-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix and unskip functional test #96004
Conversation
Thank you @jportner, I'll merge upstream once https://kibana-ci.elastic.co/job/elasticsearch+snapshots+verify/2536/ is done and we can test this against the new snapshot |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@elasticmachine merge upstream |
💚 Build SucceededMetrics [docs]
History
To update your PR or re-run it, just comment with: |
Co-authored-by: Joe Portner <[email protected]>
You are correct. Eventually we want to replace the |
I don't think these roles serve the same purpose. The stack-wide roles will grant some level of access to essentially all features, whereas your What if a user just wants APM access, and doesn't want to grant access to the other features enabled by these stack-wide roles? |
Then they can create a custom role. We don't want to have built-in roles for this in the future. |
Today it's quite cumbersome to create custom roles. The user has to hunt down all the permissions needed for a specific solution. |
I agree 100%, and I think we've captured this already within #80634. There is a similar initiative planned [at some point in the future] to handle this in a more holistic way -- something that won't just change the Kibana UI, but would potentially change the way we think about these privileges from a stack-wide perspective. |
Sounds exciting. Keep me posted! |
Resolves #96001.