NOTE:
Certain sensitive information, I have replaced with ***** pattern.
Versions (relevant - OpenSearch/Dashboard/Server OS/Browser):
opensearch-dashboard:2.9.0
opensearch:2.9.0
Kubernetes server version: 1.28
Describe the issue:
We have enabled SSL for HTTP as well as transport layer in Opensearch.
(Reference for the same: "Transport client authentication no longer supported." error while implementing third party CA cert for transport layer)
Now are trying to setup dashboards and it is throwing below error in the dashboard pod logs;
{“type”:“log”,“@timestamp”:“2024-06-07T19:23:25Z”,“tags”:[“error”,“opensearch”,“data”],“pid”:7,“message”:“[ConnectionError]: socket hang up”}
To enable SSL communication b/w Opensearch dashboard and Opensearch, I have set the below parameters in opensearch_dashboards.yml;
opensearch.hosts: [“https://*******:9200"]
opensearch.ssl.verificationMode: certificate
opensearch.ssl.certificateAuthorities: ["/usr/share/opensearch/config/.crt”, “/usr/share/opensearch/config/********.crt”]
In above config, I have provided the root certificate as well the primary certificate of opensearch in the certificateAuthorities part.
Setting parameters is not helping.
I have set opensearch.ssl.verificationMode: none and still I am getting the same error.
Also set logging.verbose: true in dashboard yml and still nothing helpful getting printed in logs.
If I disable all security(plugins.security.disabled: true) or set the plugins.security.ssl.http.enabled=false, the dashboard is able to talk to opensearch and there is no issue.
Am I missing something here on the server side? Please help.
Configuration:
opensearch_dashboards.yml: |
server.name: opensearch-dashboard
server.host: “0.0.0.0”
opensearch.hosts: [“https://*************:9200”]
opensearch.ssl.verificationMode: certificate
opensearch.username: ${KIBANA_USER}
opensearch.password: ${KIBANA_PASS}
opensearch.requestHeadersWhitelist: [authorization, securitytenant]
server.basePath: “/opensearch”
server.rewriteBasePath: “true”
opensearch.ssl.certificateAuthorities: [“/usr/share/opensearch/config/combined.crt”, “/usr/share/opensearch/config/********.crt”]
opensearch_security.multitenancy.enabled: true
opensearch_security.multitenancy.tenants.preferred: [“Private”, “Global”]
opensearch_security.readonly_mode.roles: [“kibana_read_only”]
# Use this setting if you are running opensearch-dashboards without https
opensearch_security.cookie.secure: false
logging.verbose: true
Relevant Logs or Screenshots:
“type”:“log”,“@timestamp”:“2024-06-07T19:38:37Z”,“tags”:[“error”,“opensearch”,“data”],“pid”:7,“message”:“[ConnectionError]: socket hang up”}
{“type”:“log”,“@timestamp”:“2024-06-07T19:38:40Z”,“tags”:[“error”,“opensearch”,“data”],“pid”:7,“message”:“[ConnectionError]: socket hang up”}
{“type”:“log”,“@timestamp”:“2024-06-07T19:38:42Z”,“tags”:[“error”,“opensearch”,“data”],“pid”:7,“message”:“[ConnectionError]: socket hang up”}
{“type”:“log”,“@timestamp”:“2024-06-07T19:38:45Z”,“tags”:[“error”,“opensearch”,“data”],“pid”:7,“message”:“[ConnectionError]: socket hang up”}
{“type”:“log”,“@timestamp”:“2024-06-07T19:38:47Z”,“tags”:[“error”,“opensearch”,“data”],“pid”:7,“message”:“[ConnectionError]: socket hang up”}