Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add a new documentation page on Load Balancing Across Multiple Kibana Instances #9129

Closed
ppf2 opened this issue Nov 17, 2016 · 1 comment · Fixed by #52659
Closed

Add a new documentation page on Load Balancing Across Multiple Kibana Instances #9129

ppf2 opened this issue Nov 17, 2016 · 1 comment · Fixed by #52659
Labels
Team:Docs Team:Operations Team label for Operations Team

Comments

@ppf2
Copy link
Member

ppf2 commented Nov 17, 2016

There is an increasing # of reports from the field from users who have set up multiple load-balanced Kibana instances seeing sessions getting invalidated and Kibana users required to login frequently. This is because Kibana encrypts the session cookie with the value of xpack.security.encryptionKey. If you do not set xpack.security.encryptionKey in your kibana.yml then every time kibana starts it will generate a new value. So it is important for these setups to set xpack.security.encryptionKey explicitly and to the same value on each Kibana server. Same thing for xpack.reporting.encryptionKey if Reporting is used.

It will be helpful to add a new page Using Kibana in a Production Environment > Load Balancing Across Multiple Kibana Instances to cover such important requirements.

Linking to the parent production doc improvement ticket (#5347). I am filing this as a separate ticket so the details above will not get lost in a long comment thread in the parent ticket :)

@ppf2 ppf2 added the Team:Docs label Nov 17, 2016
@tylersmalley tylersmalley added the Team:Operations Team label for Operations Team label Aug 7, 2018
@MorrieAtElastic
Copy link

I'd also like to raise the question of whether setting xpack.security.encryptionKey and possibly also xpack.security.secureCookies is sufficient to support multiple kibana instances running behind a load balance and/or proxy. While the current documentation of xpack.security.secureCookies does mention using the parameter with load balancers and proxies , the discussion of xpack.security.encryptionKey says nothing about load balancers and proxies; and I am unclear how session persistence in enabling ~encryption key on separate Kibana instances would support multiple concurrent sessions on each of the instances.

Please add to the list of scheduled improvements in Kibana documentation a discussion of how to enable Kibana for multiple concurrent sessions behind a load balancer, and specifically which xpack.security parameters.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Team:Docs Team:Operations Team label for Operations Team
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants