Skip to content

Conversation

@kcreddy
Copy link
Contributor

@kcreddy kcreddy commented Nov 18, 2025

Adding logs-prisma_cloud.misconfiguration-* and logs-prisma_cloud.vulnerability-* data stream indices to the kibana_system privileges. This is required for the latest transform to work.

Related: elastic/integrations#16012

Similar to #124074, #128350

@elasticsearchmachine elasticsearchmachine added v9.3.0 external-contributor Pull request authored by a developer outside the Elasticsearch team labels Nov 18, 2025
@kcreddy kcreddy added >non-issue :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team Team:Cloud Security Meta label for Cloud Security team auto-backport Automatically create backport pull requests when merged v9.2.2 v8.19.8 v9.1.8 labels Nov 18, 2025
@kcreddy kcreddy self-assigned this Nov 18, 2025
@kcreddy kcreddy marked this pull request as ready for review November 18, 2025 11:49
@kcreddy kcreddy requested a review from a team as a code owner November 18, 2025 11:49
@elasticsearchmachine
Copy link
Collaborator

Pinging @elastic/es-security (Team:Security)

Copy link

@jeramysoucy jeramysoucy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Note: we usually would not grant the system user access to data indexes, but there is an exception for logs-* patterns (documented here).

@kcreddy
Copy link
Contributor Author

kcreddy commented Nov 19, 2025

💚 All backports created successfully

Status Branch Result
9.2
9.1
8.19

Questions ?

Please refer to the Backport tool documentation

kcreddy added a commit to kcreddy/elasticsearch that referenced this pull request Nov 19, 2025
…tic#138218)

Adding logs-prisma_cloud.misconfiguration-* and logs-prisma_cloud.vulnerability-* data stream indices to the kibana_system privileges. This is required for the latest transform to work.

(cherry picked from commit 39d2bb8)
kcreddy added a commit to kcreddy/elasticsearch that referenced this pull request Nov 19, 2025
…tic#138218)

Adding logs-prisma_cloud.misconfiguration-* and logs-prisma_cloud.vulnerability-* data stream indices to the kibana_system privileges. This is required for the latest transform to work.

(cherry picked from commit 39d2bb8)
kcreddy added a commit to kcreddy/elasticsearch that referenced this pull request Nov 19, 2025
…tic#138218)

Adding logs-prisma_cloud.misconfiguration-* and logs-prisma_cloud.vulnerability-* data stream indices to the kibana_system privileges. This is required for the latest transform to work.

(cherry picked from commit 39d2bb8)
elasticsearchmachine pushed a commit that referenced this pull request Nov 19, 2025
) (#138276)

Adding logs-prisma_cloud.misconfiguration-* and logs-prisma_cloud.vulnerability-* data stream indices to the kibana_system privileges. This is required for the latest transform to work.

(cherry picked from commit 39d2bb8)
elasticsearchmachine pushed a commit that referenced this pull request Nov 19, 2025
) (#138278)

Adding logs-prisma_cloud.misconfiguration-* and logs-prisma_cloud.vulnerability-* data stream indices to the kibana_system privileges. This is required for the latest transform to work.

(cherry picked from commit 39d2bb8)
elasticsearchmachine pushed a commit that referenced this pull request Nov 19, 2025
) (#138277)

Adding logs-prisma_cloud.misconfiguration-* and logs-prisma_cloud.vulnerability-* data stream indices to the kibana_system privileges. This is required for the latest transform to work.

(cherry picked from commit 39d2bb8)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

auto-backport Automatically create backport pull requests when merged external-contributor Pull request authored by a developer outside the Elasticsearch team >non-issue :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Cloud Security Meta label for Cloud Security team Team:Security Meta label for security team v8.19.8 v9.1.8 v9.2.2 v9.3.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants