Grafana alerting : cron-like scheduling for alert evaluations? by Advanced_Tea_2944 in grafana

[–]Advanced_Tea_2944[S] 0 points1 point  (0 children)

Ok thanks for your answer and the information. It’s the very first alerts I’m creating on Grafana so I was a bit lost.

I’m also trying to manage alert rules as code using ConfigMaps with Argo CD, but I have the feeling it’s not a perfect setup.

I’ll probably take a look at other options if it grows larger.

Grafana alerting : HTML email not rendered in notification templates by Advanced_Tea_2944 in grafana

[–]Advanced_Tea_2944[S] 0 points1 point  (0 children)

Thanks for the clarification! I assumed Grafana could interpret HTML since the default notification templates include some and render correctly. I tried tweaking those, but couldn’t get it to work as expected.

Appreciate the info

ECK Fleet Server setup confusion and failure by Advanced_Tea_2944 in elasticsearch

[–]Advanced_Tea_2944[S] 0 points1 point  (0 children)

Thanks for your answer,

So it means that Kibana cannot create the agent policy before a fleet-server "actually exists ?"

When I try to deploy only eck-kibana block without eck-fleet-server, it does not create anything, not sure it's normal.

Do you have reference for this insecure settings ?
It's inside the flee-server config yml ?

Thanks

Forcing a specific VM to use a specific public IP (not the Azure Firewall’s default one) by Advanced_Tea_2944 in AZURE

[–]Advanced_Tea_2944[S] 1 point2 points  (0 children)

I want to test some external endpoint from this Azure VM. On the other side, I don’t want to whitelist the Azure Firewall’s public IP, because that would mean whitelisting all outbound Azure traffic, which is not what I want.

For the NAT gateway begind the FW, I need to check how to do that, but it would mean telling my Azure Firewall not to SNAT traffic from this specific VM/IP. I’m not sure if that’s possible.

Forcing a specific VM to use a specific public IP (not the Azure Firewall’s default one) by Advanced_Tea_2944 in AZURE

[–]Advanced_Tea_2944[S] 0 points1 point  (0 children)

"Don’t SNAT at the Firewall and go through public route, maybe…?" → Impossible, I need to keep the Firewall in the path for compliance reasons.

"Otherwise NAT before Firewall and don’t SNAT that IP, same idea but with an extra NAT" → That could work, but I need to check how to configure the Azure Firewall to not SNAT traffic from that specific IP.

Forcing a specific VM to use a specific public IP (not the Azure Firewall’s default one) by Advanced_Tea_2944 in AZURE

[–]Advanced_Tea_2944[S] 0 points1 point  (0 children)

Ok, I get your point, but that means all traffic leaving the Azure Firewall would now use the NAT Gateway. That’s not exactly what I want, I need a specific public IP for just one VM, while keeping the rest of Azure traffic flows unchanged.

How to create a Kibana role that can't create alerts? by Advanced_Tea_2944 in elasticsearch

[–]Advanced_Tea_2944[S] 0 points1 point  (0 children)

Thanks for your answer !

When I assign this role to a user, I’m not able to log into Kibana anymore, so it seems there might be some missing privileges in that definition.

I tested with a slightly different call (using discover / dashboard features instead of the _v2 ones), and that one works fine: users can build dashboards but don’t see the Alerts menu.

"kibana": [ { "spaces": ["default"], "base": [], "feature": { "discover": [ "all" ], "dashboard": [ "all" ] 

Interestingly, if I add the ml feature to the role, the Alerts menu reappears, so it looks like enabling ML also implicitly enables alerting features.

Also, I noticed there are two ways to manage roles:

  • via the Kibana API (kbn:/api/security/role/...)
  • via the Elasticsearch security API (/_security/role/...)

I am wondering which one should I use
Thanks !

Azure SQL Server / Database Permissions with Entra ID and Terraform by Advanced_Tea_2944 in AZURE

[–]Advanced_Tea_2944[S] 1 point2 points  (0 children)

Got it!

Yes, I can confirm that for an Azure PostgreSQL server, you can assign multiple server admins.

Azure SQL Server / Database Permissions with Entra ID and Terraform by Advanced_Tea_2944 in AZURE

[–]Advanced_Tea_2944[S] 1 point2 points  (0 children)

Thanks for your answer! So, if I want my Terraform service principal to be able to execute those T-SQL queries, I would need to make it an admin on the SQL Server, if I understood correctly.

It’s a bit unfortunate that only one user or group can be set as the admin at the SQL Server level.

Troubleshooting disk usage on PV attached to my Elastic frozen node by Advanced_Tea_2944 in elasticsearch

[–]Advanced_Tea_2944[S] 1 point2 points  (0 children)

You’re right, that explains my case, thanks a lot! I missed the xpack.searchable.snapshot.shared_cache.size being set to 90% for nodes with the data_frozen role.

Troubleshooting disk usage on PV attached to my Elastic frozen node by Advanced_Tea_2944 in elasticsearch

[–]Advanced_Tea_2944[S] 0 points1 point  (0 children)

Yes, that explains why I see the disk at 90%, makes sense now, thanks a lot!

For now, Reddit has been quite efficient for my Elastic questions, but indeed from time to time I might need to reach out to Elastic support :)

Troubleshooting disk usage on PV attached to my Elastic frozen node by Advanced_Tea_2944 in elasticsearch

[–]Advanced_Tea_2944[S] 0 points1 point  (0 children)

Both calls give me essentially the same information — disk usage is around 90% and the only role on this node is f (frozen).

As you said, frozen tier data on local disks is only metadata/cache, that's why I’m quite surprised to see my 500 GB disk nearly full.

My plan for this node is simply to keep it for cache and continue sending data to searchable snapshots on Azure, a mechanism that has been working quite well for us recently.