Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Granting kibana_system reserved role access to "all" privileges to .internal.alerts* index #76624

Merged
merged 1 commit into from
Aug 18, 2021

Conversation

banderror
Copy link
Contributor

@banderror banderror commented Aug 17, 2021

Parent ticket: elastic/kibana#101016
Related to: #72181

Summary

Similar to the previous PR (#72181), we'd like to add privileges to a new set of indices to the kibana_system role.

The reason for that is we need to have different naming schemes for alerts-as-data index aliases and backing indices pointing to these aliases, which in turn is needed to support backwards compatibility, migrations and reindexing in the future.

We didn't want to prefix the backing indices with .kibana-, so we're adding a new .internal.alerts prefix. Prefixing with .kibana- would make them system indices, which means they would not be supposed to be read by end users, which is not what we want.

.internal could become a universal prefix for hidden Kibana indices, but at this point I don't feel confident enough to generalise prematurely.

@banderror banderror added >enhancement :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC v8.0.0 Team:Security Meta label for security team external-contributor Pull request authored by a developer outside the Elasticsearch team v7.15.0 labels Aug 17, 2021
@banderror banderror self-assigned this Aug 17, 2021
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security (Team:Security)

@kobelb
Copy link
Contributor

kobelb commented Aug 17, 2021

@elastic/kibana-security do any of you want to review this PR as well?

@kobelb kobelb requested a review from a team August 17, 2021 19:41
@@ -404,15 +405,20 @@ public static RoleDescriptor kibanaSystemRoleDescriptor(String name) {
RoleDescriptor.IndicesPrivileges.builder()
.indices(".fleet*")
.privileges("all").build(),
// Legacy "Alerts as data" index. Kibana user will create this index.
// Kibana user will read / write to these indices
// Legacy "Alerts as data" used in Security Solution.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nit: "Alerts as data" indices used in Security Solution.

@banderror banderror added the auto-backport Automatically create backport pull requests when merged label Aug 17, 2021
Copy link
Member

@ywangd ywangd left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@spong spong merged commit 87ca6fa into elastic:master Aug 18, 2021
spong pushed a commit to spong/elasticsearch that referenced this pull request Aug 18, 2021
…ernal.alerts* (elastic#76624)

**Parent ticket:** elastic/kibana#101016
**Related to:** elastic#72181

## Summary

Similar to the previous PR (elastic#72181), we'd like to add privileges to a new set of indices to the `kibana_system` role.

The reason for that is we need to have different naming schemes for alerts-as-data index aliases and backing indices pointing to these aliases, which in turn is needed to support backwards compatibility, migrations and reindexing in the future.

We didn't want to prefix the backing indices with `.kibana-`, so we're adding a new `.internal.alerts` prefix. Prefixing with `.kibana-` would make them system indices, which means they would not be supposed to be read by end users, which is not what we want.

`.internal` could become a universal prefix for hidden Kibana indices, but at this point I don't feel confident enough to generalise prematurely.
elasticsearchmachine pushed a commit that referenced this pull request Aug 18, 2021
…ernal.alerts* (#76624) (#76635)

**Parent ticket:** elastic/kibana#101016
**Related to:** #72181

## Summary

Similar to the previous PR (#72181), we'd like to add privileges to a new set of indices to the `kibana_system` role.

The reason for that is we need to have different naming schemes for alerts-as-data index aliases and backing indices pointing to these aliases, which in turn is needed to support backwards compatibility, migrations and reindexing in the future.

We didn't want to prefix the backing indices with `.kibana-`, so we're adding a new `.internal.alerts` prefix. Prefixing with `.kibana-` would make them system indices, which means they would not be supposed to be read by end users, which is not what we want.

`.internal` could become a universal prefix for hidden Kibana indices, but at this point I don't feel confident enough to generalise prematurely.

Co-authored-by: Georgii Gorbachev <banderror@gmail.com>
@banderror banderror deleted the alerts-as-data-backing-indices branch August 18, 2021 09:53
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auto-backport Automatically create backport pull requests when merged >enhancement external-contributor Pull request authored by a developer outside the Elasticsearch team :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team v7.15.0 v8.0.0-alpha2
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants