-
Notifications
You must be signed in to change notification settings - Fork 25.2k
[Documentation] Update doc to include missing API attribute #88751
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
RobsonSutton
commented
Jul 23, 2022
- Identified as missing through investigation into [Bug] Unable to use the option allow_restricted_indices when creating security role terraform-provider-elasticstack#125
Identified as missing through investigation into elastic/terraform-provider-elasticstack#125
Related to #81400 - requirement for setting this may increase now that these permissions have been removed from the superuser role |
Pinging @elastic/es-docs (Team:Docs) |
Pinging @elastic/es-security (Team:Security) |
Would someone in the @elastic/es-security team mind taking a look at this proposed description for the For example, in the Has privileges API docs we describe (Boolean) This needs to be set to true (default is false) if using wildcards or regexps for patterns that cover restricted indices. Implicitly, restricted indices do not match index patterns because restricted indices usually have limited privileges and including them in pattern tests would render most such tests false. If restricted indices are explicitly included in the names list, privileges will be checked against them regardless of the value of allow_restricted_indices. |
There is no good reason to manually write to any system indices. If read permission is needed, the |
@ywangd - For a bit of context, the support of this setting was requested by a consumer in the elasticstack terraform provider (elastic/terraform-provider-elasticstack#125) off the back of elastic support advice by the looks of it (I think this may be the ref. - ITSI-17455). The setting has been added to the provider and the TF docs updated accordingly (elastic/terraform-provider-elasticstack#126). Just figured I'd add to the API docs too for clarity is all so it was consistent across different sources of documentation 👍 |
@RobsonSutton I am not familiar with the elastic stack terraform provider code. But why would the code want to provision a role that has write permission to system indices? As commented earlier, it is generally not recommended unless for adhoc emergency recovery. I suspect this is not the case for the terraform provider? Is the designated service account (e.g. |
@ywangd - Apologies I'm not too sure of what the specific reasoning was for enabling this setting, it just appears that the user that raised the issue was advised to raise an issue to enable this setting by elastic support. I don't work for elastic so unfortunately don't have access to look into the support case for the consumer that raised the initial issue (elastic/terraform-provider-elasticstack#125), is this something you are able to view for more context? |
Important Elastic documentation is migrating to Markdown for version 9.0+. See the migration guide for details. ℹ️ What's happening?
What do I need to do?For <=8.x docs:
For 9.0+ docs:Option 1:
Option 2:
💡 Need help?
|