-
Notifications
You must be signed in to change notification settings - Fork 24.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Granting kibana_system reserved role access to "all" privileges to .internal.alerts* index #76624
Granting kibana_system reserved role access to "all" privileges to .internal.alerts* index #76624
Conversation
Pinging @elastic/es-security (Team:Security) |
@elastic/kibana-security do any of you want to review this PR as well? |
@@ -404,15 +405,20 @@ public static RoleDescriptor kibanaSystemRoleDescriptor(String name) { | |||
RoleDescriptor.IndicesPrivileges.builder() | |||
.indices(".fleet*") | |||
.privileges("all").build(), | |||
// Legacy "Alerts as data" index. Kibana user will create this index. | |||
// Kibana user will read / write to these indices | |||
// Legacy "Alerts as data" used in Security Solution. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nit: "Alerts as data"
indices used in Security Solution.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
…ernal.alerts* (elastic#76624) **Parent ticket:** elastic/kibana#101016 **Related to:** elastic#72181 ## Summary Similar to the previous PR (elastic#72181), we'd like to add privileges to a new set of indices to the `kibana_system` role. The reason for that is we need to have different naming schemes for alerts-as-data index aliases and backing indices pointing to these aliases, which in turn is needed to support backwards compatibility, migrations and reindexing in the future. We didn't want to prefix the backing indices with `.kibana-`, so we're adding a new `.internal.alerts` prefix. Prefixing with `.kibana-` would make them system indices, which means they would not be supposed to be read by end users, which is not what we want. `.internal` could become a universal prefix for hidden Kibana indices, but at this point I don't feel confident enough to generalise prematurely.
…ernal.alerts* (#76624) (#76635) **Parent ticket:** elastic/kibana#101016 **Related to:** #72181 ## Summary Similar to the previous PR (#72181), we'd like to add privileges to a new set of indices to the `kibana_system` role. The reason for that is we need to have different naming schemes for alerts-as-data index aliases and backing indices pointing to these aliases, which in turn is needed to support backwards compatibility, migrations and reindexing in the future. We didn't want to prefix the backing indices with `.kibana-`, so we're adding a new `.internal.alerts` prefix. Prefixing with `.kibana-` would make them system indices, which means they would not be supposed to be read by end users, which is not what we want. `.internal` could become a universal prefix for hidden Kibana indices, but at this point I don't feel confident enough to generalise prematurely. Co-authored-by: Georgii Gorbachev <banderror@gmail.com>
Parent ticket: elastic/kibana#101016
Related to: #72181
Summary
Similar to the previous PR (#72181), we'd like to add privileges to a new set of indices to the
kibana_system
role.The reason for that is we need to have different naming schemes for alerts-as-data index aliases and backing indices pointing to these aliases, which in turn is needed to support backwards compatibility, migrations and reindexing in the future.
We didn't want to prefix the backing indices with
.kibana-
, so we're adding a new.internal.alerts
prefix. Prefixing with.kibana-
would make them system indices, which means they would not be supposed to be read by end users, which is not what we want..internal
could become a universal prefix for hidden Kibana indices, but at this point I don't feel confident enough to generalise prematurely.