-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Set default credentials for Kibana #4867
Set default credentials for Kibana #4867
Conversation
56d1394
to
3b402a6
Compare
ce3fb45
to
a9b5a9e
Compare
…e as for Elasticsearch - Raise an error in case there are no dashboards to be imported
…e as for Elasticsearch (elastic#4867) - Raise an error in case there are no dashboards to be imported (cherry picked from commit fb3a7a3)
I'm -1 on this change. If you're using the same credentials (in Cloud or elsewhere) to connect to Elasticsearch and Kibana I'm guessing you're using the elastic superuser? I don't think this should be suggested or the default. You should generally use users with the minimal privileges they need to get the job done. Even in Cloud, we should create roles and users with the correct privileges for the task. In my integration test I create a specific role and user And to access the Kibana API (setup.kibana:) to create the index-patterns, dashboards, etc I'm currently using the kibana user (kibana_system role). But I think even that is more privileged than it needs to be. Now I'm thinking the kibana_user role should be enough since any kibana_user can create all those things. |
I agree that having different users for ES and Kibana is what we should recommend for production, but this simplifies the getting started with xpack security and Cloud cases. It's a tradeoff, but in this case, I think adding convenience for getting started is worth it. Note that the old implementation (writing directly in .kibana index) was worse in the sense that one couldn't have different users. So this is not a security regression since 5.x, on the contrary. |
…e as for Elasticsearch (elastic#4867) (elastic#4892) - Raise an error in case there are no dashboards to be imported (cherry picked from commit a7b5064)
When loading the dashboards from Beats 6.0, the user needs to configure:
In Cloud, the credentials for connecting to Elasticsearch are the same as for connecting to Kibana, so the last step can be removed if we take (by default) the Kibana credentials from the Elasticsearch credentials.
This PR gets by default the credentials for Kibana from Elasticsearch configuration.