Caused by: org.elasticsearch.ElasticsearchSecurityException: unauthenticated request indices:data/write/bulk for user User [name=_sg_internal, roles=[]]searchguard.ssl.transport.keystore_filepath: keystore.jkssearchguard.ssl.transport.truststore_filepath: truststore.jkssearchguard.ssl.transport.enforce_hostname_verification: falsesearchguard.ssl.http.enabled: falsesearchguard.ssl.http.keystore_filepath: keystore.jkssearchguard.ssl.http.truststore_filepath: truststore.jkssearchguard.authcz.admin_dn: - CN=kirk,OU=client,O=client,L=test, C=de
cluster.name: docker-ezcore-clusternetwork.host: 0.0.0.0######## End Search Guard Demo Configuration ########xpack.security.enabled: falsexpack.monitoring.enabled: truexpack.graph.enabled: falsexpack.watcher.enabled: falsexpack.monitoring.exporters: my_local: type: localsearchguard.ssl.http.enabled: falseorg.elasticsearch.client.ResponseException: GET http://127.0.0.1:9200/?filter_path=version.number: HTTP/1.1 401 Unauthorized
Authentication finally failedsg_monitor:
cluster:
- cluster:admin/ingest/pipeline/get
- cluster:admin/xpack/monitoring/bulk
- indices:admin/template/get
- indices:admin/template/put
- indices:admin/get
- cluster:monitor/nodes/info
- cluster:monitor/health
- cluster:monitor/main
- cluster:monitor/xpack/info
- indices:data/write/bulk
indices:
'?monitoring*':
'*':
- ALLsg_monitor: users: - monitoring######## Start Search Guard Demo Configuration ########
searchguard.ssl.transport.keystore_filepath: keystore.jks
searchguard.ssl.transport.truststore_filepath: truststore.jks
searchguard.ssl.transport.enforce_hostname_verification: false
searchguard.ssl.http.enabled: false
searchguard.ssl.http.keystore_filepath: keystore.jks
searchguard.ssl.http.truststore_filepath: truststore.jks
searchguard.authcz.admin_dn:
- CN=kirk,OU=client,O=client,L=test, C=de
cluster.name: docker-ezcore-cluster
network.host: 0.0.0.0
######## End Search Guard Demo Configuration ########
xpack.security.enabled: false
xpack.monitoring.enabled: true
xpack.graph.enabled: false
xpack.watcher.enabled: false
xpack.monitoring.exporters:
id1:
type: http
host: ["http://127.0.0.1:9200"]
auth.username: monitoring
auth.password: pword
# ssl:
# truststore.path: truststore.jks
# truststore.password: changeitsg_monitor: cluster: - cluster:admin/mappings/get <--------- added - cluster:admin/ingest/pipeline/put <--------- added - cluster:admin/ingest/pipeline/get - cluster:admin/xpack/monitoring/bulk - indices:admin/template/get - indices:admin/template/put - indices:admin/get - cluster:monitor/nodes/info - cluster:monitor/health - cluster:monitor/main - cluster:monitor/xpack/info - indices:data/write/bulk indices: '?monitoring*': '*': - ALL '?marvel*': <------ added '*': - ALL[2017-06-22T18:21:28,870][INFO ][c.f.s.c.PrivilegesEvaluator] No index-level perm match for User [name=CN=Kibana SearchGuard Dev,OU=Comptes de services,OU=hidden,DC=hidden,DC=hidden,DC=hidden, roles=[]] [IndexType [index=_all, type=*]] [Action [indices:admin/get]] [RolesChecked [sg_kibana_server, sg_monitor, sg_own_index, sg_public]]
[2017-06-22T18:21:28,871][INFO ][c.f.s.c.PrivilegesEvaluator] No permissions for {sg_public=[IndexType [index=_all, type=*]], sg_own_index=[IndexType [index=_all, type=*]], sg_monitor=[IndexType [index=_all, type=*]], sg_kibana_server=[IndexType [index=_all, type=*]]}
[2017-06-22T18:21:28,874][ERROR][o.e.x.m.e.h.BackwardsCompatibilityAliasesResource] org.elasticsearch.xpack.monitoring.exporter.http.BackwardsCompatibilityAliasesResource$$Lambda$1681/1710762394@59f4ec16
org.elasticsearch.client.ResponseException: GET http://127.0.0.1:9200/.marvel-es-1-*?filter_path=*.aliases: HTTP/1.1 403 Forbidden
{"error":{"root_cause":[{"type":"security_exception","reason":"no permissions for indices:admin/get"}],"type":"security_exception","reason":"no permissions for indices:admin/get"},"status":403}
[2017-07-04T10:04:27,435][INFO ][c.f.s.c.PrivilegesEvaluator] No index-level perm match for User [name=<<<my active directory user>>>, roles=[]] [IndexType [index=_all, type=esqueue]] [Action [indices:data/read/search]] [RolesChecked [sg_kibana_server, sg_monitor, sg_own_index, sg_public]][2017-07-04T10:04:27,435][INFO ][c.f.s.c.PrivilegesEvaluator] No permissions for {sg_public=[IndexType [index=_all, type=esqueue]], sg_own_index=[IndexType [index=_all, type=esqueue]], sg_monitor=[IndexType [index=_all, type=esqueue]], sg_kibana_server=[IndexType [index=_all, type=esqueue]]}[2017-07-04T10:06:36,597][WARN ][c.f.s.c.PrivilegesEvaluator] _all does not exist in cluster metadata