-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Actions] document NODE_EXTRA_CA_CERTS
et al as a way to enable extra https certs for 3rd party services
#75870
Comments
Pinging @elastic/kibana-alerting-services (Team:Alerting Services) |
++ we should update the docs in the interim. I'm wondering more long term if we should support this in the UI where the connectors are configured. Maybe an upload of the certificate which gets encrypted in |
My guess would be that if they need special certs to access a service, there may be other software they're using that also needs these certs, so if there's any way to reuse some kind of "standard" discovery for these, that would be useful. Eg, env var names. Uploading certs to ES is an interesting approach, not sure there's enough bang for the buck for it though, considering the extra code we'd have to write to manage these. Making use of the keystore would be a similar sort of story, probably easier for everyone to deal with given it's a set of CLI commands, and no new key management code would need to be written. |
BTW, cloud can't currently set this option, not to mention allow the customer to upload CA cert files, so we'll need some sort of whitelisted kibana config to handle all this SSL/TLS stuff for cloud. Probably a fairly big piece of work, and the CA cert file thing in particular may be a different sort of beast if we're going to need customers to upload certs to a cloud deployment. |
I think you're right and the issue is a bit bigger than simply updating the docs. @legrego I'm reaching out to get some thoughts on this issue in case something like this has crossed your path. Some customers have custom certs they need to set before they can use some connectors. They can be set via |
I'm personally not a fan of using We've instead favored explicit configuration via I'd rather see us add this to |
Ya, I think we can certainly handle CAs specifically for use with actions vs across all https connections Kibana is making - the next question is do we need per-connection CAs - eg, only use CA xyz for this particular webhook connector. It's likely we'd only need this for webhook, actually, since most/all of the other actions talk to 3rd party services on the web, so are likely already using CAs acceptable to node. |
We may want to factor in the http proxy stuff here as well. Would a customer have an https proxy that required special certs? Note that cloud is unlikely to be affected here, I doubt there's a requirement for a cloud customer to have to use http proxies for actions. None-the-less, that's still a cert we'd have to deal with, for on-prem, so it would be nice to have a somewhat consistent story. |
The list of allowed ES settings for cloud only lists So it doesn't look like uploading certs to the cloud is currently supported for watcher. |
So, seems like a couple of things to work on here - I think it's worth documenting the Then we need a better solution, which. is presumably a new action-based config specifying cert files/path, however we want to shape that (files / paths, for all action types, action-type specific, or connector-specific). Then if we need this for cloud, we'll need to figure out the cloud story, which is that presumably customers would be uploading certs to their cloud account | deployments. |
A customer also reported using |
I have a customer trying to use Jira connector in Security app on 7.10, and getting this certificate problem. |
Correct, they would need to set |
For customers that need to add additional security certificate settings for use with 3rd party services making
https
requests, we should document all the ways this can be done. @romain-chanu noted that he usedNODE_EXTRA_CA_CERTS
in one customer environment successfully.We should document all these somewhere in the actions documentation. We should also look into whether this is good enough:
The text was updated successfully, but these errors were encountered: