You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently the ECK Operator always creates the public-facing elastic user with superuser role for any Elasticsearch cluster. This issue is created to discuss if we should allow for this to be disabled on a per-cluster basis, and if so what would need to change for this to happen.
Known changes that would have to occur:
eck-diagnostics: This uses the elastic user by default. We would need to add the option of specifying a username/password combination to use that had sufficient privileges.
documentation: We reference this user in our docs. We would need to augment these to note that this user can be disabled.
e2e tests: We would likely want to add an e2e test that disables this user and verifies the lack of the k8s secret.
To discuss:
Any concerns for pursuing this?
Are there any further integrations that we are unaware of that would cause issues when disabling this user?
The text was updated successfully, but these errors were encountered:
Currently the ECK Operator always creates the public-facing
elastic
user withsuperuser
role for any Elasticsearch cluster. This issue is created to discuss if we should allow for this to be disabled on a per-cluster basis, and if so what would need to change for this to happen.Known changes that would have to occur:
elastic
user by default. We would need to add the option of specifying a username/password combination to use that had sufficient privileges.To discuss:
The text was updated successfully, but these errors were encountered: