Skip to content

Commit 45443a6

Browse files
authored
[Fleet] Give kibana_system delete privilege on .fleet-secrets index (#96080)
* [Fleet] Give kibana_system delete privilege on .fleet-secrets index * Update docs/changelog/96080.yaml * fix spelling * Delete docs/changelog/96080.yaml
1 parent 3e2154d commit 45443a6

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStore.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -764,11 +764,11 @@ public static RoleDescriptor kibanaSystemRoleDescriptor(String name) {
764764
RoleDescriptor.IndicesPrivileges.builder().indices("*").privileges("view_index_metadata", "monitor").build(),
765765
// Endpoint diagnostic information. Kibana reads from these indices to send telemetry
766766
RoleDescriptor.IndicesPrivileges.builder().indices(".logs-endpoint.diagnostic.collection-*").privileges("read").build(),
767-
// Fleet secrets, Kibana can only write ot this index.
767+
// Fleet secrets, Kibana can only write to this index.
768768
// This definition must come before .fleet* below.
769769
RoleDescriptor.IndicesPrivileges.builder()
770770
.indices(".fleet-secrets*")
771-
.privileges("write", "create_index")
771+
.privileges("write", "delete", "create_index")
772772
.allowRestrictedIndices(true)
773773
.build(),
774774
// Fleet Server indices. Kibana create this indice before Fleet Server use them.

0 commit comments

Comments
 (0)