Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Elasticsearch Enrollment Token injection via Kibana's CLI #136850

Closed
nathanrstacey opened this issue Jul 21, 2022 · 4 comments
Closed

Elasticsearch Enrollment Token injection via Kibana's CLI #136850

nathanrstacey opened this issue Jul 21, 2022 · 4 comments
Labels
Feature:Security/Interactive Setup Platform Security - Interactive setup mode Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!

Comments

@nathanrstacey
Copy link

Describe the feature:
When starting Kibana for the first time, provide an option like the following to inject the Elasticsearch Enrollment Token into Kibana
-a parameter option added to the "./bin/kibana" command
-an option like 'click on http://localhost:5601:code=4532 to add the Elasticsearch Enrollment Token OR click enter and add the token here'

Describe a specific use case for the feature:
The current default method to inject the Elasticsearch token into Kibana requires a browser on the Kibana server. This is because the default URL is a localhost URL

Most users that I know do not have this option. Their linux servers are CLI only. To get to this webpage they need to change the kibana.yml config file with the server's URL. Then they will be able to access that webpage.

I love the simplicity of the current method, we just need an easy way for users without a 'localhost' web browser to use it

@botelastic botelastic bot added the needs-team Issues missing a team label label Jul 21, 2022
@legrego legrego added Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! Feature:Security/Interactive Setup Platform Security - Interactive setup mode labels Jul 21, 2022
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

@botelastic botelastic bot removed the needs-team Issues missing a team label label Jul 21, 2022
@legrego
Copy link
Member

legrego commented Jul 21, 2022

@nathanrstacey, we offer a "detached enrollment mode" which allows you to use a CLI to complete the enrollment process (see Step 5 in the setup docs). It doesn't use the existing bin/kibana command like you're suggesting, but would this be a viable solution for you?

bin/kibana-setup --enrollment-token <enrollment-token>

@legrego
Copy link
Member

legrego commented Aug 8, 2022

Hey @nathanrstacey, just wanted to follow up on this. Do you find the bin/kibana-setup CLI sufficient for your needs?

Any objections to me closing this issue in favor of #120993, which aims to improve the docs and discoverability of the existing bin/kibana-setup CLI?

@legrego
Copy link
Member

legrego commented Aug 22, 2022

I'm going to close this in favor of improving the docs/discoverability of bin/kibana-setup via #120993. Thanks for the feedback!

@legrego legrego closed this as completed Aug 22, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Feature:Security/Interactive Setup Platform Security - Interactive setup mode Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
Projects
None yet
Development

No branches or pull requests

3 participants