[FSH] Removed kibana user from root group#244798
[FSH] Removed kibana user from root group#244798elena-shostak merged 16 commits intoelastic:mainfrom
Conversation
|
/ci |
|
Project deployed, see credentials at: https://buildkite.com/elastic/kibana-deploy-project-from-pr/builds/811 |
|
Pinging @elastic/kibana-security (Team:Security) |
|
A few considerations for self managed Kibana:
If we're okay with these tradeoffs I think it would good to make sure there's a release note on the change and what to do if effected. |
|
cc @legrego / @azasypkin to confirm on release note and consistency adjustment (I've put release note as deprecation) |
|
@jbudz what is the best way to roll it out for us first? |
The Dockerfile is templated using handlebars, there's a few variables available: cloud, fips, serverless, depending on how we want to define it. In the context of us, are you thinking everything except self managed artifacts? |
yep |
src/dev/build/tasks/os_packages/docker_generator/templates/base/Dockerfile
Outdated
Show resolved
Hide resolved
|
Small note on the cloud variable because it's confusing: |
💚 Build Succeeded
Metrics [docs]
History
|
## Summary We initially added Kibana to the root group as part of this issue https://discuss.elastic.co/t/group-permission-inconsistency-between-kibana-and-elasticsearch-docker-images/261051 I seems to be excessive to add kibana to the group for this specific self-hosted case (if even relevant anymore). User is also added to the group with GID 1000 and you can use GID 1000 for bind-mounted directories. If there is anything I'm missing, please let me know. ## Release Note Kibana user is removed from the root group (GID 0) on cloud. The Kibana user (UID 1000) remains in the primary group (GID 1000), which can be used for bind-mounted directories. OpenShift deployments will continue to work correctly, docker image sets up files and directories with GID 0 ownership and group write permissions, which allows containers to function properly regardless of the Kibana user's group membership.
## Summary We initially added Kibana to the root group as part of this issue https://discuss.elastic.co/t/group-permission-inconsistency-between-kibana-and-elasticsearch-docker-images/261051 I seems to be excessive to add kibana to the group for this specific self-hosted case (if even relevant anymore). User is also added to the group with GID 1000 and you can use GID 1000 for bind-mounted directories. If there is anything I'm missing, please let me know. ## Release Note Kibana user is removed from the root group (GID 0) on cloud. The Kibana user (UID 1000) remains in the primary group (GID 1000), which can be used for bind-mounted directories. OpenShift deployments will continue to work correctly, docker image sets up files and directories with GID 0 ownership and group write permissions, which allows containers to function properly regardless of the Kibana user's group membership.
Summary
We initially added Kibana to the root group as part of this issue https://discuss.elastic.co/t/group-permission-inconsistency-between-kibana-and-elasticsearch-docker-images/261051
I seems to be excessive to add kibana to the group for this specific self-hosted case (if even relevant anymore). User is also added to the group with GID 1000 and you can use GID 1000 for bind-mounted directories.
If there is anything I'm missing, please let me know.
Release Note
Kibana user is removed from the root group (GID 0) on serverless. The Kibana user (UID 1000) remains in the primary group (GID 1000), which can be used for bind-mounted directories. OpenShift deployments will continue to work correctly, docker image sets up files and directories with GID 0 ownership and group write permissions, which allows containers to function properly regardless of the Kibana user's group membership.