Skip to content

Conversation

@mohitjha-elastic
Copy link
Contributor

@mohitjha-elastic mohitjha-elastic commented Oct 27, 2025

PR Description:
This PR focuses on the short term solution which add the logs-sentinel_one.threat_event-* indices under the kibana_system role with deletion privileges to prevent a failed deletion error when the index enters the deletion phase for the ILM lifecycle, in upcoming PR. As it ships transform pipeline too hence read, write permissions are also required.

Current behavior:

It shows permission issue while deleting the index.

Similar Issues : elastic/kibana#197390, #131825

Closing elastic/kibana#240901
NOTE: We would need this to be backported to at least 8.18.0 and above.

@mohitjha-elastic mohitjha-elastic requested a review from a team as a code owner October 27, 2025 20:51
@elasticsearchmachine elasticsearchmachine added needs:triage Requires assignment of a team area label v9.3.0 external-contributor Pull request authored by a developer outside the Elasticsearch team labels Oct 27, 2025
@mohitjha-elastic mohitjha-elastic force-pushed the sentinel_one_threat_event_ilm_policy branch from 571bbc6 to 929baa0 Compare October 27, 2025 21:03
@AI-IshanBhatt AI-IshanBhatt added the :Security/Security Security issues without another label label Oct 28, 2025
@elasticsearchmachine elasticsearchmachine added Team:Security Meta label for security team and removed needs:triage Requires assignment of a team area label labels Oct 28, 2025
@elasticsearchmachine
Copy link
Collaborator

Pinging @elastic/es-security (Team:Security)

@ShourieG ShourieG added >non-issue :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Cloud Security Meta label for Cloud Security team auto-backport Automatically create backport pull requests when merged v9.2.1 v8.19.7 v9.1.7 and removed :Security/Security Security issues without another label labels Oct 28, 2025
@azasypkin azasypkin self-requested a review October 29, 2025 13:10
Copy link
Member

@azasypkin azasypkin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good from the Kibana Platform Security perspective. Thanks for updating the spreadsheet.

@mohitjha-elastic mohitjha-elastic merged commit ddb1502 into elastic:main Oct 31, 2025
36 checks passed
@mohitjha-elastic mohitjha-elastic deleted the sentinel_one_threat_event_ilm_policy branch October 31, 2025 07:08
mohitjha-elastic added a commit to mohitjha-elastic/elasticsearch that referenced this pull request Oct 31, 2025
… event (elastic#137222)

This PR introduces a short-term solution by adding the logs-sentinel_one.threat_event-* indices to the kibana_system role with delete privileges. This prevents deletion failures when the index enters the ILM deletion phase. Since the transform pipeline is also shipped as part of this change, the role requires additional read and write permissions.

(cherry picked from commit ddb1502)
mohitjha-elastic added a commit to mohitjha-elastic/elasticsearch that referenced this pull request Oct 31, 2025
… event (elastic#137222)

This PR introduces a short-term solution by adding the logs-sentinel_one.threat_event-* indices to the kibana_system role with delete privileges. This prevents deletion failures when the index enters the ILM deletion phase. Since the transform pipeline is also shipped as part of this change, the role requires additional read and write permissions.

(cherry picked from commit ddb1502)

# Conflicts:
#	x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java
@mohitjha-elastic
Copy link
Contributor Author

💚 All backports created successfully

Status Branch Result
9.2
9.1
8.19

Questions ?

Please refer to the Backport tool documentation

mohitjha-elastic added a commit to mohitjha-elastic/elasticsearch that referenced this pull request Oct 31, 2025
… event (elastic#137222)

This PR introduces a short-term solution by adding the logs-sentinel_one.threat_event-* indices to the kibana_system role with delete privileges. This prevents deletion failures when the index enters the ILM deletion phase. Since the transform pipeline is also shipped as part of this change, the role requires additional read and write permissions.

(cherry picked from commit ddb1502)

# Conflicts:
#	x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java
mohitjha-elastic added a commit that referenced this pull request Nov 3, 2025
… event (#137222) (#137424)

This PR introduces a short-term solution by adding the logs-sentinel_one.threat_event-* indices to the kibana_system role with delete privileges. This prevents deletion failures when the index enters the ILM deletion phase. Since the transform pipeline is also shipped as part of this change, the role requires additional read and write permissions.

(cherry picked from commit ddb1502)
mohitjha-elastic added a commit to mohitjha-elastic/elasticsearch that referenced this pull request Nov 3, 2025
… event (elastic#137222)

This PR introduces a short-term solution by adding the logs-sentinel_one.threat_event-* indices to the kibana_system role with delete privileges. This prevents deletion failures when the index enters the ILM deletion phase. Since the transform pipeline is also shipped as part of this change, the role requires additional read and write permissions.

(cherry picked from commit ddb1502)
mohitjha-elastic added a commit that referenced this pull request Nov 3, 2025
… event (#137222) (#137426)

This PR introduces a short-term solution by adding the logs-sentinel_one.threat_event-* indices to the kibana_system role with delete privileges. This prevents deletion failures when the index enters the ILM deletion phase. Since the transform pipeline is also shipped as part of this change, the role requires additional read and write permissions.

(cherry picked from commit ddb1502)
mohitjha-elastic added a commit that referenced this pull request Nov 4, 2025
… event (#137222) (#137425)

This PR introduces a short-term solution by adding the logs-sentinel_one.threat_event-* indices to the kibana_system role with delete privileges. This prevents deletion failures when the index enters the ILM deletion phase. Since the transform pipeline is also shipped as part of this change, the role requires additional read and write permissions.

(cherry picked from commit ddb1502)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

auto-backport Automatically create backport pull requests when merged external-contributor Pull request authored by a developer outside the Elasticsearch team >non-issue :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Cloud Security Meta label for Cloud Security team Team:Security Meta label for security team v8.19.7 v9.1.7 v9.2.1 v9.3.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants