How to minimize the configuration of API Key permissions when using Elasticsearch's API Key authentication #7486
Replies: 1 comment 1 reply
-
Hi @MicroOps-cn! I'm Dosu and I’m helping the jaeger team. Jaeger requires more than just index-level read/write permissions when connecting to Elasticsearch. During startup, it performs cluster-level operations like health checks and version detection, which require permissions such as To minimize permissions, you can disable health checks and sniffing in Jaeger's Elasticsearch storage config ( {
"minimal-jaeger-role": {
"cluster": ["monitor", "monitor/health", "monitor/state"],
"indices": [
{
"names": ["jaeger-primary-*"],
"privileges": ["read", "write"]
}
]
}
} This setup grants only the necessary cluster privileges for Jaeger to start and operate reliably. For more details, see the Jaeger Elasticsearch storage config and authentication code here. To reply, just mention @dosu. How did I do? Good | Irrelevant | Incorrect | Verbose | Hallucination | Report 🐛 | Other |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
When configuring Jaeger to use Elasticsearch's APIKey authentication, if I set the permission of the APIKey to only allow read and write permissions for the specified index, it will cause Jaeger to fail to start. Will Jaeger call other ES interfaces besides reading and writing ES?
permissions:
log:
Beta Was this translation helpful? Give feedback.
All reactions