-
Notifications
You must be signed in to change notification settings - Fork 25.6k
Give the kibana system user permission to read security entities #114363
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
@hop-dev please enable the option "Allow edits and access to secrets by maintainers" on your PR. For more information, see the documentation. |
|
Pinging @elastic/es-core-infra (Team:Core/Infra) |
|
Hi @hop-dev, I've created a changelog YAML for you. |
|
@elasticsearchmachine merge upstream |
|
@elasticmachine merge upstream |
|
Oops this was unintended, apologies. |
|
Hey @hop-dev, Would you mind updating PR description with more details about the requirements behind this change?
The more details, the better. Thanks! |
|
@azasypkin I've updated the description, let me know if you need any more info. |
|
@elasticmachine merge upstream |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@azasypkin I've updated the description, let me know if you need any more info.
That’s super helpful, @hop-dev, thanks! One last question - are these indices created with hidden: true?
|
@azasypkin they currently are not, but I have been thinking we should hide them because of the dot prefix, why do you ask? |
Yeah, if we don’t want users to interact with these indices directly, then making them hidden or even system indices (depends on your requirements, a bit more involved, but much safer, see elasticsearch/modules/kibana/src/main/java/org/elasticsearch/kibana/KibanaPlugin.java Lines 25 to 53 in 430ec3b
elasticsearch/x-pack/plugin/fleet/src/main/java/org/elasticsearch/xpack/fleet/Fleet.java Lines 284 to 292 in 430ec3b
|
|
Really appreciate the guidance, I'll look into it 👍 |
💚 All backports created successfully
Questions ?Please refer to the Backport tool documentation |
…stic#114363) * Give the kibana system user .entities read permissions * Update docs/changelog/114363.yaml --------- Co-authored-by: Elastic Machine <[email protected]>
…4363) (#114520) * Give the kibana system user .entities read permissions * Update docs/changelog/114363.yaml --------- Co-authored-by: Elastic Machine <[email protected]> (cherry picked from commit cbd3613) # Conflicts: # x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java Co-authored-by: Elastic Machine <[email protected]>
…stic#114363) * Give the kibana system user .entities read permissions * Update docs/changelog/114363.yaml --------- Co-authored-by: Elastic Machine <[email protected]>
As part of the entity store feature we need the Kibana system user to be able to read entity store entities.
What is the entity store?
The entity store is a new security feature which extracts entities (hosts & users) from logs and metrics data.
The documents in the
.entities.v1.latest.security*index each represent an entity extracted from event data, properties are added as we see them over time, for example for a host we store ip, mac, and OS information, for a user we store things like email, name, roles.Why does Kibana system need read access?
Primarily in 8.16.0 we need read access in order to execute an enrich policy on a regular basis as part of our architecture.
But going forward we will be building experiences on top of the entities index, for example the Kibana system user will read the entities index in order to perform risk scoring on the entities.