Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bootstrapping of Elastic indices for Fleet / Fleet-Server, Phase 1 #51

Closed
ruflin opened this issue Jan 6, 2021 · 5 comments
Closed
Assignees

Comments

@ruflin
Copy link
Contributor

ruflin commented Jan 6, 2021

Currently the bootstrapping of the fleet-server indices happens in fleet-server. This issue is to come to a conclusion on where the bootstrapping should happen (fleet-server, Elasticsearch, Kibana) for the first phase.

Related issues / PRs:

@aleksmaus
Copy link
Member

Adding @nchaulet since probably he might end up handling that on Kibana side for the beta release upon the fleet enabling in the Kibana UI.

@scunningham
Copy link

@ruflin Objections to pushing this code into Kibana and dropping packages? The packages don't seem to be buying us much here. They are particularly problematic during upgrade scenarios, as it requires direct user interaction with privs to install the new packages. So you end up in scenarios where Kibana is upgraded, but the Fleet code in Kibana cannot behave properly because it is dependent a package that is yet to, if ever, be installed.

Ideally, Kibana would pin, ship, and install dependent package on upgrade. To my understanding, we are not there yet.

@scunningham
Copy link

To wit, we have the following dependencies:

mapping templates
ilm policy

those should be installed before creating the indices.

Looking into how system indices might help alleviate this issue. It's not clear that ILM policy is related to system indices.

@ruflin
Copy link
Contributor Author

ruflin commented Jan 28, 2021

@scunningham No objections to drop the package idea. The issue that will stay is around index template setup and permissions, would be good to solve it in ES for now.

nchaulet added a commit to elastic/elasticsearch that referenced this issue Feb 5, 2021
Add "all" permission to Fleet Server indices (.fleet*) to kibana_system role

We recently added the permissions for the Kibana to read and read to .fleet-* we decided that Kibana will also create these indexes so we need more permissions to do so.

Related to elastic/fleet-server#51
@ruflin ruflin mentioned this issue Feb 16, 2021
20 tasks
@ruflin
Copy link
Contributor Author

ruflin commented Feb 17, 2021

Closing this issue as elastic/kibana#91543 got merged. @nchaulet Please let me know if there are parts missing for Phase 1.

@ruflin ruflin closed this as completed Feb 17, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants