-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create stable API for accessing safe Elasticsearch config values in plugins #119862
Comments
Pinging @elastic/kibana-core (Team:Core) |
@joshdover any reason to want this exposed via the initializer context instead of an API from the |
This was my only reason: consistency with other config values. Though tbh, I've always felt that this constructor being separate from |
Ok, thanks, just wanted to confirm using a core service's contract wouldn't be an issue for you. FWIW, the
Note that in addition to the kibana/src/core/server/plugins/types.ts Lines 374 to 375 in 1061835
We're also exposing the whole config via kibana/src/core/server/elasticsearch/elasticsearch_service.ts Lines 94 to 96 in d2bd7f8
which is (at least) used by the
Not sure if this one should be considered as part of the scope of this issue? |
Ah interesting, didn't realize we had that as well. FWIW our main use case for this has been eliminated and we no longer plan to need to read any ES config values from the Fleet UI side of things. I could see this changing in the future, but no plans currently. Other than Console, I'm not sure what the requirements are for other plugins for config values. We definitely should remove |
I'm enabling Jira sync to get this issue on the team's roadmap. We're long past the platform migration initiative and should be removing anything legacy-related. |
Enterprise Search has a use case for fetching the external Elasticsearch URL: #77464 (comment) |
@richkuz Based on Alex's comment (#77464 (comment)), it sounds like simply exposing the ES URL that Kibana is configured with isn't going to solve the problem for Enterprise Search since y'all need the external URL. Would you mind opening a separate issue for that use case (exposing external ES URL to Kibana plugins?). It would be a blocker for #77464 and for the Enterprise Search use case. |
👍 Submitted #139405 |
Blocked by #117496
In #117496, we added the ability for plugins to read CA fingerprints from the Elasticsearch configuration, a feature we plan to support for the long-term to allow plugins to integrate directly with the new security-on-by-default feature.
In order to minimize scope for the 8.0 release, this change was added to the existing
legacy.globalConfig$()
API. We should move this and any other necessary ES config values to a stable, undeprecated API directly on the Elasticsearch service.It should still be accessible on the
PluginInitializerContext
interface so that it can be accessed in the same way as all other configuration values.Scope:
PluginInitializerContext
or whether providing on the ES API is sufficientThe text was updated successfully, but these errors were encountered: