("java.io.FilePermission" "/proc/self/task" "read") java.security.AccessControlException: access denied ("java.io.FilePermission" "/proc/self/task" "read")

Versions (relevant - OpenSearch/Dashboard/Server OS/Browser):
Opensearch 2.5.0

Describe the issue:

Open search appears to be running but I do see a Read Error in the logs. Should I jhust ignore these?

Configuration:

egrep -v “^\s*(#|$)” /etc/opensearch/opensearch.yml

action.auto_create_index: true
path.data: /var/lib/opensearch
path.logs: /var/log/opensearch
network.host: 127.0.0.1
http.port: 9200
plugins.security.ssl.transport.pemcert_filepath: esnode.pem
plugins.security.ssl.transport.pemkey_filepath: esnode-key.pem
plugins.security.ssl.transport.pemtrustedcas_filepath: root-ca.pem
plugins.security.ssl.transport.enforce_hostname_verification: false
plugins.security.ssl.http.enabled: true
plugins.security.ssl.http.pemcert_filepath: esnode.pem
plugins.security.ssl.http.pemkey_filepath: esnode-key.pem
plugins.security.ssl.http.pemtrustedcas_filepath: root-ca.pem
plugins.security.allow_unsafe_democertificates: true
plugins.security.allow_default_init_securityindex: true
plugins.security.authcz.admin_dn:

  • CN=kirk,OU=client,O=client,L=test, C=de
    plugins.security.audit.type: internal_opensearch
    plugins.security.enable_snapshot_restore_privilege: true
    plugins.security.check_snapshot_restore_write_privileges: true
    plugins.security.restapi.roles_enabled: [“all_access”, “security_rest_api_access”]
    plugins.security.system_indices.enabled: true
    plugins.security.system_indices.indices: [“.plugins-ml-model”, “.plugins-ml-task”, “.opendistro-alerting-config”, “.opendistro-alerting-alert*”, “.opendistro-anomaly-results*”, “.opendistro-anomaly-detector*”, “.opendistro-anomaly-checkpoints”, “.opendistro-anomaly-detection-state”, “.opendistro-reports-", ".opensearch-notifications-”, “.opensearch-notebooks”, “.opensearch-observability”, “.opendistro-asynchronous-search-response*”, “.replication-metadata-store”]
    node.max_local_storage_nodes: 3

Relevant Logs or Screenshots:

