You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In addition to TLS, you can configure authentication to ensure that only authorized agents can communicate with the extension.
126
+
In addition to TLS, you can configure authentication to ensure that only authorized agents can communicate with the extension and retrieve their corresponding remote configurations.
127
127
128
-
The apmconfig extension supports any [configauth authenticator](https://github.com/open-telemetry/opentelemetry-collector/blob/v0.125.0/config/configauth/README.md). We recommend using the [apikeyauth extension](https://github.com/elastic/opentelemetry-collector-components/tree/main/extension/apikeyauthextension) to authenticate with Elastic APM API keys (HTTP headers must include a valid API Key):
128
+
The apmconfig extension supports any [configauth authenticator](https://github.com/open-telemetry/opentelemetry-collector/blob/v0.125.0/config/configauth/README.md). We recommend using the [apikeyauth extension](https://github.com/elastic/opentelemetry-collector-components/tree/main/extension/apikeyauthextension) to authenticate with Elasticsearch API keys:
129
129
130
130
```yaml
131
131
extensions:
@@ -134,18 +134,50 @@ extensions:
134
134
application_privileges:
135
135
- application: "apm"
136
136
privileges:
137
-
- "event:write"
137
+
- "config_agent:read"
138
138
resources:
139
139
- "-"
140
140
apmconfig:
141
141
opamp:
142
142
protocols:
143
143
http:
144
-
endpoint: ":4320"
145
-
tls:
146
-
cert_file: server.crt
147
-
key_file: server.key
148
144
auth:
149
145
authenticator: apikeyauth
150
146
...
151
147
```
148
+
149
+
The server will expect incoming HTTP requests to include an API key with sufficient privileges, using the following header format:
150
+
```
151
+
Authorization: ApiKey <base64(id:api_key)>
152
+
```
153
+
154
+
An API key with the minimum required application permissions (as verified with the configuration above) can be created via Kibana by navigating to: `Observability → Applications → Settings → Agent Keys`, or by using the Elasticsearch Security API:
0 commit comments