-
Notifications
You must be signed in to change notification settings - Fork 8.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Read-only mode for Index management #77347
Labels
enhancement
New value added to drive a business result
Feature:Index Management
Index and index templates UI
Team:Kibana Management
Dev Tools, Index Management, Upgrade Assistant, ILM, Ingest Node Pipelines, and more
Comments
marius-dr
added
enhancement
New value added to drive a business result
Team:Kibana Management
Dev Tools, Index Management, Upgrade Assistant, ILM, Ingest Node Pipelines, and more
labels
Sep 14, 2020
Pinging @elastic/es-ui (Team:Elasticsearch UI) |
This would be part of the workstream "App privileges" in mentioned in #77376 (comment) |
alisonelizabeth
removed
the
Team:Kibana Management
Dev Tools, Index Management, Upgrade Assistant, ILM, Ingest Node Pipelines, and more
label
Sep 17, 2024
alisonelizabeth
added
Team:Kibana Management
Dev Tools, Index Management, Upgrade Assistant, ILM, Ingest Node Pipelines, and more
and removed
Feature:Index Management
Index and index templates UI
needs-team
Issues missing a team label
labels
Sep 17, 2024
Pinging @elastic/kibana-management (Team:Kibana Management) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
enhancement
New value added to drive a business result
Feature:Index Management
Index and index templates UI
Team:Kibana Management
Dev Tools, Index Management, Upgrade Assistant, ILM, Ingest Node Pipelines, and more
Describe the feature:
Allow customized security rules that will provide read-only mode access to the index management feature, leveraging this PR: #67791
Describe a specific use case for the feature:
It's been requested to allow users to search and view indices in the cluster, but without the permissions to do potentially destructive actions on them: like delete, freeze or flush.
The current workaround is really convoluted and involves setting specific cluster privileges and it offers a bad user experience. They can still call the actions like delete, but they'll get a bunch of errors.
Related discuss post:
https://discuss.elastic.co/t/how-to-give-read-only-privileges-in-the-index-management-module/247155
The text was updated successfully, but these errors were encountered: