kibana access es always with user "kibanaserver"

93 views
Skip to first unread message

tuse...@gmail.com

unread,
Oct 9, 2018, 11:14:40 AM10/9/18
to Search Guard Community Forum
No matter what I config elasticsearch.username and elasticsearch.password in kibana.yml and no matter what valid user I  really use, Kibana access ES always with user "kibanaserver".

such as I have logined in with admin, I want to view all indices in index management, then es log print error:

[2018-10-09T23:12:35,644][INFO ][c.f.s.c.PrivilegesEvaluator] No index-level perm match for User [name=kibanaserver, roles=[], requestedTenant=null] Resolved [aliases=[*], indices=[*], allIndices=[*], types=[*], isAll()=true, isEmpty()=false] [Action [indices:monitor/stats]] [RolesChecked [sg_own_index, sg_kibana_server]]

[2018-10-09T23:12:35,644][INFO ][c.f.s.c.PrivilegesEvaluator] No permissions for [indices:monitor/stats]


When asking questions, please provide the following information:

* Search Guard and Elasticsearch version
    SG  6.4.0.15        6.4.0
* Installed and used enterprise modules, if any
  ES SG plugin, Kibana SG plugin
* JVM version and operating system version
 jvm 8, centos 7
* Search Guard configuration files
* Elasticsearch log messages on debug level
* Other installed Elasticsearch or Kibana plugins, if any

Jochen Kressin

unread,
Oct 9, 2018, 1:33:53 PM10/9/18
to Search Guard Community Forum
Can you please post your SG config files and the kibana.yml you are using?

tuse...@gmail.com

unread,
Oct 9, 2018, 8:48:20 PM10/9/18
to search...@googlegroups.com
sg_config.yml is default.

kibana.yml:
server.port: 5601

server.host: "0.0.0.0"

server.name: "kibana-beta"

elasticsearch.username: "kibanaserver"
elasticsearch.password: "kibanaserver"

xpack.security.enabled: false
xpack.monitoring.kibana.collection.enabled: false
xpack.monitoring.ui.enabled: false

# Optional setting that enables you to specify a path to the PEM file for the certificate
# authority for your Elasticsearch instance.

elasticsearch.ssl.certificateAuthorities: [ "/usr/local/kibana/config/root-ca.pem" ]
elasticsearch.ssl.verificationMode: certificate

# Specifies the path where Kibana creates the process ID file.

pid.file: /data/kibana/run/kibana.pid

# Enables you specify a file where Kibana stores log output.

logging.dest: /data/kibana/logs/sys.log

path.data: /data/kibana/data/
searchguard.readonly_mode.roles: ["sg_readall", ...]





在 2018年10月10日星期三 UTC+8上午1:33:53,Jochen Kressin写道:

Mohammad Idrees

unread,
Oct 11, 2018, 12:14:27 AM10/11/18
to search...@googlegroups.com
hi,
I also have the same problem and I am troubleshooting since one week. did you find any solution?
thanks


Manjula Piyumal

unread,
Oct 18, 2018, 1:17:33 AM10/18/18
to Search Guard Community Forum
Hi,

Did anyone find a solution for this? I'm also having the same problem.

Thanks

Jochen Kressin

unread,
Oct 19, 2018, 6:06:05 AM10/19/18
to Search Guard Community Forum
Such an issue never surfaced anywhere in the integration tests, so we need to debug a bit.

A couple of questions:

You write: "No matter what I config elasticsearch.username and elasticsearch.password in kibana.yml ... ". Do you mean that changing these values has no effect? So if you change kibanaserver to something else Kibana will still start? This should not be the case because if these credentials are not correct Kibana can't connect to Elasticsearch at all.

You write " no matter what valid user I  really use". This means you are using Basic Authentication and use the Search Guard login form to log in, correct?

Can you open the Developer Tools in your browser (Chrome example attached) and inspect the HTTP POST request that us authenticating the user (see screenshot)?

Kibana.png



And can you inspect the session storage after you logged in? You should see a user entry, what is the value? 

If you navigate to the "Tenants" page, what role is displayed in the upper right corner (also see Screenshot).

Kibana.png

Reply all
Reply to author
Forward
0 new messages