-
Notifications
You must be signed in to change notification settings - Fork 8.5k
Closed
Labels
Team:SecurityPlatform Security: Auth, Users, Roles, Spaces, Audit Logging, etc t//Platform Security: Auth, Users, Roles, Spaces, Audit Logging, etc t//chore
Description
It's historically been quite common for developers to run the Kibana server as the elastic user. This practice ignores any issues with the kibana_system reserved role not having the necessary privileges in Elasticsearch, and has caused us to catch these issues incredibly late and have to rush in a fix.
Telling developers they shouldn't be doing this hasn't worked, so we should consider taking a more aggressive approach. The most obvious solution is to prevent the use of elasticsearch.username: elastic when in dev-mode. However, I'm open to alternatives.
legrego and azasypkin
Metadata
Metadata
Assignees
Labels
Team:SecurityPlatform Security: Auth, Users, Roles, Spaces, Audit Logging, etc t//Platform Security: Auth, Users, Roles, Spaces, Audit Logging, etc t//chore