-
Notifications
You must be signed in to change notification settings - Fork 75
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Change Proposal] Add support for specifying cluster privileges #224
Comments
There is an in-flight spec proposal that, among other things, adds spec for a top-level
Yes, we will need to update Fleet's code to read from the new output_permissions:
default:
apm-1:
+ cluster:
+ - monitor/main
indices:
- names:
- metrics-apm.app.*-default
privileges:
- auto_configure
- create_doc
- names:
- logs-apm.error-default
privileges:
- auto_configure
- create_doc I believe no changes are required on Fleet Server or Elastic Agent because we already send cluster privileges for agent monitoring permissions. @hop-dev, cc'ing you for awareness as you originally implemented the Fleet changes for the data stream privileges (elastic/kibana#112397). Will probably need your help in implementing this change if the proposal is approved :) |
We have a similar section in data stream manifests:
Maybe it would be good enough to keep it in the package manifest? cc @ruflin |
@jen-huang assuming this goes through, would you have bandwidth to get the necessary changes in on the kibana side by FF on oct 19? |
Package manifest sounds like a good place for me as it seems it does not tie into a specific data stream. |
It will be tight but yes, I believe so. |
I'm going to go ahead and call this "accepted". I'll create implementation issues and then move forward from there. |
Closing this as it seems it was already implemented in #226. Please reopen if there was anything pending to do. |
This proposal is a continuation of work that was initially begun with #203.
In that issue it was decided to add
elasticsearch.privileges.indices
, but not specifically cluster privileges.As was recently surfaced in elastic/elastic-agent#145, access to specific cluster privileges are required for apm-server's stack monitoring ui to correctly while while being managed by elastic-agent.
The specific problem is that the
cluster:monitor/main
privilege is required.I could use some additional insight from others on the specifics of how to achieve this. Assuming this is approved, I have a few questions:
However it ends up being structured, I think the original proposal's core looks like a good start:
The text was updated successfully, but these errors were encountered: