Skip to content

Conversation

@BigPandaToo
Copy link
Contributor

Adds a kibana-system service account, with the same privileges as the kibana_system reserved user

Copy link
Member

@legrego legrego left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tested locally (draft PR: elastic/kibana#102121), and this seems to be working well for us!

// To cancel tasks and delete async searches
"cancel_task"
},
new RoleDescriptor.IndicesPrivileges[] {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

question is there a way to share this role descriptor with the one used to define the kibana_system reserved role, so that we have a single source of truth for our necessary privileges?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Glad to hear the news!
We'll push for a single source of truth for the reserved role and the service account, I don't think there's any issue preventing this.

@jkakavas
Copy link
Contributor

Closing this in favor of #76370

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants