Integrations: All
Fleet: Read
Agents: Read
Agent policies: All
Settings: All
Preconditions:
8.16.0-SNAPSHOT Kibana cloud environment should be available.
New User should be created with above defined role.
An agent policy should be provided access to all the spaces.
Steps to reproduce:
Login with the above user to the second space.
Now navigate to Fleet>Agent policy settings.
Observe the spaces that are not accessible to this user are displayed as ?.
Expected Result:
Spaces which are not accessible should not be displayed even as ? under Agent policy settings for custom user having access only for Space2.
Kibana Build details:
Role: space: SPACE2
Preconditions:
Steps to reproduce:
?
.Expected Result: Spaces which are not accessible should not be displayed even as
?
under Agent policy settings for custom user having access only for Space2.Screen Recording:
https://github.com/user-attachments/assets/6bee6d45-5047-4a85-a5bf-b2ce096684f5
Feature: https://github.com/elastic/ingest-dev/issues/2903 https://github.com/elastic/ingest-dev/issues/1664