Skip to content

Commit f3a5583

Browse files
Add required ilm index for delete privilege
1 parent fa531c9 commit f3a5583

File tree

2 files changed

+16
-6
lines changed

2 files changed

+16
-6
lines changed

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -536,18 +536,26 @@ static RoleDescriptor kibanaSystem(String name) {
536536
// For source indices of the Cloud Detection & Response (CDR) packages
537537
// that ships a transform and has ILM policy
538538
RoleDescriptor.IndicesPrivileges.builder()
539-
.indices("logs-m365_defender.vulnerability-*", "logs-microsoft_defender_endpoint.vulnerability-*")
539+
.indices(
540+
"logs-m365_defender.vulnerability-*",
541+
"logs-microsoft_defender_endpoint.vulnerability-*",
542+
"logs-sentinel_one.application_risk-*"
543+
)
540544
.privileges(
541545
"read",
542546
"view_index_metadata",
543547
// Require "delete_index" to perform ILM policy actions
544548
TransportDeleteIndexAction.TYPE.name()
545549
)
546550
.build(),
547-
// For ExtraHop and QualysGAV specific actions. Kibana reads, writes and manages this index
551+
// For ExtraHop, QualysGAV, and SentinelOne Application Dataset specific actions. Kibana reads, writes and manages this index
548552
// for configured ILM policies.
549553
RoleDescriptor.IndicesPrivileges.builder()
550-
.indices("logs-extrahop.investigation-*", "logs-qualys_gav.asset-*")
554+
.indices(
555+
"logs-extrahop.investigation-*",
556+
"logs-qualys_gav.asset-*",
557+
"logs-sentinel_one.application-*"
558+
)
551559
.privileges(
552560
"manage",
553561
"create_index",

x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStoreTests.java

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1772,7 +1772,8 @@ public void testKibanaSystemRole() {
17721772

17731773
Arrays.asList(
17741774
"logs-m365_defender.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1775-
"logs-microsoft_defender_endpoint.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13))
1775+
"logs-microsoft_defender_endpoint.vulnerability-" + randomAlphaOfLength(randomIntBetween(0, 13)),
1776+
"logs-sentinel_one.application_risk-*" + randomAlphaOfLength(randomIntBetween(0, 13))
17761777
).forEach(indexName -> {
17771778
final IndexAbstraction indexAbstraction = mockIndexAbstraction(indexName);
17781779
assertThat(kibanaRole.indices().allowedIndicesMatcher("indices:foo").test(indexAbstraction), is(false));
@@ -1974,11 +1975,12 @@ public void testKibanaSystemRole() {
19741975
assertThat(kibanaRole.indices().allowedIndicesMatcher(RolloverAction.NAME).test(indexAbstraction), is(true));
19751976
});
19761977

1977-
// Tests for third-party agent indices (ExtraHop, QualysGAV) that `kibana_system` has full management access to
1978+
// Tests for third-party agent indices (ExtraHop, QualysGAV, SentinelOne) that `kibana_system` has full management access to
19781979
// This includes read, write, create, delete, and all ILM-related management actions.
19791980
Arrays.asList(
19801981
"logs-extrahop.investigation-" + randomAlphaOfLength(randomIntBetween(1, 10)),
1981-
"logs-qualys_gav.asset-" + randomAlphaOfLength(randomIntBetween(1, 10))
1982+
"logs-qualys_gav.asset-" + randomAlphaOfLength(randomIntBetween(1, 10)),
1983+
"logs-sentinel_one.application-*" + randomAlphaOfLength(randomIntBetween(1, 10))
19821984
).forEach((index_qualys_extra_hop) -> {
19831985
final IndexAbstraction indexAbstraction = mockIndexAbstraction(index_qualys_extra_hop);
19841986

0 commit comments

Comments
 (0)