Skip to content

Commit 38e69de

Browse files
[8.10] Adds kibana namespace requirement to CNVM and CSPM (backport #5154) (#5177)
* Adds kibana namespace requirement to CNVM and CSPM (#5154) * Updates requirements section for CNVM and CSPM * minor updates - adds attribute (cherry picked from commit 5df1b3a) # Conflicts: # docs/cloud-native-security/cspm-get-started-aws.asciidoc # docs/cloud-native-security/cspm-get-started-azure.asciidoc # docs/cloud-native-security/cspm-get-started-gcp.asciidoc # docs/cloud-native-security/cspm.asciidoc * fixes merge conflicts --------- Co-authored-by: Benjamin Ironside Goldstein <[email protected]> Co-authored-by: Benjamin Ironside Goldstein <[email protected]>
1 parent 5675e89 commit 38e69de

File tree

5 files changed

+9
-1
lines changed

5 files changed

+9
-1
lines changed

docs/cloud-native-security/cspm-get-started-aws.asciidoc

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ This page explains how to get started monitoring the security posture of your cl
1111
[sidebar]
1212
--
1313
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
14+
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
15+
* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
1416
* To view posture data, you need `read` privileges for the following {es} indices:
1517
** `logs-cloud_security_posture.findings_latest-*`
1618
** `logs-cloud_security_posture.scores-*`
@@ -202,7 +204,7 @@ image::images/cspm-aws-auth-3.png[The EC2 page in AWS, showing the Modify IAM ro
202204
.. Click *Update IAM role*.
203205
.. Return to {kib} and <<cspm-finish-manual, finish manual setup>>.
204206

205-
IMPORTANT: Make sure to deploy the CSPM integration to this EC2 instance. When completing setup in Kibana, in the *Setup Access* section, select *Assume role* and leave *Role ARN* empty. Click *Save and continue*.
207+
IMPORTANT: Make sure to deploy the CSPM integration to this EC2 instance. When completing setup in {kib}, in the *Setup Access* section, select *Assume role* and leave *Role ARN* empty. Click *Save and continue*.
206208

207209
[discrete]
208210
[[cspm-use-keys-directly]]

docs/cloud-native-security/cspm-get-started-gcp.asciidoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ This page explains how to get started monitoring the security posture of your cl
1111
[sidebar]
1212
--
1313
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
14+
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
15+
* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
1416
* To view posture data, you need `read` privileges for the following {es} indices:
1517
** `logs-cloud_security_posture.findings_latest-*`
1618
** `logs-cloud_security_posture.scores-*`

docs/cloud-native-security/cspm.asciidoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@ This feature currently supports Amazon Web Services (AWS) and Google Cloud Platf
1010
--
1111
* The CSPM integration is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
1212
* {stack} version 8.10 or greater.
13+
* CSPM only works in the `Default` {kib} space. Installing the CSPM integration on a different {kib} space will not work.
14+
* CSPM is supported on commercial cloud only. Government cloud is not supported (https://github.com/elastic/enhancements[request support]).
1315
--
1416

1517
[discrete]

docs/cloud-native-security/vuln-management-get-started.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ This page explains how to set up Cloud Native Vulnerability Management (CNVM).
88
--
99
* CNVM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
1010
* Requires {stack} and {agent} version 8.8 or higher.
11+
* CNVM only works in the `Default` {kib} space. Installing the CNVM integration on a different {kib} space will not work.
1112
* To view vulnerability scan findings, you need at least `read` privileges for the following indices:
1213
** `logs-cloud_security_posture.vulnerabilities-*`
1314
** `logs-cloud_security_posture.vulnerabilities_latest-*`

docs/cloud-native-security/vuln-management-overview.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@ NOTE: CNVM currently only supports AWS EC2 Linux workloads.
1212
--
1313
* CNVM is available to all {ecloud} users. On-premise deployments require an https://www.elastic.co/pricing[Enterprise subscription].
1414
* Requires {stack} and {agent} version 8.8 or higher.
15+
* CNVM only works in the `Default` {kib} space. Installing the CNVM integration on a different {kib} space will not work.
1516
* To view vulnerability scan findings, you need at least `read` privileges for the following indices:
1617
** `logs-cloud_security_posture.vulnerabilities-*`
1718
** `logs-cloud_security_posture.vulnerabilities_latest-*`

0 commit comments

Comments
 (0)