Skip to content

Conversation

janvi-elastic
Copy link
Contributor

@janvi-elastic janvi-elastic commented Sep 12, 2025

PR Description:

This PR focuses on the short term solution which add the logs-island_browser.user-* and 
logs-island_browser.device-* indices under the kibana_system role with deletion privileges 
to prevent a failed deletion error when the index enters the deletion phase for the ILM lifecycle, 
in upcoming PR. As it ships transform pipeline too hence read, write permissions are also required.   

Current behavior:

It shows permission issue while deleting the index.

Closes - elastic/kibana#235999

@janvi-elastic janvi-elastic requested a review from a team as a code owner September 12, 2025 14:04
@elasticsearchmachine elasticsearchmachine added needs:triage Requires assignment of a team area label v9.2.0 external-contributor Pull request authored by a developer outside the Elasticsearch team labels Sep 12, 2025
@ShourieG ShourieG added Team:Security Meta label for security team Team:Cloud Security Meta label for Cloud Security team :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC >bug auto-backport Automatically create backport pull requests when merged labels Sep 12, 2025
@elasticsearchmachine elasticsearchmachine removed the needs:triage Requires assignment of a team area label label Sep 12, 2025
@elasticsearchmachine
Copy link
Collaborator

Pinging @elastic/es-security (Team:Security)

@kcreddy kcreddy added >non-issue and removed >bug labels Sep 13, 2025
@kcreddy
Copy link
Contributor

kcreddy commented Sep 15, 2025

@elasticsearchmachine test this please

@ShourieG
Copy link
Contributor

Hi @elastic/kibana-security, need your approval to proceed here.

@kcreddy
Copy link
Contributor

kcreddy commented Sep 17, 2025

@elasticsearchmachine test this please

@ShourieG ShourieG added v9.0.8 and removed v9.0.8 labels Sep 18, 2025
@ShourieG
Copy link
Contributor

@elasticsearchmachine test this please

@janvi-elastic
Copy link
Contributor Author

💚 All backports created successfully

Status Branch Result
9.1
9.0
8.19
8.18

Questions ?

Please refer to the Backport tool documentation

janvi-elastic added a commit to janvi-elastic/elasticsearch that referenced this pull request Sep 23, 2025
…#134636)

This PR focuses on the short term solution which add the logs-island_browser.user-* and
logs-island_browser.device-* indices under the kibana_system role with deletion privileges
to prevent a failed deletion error when the index enters the deletion phase for the ILM lifecycle,
in upcoming PR. As it ships transform pipeline too hence read, write permissions are also required.

(cherry picked from commit ae63901)
janvi-elastic added a commit to janvi-elastic/elasticsearch that referenced this pull request Sep 23, 2025
…#134636)

This PR focuses on the short term solution which add the logs-island_browser.user-* and
logs-island_browser.device-* indices under the kibana_system role with deletion privileges
to prevent a failed deletion error when the index enters the deletion phase for the ILM lifecycle,
in upcoming PR. As it ships transform pipeline too hence read, write permissions are also required.

(cherry picked from commit ae63901)
janvi-elastic added a commit to janvi-elastic/elasticsearch that referenced this pull request Sep 23, 2025
…#134636)

This PR focuses on the short term solution which add the logs-island_browser.user-* and
logs-island_browser.device-* indices under the kibana_system role with deletion privileges
to prevent a failed deletion error when the index enters the deletion phase for the ILM lifecycle,
in upcoming PR. As it ships transform pipeline too hence read, write permissions are also required.

(cherry picked from commit ae63901)
elasticsearchmachine pushed a commit that referenced this pull request Sep 23, 2025
#135268)

This PR focuses on the short term solution which add the logs-island_browser.user-* and
logs-island_browser.device-* indices under the kibana_system role with deletion privileges
to prevent a failed deletion error when the index enters the deletion phase for the ILM lifecycle,
in upcoming PR. As it ships transform pipeline too hence read, write permissions are also required.

(cherry picked from commit ae63901)
elasticsearchmachine pushed a commit that referenced this pull request Sep 23, 2025
#135265)

This PR focuses on the short term solution which add the logs-island_browser.user-* and
logs-island_browser.device-* indices under the kibana_system role with deletion privileges
to prevent a failed deletion error when the index enters the deletion phase for the ILM lifecycle,
in upcoming PR. As it ships transform pipeline too hence read, write permissions are also required.

(cherry picked from commit ae63901)
elasticsearchmachine pushed a commit that referenced this pull request Sep 23, 2025
#135267)

This PR focuses on the short term solution which add the logs-island_browser.user-* and
logs-island_browser.device-* indices under the kibana_system role with deletion privileges
to prevent a failed deletion error when the index enters the deletion phase for the ILM lifecycle,
in upcoming PR. As it ships transform pipeline too hence read, write permissions are also required.

(cherry picked from commit ae63901)
elasticsearchmachine pushed a commit that referenced this pull request Sep 23, 2025
#135266)

This PR focuses on the short term solution which add the logs-island_browser.user-* and
logs-island_browser.device-* indices under the kibana_system role with deletion privileges
to prevent a failed deletion error when the index enters the deletion phase for the ILM lifecycle,
in upcoming PR. As it ships transform pipeline too hence read, write permissions are also required.

(cherry picked from commit ae63901)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auto-backport Automatically create backport pull requests when merged external-contributor Pull request authored by a developer outside the Elasticsearch team >non-issue :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Cloud Security Meta label for Cloud Security team Team:Security Meta label for security team v8.18.8 v8.19.5 v9.0.8 v9.1.5 v9.2.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants