Skip to content

[Osquery] Extend kibana_system role with an access to new osquery_manager index#108849

Merged
szwarckonrad merged 7 commits intoelastic:mainfrom
szwarckonrad:feat/extend-kibana-system-osquery-index-permissions
May 23, 2024
Merged

[Osquery] Extend kibana_system role with an access to new osquery_manager index#108849
szwarckonrad merged 7 commits intoelastic:mainfrom
szwarckonrad:feat/extend-kibana-system-osquery-index-permissions

Conversation

@szwarckonrad
Copy link
Copy Markdown
Contributor

@szwarckonrad szwarckonrad commented May 21, 2024

This PR extends the kibana_system role to include access to the new index logs-osquery_manager.action.responses . Previously, we used the .logs-osquery_manager.action.responses index, which stored data from a transform. We are now implementing a solution where osquerybeat writes directly to logs-osquery_manager.action.responses, removing the need for the transform. The existing index is marked as "Legacy" and will still be used by anyone who does not upgrade Kibana to version 8.15 and the Osquery integration to version 1.12.

Follow up: elastic/kibana#183892

@szwarckonrad szwarckonrad added >enhancement :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team v8.15.0 labels May 21, 2024
@szwarckonrad szwarckonrad self-assigned this May 21, 2024
@elasticsearchmachine elasticsearchmachine added the external-contributor Pull request authored by a developer outside the Elasticsearch team label May 21, 2024
@elasticsearchmachine
Copy link
Copy Markdown
Collaborator

Hi @szwarckonrad, I've created a changelog YAML for you.

@pgomulka
Copy link
Copy Markdown
Contributor

@elasticmachine test this please

@pgomulka
Copy link
Copy Markdown
Contributor

ok to test

@szwarckonrad szwarckonrad marked this pull request as ready for review May 21, 2024 09:57
@szwarckonrad szwarckonrad requested a review from a team as a code owner May 21, 2024 09:57
@elasticsearchmachine
Copy link
Copy Markdown
Collaborator

Pinging @elastic/es-security (Team:Security)

Copy link
Copy Markdown
Contributor

@kc13greiner kc13greiner left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just one question!

Copy link
Copy Markdown
Contributor

@kc13greiner kc13greiner left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

The new privileges are being added for a data index that matches the known collision pattern logs-* so we can allow this privilege. This pattern is documented here

@szwarckonrad szwarckonrad requested a review from a team May 22, 2024 12:31
@slobodanadamovic slobodanadamovic requested review from slobodanadamovic and removed request for a team May 23, 2024 08:25
@szwarckonrad szwarckonrad merged commit 42b5599 into elastic:main May 23, 2024
szwarckonrad added a commit to elastic/kibana that referenced this pull request May 24, 2024
…#183892)

**Prerequisite**: elastic/elasticsearch#108849

**Follow-up**: elastic/integrations#9661

This PR introduces a new index
`logs-osquery_manager.action.responses-default` for action responses.
This index will be added in Osquery Manager integration version `1.12`
and will replace the existing
`.logs-osquery_manager.action.responses-default`, which is currently
populated by a transform from `.fleet-actions`.

Since most users will still be using the old integration package, we
ensured that the implementation checks the old index first and returns
the response from there unless the new index is available. If the new
index is available, the response will come from it. This change ensures
compatibility with all user scenarios.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

>enhancement external-contributor Pull request authored by a developer outside the Elasticsearch team :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team v8.15.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants