-
Notifications
You must be signed in to change notification settings - Fork 3.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document permissions and/or role required for user to run X-Pack features #9146
Comments
I'm going to hijack this issue for my opinion on the current state of https://www.elastic.co/guide/en/logstash/current/ls-security.html and suggestions for how to fix. Logstash Internal
Logstash User
Logstash System
Logstash admin user
Suggested fixes:To discuss ... |
We also need to reconcile any changes/documentation with this: https://www.elastic.co/guide/en/x-pack/current/built-in-roles.html |
Looping @lcawl in on this discussion since it pertains to security. TBH, I'm not sure who wrote the original text here because the content has moved around a lot and lost its history. She might have more detail on specific users/roles and why we suggest specific privileges. I did test this content last year. If you change the user names/roles/privileges, you'll need to make sure you update (and test) any topics that refer to them. |
The original home of that page was https://www.elastic.co/guide/en/x-pack/5.0/logstash.html, but it hasn't had too many substantive updates since that time, so there's definitely room for improvement. With respect to the logstash_system built-in user, it's one of the ones that's created when you have X-Pack security enabled and its initial password is set by using the setup-password command, per https://www.elastic.co/guide/en/x-pack/master/setting-up-authentication.html#built-in-users I'm happy to help with these updates. |
I removed the suggested fixes as they were too aggressive w/r/t passivity. We can discuss and I will take another stab at a suggestion. |
There are basically three index patterns needed for Logstash default.
For
For
For
@ycombinator @andrewvc - would you agree that these are personas that should back suggestions for RBAC ? |
Out of the box, it appears that we have 2 pre-defined roles (and 0 pre-defined users): Logstash admin role: and Logstash system role: It seems that the Logstash admin role is target at "the Human changing the central config " , which seems correct. The documentation states that Logstash system role "Grants access necessary for the Logstash system user to send system-level data (such as monitoring) to Elasticsearch.' , which seems to be targeting the "the Logstash system writing the monitoring data, and reading the management data" persona. However, the privileges don't appear be correct since there are no index level privs and the existing documentation refers to enabling a user that does not work. I think persona needs the most attention, and may require changes to the default roles. The other personas seem to be documented as logstash reader/writer roles which also seem correct, but may benefit from some updates for clarification. |
I think this proposal covers the personas and is a minimal difference to what is currently there.
|
^^ is needed to bootstrap the logstash_system so I think that bootstrapping step is needed to give the
|
I confirmed that the Per the proposal above I suggest we should (by default) give the
Also confirmed that this user is not currently available via cloud, so we will likely want to explicitly document how to set this user up. (note the role is present , just not the user) |
I agree with the personas.
Can you elaborate on this? I've always wondered about this: why the Logstash system doesn't get just read access to |
The comment was in reference to the human use case, where we should never give a human the ability to read but not write. Doing that would open the door to accidentally give a non-admin user the ability see potentially sensitive information. I wasn't part of the part the decision w/r/t the definition of the role, but it does make sense for the human use case.
Agreed for the system use case. Perhaps we should try address that with a change to the |
Agreed. Makes sense. Thanks for the explanation.
Yeah, this makes sense to me. It does mean that all existing users of Logstash would've given their Logstash (system) read and write privileges to |
For the Beats -> LS -> ES (with secured cluster) use case, we also need to document the privileges that are required to write/read to beats indexes for users who want to use the beats dashboards--that is, users who have this config:
You get the following security exception if the user doesn't have the correct privileges:
|
Hello, I am exactly running into the above issue using stack 6.3.1. I have a secured cluster with almost similar config. Is this issue resolved now? |
@ashokbellur Make sure your https://discuss.elastic.co/c/logstash |
@karenzone Is this issue still valid, or should I close it? |
closing because this issue is soooo old. |
Currently we document how to set up users for Logstash (here), but we don't document which roles are required when using specific features, like the pipeline viewer and monitoring.
(One exception is centralized config management, where we do document the required roles: https://www.elastic.co/guide/en/logstash/master/logstash-centralized-pipeline-management.html)
@karenzone You'll need to investigate which roles are required for using the pipeline viewer and monitoring.
The text was updated successfully, but these errors were encountered: