Skip to content

Block developers from running Kibana as superuser #45973

@kobelb

Description

@kobelb

It's historically been quite common for developers to run the Kibana server as the elastic user. This practice ignores any issues with the kibana_system reserved role not having the necessary privileges in Elasticsearch, and has caused us to catch these issues incredibly late and have to rush in a fix.

Telling developers they shouldn't be doing this hasn't worked, so we should consider taking a more aggressive approach. The most obvious solution is to prevent the use of elasticsearch.username: elastic when in dev-mode. However, I'm open to alternatives.

Metadata

Metadata

Assignees

Labels

Team:SecurityPlatform Security: Auth, Users, Roles, Spaces, Audit Logging, etc t//chore

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions