-
Notifications
You must be signed in to change notification settings - Fork 154
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Set new header for diag requests to Kibana on serverless #657
Comments
Related elastic/kibana#162149 |
It seems we will mark for serverless Elasticsearch APIs as internal as well making them available using the same header: |
As far as I understand this is not true. All endpoints with This means that the support-diagnostics tool will not work with a large number of Kibana endpoints. |
In the highlighted code, it's highlighting the |
@pickypg The tool should send both headers in HTTP requests to Kibana API endpoints:
kibana_detection_engine_health_cluster:
versions:
">= 8.8.2": "/internal/detection_engine/health/_cluster"
">= 8.11.0":
url: "/internal/detection_engine/health/_cluster"
headers:
"elastic-api-version": "1" |
Hi folks, hi @pickypg , I quickly checked with an actual ESS and on-premise cluster. Our ES diagnostics are at the moment not influenced by this issue, however Kibana diagnostics is already with the follow files:
The error was for all three the same:
By some tests a simple parameter I suppose with later stack versions there could be more issues with that. |
Hi @111andre111 @pickypg, are there plans to add this functionality in the near future? This is affecting both Serverless and ESS at the moment. See this report on a recent SDH where we can't get the diagnostic information we need. |
@111andre111 Can we raise priority for this? There's another SDH lacking some information in the Kibana bundle due to the missing version header |
For serverless we plan on making most of Kibana's HTTP APIs "internal". This means they will be soft blocked: requiring setting a new special header otherwise we return 400.
Note: this will only be enforced for serverless, Cloud/onprem will not be restricted in this way.
Additional note: setting the header will not cause issues for Cloud/onprem
"Internal" in this case refers only to obscuring HTTP APIs from users that want to integrate with Kibana. "Public" endpoints will be versioned, documented and be very long lived. "Internal" endpoints , especially those used by our tooling for diagnostics are not necessarily expected to change often -- we just want to prevent end users from knowing about/integrating with them given the much larger commitment that goes with making them public.
My suggestion is rather than making these HTTP APIs "public" in the sense described above, we give this tool access to "internal" HTTP APIs so that it can be used against serverless Kibana in the same way as Cloud/onprem Kibana.
Let me know what you think!
CC @xcrzx
The text was updated successfully, but these errors were encountered: