-
Notifications
You must be signed in to change notification settings - Fork 1.9k
[elasticsearch] Readiness probe is failing with 8.0.0-SNAPSHOT and default config #1375
Comments
cc @elastic/es-delivery |
Hmm, what can we do here? I suspect we should be explicit, that is, make users choose to either enable to disable security, and if they enable, provide the necessary credentials. cc @jkakavas |
Thanks for bringing this to our attention!
Yes, I agree. Auto-configuration is helpful but it is not aimed to cover the use cases where there is some other form of orchestration. My helm knowledge is somewhat limited, but I think the way forward here would be to include a section like
in all of our examples ( as we do for https://github.com/elastic/helm-charts/blob/master/elasticsearch/examples/security/values.yaml ) and that will be used for the readiness probe too. Setting this would also trigger elasticsearch to not auto-generate a new password for the elastic user. |
Yes, I can confirm that settings The goal of testing the default example in Jenkins, is to ensure that deploying Elasticsearch chart with the default config using If we want to make auto-configuration compatible with Elasticsearch chart, we should be able to query Otherwise, we can just consider that Elasticsearch chart shouldn't work anymore with only default config and document that security auto-configuration is not compatible with this charts and that setting WDYT @jkakavas? |
I think we should be documenting this as our preferred approach to use the helm chart. Mind, you don't need to set
There is no unauthenticated health check endpoint for ES. If we query the Given the opportunity, I also want to bring elastic/elasticsearch#77231 to your attention. In that PR, we are enabling auto-configuration of TLS so we wouldn't need the |
This commit update Elasticsearch chart to use security by default. - Adds a new Secret templates for Elasticsearch credentials with a randomized password if password value isn't defined. - Adds instructions to retrieve credentials in Elasticsearch chart deployment notes. The other charts will be updated in follow-up PRs to use the proper credentials Relates to elastic#1375
This commit updates apm-server values to use the new Elasticsearch credentials from elastic#1384. Relates to elastic#1375
This commit updates filebeat values to use the new Elasticsearch credentials from elastic#1384. Relates to elastic#1375
This commit updates kibana values to use the new Elasticsearch credentials from elastic#1384. Relates to elastic#1375
This commit updates logstash values to use the new Elasticsearch credentials from elastic#1384. Relates to elastic#1375
This commit updates metricbeat values to use the new Elasticsearch credentials from elastic#1384. Relates to elastic#1375
This commit update Elasticsearch chart to use security by default. - Adds a new Secret template for Elasticsearch password with a randomized password if `secret.password` isn't defined. - Adds instructions to retrieve the password in Elasticsearch chart deployment notes. - Also, remove usage of `ELASTIC_USERNAME` variable because it don't seem to be supported anymore by Elasticsearch The other charts will be updated in follow-up PRs to use the proper credentials Relates to #1375
This commit update Elasticsearch chart to use security by default. - Adds a new Secret template for Elasticsearch password with a randomized password if `secret.password` isn't defined. - Adds instructions to retrieve the password in Elasticsearch chart deployment notes. - Also, remove usage of `ELASTIC_USERNAME` variable because it don't seem to be supported anymore by Elasticsearch The other charts will be updated in follow-up PRs to use the proper credentials Relates to elastic#1375
This commit updates apm-server values to use the new Elasticsearch credentials from elastic#1384. Relates to elastic#1375
This commit updates filebeat values to use the new Elasticsearch credentials from elastic#1384. Relates to elastic#1375
This commit updates kibana values to use the new Elasticsearch credentials from elastic#1384. Relates to elastic#1375
This commit updates logstash values to use the new Elasticsearch credentials from elastic#1384. Relates to elastic#1375#
This commit updates metricbeat values to use the new Elasticsearch credentials from elastic#1384. Relates to elastic#1375
This commit update Elasticsearch chart to use security by default. - Adds a new Secret template for Elasticsearch password with a randomized password if `secret.password` isn't defined. - Adds instructions to retrieve the password in Elasticsearch chart deployment notes. - Also, remove usage of `ELASTIC_USERNAME` variable because it don't seem to be supported anymore by Elasticsearch The other charts will be updated in follow-up PRs to use the proper credentials Relates to elastic/helm-charts#1375
Chart version:
8.0.0-SNAPSHOT
Kubernetes version: all
Kubernetes provider: all
Helm Version: all
helm get release
output:Output of helm get release
Describe the bug:
When using
8.0.0-SNAPSHOT
and default values (default elasticsearch config, security not enforced), Elasticsearch chart fails to deploy, with pods never reaching ready state due to Readiness probe failing:This seems to be related to the new behavior where Elasticsearch enables security and generates password if it's not configured. Without getting too deep into the weed, I think that's because the generated credentials are not passed to the readiness probe scripts:
helm-charts/elasticsearch/templates/statefulset.yaml
Lines 229 to 283 in e22fe09
Steps to reproduce:
Expected behavior: Readiness probe should success.
Provide logs and/or server output (if relevant):
Elasticsearch logs
Any additional context:
The text was updated successfully, but these errors were encountered: