Hi!
After installing the elasticsearch and kibana Search Guard plugin, and initializing Search Guard with sgctl the kibana GUI is not reachable. The kibana log file contains the following error:
kibana[3361368]: [2023-03-06T13:13:21.394+01:00][ERROR][plugins.security.authentication] License is not available or does not support security features, re-authentication is not possible (available: true, enabled: false).
*** Edited ***
Meanwhile in the elasticsearch log:
[WARN ][c.f.s.a.b.RequestAuthenticationProcessor] [hostname] Authentication failed for null from [request=/.kibana_8.5.3/_search, directIpAddress=127.0.0.1, originatingIpAddress=127.0.0.1, clientCertSubject=null]
Additional info:
curl -u kibanaserver:password https://host:9200/_searchguard/health
{“message”:null,“mode”:“strict”,“status”:“UP”}
curl -u kibanaserver:password https://host:9200/_searchguard/authinfo
{“user”:“User kibanaserver <basic/internal_users_db>”,“user_name”:“kibanaserver”,“user_requested_tenant”:null,“remote_address”:“ip address:port”,“backend_roles”:,“custom_attribute_names”:,“attribute_names”:,“sg_roles”:[“SGS_KIBANA_SERVER”,“SGS_ALL_ACCESS”,“SGS_OWN_INDEX”,“SG_KBNSRV”],“sg_tenants”:{},“principal”:null,“peer_certificates”:“0”,“cluster_name”:“cluster”}
*** Edited ***
The same configuration worked before with ELK 7.17.4 and SG 53. How can I solve this issue?
Elasticsearch version:
8.5.3
Server OS version:
Red Hat Enterprise Linux 8.6
Kibana version (if relevant):
8.5.3
Describe the issue:
Kibana GUI unreachable
Steps to reproduce:
- After starting the kibana service the error occures immediately
Expected behavior:
Provide configuration:
kibana.yml:
server.port: 5601
server.host: “hostname”
server.publicBaseUrl: “load balancer hostname”
server.name: “hostname”
elasticsearch.hosts: [“https://localhost:9200”]
elasticsearch.username: “kibanaserver”
elasticsearch.password: “password”
server.ssl.enabled: true
server.ssl.certificate: /etc/kibana/kibana.cer
server.ssl.key: /etc/kibana/kibana.key
elasticsearch.ssl.certificateAuthorities: [ “/etc/kibana/ca-chain.pem” ]
elasticsearch.ssl.verificationMode: none
xpack.reporting.roles.enabled: false