-
Notifications
You must be signed in to change notification settings - Fork 708
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
APM Server permissions for Kibana appears to be broken #8037
Labels
Comments
Could you please provide the manifests you are using, this would help me reproduce. Thanks! |
It's slightly sanitized from sensitive data: affinity, specific labels, but cross-resource refers are persisted "as-is" apiVersion: apm.k8s.elastic.co/v1
kind: ApmServer
metadata:
labels:
module/name: apm-server
package/name: intake
package/overlay: base
package/version: "2"
name: apm-server-v2
namespace: apm-sandbox
spec:
config:
apm-server:
auth:
anonymous:
allow_agent:
- rum-js
- rum-js-dpeo
- js-base
- java
- dotnet
- php
- opentelemetry/cpp
- python
- otlp
- go
- opentelemetry
- opentelemetry/webjs
- opentelemetry/js
- opentelemetry/go
- opentelemetry/java
- opentelemetry/nodejs
- opentelemetry/dotnet
- nodejs
- '@microlabs/otel-workers-sdk/js'
enabled: true
rate_limit:
event_limit: 8000
ip_limit: 1000
api_key:
enabled: false
limit: 100
capture_personal_data: true
default_service_environment: undefined
expvar.enabled: false
host: 0.0.0.0:8200
idle_timeout: 45s
max_connections: 0
max_event_size: 307200
max_header_size: 1048576
pprof.enabled: false
read_timeout: 30s
rum:
allow_headers:
- x-requested-with
- access-control-request-private-network
- access-control-allow-origin
- xmlhttprequest
- request-origin
allow_origins:
- '*'
enabled: true
exclude_from_grouping: ^/webpack
library_pattern: node_modules|bower_components|~
shutdown_timeout: 30s
ssl:
supported_protocols:
- TLSv1.2
- TLSv1.3
write_timeout: 30s
logging.level: warning
monitoring.elasticsearch: {}
count: 2
elasticsearchRef:
name: elasticsearch-v1
http:
service:
metadata:
labels:
module/name: apm-server
package/name: intake
package/version: "2"
spec:
ports:
- appProtocol: HTTPS
name: https
port: 8200
protocol: TCP
targetPort: 8200
tls:
certificate: {}
selfSignedCertificate:
subjectAltNames:
- dns: apm-server
kibanaRef:
name: kibana-v1
podTemplate:
metadata:
creationTimestamp: null
labels:
module/name: apm-server
package/name: intake
package/version: "2"
spec:
containers:
- env:
- name: ELASTIC_APM_GLOBAL_LABELS
value: project=dummy
- name: ELASTIC_APM_CAPTURE_BODY
value: all
- name: ELASTICSEARCH_HOST
value: https://elasticsearch:9200
name: apm-server
resources:
limits:
cpu: 1
memory: 1Gi
requests:
cpu: 1
memory: 1Gi
topologySpreadConstraints:
- labelSelector:
matchLabels:
module/name: apm-server
package/name: intake
package/version: "2"
maxSkew: 1
nodeAffinityPolicy: Honor
topologyKey: kubernetes.io/hostname
whenUnsatisfiable: DoNotSchedule
version: 8.14.3
---
apiVersion: kibana.k8s.elastic.co/v1
kind: Kibana
metadata:
labels:
package/name: elastic-stack-eck
package/type: component
package/version: "1"
name: kibana-v1
namespace: apm-sandbox
spec:
config:
elasticsearch.requestHeadersWhitelist:
- authorization
elasticsearch.requestTimeout: 60000
elasticsearch.shardTimeout: 60000
server:
customResponseHeaders:
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
telemetry.optIn: false
xpack.fleet.agentPolicies:
- id: eck-fleet-server
monitoring_enabled:
- logs
- metrics
name: Fleet Server on ECK policy
namespace: default
package_policies:
- id: fleet_server-1
name: fleet_server-1
package:
name: fleet_server
unenroll_timeout: 900
xpack.fleet.agents.fleet_server.hosts:
- https://fleet:8220
xpack.fleet.outputs:
- config:
ssl.verification_mode: none
hosts:
- https://elasticsearch:9200
id: fleet-default-output
is_default: "true"
is_default_monitoring: "true"
name: default
type: elasticsearch
xpack.fleet.packages:
- name: system
version: latest
- name: elastic_agent
version: latest
- name: fleet_server
version: latest
- name: apm
version: latest
- name: kubernetes
version: latest
- name: cloudflare
