CSS Clusters Have Kibana Public Access Control Enabled
Rule Details
Parameter |
Description |
---|---|
Rule Name |
css-cluster-kibana-not-enable-white-list |
Identifier |
css-cluster-kibana-not-enable-white-list |
Description |
If a CSS cluster does not have Kibana public access control enabled, this cluster is noncompliant. |
Tag |
css |
Trigger Type |
Configuration change |
Filter Type |
css.clusters |
Configure Rule Parameters |
None |
Applicable Scenario
If a CSS cluster has Kibana access control disabled, Kibana is publically accessible by all IP addresses. If Kibana access control is enabled, it is only accessible by whitelisted IP addresses over public networks. For details, see Logging In to an Elasticsearch Cluster Using Kibana.
Solution
You can call the Enabling Kibana Public Access API to whitelist IP addresses that can access Kibana.
Rule Logic
- If a CSS cluster does not have Kibana public access enabled, this cluster is compliant.
- If a CSS cluster has Kibana public access enabled but does not have access control enabled, this cluster is noncompliant.
- If a CSS cluster has both Kibana public access and access control enabled, this cluster is compliant.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot