-
Notifications
You must be signed in to change notification settings - Fork 25.6k
Add microsoft_defender_cloud.assessment indices to kibana_system role permissions #133623
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Pinging @elastic/es-security (Team:Security) |
SiddharthMantri
approved these changes
Aug 29, 2025
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Index pattern matches known patterns. LGTM.
kcreddy
added a commit
to kcreddy/elasticsearch
that referenced
this pull request
Aug 29, 2025
… for transform (elastic#133623) Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to elastic#132445 (cherry picked from commit eb005b0)
kcreddy
added a commit
to kcreddy/elasticsearch
that referenced
this pull request
Aug 29, 2025
… for transform (elastic#133623) Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to elastic#132445 (cherry picked from commit eb005b0)
kcreddy
added a commit
to kcreddy/elasticsearch
that referenced
this pull request
Aug 29, 2025
… for transform (elastic#133623) Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to elastic#132445 (cherry picked from commit eb005b0)
💚 All backports created successfully
Questions ?Please refer to the Backport tool documentation |
kcreddy
added a commit
to kcreddy/elasticsearch
that referenced
this pull request
Aug 29, 2025
… for transform (elastic#133623) Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to elastic#132445 (cherry picked from commit eb005b0)
elasticsearchmachine
pushed a commit
that referenced
this pull request
Aug 29, 2025
… for transform (#133623) (#133800) Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to #132445 (cherry picked from commit eb005b0)
elasticsearchmachine
pushed a commit
that referenced
this pull request
Aug 29, 2025
… for transform (#133623) (#133799) Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to #132445 (cherry picked from commit eb005b0)
elasticsearchmachine
pushed a commit
that referenced
this pull request
Aug 29, 2025
… for transform (#133623) (#133798) Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to #132445 (cherry picked from commit eb005b0)
elasticsearchmachine
pushed a commit
that referenced
this pull request
Aug 29, 2025
… for transform (#133623) (#133797) Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to #132445 (cherry picked from commit eb005b0)
JeremyDahlgren
pushed a commit
to JeremyDahlgren/elasticsearch
that referenced
this pull request
Aug 29, 2025
… for transform (elastic#133623) Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to elastic#132445
sarog
pushed a commit
to portsbuild/elasticsearch
that referenced
this pull request
Sep 11, 2025
… for transform (elastic#133623) (elastic#133799) Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to elastic#132445 (cherry picked from commit eb005b0)
sarog
pushed a commit
to portsbuild/elasticsearch
that referenced
this pull request
Sep 19, 2025
… for transform (elastic#133623) (elastic#133799) Add logs-microsoft_defender_cloud.assessment data stream indices to the kibana_system's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work. Also adds delete_index on logs-microsoft_defender_cloud.assessment-* to facilitate index removal through ILM policies. Related: For elastic/integrations#14785 Similar to elastic#132445 (cherry picked from commit eb005b0)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
auto-backport
Automatically create backport pull requests when merged
external-contributor
Pull request authored by a developer outside the Elasticsearch team
>non-issue
:Security/Authorization
Roles, Privileges, DLS/FLS, RBAC/ABAC
Team:Cloud Security
Meta label for Cloud Security team
Team:Security
Meta label for security team
v8.18.7
v8.19.4
v9.0.7
v9.1.4
v9.2.0
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Add
logs-microsoft_defender_cloud.assessment
data stream indices to thekibana_system
's read privileges. This is required for the latest transform for 3rd party integrations CDR workflows (vulnerability and misconfigurations findings) to work.Also adds
delete_index
onlogs-microsoft_defender_cloud.assessment-*
to facilitate index removal through ILM policies.Related: For elastic/integrations#14785
Similar to #132445