{
"error": {
"root_cause": [
{
"type": "repository_missing_exception",
"reason": "[es_backup] missing"
}
],
"type": "repository_missing_exception",
"reason": "[es_backup] missing"
},
"status": 404
}searchguard:
enable_snapshot_restore_privilege: truesg_snapshot_restore:
- "CN=curator,OU=IBM Cloud Private"
- "CN=kibana,OU=IBM Cloud Private"roles.yml
sg_snapshot_restore:
cluster:
- cluster:admin/repository/put
- cluster:admin/repository/get
- cluster:admin/snapshot/status
- cluster:admin/snapshot/get
- cluster:admin/snapshot/create
- cluster:admin/snapshot/restore
- cluster:admin/snapshot/delete
indices:
'*':
'*':
- indices:data/write/index
sg_action_groups.yml
MANAGE_SNAPSHOTS:
- "cluster:admin/snapshot/*"
- "cluster:admin/repository/*"
sg_roles.yml
sg_snapshot_restore:
cluster:
- cluster:admin/repository/put
- cluster:admin/repository/get
- cluster:admin/snapshot/status
- cluster:admin/snapshot/get
- cluster:admin/snapshot/create
- cluster:admin/snapshot/restore
- cluster:admin/snapshot/delete
indices:
'*':
'*':
- indices:data/write/index
- indices:admin/createKibana server also has the MANAGE_SNAPSHOT action group in sg_roles.yml
kibana_server:
readonly: true
cluster:
- CLUSTER_MONITOR
- CLUSTER_COMPOSITE_OPS
- MANAGE_SNAPSHOTS
- "cluster:admin/xpack/monitoring*"
- "indices:admin/template*"
indices:
'?kibana':
'*':
- INDICES_ALL
'?reporting*':
'*':
- INDICES_ALL
'?monitoring*':
'*':
sg_roles_mapping.yml
sg_snapshot_restore:
host:
- "*"
users:
- "superuser"
# this allows the kibana console to send snapshotst restore REST calls to elasticsearch API
- "kibana"
- "curator"
Can anyone shed some light on which config is wrong? I'm not trying to restore the all the indices, just one for testing, and no global state.
Using Elasticsearch 5.5.1 and Searchguard 5-5.5.1-16