-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security Solution][CSPM][Fleet] Cannot execute ILM policy delete step on CSPM findings logs #197390
Comments
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security) |
Thanks for reporting the bug, I will bring it to the team! |
Thanks @frconil Looks like our ILM policy have a delete configuration to remove index after 180 days. You're correct to fix this issue, we just need to add Some of my team members are on holiday and will be back Monday. I will report back with an update then. |
@frconil After Investigating [Security Solution][CSPM][Fleet] Cannot execute ILM policy delete step on CSPM findings logs bug. We can confirm we are missing privileges for our ILM policy. Since we define Couple of solutions: |
@smriti0321 I want to bring up an option that I mentioned on Slack as well. Maybe we should remove the
Maybe it makes sense instead of spending time fixing this bug, spend the time on introducing data retention via DLM on both findings and vulnerabilities. If we even want to. Because many other integrations don't have any default ILM/DLM |
Thanks @maxcold for the details, I do agree on DLM being the path forward, but I need more time and discussion with other stakeholders to understand the roadmap there and @Omolola-Akinleye for investigation and proposal of short term solution. This will help product decide the path forward. |
This was reported by one of our users, yes. I assume further CSPM adoption will highlight similar issues, especially since it takes at least 6 months for the problem to appear. |
@Omolola-Akinleye we should go ahead with your proposal for short term solution, which is going to fix the issue for this customers and potential customers who have not yet hit 6 month mark as stated by @frconil |
Okay I will push a fix today! Thanks everyone! |
Kibana Version: 8.14.3
Elasticsearch Version: 8.14.3 (but still present in main)
Describe the bug:
The
kibana_system
role does not have enough permissions to delete the system indices forlogs-cloud_security_posture.findings
as configured in https://github.com/elastic/integrations/blob/main/packages/cloud_security_posture/data_stream/findings/elasticsearch/ilm/default_policy.jsonThis is similar to the issue with endpoint/APM indices #121244
Looking at https://github.com/elastic/elasticsearch/blob/main/x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java#L407-L421
it looks like we have defined the permissions for
logs-cloud_security_posture.findings_latest-default*
but notlogs-cloud_security_posture.findings-default*
The text was updated successfully, but these errors were encountered: