-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Introduce telemetry for security features #74530
Conversation
@elastic/kibana-telemetry this PR adds new telemetry fields, but I never ran the script to update the JSON mappings. Should the Schema telemetry check have failed this build? Edit: I added the mappings. The original commit built via https://kibana-ci.elastic.co/job/elastic+kibana+pipeline-pull-request/66908/ passed without updating the mappings |
@@ -13,6 +13,19 @@ | |||
} | |||
} | |||
}, | |||
"search": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not changed as part of this PR, but the script to update the telemetry schema picked this up as something that was already missing.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@Bamieh do you know why this could have happened?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@Bamieh poke 😄
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
sorry for being dormant. I think it's already been merged to master and we've reviewed to the telemetry_check
script to make sure it fails if the JSON file is not up-to-date (if you rebase, it should be all good)
9fd1ddc
to
e078af5
Compare
Pinging @elastic/kibana-security (Team:Security) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! Just added one tiny NIT.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some nits/questions in the comments below. In addition, some higher-level questions on our approach:
-
Will we ever want to ask the question "how many of each auth provider type is enabled?" Currently, the schema doesn't tell us for instance that 2
saml
providers and 1basic
provider is enabled. It will just tell us thatsaml
andbasic
are each enabled, with 3 providers total. -
Will we ever want to ask the question "how many of our users who can enable audit logging have it enabled?" Right now the implementation will just tell us that they don't have it enabled if ES Security is disabled and/or if the license level is < Gold. (should we also be tracking
allowRbac
,allowAccessAgreement
, andallowAuditLogging
?)
x-pack/plugins/security/server/usage_collector/security_usage_collector.test.ts
Outdated
Show resolved
Hide resolved
x-pack/plugins/security/server/usage_collector/security_usage_collector.test.ts
Outdated
Show resolved
Hide resolved
x-pack/plugins/security/server/usage_collector/security_usage_collector.test.ts
Outdated
Show resolved
Hide resolved
These are exactly the types of questions I was hoping to have a discussion on before getting this ready for review 😄
I did consider this, but didn't see a huge benefit to collecting this information. Happy to revisit this decision if we think it's worthwhile though.
Elasticsearch exposes |
OK! I only asked because it would probably involve a schema change, not just an addition. I don't feel strongly either way.
I'm not super familiar with the telemetry, kinda figured this might be the case but wanted to ask to be sure. Good enough for me! |
…collector.test.ts Co-authored-by: Joe Portner <5295965+jportner@users.noreply.github.com>
💚 Build SucceededBuild metricspage load bundle size
distributable file count
History
To update your PR or re-run it, just comment with: |
@jportner this is ready for the next review round |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code review only of changes since my last review--
LGTM!
@afharo Perhaps a silly question, but I'll ask it to be certain: Will this require updates to the Telemetry cluster mappings? |
@mindbat yes, it does. It'll report the data in the same format as specified in |
@afharo Gotcha, thanks for clarifying! @legrego In order for these fields to be visible in the Telemetry cluster, we'll need to update the mappings under which this data gets indexed once its received. Would you mind opening an issue in the infra repo for making those updates? |
@mindbat will do. I was under the impression that the schema in edit: done in https://github.com/elastic/infra/issues/23346 |
Pinging @elastic/kibana-core (Team:Core) |
Summary
Adds telemetry for Kibana's stack security features. Specifically, this introduces the following fields under a new
security
section:Resolves #50815
Resolves #67747