Versions (relevant - OpenSearch/Dashboard/Server OS/Browser):
Opensearch (and Dashboards) - 2.16.0
Mozilla Firefox 129.0.1
Google Chrome 127.0.6533.99
Describe the issue:
After upgrading Opensearch to 2.16.0, Dashboards won’t load and keep timing out.
Configuration:
opensearch.yml
cluster.name: "private-email-logstore"
node.name: "LOGSTORE-MASTER-01"
path.data: /var/lib/opensearch
path.logs: /var/log/opensearch
bootstrap.memory_lock: true
network.host: "10.50.207.11"
http.port: 9200
discovery.seed_hosts: ["LOGSTORE-MASTER-01","LOGSTORE-MASTER-02","LOGSTORE-MASTER-03","LOGSTORE-HOT-01","LOGSTORE-HOT-02","LOGSTORE-HOT-03","LOGSTORE-HOT-04","LOGSTORE-WARM-01","LOGSTORE-WARM-02","LOGSTORE-WARM-03","LOGSTORE-WARM-04","LOGSTORE-WARM-05","LOGSTORE-WARM-06","LOGSTORE-WARM-07","LOGSTORE-WARM-08","LOGSTORE-WARM-09","LOGSTORE-WARM-10","LOGSTORE-COLD-01","LOGSTORE-COLD-02","LOGSTORE-COLD-03","LOGSTORE-COLD-04","LOGSTORE-COLD-05","LOGSTORE-COLD-06","LOGSTORE-COLD-07","LOGSTORE-COLD-08","LOGSTORE-COLD-09","LOGSTORE-COLD-10"]
cluster.initial_cluster_manager_nodes: ["LOGSTORE-MASTER-01","LOGSTORE-MASTER-02","LOGSTORE-MASTER-03"]
plugins.security.ssl.transport.pemcert_filepath: LOGSTORE-MASTER-01-cert.pem
plugins.security.ssl.transport.pemkey_filepath: LOGSTORE-MASTER-01-key.pem
plugins.security.ssl.transport.pemtrustedcas_filepath: root-ca-cert.pem
plugins.security.ssl.transport.enforce_hostname_verification: true
plugins.security.ssl.http.enabled: true
plugins.security.ssl.http.pemcert_filepath: LOGSTORE-MASTER-01-cert.pem
plugins.security.ssl.http.pemkey_filepath: LOGSTORE-MASTER-01-key.pem
plugins.security.ssl.http.pemtrustedcas_filepath: root-ca-cert.pem
plugins.security.ssl.transport.truststore_filepath: truststore.jks
plugins.security.ssl.transport.truststore_password: ***
plugins.security.authcz.admin_dn:
- 'EMAILADDRESS=pe@namecheap.com,CN=opensearch-admin,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
plugins.security.nodes_dn:
- 'CN=LOGSTORE-MASTER-01,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-MASTER-02,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-MASTER-03,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-HOT-01,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-HOT-02,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-HOT-03,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-HOT-04,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-WARM-01,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-WARM-02,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-WARM-03,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-WARM-04,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-WARM-05,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-WARM-06,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-WARM-07,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-WARM-08,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-WARM-09,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-WARM-10,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-COLD-01,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-COLD-02,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-COLD-03,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-COLD-04,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-COLD-05,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-COLD-06,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-COLD-07,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-COLD-08,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-COLD-09,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
- 'CN=LOGSTORE-COLD-10,OU=Private Email,O=Namecheap,L=Phoenix,ST=Arizona,C=US'
plugins.security.allow_default_init_securityindex: true
# Put 0 to disable auth information caching
plugins.security.cache.ttl_minutes: 60
plugins.security.system_indices.enabled: true
plugins.security.system_indices.indices: [".plugins-ml-model", ".plugins-ml-task", ".opendistro-alerting-config", ".opendistro-alerting-alert*", ".opendistro-anomaly-results*", ".opendistro-anomaly-detector*", ".opendistro-anomaly-checkpoints", ".opendistro-anomaly-detection-state", ".opendistro-reports-*", ".opensearch-notifications-*", ".opensearch-notebooks", ".opensearch-observability", ".opendistro-asynchronous-search-response*", ".replication-metadata-store"]
plugins.security.audit.type: internal_opensearch
plugins.security.enable_snapshot_restore_privilege: true
plugins.security.check_snapshot_restore_write_privileges: true
plugins.security.restapi.roles_enabled: ["all_access", "security_rest_api_access"]
node.max_local_storage_nodes: 3
node.roles: ["master"]
security config
---
_meta:
type: "config"
config_version: 2
config:
dynamic:
http:
anonymous_auth_enabled: false
xff:
enabled: false
authc:
basic_internal:
description: "Authenticate via HTTP Basic against internal users database"
http_enabled: true
transport_enabled: true
order: 3
http_authenticator:
type: basic
challenge: true
authentication_backend:
type: internal
ldap_ncad:
description: "Authenticate via Namecheap Active Directory"
http_enabled: true
transport_enabled: true
order: 2
http_authenticator:
type: basic
challenge: false
authentication_backend:
type: ldap
config:
enable_ssl: true
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: false
hosts:
- corp.namecheap.net
bind_dn: ***
password: ***
userbase: "DC=corp,DC=namecheap,DC=net"
usersearch: "(|(mail={0})(userPrincipalName={0}@corp.namecheap.net)(userPrincipalName={0}))"
username_attribute: "userPrincipalName"
ldap_inner:
description: "Authenticate via inner.directory"
http_enabled: true
transport_enabled: true
order: 1
http_authenticator:
type: basic
challenge: false
authentication_backend:
type: ldap
config:
enable_ssl: true
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: false
hosts:
- haproxy-vip.inner.directory
bind_dn: ***
password: ***
userbase: "DC=inner,DC=directory"
usersearch: "(|(mail={0})(userPrincipalName={0}@inner.directory)(userPrincipalName={0}))"
username_attribute: "userPrincipalName"
authz:
ldap_ncad_roles:
description: "Authorize via Namecheap Active Directory"
http_enabled: true
transport_enabled: true
authorization_backend:
type: ldap
config:
enable_ssl: true
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: false
hosts:
- corp.namecheap.net
bind_dn: ***
password: ***
userbase: "DC=corp,DC=namecheap,DC=net"
usersearch: "(userPrincipalName={0})"
rolebase: "OU=Teams,OU=Staff Groups,DC=corp,DC=namecheap,DC=net"
rolesearch: '(member={0})'
rolename: cn
resolve_nested_roles: true
#nested_role_filter:
# - "DN of a group to filter OUT (can be regexp)"
#max_nested_depth: 1
skip_users:
- admin
- kibanaserver
- logstash
- zabbix
- grafana
- '/CN=.*,DC=inner,DC=directory/'
ldap_inner_roles:
description: "Authorize via inner.directory"
http_enabled: true
transport_enabled: true
authorization_backend:
type: ldap
config:
enable_ssl: true
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: false
hosts:
- haproxy-vip.inner.directory
bind_dn: ***
password: ***
userbase: "DC=inner,DC=directory"
usersearch: "(userPrincipalName={0})"
rolebase: "OU=UA Administrative,DC=inner,DC=directory"
rolesearch: '(member={0})'
rolename: cn
resolve_nested_roles: true
#nested_role_filter:
# - "DN of a group to filter OUT (can be regexp)"
max_nested_depth: 1
skip_users:
- admin
- kibanaserver
- logstash
- zabbix
- grafana
- '/CN=.*,DC=corp,DC=namecheap,DC=net/'
Relevant Logs or Screenshots:
I don’t see any relevant logs.