-
Notifications
You must be signed in to change notification settings - Fork 81
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make Fleet spaces aware #2075
Comments
Great post here, the RBAC for Fleet is greatly needed! There is typically a great divide between Server admins and Endpoint Admins so each should be able to maintain and manage their own without the other interfering. It will be much more practical then creating separate clusters to handle this type of requirement. |
Should a new issue be created for Role Based Access Control for Fleet? Or this one renamed to better align with the actual need here for logically separating access to Fleet components (integrations, policies, agents, etc..). |
@nicpenning I don't think a new issue is needed as it will greatly overlap with the intent of this one. |
Looking for an update here on RBAC for Fleet. Is this in the works? Being tracked elsewhere? |
@jamiehynds |
My sysadmin colleagues are asking for this feature more, than ever. They want to control the updates of the Agents themself. |
@zez3 and @nicpenning we are working on making Fleet space aware, this is one of the higher priority features under consideration at the moment. A question for you on this topic: I'm somewhat familiar with each of your environments. If fleet was made to be space aware, how should we treat the Fleet-->Settings tab in your opinion? changes here are global and would affect all the users on the platform. Would you consider an admin (super user role type) to be the persona that has read/write access to these global settings tab and the only role that could add outputs, modify fleet-server settings and add proxies? Other roles (in the context of their own space) could then modify their agent policy to use global settings such as a new output created. |
I can see where Fleet Settings would simply be disabled/hidden for users that don't have the super user or appropriate user access to perform fleet setting changes. Also, I think it's okay that ingest pipelines and data streams need not be space aware, I can't think of any use case where that would be needed. The biggest thing right now is server admins managing server agents vs endpoint admins managing endpoint agents and SOC managing all, some or none of those and other key agents. Doing this via spaces seems logical as they would have their own view of what can be managed. |
@nimarezainia |
There was this discussion here:
https://discuss.elastic.co/t/elastic-agent-fleet/254691
Also my other issue elastic/kibana#132559 that I suppose it can be moved or closed as long as this one will get a team assigned
and an Internal ER number 17456
The text was updated successfully, but these errors were encountered: