-
Notifications
You must be signed in to change notification settings - Fork 25.6k
Open
Labels
Team:SecurityMeta label for security teamMeta label for security team
Description
The built-in apm_user already has read access to the default apm indices (apm-*) by default:
Lines 165 to 171 in dd4290b
| .put("apm_user", new RoleDescriptor("apm_user", | |
| null, new RoleDescriptor.IndicesPrivileges[] { | |
| RoleDescriptor.IndicesPrivileges.builder().indices("apm-*") | |
| .privileges("read", "view_index_metadata").build(), | |
| RoleDescriptor.IndicesPrivileges.builder().indices(".ml-anomalies*") | |
| .privileges("view_index_metadata", "read").build(), | |
| }, null, MetadataUtils.DEFAULT_RESERVED_METADATA)) |
However, simply assigning the apm_user role to a user will not grant them access to use APM in Kibana. They'll still need application privileges for APM.
Suggestion
To improve the getting started experience I'm proposing that apm_user role should have read privileges to the APM feature in Kibana.
I'm thinking something like this:
new RoleDescriptor.ApplicationResourcePrivileges[] {
RoleDescriptor.ApplicationResourcePrivileges.builder()
.application("kibana-*").resources("*").privileges("feature_apm.read").build()
},Metadata
Metadata
Assignees
Labels
Team:SecurityMeta label for security teamMeta label for security team