Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Management - Cluster vs Global Kibana vs Space #37283

Open
kobelb opened this issue May 28, 2019 · 3 comments
Open

Management - Cluster vs Global Kibana vs Space #37283

kobelb opened this issue May 28, 2019 · 3 comments
Labels
enhancement New value added to drive a business result Feature:Kibana Management Feature label for Data Views, Advanced Setting, Saved Object management pages Feature:Security/Spaces Platform Security - Spaces feature Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! unified-security-painpoint Highlights issues that are painpoints as a result of the lack of a unified security model

Comments

@kobelb
Copy link
Contributor

kobelb commented May 28, 2019

Currently, the management application in Kibana has a number of different management sections.

Screen Shot 2019-05-28 at 2 24 09 PM

They're currently all in a flat list; however, each of them has a different "scope".

  1. Cluster: these sections apply to the entire Elasticsearch cluster
  2. Global Kibana: these sections apply to the entire tenant/instance of Kibana. Most users only use a single tenant/instance of Kibana, but it's possible to create a different tenant/instance by changing the kibana.index in the kibana.yml to create separate tenants
  3. Space specific: these sections only apply to the currently selected space

I'm not certain whether it'd be beneficial to differentiate as much between cluster and global-kibana, as much as it is beneficial to differentiate between space specific and cluster/global-kibana.

We'd like to find a way to expose this "scope" on the management screen. The following sections have the specified scope:

Cluster

  • Elasticsearch
    • Index Management
    • Index Lifecycle Policies
    • Rollup Jobs
    • Cross-Cluster Replication
    • Remote Clusters
    • Watcher
    • Snapshot Repositories
    • License Management
    • 9.0 Upgrade Assistant
  • Logstash
    • Pipelines
  • Beats
    • Central Management
  • Security
    • Users
    • Roles

Global Kibana

  • Kibana
    • Spaces
    • Reporting

Space specific

  • Kibana
    • Index Patterns
    • Saved Objects
    • Advanced Settings
@kobelb kobelb added the Feature:Security/Spaces Platform Security - Spaces feature label May 28, 2019
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security

@kobelb kobelb added the Feature:Kibana Management Feature label for Data Views, Advanced Setting, Saved Object management pages label May 28, 2019
@kobelb
Copy link
Contributor Author

kobelb commented May 28, 2019

/cc @cchaos

@kobelb kobelb added the enhancement New value added to drive a business result label May 28, 2019
@cchaos cchaos added the Team:Platform-Design Team Label for Kibana Design Team. Support the Analyze group of plugins. label May 28, 2019
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-design

@kobelb kobelb added Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! and removed Team:Platform-Design Team Label for Kibana Design Team. Support the Analyze group of plugins. labels Jun 19, 2019
@legrego legrego added the unified-security-painpoint Highlights issues that are painpoints as a result of the lack of a unified security model label Jul 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New value added to drive a business result Feature:Kibana Management Feature label for Data Views, Advanced Setting, Saved Object management pages Feature:Security/Spaces Platform Security - Spaces feature Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! unified-security-painpoint Highlights issues that are painpoints as a result of the lack of a unified security model
Projects
None yet
Development

No branches or pull requests

4 participants