Skip to content

Commit 75aef76

Browse files
[Sentinel One] - Fix Cannot execute ILM policy delete step for threat event (elastic#137222) (elastic#137424)
This PR introduces a short-term solution by adding the logs-sentinel_one.threat_event-* indices to the kibana_system role with delete privileges. This prevents deletion failures when the index enters the ILM deletion phase. Since the transform pipeline is also shipped as part of this change, the role requires additional read and write permissions. (cherry picked from commit ddb1502)
1 parent 0af600e commit 75aef76

File tree

3 files changed

+9
-1
lines changed

3 files changed

+9
-1
lines changed

docs/changelog/137222.yaml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
pr: 137222
2+
summary: "[Sentinel One] Add `manage`, `create_index`, `read`, `index`, `write`, `delete`, permission for third-party agent indices in the `Kibana system` to support the threat event data stream."
3+
area: Authorization
4+
type: enhancement
5+
issues:
6+
- 240901

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -550,14 +550,15 @@ static RoleDescriptor kibanaSystem(String name) {
550550
TransportDeleteIndexAction.TYPE.name()
551551
)
552552
.build(),
553-
// For ExtraHop, QualysGAV, SentinelOne Application Dataset, Island Browser and Cyera specific actions.
553+
// For ExtraHop, QualysGAV, SentinelOne, Island Browser and Cyera specific actions.
554554
// Kibana reads, writes and manages this index
555555
// for configured ILM policies.
556556
RoleDescriptor.IndicesPrivileges.builder()
557557
.indices(
558558
"logs-extrahop.investigation-*",
559559
"logs-qualys_gav.asset-*",
560560
"logs-sentinel_one.application-*",
561+
"logs-sentinel_one.threat_event-*",
561562
"logs-island_browser.user-*",
562563
"logs-island_browser.device-*",
563564
"logs-cyera.classification-*",

x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStoreTests.java

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1984,6 +1984,7 @@ public void testKibanaSystemRole() {
19841984
"logs-extrahop.investigation-" + randomAlphaOfLength(randomIntBetween(1, 10)),
19851985
"logs-qualys_gav.asset-" + randomAlphaOfLength(randomIntBetween(1, 10)),
19861986
"logs-sentinel_one.application-" + randomAlphaOfLength(randomIntBetween(1, 10)),
1987+
"logs-sentinel_one.threat_event-" + randomAlphaOfLength(randomIntBetween(1, 10)),
19871988
"logs-island_browser.user-" + randomAlphaOfLength(randomIntBetween(1, 10)),
19881989
"logs-island_browser.device-" + randomAlphaOfLength(randomIntBetween(1, 10)),
19891990
"logs-cyera.classification-" + randomAlphaOfLength(randomIntBetween(1, 10)),

0 commit comments

Comments
 (0)