version: latest
- name: synthetics
version: latest
- name: cloudflare_logpush
version: latest
- name: gcp_pubsub
version: latest
xpack.reporting.roles.enabled: false
xpack.spaces.maxSpaces: 1000
xpack.task_manager.max_workers: 100
xpack.task_manager.monitored_stats_health_verbose_log.enabled: true
count: 3
elasticsearchRef:
name: elasticsearch-v1
enterpriseSearchRef: {}
http:
service:
metadata:
labels:
package/name: elastic-stack-eck
package/type: component
package/version: "1"
spec:
- name: https
port: 5601
protocol: TCP
targetPort: 5601
tls:
certificate: {}
selfSignedCertificate:
subjectAltNames:
- dns: kibana
monitoring:
logs: {}
metrics: {}
podTemplate:
metadata:
creationTimestamp: null
labels:
package/name: elastic-stack-eck
package/type: component
package/version: "1"
spec:
affinity:
podAntiAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchLabels:
common.k8s.elastic.co/type: kibana
package/name: elastic-stack-eck
package/type: component
package/version: "1"
topologyKey: kubernetes.io/hostname
containers:
- name: kibana
resources:
limits:
cpu: 1
memory: 1Gi
requests:
cpu: 500m
memory: 1Gi
version: 8.14.3
---
apiVersion: elasticsearch.k8s.elastic.co/v1
kind: Elasticsearch
metadata:
labels:
package/name: elastic-stack-eck
package/type: component
package/version: "1"
name: elasticsearch-v1
spec:
auth: {}
http:
service:
metadata: {}
spec: {}
tls:
certificate: {}
selfSignedCertificate:
subjectAltNames:
- dns: elasticsearch
monitoring:
logs: {}
metrics: {}
nodeSets:
- config:
node.roles:
- master
- remote_cluster_client
xpack.security.authc:
anonymous:
roles: monitoring_user
username: anon
count: 3
name: master
podTemplate:
metadata:
labels:
package/name: elastic-stack-eck
package/type: component
package/version: "1"
spec:
containers:
- name: elasticsearch
readinessProbe:
httpGet:
port: 9200
scheme: HTTPS
resources:
limits:
cpu: 2
memory: 10Gi
requests:
cpu: 1
memory: 10Gi
volumeClaimTemplates:
- metadata:
name: elasticsearch-data
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 10Gi
storageClassName: standard-rwo
- config:
node.roles:
- remote_cluster_client
- data_content
- data_hot
- ingest
- transform
xpack.security.authc:
anonymous:
roles: monitoring_user
username: anon
count: 4
name: data
podTemplate:
metadata:
labels:
package/name: elastic-stack-eck
package/type: component
package/version: "1"
spec:
containers:
- name: elasticsearch
readinessProbe:
httpGet:
port: 9200
scheme: HTTPS
resources:
limits:
cpu: 7
memory: 54Gi
requests:
cpu: 6
memory: 54Gi
volumeClaimTemplates:
- metadata:
name: elasticsearch-data
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 2Ti
storageClassName: premium-rwo
- config:
node.roles:
- remote_cluster_client
- data_cold
- data_warm
xpack.security.authc:
anonymous:
roles: monitoring_user
username: anon
count: 3
name: data-cold
podTemplate:
metadata:
labels:
package/name: elastic-stack-eck
package/type: component
package/version: "1"
spec:
containers:
- name: elasticsearch
readinessProbe:
httpGet:
port: 9200
scheme: HTTPS
resources:
limits:
cpu: 4
memory: 16Gi
requests:
cpu: 2
memory: 16Gi
volumeClaimTemplates:
- metadata:
name: elasticsearch-data
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 3096Gi
storageClassName: standard-rwo
podDisruptionBudget:
metadata: {}
spec:
maxUnavailable: 1
selector:
matchLabels:
common.k8s.elastic.co/type: elasticsearch
package/name: elastic-stack-eck
package/type: component
package/version: "1"
transport:
service:
metadata: {}
spec: {}
tls:
certificate: {}
certificateAuthorities: {}
updateStrategy:
changeBudget:
maxUnavailable: 1
version: 8.14.3 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
When APM Server is deployed with ECK it has no sufficient permissions for Kibana API:
Transaction JSON
The text was updated successfully, but these errors were encountered: