I suspect you are not using the ROR Kibana plugin (PRO/Enterprise) and you are facing that old (but still valid) Kibana issue where some request don’t carry the Authorization header.
If this is the case, I provided explanation and a workaround in this thread:
Not really, ROR PRO/Enterprise Kibana plugin always require an identity for the current user. The only way to skip the login is to have the (default) identity injected via x-forwarded-for header, or JWT. Read about this in the docs
We have seen client response time increased after installing ROR plugin in elastic search 6.2.1. It’s 3x increase. I installed it on all 3 nodes in our 3 node dev cluster. All of them are master eligible, data and client nodes. Generally what is the recommendation for plugin and ACL rules? Does it need to be only on master? Please help.
it’s not normal to have significant a performance hit with ROR. Are you calling external auth systems? How long is your ACL?
You should install ROR as a stateless security “filter” only in the ES nodes that receive HTTP connections, which - unless your deployment is really simplistic - are not the same node which have data and are master eligible.