-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Monitoring] remote_cluster_client
role shouldn't be required to use Monitoring
#93432
Comments
Pinging @elastic/stack-monitoring (Team:Monitoring) |
I am seeing a similar issue, however I do not believe that it's related to a user role but rather to the node role. Using the eck-operator and giving each node a specific role we get the following in the logs for each node that does not have the
We are not specifying the This is also a test cluster so all of the monitoring is reporting back to itself so it should not need the |
We are currently on e/k 7.9.2. We are attempting an upgrade to 7.13.3, and even tried 7.12.1 of ES and started experiencing this issue. It looks like somewhere between elasticsearch 7.9.2 and 7.12.1 something introduced this! |
@ravikesarwani I wonder if CCS should be on by default. Otherwise, if the user doesn't have @katefarrar Perhaps we need some UX help with this. |
What is the default value for monitoring.ui.ccs.enabled when its not explicitly set by the users? I am assuming it it is false (or should be false) and hence by default the alerts (queries) shouldn't rely on it. If the value is set by the user to "true" then we are saying that they should also add the remote_cluster_client role to the monitoring.ui.elasticsearch.username user. This is something that we should clarify in our documentation. |
The default for |
Do we know why "monitoring.ui.ccs.enabled" is true by default especially if it requires specific roles? My take is that we should start simple by default and make sure things work correctly without any extra work by the users (so monitoring.ui.ccs.enabled should be false). Asking them to add role to the user OR asking them to change the config value to false "by all the users" I don't think is the best answer. Anyone know why monitoring.ui.ccs.enabled is set as true by default? Do we see any reason to make this "false" as a default value to fix this issue. |
It seems like the intention was "Everything should just work" as long as you didn't do anything custom. But the moment you start customizing roles for nodes, things will start going haywire. I want to point out that if we make the change |
Does this relates to #109100 (comment) and is a regression in 7.15? I am not sure about the comment around Cloud. Is the behavior different there than self-managed because of how we packages things differently. |
It's possible the 7.15 ES issue could affect alerts but this particular issue is not related to that and exists in previous versions. |
@ravikesarwani Yes, it sort of relates, but it looks like the issue in #109100 (comment) is a regression in Elasticsearch 7.15.0 which hopefully they fix.
In order to remove the |
From product perspective my thinking is clear. In ESS I don’t see monitoring.ui.ccs.enabled kibana setting available to users (or at least documented). Also, I spun up a cluster in ESS (7.14), enabled self monitoring, said yes to create rules on SM app and things are working okay. I don’t get the said errors. My vote would be to keep things simple "by default" and turn off CCS support (by default) and document the steps on how to turn it on (where we will talk about remote_cluster_client role is needed). |
You would get the error if you removed the |
@ravikesarwani I agree with this approach. I think we should schedule this for 7.16 so we have some time to discuss how this will affect other parts of the stack. |
Is it possible to switch SM behavior based on node roles? The error isn’t good but having CCS “just work” once the remote is connected is pretty nice behavior. Would be a shame to lose that, doubly so if getting it back required modifying kibana.yml |
How is this issue resolved with a self managed instance? I'm running ECK 2.0 on version 7.17.1 of Elastic/Kibana on an Azure AKS cluster. |
@jmp601 you can set |
Pinging @elastic/infra-monitoring-ui (Team:Infra Monitoring UI) |
Closing this as a duplicate of #120384. |
monitoring.ui.ccs.enabled: false * and not monitoring.ui.css.enabled: false |
@jmp601 Thanks for noting that! I've updated the above comments to correct the issue to avoid any further misunderstandings 🙏🏼 |
Currently, we rely on the
remote_cluster_client
role attached to the configured user (monitoring.ui.elasticsearch.username
) to make CCS requests in the Stack Monitoring UI. If this role is not available, all out of the box alerts will start to fail as we do not gracefully handle this scenario and the user will see something like this in the Kibana server log:In this scenario, there are two fixes to resolve the issue:
remote_cluster_client
role to themonitoring.ui.elasticsearch.username
usermonitoring.ui.ccs.enabled: false
inkibana.yml
However, none of this should be necessary. We should be able to handle this scenario more gracefully and simply not perform any future CCS requests if the role is not available.
The text was updated successfully, but these errors were encountered: