Interactive setup mode server-side functionality #104068
Labels
Feature:Security/Interactive Setup
Platform Security - Interactive setup mode
impact:high
Addressing this issue will have a high level of impact on the quality/strength of our product.
loe:small
Small Level of Effort
Team:Security
Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more!
v8.0.0
Summary
In the scope of this issue we're going to implement server-side functionality that's absolutely necessary for the initial phase of the interactive setup mode provided by the
userSetup
plugin:userSetup
plugin skeleton. (AdduserSetup
plugin skeleton. #101610)Enroll
API endpoint. #108835)Enroll
API endpoint. #108835)elasticsearch.*
configuration to the disk [1W] (IntroduceEnroll
API endpoint. #108835)@azasypkin Functional and API integration tests(will be handled in the scope of Add functional and API integration tests for the Interactive Setup mode #111336)By default ECK sets up TLS for both Elasticsearch and Kibana. TLS can be disabled, but Security is assumed to be enabled all the time. However, ECK Kibana can be configured to connect to external Elasticsearch , and if the ES happens to be
http://localhost:9200
that Kibana cannot connect to we'll activate interactive setup.kibana
group has permissions to write tokibana.yml
:kibana/src/dev/build/tasks/os_packages/package_scripts/post_install.sh
Lines 11 to 29 in 4a54188
kibana/src/dev/build/tasks/os_packages/docker_generator/templates/ironbank/Dockerfile
Lines 58 to 73 in 4a54188
kibana/src/dev/build/tasks/os_packages/docker_generator/templates/base/Dockerfile
Lines 95 to 113 in 4a54188
Telemetry to record user behavior and common sources of errors(will be handled in the scope of Add telemetry for the interactive setup #111341)Find a way to expose ES config schema to preboot plugins(will be handled in the scope of Interactive setup should validate configuration entries using original schema objects #111340)Support keystore for credentials?(will be handled in the scope of Store kibana system user credentials in the keystore #111337)Related: #89287, #102538
Blocked by:
#103636,https://github.com/elastic/clients-team/issues/423,#102121The text was updated successfully, but these errors were encountered: