Skip to content

Conversation

@chrisronline
Copy link
Contributor

Resolves elastic/kibana#47859

We added a new call in the Stack Monitoring UI that requires this cluster privilege.

To test, create a user with the minimum permissions (roles=[kibana_user, monitoring_user]) and ensure you can access the Stack Monitoring UI in Kibana

@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-core-features (:Core/Features/Monitoring)

@chrisronline chrisronline requested review from cachedout and igoristic and removed request for ycombinator October 10, 2019 16:20
@pickypg pickypg added the >bug label Oct 10, 2019
@pickypg
Copy link
Member

pickypg commented Oct 10, 2019

For anyone that runs into this issue, there is a workaround for those running 7.4.0 in the short term by creating a temporary, custom role:

PUT /_security/role/fix_monitoring_user
{
  "cluster": [
    "cluster:monitor/remote/info"
  ]
}

then adding it to your monitoring user (the key is the extra role):

PUT /_security/user/my_monitoring_user
{
  "username": "my_monitoring_user",
  "roles": [
    "kibana_user",
    "monitoring_user",
    "fix_monitoring_user"
  ],
  "enabled": true,
  "full_name": "My Monitoring User",
  "email": "[email protected]"
}

Note: this implies a user update, since there's no password.

@cachedout
Copy link
Contributor

Based on my recent experience in opening a PR against these files, I think this may need to be reviewed by @elastic/es-security

Copy link

@igoristic igoristic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Works as expected 🥇

Copy link
Member

@pickypg pickypg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Member

@pickypg pickypg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

I'm not sure how the ES team feels about mixing the constants with the static references, so I'll leave that for them to make a final ruling on.

@chrisronline
Copy link
Contributor Author

chrisronline commented Oct 10, 2019

There is precedent for doing this right now

EDIT: updated link

@tvernum tvernum self-requested a review October 11, 2019 02:08
@tvernum tvernum added :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC and removed :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC labels Oct 11, 2019
chrisronline added a commit to chrisronline/elasticsearch that referenced this pull request Oct 11, 2019
…nitoring ui (elastic#47871)

* Add new cluster privilege now necessary for the stack monitoring ui

* PR feedback, and add test
chrisronline added a commit that referenced this pull request Oct 11, 2019
…nitoring ui (#47871) (#47916)

* Add new cluster privilege now necessary for the stack monitoring ui

* PR feedback, and add test
chrisronline added a commit that referenced this pull request Oct 11, 2019
…nitoring ui (#47871) (#47915)

* Add new cluster privilege now necessary for the stack monitoring ui

* PR feedback, and add test
@chrisronline
Copy link
Contributor Author

Backport:

7.4: 1571527
7.x: c57191b

howardhuanghua pushed a commit to TencentCloudES/elasticsearch that referenced this pull request Oct 14, 2019
…nitoring ui (elastic#47871)

* Add new cluster privilege now necessary for the stack monitoring ui

* PR feedback, and add test
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Monitoring] The default monitoring_user role is not able to view monitoring

7 participants