Respond to TLS certificate/key changes without requiring a restart #101072
Labels
enhancement
New value added to drive a business result
impact:low
Addressing this issue will have a low level of impact on the quality/strength of our product.
loe:small
Small Level of Effort
Team:Core
Core services & architecture: plugins, logging, config, saved objects, http, ES client, i18n, etc
Team:Security
Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Kibana maintains a number of different TLS configuration settings:
SIGHUP
#171823)TLS certificates and keys are generally stored on disk, read once on startup, and used for the lifetime of the process. Changes to these files will not be picked up until Kibana is restarted.
Elasticsearch has long supported reloading this configuration from disk -- we should explore the feasibility of similar support within Kibana, so that we can accept updated certificates/keys without a restart.
Support for this would greatly simplify certificate rotation in managed environments such as ESS and ECE
The text was updated successfully, but these errors were encountered: