-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[APM] Fleet: Inject Kibana URL + API Key into APM integration policy #93420
Comments
Pinging @elastic/apm-ui (Team:apm) |
Alex already created an issue for that: #88822 |
To try and help get things started, I've prototyped a couple of things:
It's all hacks, just use it for inspiration if anything. The approach of injecting config is probably what we should eventually take. Since with that approach APM Server wouldn't be connecting to Kibana at all, we would need to come up with a new way of indicating that agent config has been applied. I'm also not sure if this will work with our security model. |
Thanks @axw, much appreciated! This provides some great pointers for what to do next |
update: I deleted a bunch of comments on this issue and moved them over to #89989 (comment). Apologies for this mess! |
Since we decided to not work on an iterims solution for |
This is an interim solution. The permanent solution is #95501
Hook into Fleet extension points to create and inject a Kibana API Key and the Kibana URL to the APM integration policy. The API Key need to be checked on every
packagePolicyUpdate
as the key might be invalidated by users, in which case a new key needs to be created.Permissions for key creation should not be an issue, as Fleet requires superuser privileges.
The Types for the callbacks supported are defined here:
kibana/x-pack/plugins/fleet/server/plugin.ts
Lines 132 to 148 in a99ccc2
The APM app should hook into these API calls, and inject one or more additional API Keys. This could be done without #89311.
This issue supersedes #89311
Related discussion: elastic/apm-server#4573 (comment)
The text was updated successfully, but these errors were encountered: