-
Notifications
You must be signed in to change notification settings - Fork 25k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding GET/PUT ILM cluster privileges to kibana_system
role
#49451
Conversation
Pinging @elastic/es-security (:Security/Authorization) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me, but I ultimately defer to @elastic/es-security. I don't know of a way to accomplish what @albertzaharovits suggested here...
Thanks for raising this @legrego ! We'll be discussing this at our next team meeting. I am particularly worried that the |
We've discussed and raised #50130 as a consequence. |
@pmuellr May I ask you to name the ILM policy and not change its name? We plan to introduce a new privilege so that |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, provided we'll have to revise this when we introduce a new privilege, possibly not before the next minor release.
Would it be ok if the policy had a known unchangeable prefix, but a customizable suffix? We'll need to support multi-tenant Kibana setups, so if users have multiple We do something similar today with the application privileges Kibana registers with Elasticsearch. |
Larry is correct - the name of the ES resources for the new event log are all prefixed with the "kibana index name" (default: My understanding is these multi-tenant scenarios require some amount of additional admin work by the customer to set up correctly - new roles need to be created, etc for the new "alternative" kibana indices. Adding some additional work by the customer to accommodate a new policy for the ILM bits seems like it would be ok. |
Customers are able to exploit the fact that |
@elasticmachine merge upstream |
@elasticmachine merge upstream |
…c#49451) Co-authored-by: Elastic Machine <[email protected]>
Resolves #46894
As outlined in #46894, the
kibana_system
role needs the ability to retrieve and create ILM policies. Additionally, it needs to be able to assign these policies to indices matching the.kibana*
pattern.Since
kibana_system
can already do everything against.kibana*
, the latter is already taken care of. This PR addresses the former by granting the appropriate cluster privileges to thekibana_system
role.