Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Option to ignore SSL certificate check for Elasticsearch connector #13800

Closed
alogvinov-forter opened this issue Oct 31, 2023 · 1 comment · Fixed by #13919
Closed

Option to ignore SSL certificate check for Elasticsearch connector #13800

alogvinov-forter opened this issue Oct 31, 2023 · 1 comment · Fixed by #13919
Assignees
Labels
enhancement New feature or request Ingestion

Comments

@alogvinov-forter
Copy link

alogvinov-forter commented Oct 31, 2023

Hi team,

Thank you very much for adding the support for Elasticsearch in the latest release! We've been waiting for this connector for quite some time now, and after upgrade to 1.2 we should finally able to ingest this data source into OpenMetadata.
While setting up the ingestion and testing the connection, I ran into an issue with self-signed SSL certificates:

TLS error caused by: TlsError(TLS error caused by: SSLError([SSL: CERTIFICATE_VERIFY_FAILED] 
certificate verify failed: unable to get local issuer certificate (_ssl.c:1129)))

I understand there is the "Client Certificate Path" field which can be used to supply the certificate, but I'm wondering if there is a way to skip verification of certificates altogether? I tried passing verify_certs=False in the advanced config, it didn't work. The problem is, we have ~30 Elasticsearch clusters all using self-signed certificates which are also rotated periodically. So maintaining all of this configuration is going to be a nightmare.

I found this GitHub issue - elastic/elasticsearch-py#712 - and tried following the suggested options there with no luck. Any advice would be very much appreciated, thanks! 🙏

@alogvinov-forter alogvinov-forter added the enhancement New feature or request label Oct 31, 2023
@alogvinov-forter
Copy link
Author

We have an internal Python client for Elasticsearch which basically wraps up the default one, and this is the piece that seems to be relevant:

ssl_context = create_ssl_context()
ssl_context.check_hostname = False
ssl_context.verify_mode = ssl.CERT_NONE
connection_kwargs.update({"ca_certs": False, "ssl_context": ssl_context})

@ulixius9 ulixius9 self-assigned this Nov 4, 2023
@harshach harshach moved this to Ingestion - Bugs & Minor Features in Release 1.3.0 Nov 4, 2023
@harshach harshach moved this from Ingestion - Bugs & Minor Features to Done in Release 1.3.0 Nov 28, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request Ingestion
Projects
No open projects
Status: Done
Development

Successfully merging a pull request may close this issue.

2 participants