-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Fleet] Requirement for Kibana API Key for Agent subprocess #89311
Comments
Pinging @elastic/fleet (Feature:Fleet) |
It looks like the endpoint integration is receiving a Kibana API Key by requesting pinging @scunningham and @ruflin as you have been involved in previous conversations around this. |
Pinging @elastic/ingest-management (Team:Ingest Management) |
@simitt Elastic Agent does send the Endpoint the |
Thanks @blakerouse; do you know which privileges that API Key has (or could you link to the code)? I am not sure it makese sense to reuse this |
@simitt For the |
Update: pulled out the requirements for ES API Keys in inputs and created a dedicated issue #91704; changed the description to make this issue focused on Kibana API Key requirements for APM. |
I am concerned that the apm server will not have a network route to Kibana when running under the Fleet Agent. Reading the ticket, this seems like a possible candidate for policy integration. Unclear if that would solve the problem. It would depend on the nature of the configuration data:
An artifact implementation could work as well, but that too is tied to policy. |
Oh, I understood otherwise from elastic/beats#23856 (comment), but I am not familiar enough with fleet server. What is a "policy integration"? We just need one connection to Kibana with an API key with the right privileges, we don't need more granularity than that - and I don't expect apm policies to change often (if that helps). |
My suggest is what we should do for now is that APM includes the necessary Kibana URL and API key directly inside the APM input config. Like this we have a temporary solution and the Elastic Agent does not require any knowledge about it. |
@simitt and I discussed - we still need to determine what needs to be done here to figure out who will do it, depending on the outcome of the indexing permissions discussion. As of now this is not slated for a specific milestone. |
Depending on elastic/apm-server#4573 (comment) we might not need to solve this for APM for |
Update: What @simitt posted above with elastic/apm-server#4573 (comment) is what should be done. I don't think this depends on the index permission discussion as we are discussing here access to Kibana. Long term, apm-server should not require access to Kibana at all. Instead, the central config changes for the APM Agents should be pushed as part of the integration policy. There should be only 1 delivery mechanism for Cloud. Until we get there, APM should create its own API Key for Kibana + URL and add it to the APM Integration policy. |
Closing this in favor of #93420 |
APM Server requires access to Kibana for supporting the APM Server Central Configuration Management feature. The API Key needs to have spaces read privileges for the APM app.
The text was updated successfully, but these errors were encountered: