[8.19](backport #47956) [azure-eventhub] Support for AMQP-over-WebSocket transport in the processor v2#50025
[8.19](backport #47956) [azure-eventhub] Support for AMQP-over-WebSocket transport in the processor v2#50025mergify[bot] wants to merge 1 commit into8.19from
Conversation
…cessor v2 (#47956) Support for AMQP-over-WebSocket transport in the azure-eventhub processor v2. Enterprise users often need to comply with network restrictions, which means using AMQP may not be an option. In addition to AMQP-over-WebSocket support, this change allows users to run the azure-eventhub input behind an HTTPS proxy. (cherry picked from commit af5d23e) # Conflicts: # go.mod # go.sum # x-pack/filebeat/input/azureeventhub/auth.go
|
Cherry-pick of af5d23e has failed: To fix up this pull request, you can check it out locally. See documentation: https://docs.github.com/en/pull-requests/collaborating-with-pull-requests/reviewing-changes-in-pull-requests/checking-out-pull-requests-locally |
🤖 GitHub commentsJust comment with:
|
|
Pinging @elastic/obs-ds-hosted-services (Team:obs-ds-hosted-services) |
TL;DRAll 34 Buildkite failures are caused by unresolved Git merge-conflict markers committed in this backport ( Remediation
Investigation detailsRoot CauseClassification: Configuration/source-control error (unresolved merge conflict), not an infrastructure failure. The commit message itself declares unresolved cherry-pick conflicts ( Evidence
VerificationNot run locally against the PR head SHA because the workflow environment does not have that commit checked out; diagnosis is based on Buildkite logs plus direct file-content lookup at SHA Follow-upAfter conflict resolution, all current failures should clear together because they are downstream effects of the same parse/hook failure. Note 🔒 Integrity filtering filtered 2 itemsIntegrity filtering activated and filtered the following items during workflow execution.
What is this? | From workflow: PR Buildkite Detective Give us feedback! React with 🚀 if perfect, 👍 if helpful, 👎 if not. |
Proposed commit message
Support for AMQP-over-WebSocket transport in the azure-eventhub processor v2.
Enterprise users often need to comply with network restrictions, which means using AMQP may not be an option.
In addition to AMQP-over-WebSocket support, this change allows users to run the azure-eventhub input behind an HTTPS proxy.
Checklist
stresstest.shscript to run them under stress conditions and race detector to verify their stability../changelog/fragmentsusing the changelog tool.Disruptive User Impact
No disruptive user impact. The input still defaults to AMQP transport, and unless users switch to WS transport, the behavior is unchanged.
Author's Checklist
How to test this PR locally
I used the following Filebeat config:
Here are a couple of vscode configuration to test the WebSocket-only and WebSocket with HTTPS proxy scenarios (make sure to replace the placeholders
YOUR * GOES HEREwith actual values).WebSocket only
{ "version": "0.2.0", "configurations": [ { "name": "Launch Filebeat", "type": "go", "request": "launch", "mode": "auto", "program": "${workspaceFolder}/x-pack/filebeat/main.go", "args": [ "-e", "-v", "-d", "*", "--strict.perms=false", "--path.home", "${workspaceFolder}/x-pack/filebeat", "-E", "cloud.id=<YOUR CLOUD ID GOES HERE>", "-E", "cloud.auth=<YOUR USERNAME GOES HERE>:<YOUR PASSWORD GOES HERE>", "-E", "gc_percent=100", "-E", "setup.ilm.enabled=false", "-E", "setup.template.enabled=false", "-E", "output.elasticsearch.allow_older_versions=true" ], "env": { "EVENTHUB_NAME": "logs", "EVENTHUB_CONNECTION_STRING": "<YOUR EVENT HUB CONNECTION STRING GOES HERE>", "EVENTHUB_CONSUMER_GROUP": "$Default", "STORAGE_ACCOUNT": "<YOUR STORAGE ACCOUNT NAME GOES HERE>", "STORAGE_ACCOUNT_KEY": "<YOUR STORAGE ACCOUNT KEY GOES HERE>", "STORAGE_ACCOUNT_CONNECTION_STRING": "<YOUR STORAGE ACCOUNT CONNECTION STRING GOES HERE>", "PROCESSOR_VERSION": "v2", "MIGRATE_CHECKPOINT": "true", "TRANSPORT": "websocket" } } ] }WebSocket with HTTPS proxy
{ "version": "0.2.0", "configurations": [ { "name": "Launch Filebeat", "type": "go", "request": "launch", "mode": "auto", "program": "${workspaceFolder}/x-pack/filebeat/main.go", "args": [ "-e", "-v", "-d", "*", "--strict.perms=false", "--path.home", "${workspaceFolder}/x-pack/filebeat", "-E", "cloud.id=<YOUR CLOUD ID GOES HERE>", "-E", "cloud.auth=<YOUR USERNAME GOES HERE>:<YOUR PASSWORD GOES HERE>", "-E", "gc_percent=100", "-E", "setup.ilm.enabled=false", "-E", "setup.template.enabled=false", "-E", "output.elasticsearch.allow_older_versions=true" ], "env": { "EVENTHUB_NAME": "logs", "EVENTHUB_CONNECTION_STRING": "<YOUR EVENT HUB CONNECTION STRING GOES HERE>", "EVENTHUB_CONSUMER_GROUP": "$Default", "STORAGE_ACCOUNT": "<YOUR STORAGE ACCOUNT NAME GOES HERE>", "STORAGE_ACCOUNT_KEY": "<YOUR STORAGE ACCOUNT KEY GOES HERE>", "STORAGE_ACCOUNT_CONNECTION_STRING": "<YOUR STORAGE ACCOUNT CONNECTION STRING GOES HERE>", "PROCESSOR_VERSION": "v2", "MIGRATE_CHECKPOINT": "true", "TRANSPORT": "websocket", "HTTP_PROXY": "http://127.0.0.1:9090", "HTTPS_PROXY": "http://127.0.0.1:9090" } } ] }To test the proxy support, I used mitmproxy, an interactive HTTPS proxy with request inspection:
Since the Azure services require using an HTTPS proxy, you also need to set up a certificate for mitmproxy. See https://docs.mitmproxy.org/stable/concepts/certificates/ fore more details.
The mitmproxy main view:
Upgrade to AMQP-over-WebSocket:
WebSocket details:
Event hub messages received using AMQP-over-websocket through the proxy:
Related issues
Use cases
This is an automatic backport of pull request #47956 done by [Mergify](https://mergify.com).