Skip to content

[APM] Add Kibana privileges to built-in user #57201

Open
@sorenlouv

Description

@sorenlouv

The built-in apm_user already has read access to the default apm indices (apm-*) by default:

.put("apm_user", new RoleDescriptor("apm_user",
null, new RoleDescriptor.IndicesPrivileges[] {
RoleDescriptor.IndicesPrivileges.builder().indices("apm-*")
.privileges("read", "view_index_metadata").build(),
RoleDescriptor.IndicesPrivileges.builder().indices(".ml-anomalies*")
.privileges("view_index_metadata", "read").build(),
}, null, MetadataUtils.DEFAULT_RESERVED_METADATA))

However, simply assigning the apm_user role to a user will not grant them access to use APM in Kibana. They'll still need application privileges for APM.

Suggestion
To improve the getting started experience I'm proposing that apm_user role should have read privileges to the APM feature in Kibana.

I'm thinking something like this:

new RoleDescriptor.ApplicationResourcePrivileges[] {
    RoleDescriptor.ApplicationResourcePrivileges.builder()
        .application("kibana-*").resources("*").privileges("feature_apm.read").build()
},

Metadata

Metadata

Assignees

No one assigned

    Labels

    Team:SecurityMeta label for security team

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions