Versions (relevant - OpenSearch/Dashboard/Server OS/Browser):
OpenSearch 2.15
Background:
- AWS OpenSearch domain in ap-southeast-1, fine-grained access control enabled.
- Master user: internal database; IAM Identity Center disabled.
- Repository created successfully via API:
PUT _snapshot/prod_opensearch_repo/snapshot-2
Describe the issue:
Restoring snapshot fails:
POST /_snapshot/prod_opensearch_repo/snapshot-2/_restore
{ “indices”: “-.kibana*, -.opendistro*”, “include_global_state”: false }
{
“error”: {
“root_cause”: [
{
“type”: “security_exception”,
“reason”: “no permissions for and User [name=admin, backend_roles=[arn:aws:iam::851725613314:role/opensearchsnapshotrol], requestedTenant=]”
}
],
“type”: “security_exception”,
“reason”: “no permissions for and User [name=admin, backend_roles=[arn:aws:iam::851725613314:role/opensearchsnapshotrol], requestedTenant=]”
},
“status”: 403
}
Configuration:
Auth Info
{
“user”: “User [name=admin, backend_roles=[arn:aws:iam::851725613314:role/opensearchsnapshotrol], requestedTenant=]”,
“user_name”: “admin”,
“user_requested_tenant”: “”,
“backend_roles”: [
“arn:aws:iam::851725613314:role/opensearchsnapshotrol”
],
“custom_attribute_names”: ,
“roles”: [
“manage_snapshots”,
“security_manager”,
“all_access”,
“snapshot_management_full_access”
],
“tenants”: {
“global_tenant”: true,
“admin”: true
},
“principal”: null,
“peer_certificates”: “0”,
“sso_logout_url”: null
}
Manage Snapshots
{
“manage_snapshots”: {
“hosts”: ,
“users”: [
“arn:aws:iam::851725613314:user/Agmo”,
“admin”
],
“reserved”: false,
“hidden”: false,
“backend_roles”: [
“arn:aws:iam::851725613314:role/opensearchsnapshotrole”
],
“and_backend_roles”:
}
}
Snapshot Management full Access
{
“snapshot_management_full_access”: {
“hosts”: ,
“users”: [
“admin”
],
“reserved”: false,
“hidden”: false,
“backend_roles”: [
“arn:aws:iam::851725613314:user/devmiddlewarefunctionaluser”,
“arn:aws:iam::851725613314:role/opensearchsnapshotrole”
],
“and_backend_roles”:
}
}
Questions
- Why does OpenSearch still return
no permissions for []
despite correctmanage_snapshots
mapping and roles identified inauthinfo
? - Is mapping to
snapshot_management_full_access
orsecurity_manager
required as a separate step? - Is certificate-based admin auth (PEM) required for snapshot restores on AWS-managed OpenSearch—even with FGAC?
- Are there any missing configuration layers (Domain Policies, FGAC migration, etc.) or logs I should examine?
Relevant Logs or Screenshots: