I’m trying to a make a new user with similar privilege as the built-in kibanaserver (user)/kibana_server (role) so I can use that instead in opensearch_dashboards.yml, however, despite basically copying the privileges of that role (obtained via REST API), OpenSearch is still saying that the new role has missing privileges. Is it so that creating roles with access to the internal indices is not allowed, or am I missing something?
@silver_searcher
Just to make sure I understand correctly, in kibana.yml under elasticsearch.username instead of kibanaserver user you want to put a new user with the same permissions?
In that case you will need to create that user in internal_users.yml file, then set up the role, but need to add read permissions for tenant, see your example below:
@Anthony
Yes, that’s my intent. Adding the tenant permissions worked, thanks!
Can you please help me understand why though? When I query via REST API the built-in kibana_server role, this is what I get below. The tenant permissions are blank.
Why then if we’re creating our own user with supposedly the same privileges, we need to explicitly define a tenant permission ourselves? There’s some special handling for the built-in kibana_server role?
@silver_searcher I’ve seen in the past this behaviour across some of the built in roles. My only guess (as you already mentioned) is there is some special handling of those built in roles and new roles (although with same permissions attached) need a little “help” to work correctly.
so when im deploying opensearch dashboard im facing issue { “type”: “log”, “@timestamp”: “timestamp”, “tags”: [ “error”, “opensearch”, “data” ], “pid”: 453, “message”: “[security_exception]: no permissions for [indices:admin/create] and User [name=monitor, backend_roles=[monitor_role], requestedTenant=null]”} so for dashboard user i dont want to keep create index right but how to avoid this kind of error.