Describe the issue:
I have upgraded OSD from v2.9.0 to v2.11.0 and my plugin have stopped working which was compatible with node version 16. I was observing some security related issues in the log though I’d not deployed the opensearch with security enabled.
Relevant Logs or Screenshots:
Index Management - CommonService - apiCaller StatusCodeError: no handler found for uri [/_plugins/_security/api/account] and method [GET]
at respond (/usr/share/opensearch-dashboards/node_modules/elasticsearch/src/lib/transport.js:349:15)
at checkRespForFailure (/usr/share/opensearch-dashboards/node_modules/elasticsearch/src/lib/transport.js:306:7)
at HttpConnector. (/usr/share/opensearch-dashboards/node_modules/elasticsearch/src/lib/connectors/http.js:173:7)
at IncomingMessage.wrapper (/usr/share/opensearch-dashboards/node_modules/lodash/lodash.js:4991:19)
at IncomingMessage.emit (node:events:525:35)
at IncomingMessage.emit (node:domain:489:12)
at endReadableNT (node:internal/streams/readable:1359:12)
at processTicksAndRejections (node:internal/process/task_queues:82:21) {
status: 400,
displayName: ‘BadRequest’,
path: ‘/_plugins/_security/api/account’,
query: undefined,
body: {
error: ‘no handler found for uri [/_plugins/_security/api/account] and method [GET]’
},
statusCode: 400,
response: ‘{“error”:“no handler found for uri [/_plugins/_security/api/account] and method [GET]”}’,
toString: [Function (anonymous)],
toJSON: [Function (anonymous)]
Donot change sever name and host. This is default configuration.
server.name: dashboards
server.customResponseHeaders: { “X-Frame-Options”: “DENY” } #Set it to ‘true’ to help prevent the browser from allowing unsafe scripting. If true, it will block access to dashboards for any browser that does not enforce even a rudimentary set of Content Security Policy protections.
csp.strict: true #Enable server.ssl.supportedProtocols when Security is enabled. #server.ssl.supportedProtocols: [“TLSv1.2”] OpenSearch security cookie can be secured by setting the below parameter to true. Uncomment it when Security is enabled. #opensearch_security.cookie.secure: true #To enable multitenancy in dashboards uncomment and set “opensearch_security.multitenancy.enabled” to true and uncomment opensearch.requestHeadersAllowlist parameter. #opensearch_security.multitenancy.enabled: false
To use client-cert authentication for dashboards backend server with opensearch, enable clientcert_auth_domain in indexsearch and uncomment the two parameters “opensearch.ssl.certificate” and “opensearch.ssl.key”. Their values will be set internally. Add the required certificates in pre-created secret and configure them under sslsecretvolume section.
uncomment below section for keycloak authentication and provide required correct parameters
When sensitiveInfoInSecret is true then uncomment below section for keycloak authentication and set opensearch_security.openid.client_id: , opensearch_security.openid.client_secret: , opensearch_security.openid.root_ca: to empty so that they are internally populated from the secrets.