Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Kibana can't recreate proxy location #6002

Open
w33ble opened this issue Jan 25, 2016 · 5 comments
Open

Kibana can't recreate proxy location #6002

w33ble opened this issue Jan 25, 2016 · 5 comments
Labels
bug Fixes for quality problems that affect the customer experience Team:Operations Team label for Operations Team

Comments

@w33ble
Copy link
Contributor

w33ble commented Jan 25, 2016

When running Kibana behind a proxy, it can no longer reliably recreate it's location. When asking for the details about where it's exposed, the details are invalid:

screenshot 2016-01-25 13 23 38

This is most apparent in dev mode, which spins up a proxy and injects a random basePath value to the config.

  • The proxy is running on port 5601, which Kibana knows nothing about
  • The server is actually running on port 5603, so that's the only port it can share
  • Because basePath is set, all assets are requested with that prefix, meaning requests to 5603 don't work correctly
@w33ble w33ble added the bug Fixes for quality problems that affect the customer experience label Jan 25, 2016
@w33ble
Copy link
Contributor Author

w33ble commented Jan 25, 2016

A couple possible paths of resolution:

  • Ability to tell Kibana the proxy details, so it knows how to craft a URL to it
  • Somehow flagging requests as internal and having Kibana drop the basePath entirely

@vidhya03
Copy link

+1

1 similar comment
@abhijitdeka
Copy link

+1

@spalger
Copy link
Contributor

spalger commented Mar 21, 2016

I imagine there is a way to do some of this dynamically with proxy-set headers. We should look into that.

@mike-marcacci
Copy link

This is exceedingly frustrating in the default dev setup, as the user-facing server.basePath and dev.basePathProxyTarget are inconsistently trustworthy. For example, I need to redirect to an external OAuth provider:

  • if I'm in production and no server.basePath is configured, I can trust request.url.path
  • if I'm in production WITH a server.basePath is configured, I can trust request.url.path
  • if I'm in development, request.url.path will be missing the randomly generated server.basePath

Similarly, server.port in development is always identical to dev.basePathProxyTarget, with request.info.host using this internal port. As far as I know there's no way to find the correct user-facing port to conduct the redirect without adding dev-specific behavior or assuming the default.

@rayafratkina rayafratkina added the Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! label Aug 7, 2018
@kobelb kobelb added Team:Operations Team label for Operations Team and removed Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! labels Oct 10, 2018
@tylersmalley tylersmalley added 1 and removed 1 labels Oct 11, 2021
@exalate-issue-sync exalate-issue-sync bot added impact:low Addressing this issue will have a low level of impact on the quality/strength of our product. loe:small Small Level of Effort labels Oct 12, 2021
@tylersmalley tylersmalley removed loe:small Small Level of Effort impact:low Addressing this issue will have a low level of impact on the quality/strength of our product. EnableJiraSync labels Mar 16, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Fixes for quality problems that affect the customer experience Team:Operations Team label for Operations Team
Projects
None yet
Development

No branches or pull requests

8 participants