-
Notifications
You must be signed in to change notification settings - Fork 25k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Fleet] Added all privilege to kibana_system to logs-fleet_server.* index pattern #106815
Conversation
Pinging @elastic/es-core-infra (Team:Core/Infra) |
Heya @juliaElastic! I was wondering if there was a less broad privilege that could be granted to the In the description, ILM is mentioned. Would a privilege |
Hi @kc13greiner, thanks for the review! We had an error reported when kibana tried to run ILM to delete:
Do you think |
I can't say for sure 😅 I'm not as knowledgable with index privileges as I'd like! Your latest change to Thanks for reducing it! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
kibana_system
is allowed higher privileges on logs-* ( and this is specifically logs-fleet_server) even though it is a data index, as they are documented as potential collisions here
…ndex pattern (elastic#106815) * Update KibanaOwnedReservedRoleDescriptors.java * replaced all with read, delete_index
…ndex pattern (elastic#106815) * Update KibanaOwnedReservedRoleDescriptors.java * replaced all with read, delete_index
gradle check
? yesGiving all access, so that
kibana_system
can run the ILM policy to clean up thelogs-fleet_server.output_health
data stream defined here: elastic/integrations#8605