Add Application privileges for ML to apm_user
#72260
Labels
blocker
:ml
regression
Team:APM
All issues that need APM UI Team support
Team:Security
Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
v7.9.0
APM has an integration with ML. In 7.8 and earlier this worked out of the box for users with the
apm_user
role because it was granted read access to.ml-anomalies*
:https://github.com/elastic/elasticsearch/blob/ea39a471a7a33eaaef667009d5c0c2b59b5c93d4/x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStore.java#L178-L186
In 7.9 it is no longer recommended to read directly from the
.ml-anomalies*
index and to retrieve ML data APM now uses the ML client which handles the ES querying with an internal user.To keep the out-of-the-box experience great, we should make sure that users with
apm_user
role can still read ML jobs and anomalies.Afaict we need to apply application privileges to ML. In this case "read" access. This can be done via the Security UI in Kibana:
How can this be added to the
apm_user
role by default?Would it be something like this?
The text was updated successfully, but these errors were encountered: