Configure proxy for Elasticsearch


We have an Elasticsearch setup running in on-prem data center as a Kubernetes application. I would like to configure SAML realm for SSO login to the cluster and Kibana, but in order to get authenticated to the Identity Provider (Azure AD) in our case, we have to go through a proxy IP address that allows access to public URL on the internet.

How can this proxy setup be added to the elasticsearch configuration? The current configuration is the following and we are using 7.6 ES version.

elasticsearch.yml: | dev-observability ""
    bootstrap.memory_lock: false
    discovery.zen.minimum_master_nodes: 2
    cluster.initial_master_nodes: es-cluster-0, es-cluster-1, es-cluster-2 true true certificate /usr/share/elasticsearch/config/elastic-certificates.p12 /usr/share/elasticsearch/config/elastic-certificates.p12 
    xpack.monitoring.enabled: true false
    xpack.watcher.enabled: false
    xpack.license.self_generated.type: trial true true /usr/share/elasticsearch/config/http.p12 /usr/share/elasticsearch/config/http.p12
      order: 1
      idp.metadata.path: /usr/share/elasticsearch/config/idp-metadata.xml
      sp.entity_id: SP-kibana-dev
      attributes.principal: urn:oid:0.9.2342.19200300.100.1.1
      attributes.groups: urn:oid:
    #   order: 0

      master: true
      data: true
      ingest: true

Thank you for your answers!

This topic was automatically closed 28 days after the last reply. New replies are no longer allowed.