-
Notifications
You must be signed in to change notification settings - Fork 25.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Get Aliases API fails when a system data stream exists and security is enabled #73218
Comments
Pinging @elastic/es-core-infra (Team:Core/Infra) |
This is the cause of elastic/kibana#100019. |
It looks to me as if the problem is in try (ThreadContext.StoredContext ignore = threadPool.getThreadContext().newStoredContext(false)) {
concreteIndices = indexNameExpressionResolver.concreteIndexNames(state, request);
} We intend for the invocation of The method |
Hi @ruflin, As per the ticket #100019 , We have validated this ticket on 7.13.0 BC7 build and Please find the below observations: Build Details:
Observations:
Agent Logs after changing the policy Thanks!! |
This commit adjusts the behavior of the Get Aliases API to more thoroughly prevent errors and warnings from being emitted unnecessarily from the Get Aliases API by retrieving all indices including system ones and only warning in the post processing of the action. Additionally, the IndexAbstractionResolver has been updated to properly handle system data streams when evaluating visibility. Closes #73218 Co-authored-by: jaymode <[email protected]>
…ic#73244) This commit adjusts the behavior of the Get Aliases API to more thoroughly prevent errors and warnings from being emitted unnecessarily from the Get Aliases API by retrieving all indices including system ones and only warning in the post processing of the action. Additionally, the IndexAbstractionResolver has been updated to properly handle system data streams when evaluating visibility. Closes elastic#73218 Co-authored-by: jaymode <[email protected]>
This commit adjusts the behavior of the Get Aliases API to more thoroughly prevent errors and warnings from being emitted unnecessarily from the Get Aliases API by retrieving all indices including system ones and only warning in the post processing of the action. Additionally, the IndexAbstractionResolver has been updated to properly handle system data streams when evaluating visibility. Closes #73218 Co-authored-by: Gordon Brown <[email protected]>
This commit adjusts the behavior of the Get Aliases API to more thoroughly prevent errors and warnings from being emitted unnecessarily from the Get Aliases API by retrieving all indices including system ones and only warning in the post processing of the action. Additionally, the IndexAbstractionResolver has been updated to properly handle system data streams when evaluating visibility. Closes #73218 Co-authored-by: Gordon Brown <[email protected]>
@deepikakeshav-qasource can you confirm, you have re-tested this in BC8 or newer in the same scenario and that it works? Thank you! |
Hi @eric, We have validated this ticket on 7.13.0 BC9 build and observed that issue Fixed. Now able to install the beats When an agent is installed and policy is changed from Fleet server agent to Default policy having System, Endpoint and Fleet Server integration Build Details:
Thanks!! |
Elasticsearch version (
bin/elasticsearch --version
): 7.13.0, probably all later versionsPlugins installed: []
JVM version (
java -version
): built-inOS version (
uname -a
if on a Unix-like system): MacOSDescription of the problem including expected versus actual behavior:
When a system data stream exists and Security is enabled, the Get Alias API will always fail.
Steps to reproduce:
GET _alias
orGET _alias/auditbeat-7.13.0
.Note that the Get Alias API behaves as expected when security is not enabled.
Provide logs (if relevant):
The error response:
The text was updated successfully, but these errors were encountered: