-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(slo): general enhancement #164723
chore(slo): general enhancement #164723
Conversation
🤖 GitHub commentsExpand to view the GitHub comments
Just comment with:
|
Pinging @elastic/actionable-observability (Team: Actionable Observability) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM (thanks for getting the import/export change in)
@@ -11,7 +11,7 @@ export const getSLOSummarySettingsTemplate = (name: string) => ({ | |||
name, | |||
template: { | |||
settings: { | |||
auto_expand_replicas: '0-all', | |||
auto_expand_replicas: '0-1', |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
@@ -57,7 +57,7 @@ export const slo: SavedObjectsType = { | |||
}, | |||
management: { | |||
displayName: 'SLO', | |||
importableAndExportable: true, | |||
importableAndExportable: false, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
👋🏻 I have a drive-by request for another 1-liner fix to this great feature if possible! |
Including this fix :) Thanks |
💚 Build Succeeded
Metrics [docs]Public APIs missing comments
Async chunks
Page load bundle
History
To update your PR or re-run it, just comment with: cc @kdelemme |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I tested this with a read only role and a write only role for SLOs with the minimums outlined in this PR. LGTM!
💚 All backports created successfully
Note: Successful backport PRs will be merged automatically after passing CI. Questions ?Please refer to the Backport tool documentation |
(cherry picked from commit 733869e)
# Backport This will backport the following commits from `main` to `8.10`: - [chore(slo): general enhancement (#164723)](#164723) <!--- Backport version: 8.9.7 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) <!--BACKPORT [{"author":{"name":"Kevin Delemme","email":"[email protected]"},"sourceCommit":{"committedDate":"2023-08-28T18:50:38Z","message":"chore(slo): general enhancement (#164723)","sha":"733869e9e5774c4813126c80e8c00532ba8659ed","branchLabelMapping":{"^v8.11.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["backport","release_note:skip","Team: Actionable Observability","v8.10.0","v8.11.0"],"number":164723,"url":"https://github.com/elastic/kibana/pull/164723","mergeCommit":{"message":"chore(slo): general enhancement (#164723)","sha":"733869e9e5774c4813126c80e8c00532ba8659ed"}},"sourceBranch":"main","suggestedTargetBranches":["8.10"],"targetPullRequestStates":[{"branch":"8.10","label":"v8.10.0","labelRegex":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v8.11.0","labelRegex":"^v8.11.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/164723","number":164723,"mergeCommit":{"message":"chore(slo): general enhancement (#164723)","sha":"733869e9e5774c4813126c80e8c00532ba8659ed"}}]}] BACKPORT--> Co-authored-by: Kevin Delemme <[email protected]>
* main: (40 commits) Adjust migrations and elasticsearch service settings for serverless. (elastic#165050) [Security Solution] expandable flyout - add investigate in timeline f… (elastic#165025) [SecuritySolution] Hide create dashboard button from listing (elastic#164476) Construct HTTP log message only if needed (elastic#165057) [Security Solution] expandable flyout - add no data message in entities details and entities overview components (elastic#164955) Add functional tests for serverless security management UIs (elastic#164886) [api-docs] 2023-08-29 Daily api_docs build (elastic#165056) [Cloud Security][CIS GCP]cis gcp now use updated gcp field name + small last minute changes (elastic#164792) [Security Solution] Expandable flyout - update risk classification ui in entities overview (elastic#165022) [Security Solution] Fixes Preconfigured Connectors not working with Assistant (elastic#164900) [Security Solution] Coverage Overview follow-up 2 (elastic#164986) [DOCS] Add cross-link for other encryption key settings (elastic#165014) chore(slo): general enhancement (elastic#164723) Revert "[SOR] Allow optionally downgrading documents with a higher version model in API READ methods" (elastic#164991) [OAS] Add more Elasticsearch query rule examples (elastic#164386) [security_solution_cypress] Add support for options in EsArchiver.load (elastic#164988) [Event Log] Skip setting assets to hidden in serverless (elastic#164767) remove unneeded usages of isErrorResponse (elastic#164609) [Enterprise Search] Make network drive connector platinum (elastic#165007) [RAM] update api key to become public (elastic#164883) ...
/oblt-deploy-serverless |
Resolves #164724
Resolves https://github.com/elastic/actionable-observability/issues/127
Resolves #164184
Resolves #163943
Resolves #164780
Summary
This PR enhances a few things:
0-1
instead of0-all
404
when calling/internal/data_views/_fields_for_wildcard
#163943Since we use the internal es client to create the index templates, index pipelines, and indices, we do not require these cluster permissions to be set on the user’s role:
manage_ilm, manage_index_templates, manage_index_pipelines
anymore.Therefore when the diagnosis API is trying to fetch the index template, pipelines, etc.. to check their existence, it fails with insufficient privileges. I want to avoid having to require these privileges, especially for “read only” user.
So I have removed this kind of check, and only use the security
hasPrivileges
function to check two set of permission:.slo-*
indexall
privilege..slo-*
indexread
privilege.Overall the new set of permission required to use the SLO features is as follow:
For a user that creates/edits/manages SLOs:
manage_transform
privilege.slo-*
->all
(+read
andview_index_metadata
on any indices we want to create SLO upon)Observability > SLO
>All
(on all spaces or a specific one)For a user that read SLOs only:
none
.slo-*
->read
Observability > SLO
>Read
(on all spaces or a specific one)