-
Notifications
You must be signed in to change notification settings - Fork 24.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Fleet] Add .fleet-secrets
system index
#95625
Conversation
Pinging @elastic/es-core-infra (Team:Core/Infra) |
Hi @hop-dev, I've created a changelog YAML for you. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've asked @williamrandolph to take a look, but in the meantime, I have one general thought. While I understand the note about the intention to use this index with enterprise search in the future, I think the name is too generic. It could easily be confused by developers as a general purpose index within Elasticsearch internals, such as .security. I think the name should be narrowed.
One idea is .external-secrets
. Another (and my preferred) is to use .fleet-secrets
here, and use another system index name for enterprise search. In any case, these are system indices, so the preferred approach is to wrap these indices with rest apis which have complete control over them. Then the particular index name matters even less.
+1 for |
.secrets
system index .fleet-secrets
system index
Hi @hop-dev, I've updated the changelog YAML for you. |
@hop-dev updated a few remaining occurrences of |
@juliaElastic Thanks for that! I have re-posted in |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Part of elastic/kibana#154715
Closes #95143
The .fleet-secrets index will contain agent policy secrets. An example of a secret is a password or API key. Kibana has write access only to the index, and fleet server has read access.
I have kept it in the fleet area as it is managed by us.