Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Connectors cannot call refresh on .elastic-connectors after System Index conversion #3155

Open
seanstory opened this issue Jan 27, 2025 · 1 comment
Labels
bug Something isn't working epic:agentless

Comments

@seanstory
Copy link
Member

Bug Description

When launching a fresh agentless connector on 9.0.0-SNAPSHOT, I'm hitting:

[elastic_agent.connectors][error] Error while checking existence of connector 'f641ab2c-8002-41d5-959d-943425d217a2': AuthorizationException(403, 'security_exception', 'action [indices:admin/refresh] is unauthorized for API key id [W-SfqJQBlxUzDiujVIuP] of user [elastic/fleet-server] on restricted indices [.elastic-connectors], this action is granted by the index privileges [maintenance,manage,all]')

Jedr suggests that we should be able to remove these refresh checks, since the Connectors APIs are doing these for us under the hood.

To Reproduce

  1. Create a 9.0.0 deployment
  2. create a Confluence Cloud connector from the integrations tab
  3. navigate to the Agent UI
  4. click on the Agent and view its connectors logs
  5. see the above stack trace

Expected behavior

Connectors should have sufficient privileges do do whatever they try to do, and should only do the things they have privileges for.

Environment

9.0.0-SNAPSHOT

@jedrazb
Copy link
Member

jedrazb commented Feb 5, 2025

Not in scope for Feb 2025 anymore, since we want to migrate to Connector APIs fully

@jedrazb jedrazb removed this from the February 2025 milestone Feb 5, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working epic:agentless
Projects
None yet
Development

No branches or pull requests

2 participants