-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Kibana reporting does not work when using anonymous_user to generate reports #69612
Comments
Pinging @elastic/kibana-reporting-services (Team:Reporting Services) |
Heya folks I imagine you are super busy working on more important things but this issue is causing some trouble on our end. Do you happen to know/think of any workarounds? |
I did a bit of deep dive into the Kibana source as I also encountered this problem. The access control check is done using a Hapi pre-routing rule here: kibana/x-pack/legacy/plugins/reporting/server/routes/lib/authorized_user_pre_routing.ts Lines 21 to 25 in 5db9c67
However, it seems that From what I read, Kibana derives this setting from the Elasticsearch cluster. |
I have verified that this value is derived from Elasticsearch; when While this workaround works, since we use ECK, it's not recommended: https://www.elastic.co/guide/en/cloud-on-k8s/current/k8s-reserved-settings.html It seems like the access control check may be overly eager in this case. |
By design, reporting checks the auth of the logged in user to ensure they have a role called Using that design, administrators can turn on and off reporting for specific users, which is our expectation of secure software. If this feature was implemented, would there be a way to turn it off? Using the existing config options, I don't see how it would be possible. It's hard to make a call here. If you depend on security, then access control checks should be expected. |
cc @elastic/kibana-security |
I'm running into this issue as well with 7.7.1. Setting |
Pinging @elastic/kibana-app-services (Team:AppServices) |
Any update on this issue? Running into the same problem. |
If you're using Kibana 7.11+, would you mind trying with Kibana "native" anonymous access instead? With this you don't need to disable security in Kibana and you also don't have to enable anonymous access in Elasticsearch directly if you don't need it. |
Hi all, this issue will be resolved in 7.14. This PR #94966 provides the change needed to set up anonymous access to work with Kibana Reporting.
You can also use an API key instead of entering a username and password in the YML file. The documentation of "Reporting and Security" will be updated for 7.14: https://www.elastic.co/guide/en/kibana/7.x/secure-reporting.html#secure-reporting Closing this issue as it is resolved by #94966 |
Kibana version:
7.8.0, first detected in 7.6.2
Elasticsearch version:
7.8.0, first detected in 7.6.2
Server OS version:
Linux deathstar 4.15.0-101-generic #102-Ubuntu SMP Mon May 11 10:07:26 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
Browser version:
Mozilla Firefox 77.0.1
Original install method (e.g. download page, yum, from source, etc.):
Docker compose:
docker.elastic.co/kibana/kibana:7.8.0
docker.elastic.co/elasticsearch/elasticsearch:7.8.0
Describe the bug:
When elasticsearch xpack.security is enabled with anonymous user (aka, unauthenticated) having
superuser
role and kibana xpack.security is disabled, kibana reporting fails all requests withunauthorized
.Steps to reproduce:
http://127.0.0.1:5601/app/kibana
http://127.0.0.1:5601/app/kibana#/discover
Save
the current searchShare
>Generate CSV
Reporting error Unauthorized
Expected behavior:
Kibana reporting works with the aforthmentioned configuration.
Errors in browser console (if relevant):
Nothing
Provide logs and/or server output (if relevant):
The text was updated successfully, but these errors were encountered: