[Security Solution] [Detections] Clarify result of missing read-index privileges on index patterns for a given rule#215941
Conversation
… for index pattern
...detections_response/detection_engine/actions/trial_license_complete_tier/check_privileges.ts
Outdated
Show resolved
Hide resolved
...ons/security/plugins/security_solution/server/lib/detection_engine/rule_types/utils/utils.ts
Outdated
Show resolved
Hide resolved
...ons/security/plugins/security_solution/server/lib/detection_engine/rule_types/utils/utils.ts
Outdated
Show resolved
Hide resolved
|
@dhurley14 hey! Not sure if it's already fixed in the code, but I think we're concatenating different errors using |
|
@yctercero I believe this is responsible for the incorrect punctuation. I can try to make the change in this PR. |
|
@yctercero How does this look?
|
I like that a lot better! cc @approksiu |
💚 Build Succeeded
Metrics [docs]Async chunks
Page load bundle
History
cc @dhurley14 |
|
Starting backport for target branches: 9.0 https://github.com/elastic/kibana/actions/runs/14539678922 |
💔 All backports failed
Manual backportTo create the backport manually run: Questions ?Please refer to the Backport tool documentation |
… privileges on index patterns for a given rule (elastic#215941) ## Summary Ref: elastic#193204 Updates the text shown when a rule may not have read privileges to a given index pattern.
… privileges on index patterns for a given rule (elastic#215941) ## Summary Ref: elastic#193204 Updates the text shown when a rule may not have read privileges to a given index pattern. (cherry picked from commit 6e4a06e) # Conflicts: # x-pack/solutions/security/plugins/security_solution/server/lib/detection_engine/rule_types/utils/utils.ts
💚 All backports created successfully
Note: Successful backport PRs will be merged automatically after passing CI. Questions ?Please refer to the Backport tool documentation |
… privileges on index patterns for a given rule (elastic#215941) ## Summary Ref: elastic#193204 Updates the text shown when a rule may not have read privileges to a given index pattern. (cherry picked from commit 6e4a06e) # Conflicts: # src/platform/packages/shared/kbn-doc-links/src/get_doc_links.ts # x-pack/solutions/security/plugins/security_solution/server/lib/detection_engine/rule_types/create_security_rule_type_wrapper.ts
…-index privileges on index patterns for a given rule (#215941) (#218878) # Backport This will backport the following commits from `main` to `9.0`: - [[Security Solution] [Detections] Clarify result of missing read-index privileges on index patterns for a given rule (#215941)](#215941) <!--- Backport version: 9.6.6 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sorenlouv/backport) <!--BACKPORT [{"author":{"name":"Devin W. Hurley","email":"devin.hurley@elastic.co"},"sourceCommit":{"committedDate":"2025-04-18T18:14:45Z","message":"[Security Solution] [Detections] Clarify result of missing read-index privileges on index patterns for a given rule (#215941)\n\n## Summary\n\nRef: https://github.com/elastic/kibana/issues/193204\n\nUpdates the text shown when a rule may not have read privileges to a\ngiven index pattern.","sha":"6e4a06ee0f1f2f9e6a45ce064643be323066b66c","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","ci:cloud-deploy","ci:cloud-redeploy","backport:version","v9.1.0","v8.19.0","v9.0.1"],"title":"[Security Solution] [Detections] Clarify result of missing read-index privileges on index patterns for a given rule","number":215941,"url":"https://github.com/elastic/kibana/pull/215941","mergeCommit":{"message":"[Security Solution] [Detections] Clarify result of missing read-index privileges on index patterns for a given rule (#215941)\n\n## Summary\n\nRef: https://github.com/elastic/kibana/issues/193204\n\nUpdates the text shown when a rule may not have read privileges to a\ngiven index pattern.","sha":"6e4a06ee0f1f2f9e6a45ce064643be323066b66c"}},"sourceBranch":"main","suggestedTargetBranches":["8.19","9.0"],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/215941","number":215941,"mergeCommit":{"message":"[Security Solution] [Detections] Clarify result of missing read-index privileges on index patterns for a given rule (#215941)\n\n## Summary\n\nRef: https://github.com/elastic/kibana/issues/193204\n\nUpdates the text shown when a rule may not have read privileges to a\ngiven index pattern.","sha":"6e4a06ee0f1f2f9e6a45ce064643be323066b66c"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"9.0","label":"v9.0.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}] BACKPORT-->
…d-index privileges on index patterns for a given rule (#215941) (#218882) # Backport This will backport the following commits from `main` to `8.19`: - [[Security Solution] [Detections] Clarify result of missing read-index privileges on index patterns for a given rule (#215941)](#215941) <!--- Backport version: 9.6.6 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sorenlouv/backport) <!--BACKPORT [{"author":{"name":"Devin W. Hurley","email":"devin.hurley@elastic.co"},"sourceCommit":{"committedDate":"2025-04-18T18:14:45Z","message":"[Security Solution] [Detections] Clarify result of missing read-index privileges on index patterns for a given rule (#215941)\n\n## Summary\n\nRef: https://github.com/elastic/kibana/issues/193204\n\nUpdates the text shown when a rule may not have read privileges to a\ngiven index pattern.","sha":"6e4a06ee0f1f2f9e6a45ce064643be323066b66c","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","ci:cloud-deploy","ci:cloud-redeploy","backport:version","v9.1.0","v8.19.0","v9.0.1"],"title":"[Security Solution] [Detections] Clarify result of missing read-index privileges on index patterns for a given rule","number":215941,"url":"https://github.com/elastic/kibana/pull/215941","mergeCommit":{"message":"[Security Solution] [Detections] Clarify result of missing read-index privileges on index patterns for a given rule (#215941)\n\n## Summary\n\nRef: https://github.com/elastic/kibana/issues/193204\n\nUpdates the text shown when a rule may not have read privileges to a\ngiven index pattern.","sha":"6e4a06ee0f1f2f9e6a45ce064643be323066b66c"}},"sourceBranch":"main","suggestedTargetBranches":["8.19","9.0"],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/215941","number":215941,"mergeCommit":{"message":"[Security Solution] [Detections] Clarify result of missing read-index privileges on index patterns for a given rule (#215941)\n\n## Summary\n\nRef: https://github.com/elastic/kibana/issues/193204\n\nUpdates the text shown when a rule may not have read privileges to a\ngiven index pattern.","sha":"6e4a06ee0f1f2f9e6a45ce064643be323066b66c"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"9.0","label":"v9.0.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}] BACKPORT-->
… privileges on index patterns for a given rule (elastic#215941) ## Summary Ref: elastic#193204 Updates the text shown when a rule may not have read privileges to a given index pattern.



Summary
Ref: #193204
Updates the text shown when a rule may not have read privileges to a given index pattern.
Given a user with read privileges to
packetbeat-*, and data available inauditbeat-*andpacketbeat-*, the following error would appear if given a rule querying both index patterns.