Skip to content

Conversation

@hop-dev
Copy link
Contributor

@hop-dev hop-dev commented Feb 27, 2025

We are building privileged user monitoring for Kibana, as part of that we will have the .entity_analytics.monitoring.users and .entity_analytics.monitoring.groups indices. Down the line there will be more entity_analytics indices so we want to give Kibana access to these in the future

What will these indices contain?

.entity_analytics.monitoring.users

ECS formatted users to monitor, this index will be read by a kibana task which performs the monitroing.

.entity_analytics.monitoring.groups

Semi-ECS formatted user groups which are considered to give the user elevated rights, groups have a name and an index pattern to allow the user to specify which indices the group appears in.

How will Kibana use these indices?

  • reading - when performing monitoring activity
  • writing, deleting, updating - we have an index sync feature where a user will specify an index containing privileged users or groups and we will periodically sync that index with our own index, during this sync kibana will create, update and delete docs in the indices.

@hop-dev hop-dev added >enhancement :Core/Infra/Core Core issues without another label Team:Core/Infra Meta label for core/infra team v9.1.0 labels Feb 27, 2025
@hop-dev hop-dev self-assigned this Feb 27, 2025
@hop-dev hop-dev requested a review from a team as a code owner February 27, 2025 10:29
@elasticsearchmachine
Copy link
Collaborator

@hop-dev please enable the option "Allow edits and access to secrets by maintainers" on your PR. For more information, see the documentation.

@elasticsearchmachine
Copy link
Collaborator

Pinging @elastic/es-core-infra (Team:Core/Infra)

@elasticsearchmachine elasticsearchmachine added the external-contributor Pull request authored by a developer outside the Elasticsearch team label Feb 27, 2025
@elasticsearchmachine
Copy link
Collaborator

Hi @hop-dev, I've created a changelog YAML for you.

.build(),
// security entity analytics indices
RoleDescriptor.IndicesPrivileges.builder().indices("risk-score.risk-*").privileges("all").build(),
RoleDescriptor.IndicesPrivileges.builder().indices("entity_analytics.*").privileges("all").build(),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Question: From the description, it seems like kibana_system only needs read permissions. Is that correct?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@SiddharthMantri sorry about the delay, I have added a section to the description about our need for full CRUD

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@hop-dev Sweet, thank you!

@hop-dev hop-dev requested a review from SiddharthMantri March 7, 2025 13:31
@hop-dev hop-dev merged commit a5f186b into main Mar 10, 2025
18 checks passed
@hop-dev hop-dev deleted the entity_analytics_permissions branch March 10, 2025 10:57
georgewallace pushed a commit to georgewallace/elasticsearch that referenced this pull request Mar 11, 2025
jfreden pushed a commit to jfreden/elasticsearch that referenced this pull request Mar 13, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

:Core/Infra/Core Core issues without another label >enhancement external-contributor Pull request authored by a developer outside the Elasticsearch team Team:Core/Infra Meta label for core/infra team v9.1.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants