-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow Kibana client to authorize with Elasticsearch API key #27540
Allow Kibana client to authorize with Elasticsearch API key #27540
Conversation
Allow the libbeat/kibana client to authorize using an API key instead of a username/password. This setting can be specified under output.elasticsearch.api_key in the same way that the username/password can be.
Pinging @elastic/agent (Team:Agent) |
💚 Build Succeeded
Expand to view the summary
Build stats
Test stats 🧪
Trends 🧪💚 Flaky test reportTests succeeded. Expand to view the summary
Test stats 🧪
|
Can we add an automated test for this? |
This pull request is now in conflicts. Could you fix it? 🙏
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
Co-authored-by: Andrew Kroh <andrew.kroh@elastic.co>
/test |
* Allow Kibana client to authorize with Elasticsearch API key Allow the libbeat/kibana client to authorize using an API key instead of a username/password. This setting can be specified under output.elasticsearch.api_key in the same way that the username/password can be. * Add PR number to CHANGELOG * Add testing * Add license headers * Update libbeat/kibana/client.go Co-authored-by: Andrew Kroh <andrew.kroh@elastic.co> * gofmt Co-authored-by: Andrew Kroh <andrew.kroh@elastic.co> (cherry picked from commit 0976134)
…earch API key (#27654) * Allow Kibana client to authorize with Elasticsearch API key (#27540) * Allow Kibana client to authorize with Elasticsearch API key Allow the libbeat/kibana client to authorize using an API key instead of a username/password. This setting can be specified under output.elasticsearch.api_key in the same way that the username/password can be. * Add PR number to CHANGELOG * Add testing * Add license headers * Update libbeat/kibana/client.go Co-authored-by: Andrew Kroh <andrew.kroh@elastic.co> * gofmt Co-authored-by: Andrew Kroh <andrew.kroh@elastic.co> (cherry picked from commit 0976134) * Fix CHANGELOG Co-authored-by: Michel Laterman <82832767+michel-laterman@users.noreply.github.com> Co-authored-by: michel-laterman <michel.laterman@elastic.co>
* master: Forward port 7.14.1 changelog to master (elastic#27687) Addressing multiple dashboard issues: deps loading once, field conversion, etc. (elastic#27669) Remove adaptive queue sizes from agent's spec files (elastic#27653) Osquerybeat: Improve testability and unit test coverage (elastic#27591) Osquerybeat: lockdown flagsfile, prevent global defaults (elastic#27611) Import the references of dashboard assets using the Saved Objects API (elastic#27647) Fix bug with override path in cgroups (elastic#27620) Allow Kibana client to authorize with Elasticsearch API key (elastic#27540) Filebeat auditd: Fix Top Exec Commands dashboard visualization (elastic#27638) [elastic-agent] Fix docker tar.gz generation for complete image (elastic#27621) Follow up changes in dashboards in mage check && fix minor issue (elastic#27553) [Heartbeat] Fix bug where `enabled: false` is ignored. (elastic#27615) Support kube_state_metrics v2.0.0 (elastic#27552)
…27540) * Allow Kibana client to authorize with Elasticsearch API key Allow the libbeat/kibana client to authorize using an API key instead of a username/password. This setting can be specified under output.elasticsearch.api_key in the same way that the username/password can be. * Add PR number to CHANGELOG * Add testing * Add license headers * Update libbeat/kibana/client.go Co-authored-by: Andrew Kroh <andrew.kroh@elastic.co> * gofmt Co-authored-by: Andrew Kroh <andrew.kroh@elastic.co>
What does this PR do?
Allow the libbeat/kibana client to authorize using an API key instead of
a username/password. This setting can be specified under
output.elasticsearch.api_key in the same way that the username/password
can be.
Why is it important?
Allows the elasticsearch output settings (for authorization) to be used for Kibana setup.
Checklist
I have made corresponding changes to the documentationI have made corresponding change to the default configuration filesI have added tests that prove my fix is effective or that my feature worksCHANGELOG.next.asciidoc
orCHANGELOG-developer.next.asciidoc
.How to test this PR locally
id:secret
) in the beat.yml asoutput.elasticsearch.api_key
settingsetup kibana
commandRelated issues