Bug 1548640
| Summary: | Cluster-admin users should be able to view _cat endpoints | ||
|---|---|---|---|
| Product: | OpenShift Container Platform | Reporter: | Anping Li <anli> |
| Component: | Logging | Assignee: | Jeff Cantrill <jcantril> |
| Status: | CLOSED ERRATA | QA Contact: | Anping Li <anli> |
| Severity: | urgent | Docs Contact: | |
| Priority: | urgent | ||
| Version: | 3.10.0 | CC: | anli, aos-bugs, ewolinet, jcantril, lsvaty, mjahangi, nhosoi, qitang, rmeggins, sradco, wsun |
| Target Milestone: | --- | ||
| Target Release: | 3.11.z | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: |
Cause: Permission was defined incorrectly
Consequence: admin users could not use the cluster endpoints
Fix: Define the correct permission
Result: admin users can use the _cat endpoints
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | 2019-04-11 05:38:22 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
Anping Li
2018-02-24 05:48:19 UTC
You may use 'oc exec -c elasticsearch $POD -- es_util --query=_cat/indices' which allows you to use the admin certs. If you have cluster permissions then you have access to the pod which allows you access to these endpoints. You may also need to simply update the rolesmapping document by rsh to the pod, update the document with the appropriate actions and then running 'es_seed_acl'. @Eric, thoughts on if this is something we missed and should allow and or change? Lowering the priority as this is not a blocker Is this a regression? If not, it is an RFE. # curl -k -H "Authorization: Bearer $token" https://172.30.250.118:9200/ -H"x-forwarded-for: 127.0.0.1" or # curl -k -H "Authorization: Bearer $token" https://172.30.250.118:9200/_cat/indices -H"x-forwarded-for: 127.0.0.1" yellow open project.kube-system.50884c2b-8f47-11e8-a173-525400c5b2ed.2018.07.31 R0svyTlISvqMlFKUzfjk9g 5 1 2 0 55.8kb 55.8kb green open .kibana.d033e22ae348aeb5660fc2140aec35850c4da997 nH6UXiHyQvewZRzupdqkzg 1 0 5 0 54.9kb 54.9kb yellow open .kibana 095dIdIwSnqQhEc5XPg21g 1 1 1 0 3.2kb 3.2kb green open .operations.2018.08.01 CxdEmTeKSI2tRkgFdaZzcA 1 0 29786 0 44.1mb 44.1mb green open .searchguard yZc8mDnKTfiJW4BalFkHZg 1 0 0 0 67kb 67kb green open .operations.2058.09.22 JKYv9YDHQhWhtI3nvmIXIQ 1 0 3 0 19.1kb 19.1kb yellow open project.kube-proxy.d0edea0d-945a-11e8-ad9b-525400c5b2ed.2018.07.31 38lwSa_OQJGpY36vpOXQ7A 5 1 16 0 163kb 163kb yellow open project.kube-dns.d04f6a8a-945a-11e8-ad9b-525400c5b2ed.2018.07.31 w49FM3HiQLaIMe6PFLh-hA 5 1 8 0 123.3kb 123.3kb yellow open .operations.2018.07.31 G19DbKGcRFeNyxS1fwdTIQ 5 1 180853 0 234.3mb 234.3mb yellow open project.kube-system.ca5f63a5-945a-11e8-ad9b-525400c5b2ed.2018.07.31 ULT2hAF4S8KKxqJf9KkTtw 5 1 10129 0 12.1mb 12.1mb *** Bug 1685792 has been marked as a duplicate of this bug. *** This is a blocker for RHV release Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2019:0636 |