Should minio be accessible when enabling internalFilestore through the helm chart? #74
-
Such a great product you guys made 🚀 I have a somewhat silly question. How do you access the internal filestore (minio)? Is it intended that it should be accessible when run internally? I was thinking I could access minio like I could access kibana for example. The following are my running services: NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
apm ClusterIP None <none> 8200/TCP 32m
assemblyline-kube-state-metrics ClusterIP 10.43.67.103 <none> 8080/TCP 32m
datastore-master ClusterIP 10.43.248.85 <none> 9200/TCP,9300/TCP 32m
datastore-master-headless ClusterIP None <none> 9200/TCP,9300/TCP 32m
elastic-helper ClusterIP None <none> 8000/TCP 32m
filestore ClusterIP 10.43.48.23 <none> 9000/TCP 32m
frontend ClusterIP None <none> 3000/TCP 32m
internal-ui ClusterIP None <none> 5000/TCP 32m
kibana ClusterIP 10.43.190.8 <none> 5601/TCP 32m
redis-persistent ClusterIP None <none> 6379/TCP 32m
redis-volatile ClusterIP None <none> 6379/TCP 32m
service-server ClusterIP None <none> 5003/TCP 32m
socketio ClusterIP None <none> 5002/TCP 32m
ui ClusterIP None <none> 5000/TCP 32m
ui-ingest ClusterIP None <none> 5000/TCP 32m Assemblyline-ingress: ✗ kubectl describe ingress assemblyline-ingress
Name: assemblyline-ingress
Labels: <none>
Namespace: assemblyline
Address: 192.168.50.117,192.168.50.173,192.168.50.189,192.168.50.71
Ingress Class: traefik
Default backend: <default>
TLS:
assemblyline-generated-cert terminates assemblyline.local
Rules:
Host Path Backends
---- ---- --------
assemblyline.local
/ frontend:3000 (10.42.3.205:3000)
/socket.io/ socketio:5002 (10.42.1.199:5002)
/api/ ui:5000 (10.42.2.177:5000)
/api/v4/ingest/ ui-ingest:5000 (10.42.0.168:5000)
/kibana/ kibana:5601 (10.42.1.198:5601)
Annotations: <none>
Events: <none>
I am using the newest helm chart. These are my settings relevant to filestore (sorry if I missed something): enableLogging: true
enableCoreDebugging: false
enableMetrics: true
enableMetricbeat: true
internalELKStack: true
seperateInternalELKStack: false
internalFilestore: true
separateIngestAPI: true
enableAPM: true
...
configuration:
...
filestore:
archive: []
cache:
[
"s3://${INTERNAL_FILESTORE_ACCESS}:${INTERNAL_FILESTORE_KEY}@filestore:9000?s3_bucket=al-cache&use_ssl=False",
]
storage:
[
"s3://${INTERNAL_FILESTORE_ACCESS}:${INTERNAL_FILESTORE_KEY}@filestore:9000?s3_bucket=al-storage&use_ssl=False",
]
...
filestore:
fullnameOverride: "filestore"
podLabels:
section: core
component: filestore
existingSecret: internal-filestore-keys
I've tried to edit the service account of Best regards |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 3 replies
-
Hello! The internal filestore endpoint isn't supposed to be accessible from outside the cluster, unlike for Kibana. That being said, is there a particular use-case that you have where you would want to peruse the filestore? |
Beta Was this translation helpful? Give feedback.
If I might add to that, we cannot make the filestore externally accessible as it would bypass internal document security checks (classification markings). You can always us the /api/v4/file/download// API to get to those files.