 53.0.2785.116 m

Browser OS version:Windows 10

Original install method (e.g. download page, yum, from source, etc.): Yum

Description of the problem including expected versus actual behavior:
We have enabled rest.action.multi.allow_explicit_index: false in yml file in ES and after that we are facing issue in Kibana

Courier Fetch Error: unhandled courier request error: [illegal_argument_exception] explicit index in multi get is not allowed

Steps to reproduce:

  1. add the entry "enabled rest.action.multi.allow_explicit_index: false" in /etc/elasticsearch/elasticsearch.yml in all nodes
  2. restart ES instance
  3. open Kibana browser

Errors in browser console (if relevant):
Courier Fetch Error: unhandled courier request error: [illegal_argument_exception] explicit index in multi get is not allowed

Provide logs and/or server output (if relevant):
ES server logs:
[2016-09-22 21:41:39,592][DEBUG][rest.suppressed ] /_mget Params: {preference=1474605698868, timeout=0, ignore_unavailable=true}
java.lang.IllegalArgumentException: explicit index in multi get is not allowed
at org.elasticsearch.action.get.MultiGetRequest.parseDocuments(MultiGetRequest.java:398)
at org.elasticsearch.action.get.MultiGetRequest.add(MultiGetRequest.java:364)
at org.elasticsearch.rest.action.get.RestMultiGetAction.handleRequest(RestMultiGetAction.java:68)
at org.elasticsearch.rest.BaseRestHandler.handleRequest(BaseRestHandler.java:54)
at org.elasticsearch.rest.RestController.executeHandler(RestController.java:205)
at org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:166)

Describe the feature:

@mohantnr
Copy link
Author

any update on this error?

@epixa epixa added the discuss label Oct 3, 2016
@epixa
Copy link
Contributor

epixa commented Oct 3, 2016

By default, Kibana always searches against explicit indices via the request body, so this configuration in Elasticsearch is not supported by Kibana.

To support this, we would really need to create more consistent conventions for our multi requests, and it may not be something we can address in a performant way on dashboard at all.

@spalger spalger changed the title Courier Fetch Error: unhandled courier request error: [illegal_argument_exception] explicit index in multi get is not allowed Unclear error with multi.allow_explicit_index disabled in ES Oct 3, 2016
@spalger
Copy link
Contributor

spalger commented Oct 3, 2016

We talked about this as a group, and decided that the complexity of supporting this feature isn't really worth it in the short-term. We absolutely need to improve the error messaging though, so I've updated the title/tags appropriately.

@tbragin also plans to check with the elasticsearch folks if this is even a setting they plan to support long term now that shield is the proper way to implement security in elasticsearch.

@mohantnr
Copy link
Author

mohantnr commented Oct 4, 2016

Thanks for the update

@tbragin
Copy link
Contributor

tbragin commented Oct 10, 2016

I followed up with @clintongormley on long-term viability of URL-based access control in Elasticsearch. At this time, the plan is to leave this setting in Elasticsearch so legacy perimeter-based security in custom UIs built on top of Elasticsearch do not break, but there is no expectation for this functionality to work through Kibana. The supported way for fine-grained data-level access control in Kibana is through using Shield.

@spalger spalger added P2 and removed P2 labels Oct 10, 2016
@jimgoodwin
Copy link

We decided to have Kibana go into 'red' state with an error message indicating that we can't work with this setting.

@jimgoodwin jimgoodwin added the Team:Core Core services & architecture: plugins, logging, config, saved objects, http, ES client, i18n, etc label Feb 27, 2017
@jimgoodwin
Copy link

@spalger did we add this to the startup checks ?

@spalger
Copy link
Contributor

spalger commented Mar 22, 2017

See #10855

@epixa epixa added enhancement New value added to drive a business result and removed release_note:enhancement labels May 7, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New value added to drive a business result good first issue low hanging fruit Team:Core Core services & architecture: plugins, logging, config, saved objects, http, ES client, i18n, etc
Projects
None yet
Development

No branches or pull requests

5 participants