Closed
Description
openedon Jul 1, 2021
Summary
In the scope of this issue we're going to implement server-side functionality that's absolutely necessary for the initial phase of the interactive setup mode provided by the userSetup
plugin:
- ✔️ @azasypkin Add
userSetup
plugin skeleton. (AdduserSetup
plugin skeleton. #101610) - ✔️ @thomheymann / @azasypkin - Functionality to detect if "interactive setup mode" should be enabled [2W] (Introduce
Enroll
API endpoint. #108835) - ✔️ @azasypkin - Functionality to interact with Elasticsearch Enrollment APIs (Introduce
Enroll
API endpoint. #108835) - ✔️ @thomheymann / @azasypkin - Functionality to write
elasticsearch.*
configuration to the disk [1W] (IntroduceEnroll
API endpoint. #108835) - ✔️ @azasypkin Functionality to validate server certificate fingerprint (Cumulative set of the preboot stage adjustments #108514)
- ✔️ @thomheymann - Validate and parse enrollment token (Interactive setup mode #106881)
- ✔️ @thomheymann - Secure interactive setup mode with verification code (Add verification code protection #110856)
- ✔️ @thomheymann - Redirect user to default Kibana location once it's up and running(Add verification code protection #110856)
- ✔️ @azasypkin Make sure interactive setup mode is properly triggered when Kibana is run in Docker (Make interactive setup work properly in Docker container. #110629, see this)
- ➡️
@azasypkin Functional and API integration tests(will be handled in the scope of Add functional and API integration tests for the Interactive Setup mode #111336) - ✔️ @azasypkin Make sure we don't activate interactive setup in k8s/ECK
By default ECK sets up TLS for both Elasticsearch and Kibana. TLS can be disabled, but Security is assumed to be enabled all the time. However, ECK Kibana can be configured to connect to external Elasticsearch , and if the ES happens to behttp://localhost:9200
that Kibana cannot connect to we'll activate interactive setup. - ✔️ @azasypkin Make sure Kibana installed with OS-specific packages (DEB/RPM) can write to configuration file. The
kibana
group has permissions to write tokibana.yml
:
)
- ➡️
Telemetry to record user behavior and common sources of errors(will be handled in the scope of Add telemetry for the interactive setup #111341) - ➡️
Find a way to expose ES config schema to preboot plugins(will be handled in the scope of Interactive setup should validate configuration entries using original schema objects #111340) - ➡️
Support keystore for credentials?(will be handled in the scope of Store kibana system user credentials in the keystore #111337)
Blocked by: #103636, https://github.com/elastic/clients-team/issues/423, #102121
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment