Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create apm_server user #30074

Open
elasticmachine opened this issue Feb 26, 2018 · 4 comments
Open

Create apm_server user #30074

elasticmachine opened this issue Feb 26, 2018 · 4 comments
Labels
:Security/Authentication Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc) :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team

Comments

@elasticmachine
Copy link
Collaborator

Original comment by @tvernum:

The 6.2 docs for APM say:

If you are using an X-Pack secured version of Elastic Stack, you need to specify credentials in the config file before you run the commands that set up and start APM Server. For example:

output.elasticsearch:
  hosts: ["ElasticsearchAddress:9200"]
  username: "elastic"
  password: "elastic"

It is LINK REDACTED to being running things as "elastic", but we don't have an apm_server user/role to recommend instead.

We should create a builtin user+role for APM and the update the docs accordingly.

@elasticmachine
Copy link
Collaborator Author

Original comment by @tvernum:

/CC: @elastic/apm @elastic/es-security

@elasticmachine
Copy link
Collaborator Author

Original comment by @jalvz:

fyi this has been merged recently:
elastic/apm-server#546

it is adapted from current beats documentation.

@elasticmachine
Copy link
Collaborator Author

Original comment by @tvernum:

@jalvz We can ship with a builtin role that already has the required privileges.
How common is it for customers to change the target indices for APM (is that even possible?)

If the standard setup uses a fixed index name, then it's better to just ship with the user + role preconfigured in X-Pack.
We don't do that for ingest (beats/logstash) because it very common to configure your own target indices, but I think we can get a better out-of-the-box experience for APM.

@elasticmachine
Copy link
Collaborator Author

Original comment by @jalvz:

Is hard to say how common it is at this point, but probably not common at all. It is possible to change it, but I don't see any reason why the should, everything works out of the box with the default names.

A preconfigured user/role makes sense to me. See also LINK REDACTED

@elasticmachine elasticmachine added :Security/Authentication Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc) :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC labels Apr 25, 2018
@rjernst rjernst added the Team:Security Meta label for security team label May 4, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
:Security/Authentication Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc) :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team
Projects
None yet
Development

No branches or pull requests

2 participants