[2023-05-03T11:11:44,242][INFO ][o.o.a.c.HashRing         ] [node-1.local] Rebuild AD hash ring for realtime AD with cooldown, nodeChangeEvents size 0
[2023-05-03T11:11:44,242][INFO ][o.o.a.c.HashRing         ] [node-1.local] Build AD version hash ring successfully
[2023-05-03T11:11:44,242][INFO ][o.o.a.c.ADDataMigrator   ] [node-1.local] Start migrating AD data
[2023-05-03T11:11:44,243][INFO ][o.o.a.c.ADDataMigrator   ] [node-1.local] AD job index doesn't exist, no need to migrate
[2023-05-03T11:11:44,243][INFO ][o.o.a.c.ADClusterEventListener] [node-1.local] Init AD version hash ring successfully
[2023-05-03T11:11:44,258][INFO ][o.o.g.GatewayService     ] [node-1.local] recovered [3] indices into cluster_state
[2023-05-03T11:11:44,260][INFO ][o.o.s.c.ConfigurationRepository] [node-1.local] Index .opendistro_security already exists
[2023-05-03T11:11:44,260][INFO ][o.o.s.c.ConfigurationRepository] [node-1.local] Node started, try to initialize it. Wait for at least yellow cluster state....
[2023-05-03T11:11:44,315][INFO ][o.o.p.PluginsService     ] [node-1.local] PluginService:onIndexModule index:[.opendistro_security/7SvVcS8NTCqRAauRUaQQTQ]
[2023-05-03T11:11:44,394][INFO ][o.o.p.PluginsService     ] [node-1.local] PluginService:onIndexModule index:[security-auditlog-2023.05.02/rVZaeOpbRiqd4u_v7TlQOw]
[2023-05-03T11:11:44,404][INFO ][o.o.p.PluginsService     ] [node-1.local] PluginService:onIndexModule index:[security-auditlog-2023.05.03/DzQHYR-ERxO3ExNnwymR9A]
[2023-05-03T11:11:44,438][INFO ][o.o.a.u.d.DestinationMigrationCoordinator] [node-1.local] Detected cluster change event for destination migration
[2023-05-03T11:11:44,499][INFO ][o.o.c.r.a.AllocationService] [node-1.local] Cluster health status changed from [RED] to [YELLOW] (reason: [shards started [[security-auditlog-2023.05.02][0], [.opendistro_security][0], [security-auditlog-2023.05.03][0]]]).
[2023-05-03T11:11:44,514][INFO ][o.o.a.u.d.DestinationMigrationCoordinator] [node-1.local] Detected cluster change event for destination migration
[2023-05-03T11:11:44,517][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Will update 'config' with /etc/opensearch/opensearch-security/config.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,545][ERROR][o.o.p.o.OSGlobals        ] [node-1.local] Error in static initialization of OSGlobals with exception: java.security.AccessControlException: access denied ("java.io.FilePermission" "/proc/self/task" "read")
java.security.AccessControlException: access denied ("java.io.FilePermission" "/proc/self/task" "read")
	at java.security.AccessControlContext.checkPermission(AccessControlContext.java:485) ~[?:?]
	at java.security.AccessController.checkPermission(AccessController.java:1068) ~[?:?]
	at java.lang.SecurityManager.checkPermission(SecurityManager.java:416) ~[?:?]
	at java.lang.SecurityManager.checkRead(SecurityManager.java:756) ~[?:?]
	at java.io.File.normalizedList(File.java:1171) ~[?:?]
	at java.io.File.listFiles(File.java:1269) ~[?:?]
	at org.opensearch.performanceanalyzer.os.OSGlobals.enumTids(OSGlobals.java:75) ~[performanceanalyzer-rca-2.5.0.0.jar:?]
	at org.opensearch.performanceanalyzer.os.OSGlobals.<clinit>(OSGlobals.java:34) [performanceanalyzer-rca-2.5.0.0.jar:?]
	at org.opensearch.performanceanalyzer.metrics_generator.linux.LinuxOSMetricsGenerator.getPid(LinuxOSMetricsGenerator.java:43) [performanceanalyzer-rca-2.5.0.0.jar:?]
	at org.opensearch.performanceanalyzer.jvm.ThreadList.<clinit>(ThreadList.java:42) [performanceanalyzer-rca-2.5.0.0.jar:?]
	at org.opensearch.performanceanalyzer.metrics.ThreadIDUtil.getNativeThreadId(ThreadIDUtil.java:22) [performanceanalyzer-rca-2.5.0.0.jar:?]
	at org.opensearch.performanceanalyzer.metrics.ThreadIDUtil.getNativeCurrentThreadId(ThreadIDUtil.java:18) [performanceanalyzer-rca-2.5.0.0.jar:?]
	at org.opensearch.performanceanalyzer.transport.PerformanceAnalyzerTransportChannel.set(PerformanceAnalyzerTransportChannel.java:46) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.performanceanalyzer.transport.PerformanceAnalyzerTransportRequestHandler.getShardBulkChannel(PerformanceAnalyzerTransportRequestHandler.java:84) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.performanceanalyzer.transport.PerformanceAnalyzerTransportRequestHandler.getChannel(PerformanceAnalyzerTransportRequestHandler.java:53) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.performanceanalyzer.transport.PerformanceAnalyzerTransportRequestHandler.messageReceived(PerformanceAnalyzerTransportRequestHandler.java:43) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.transport.RequestHandlerRegistry.processMessageReceived(RequestHandlerRegistry.java:106) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.transport.TransportService.sendLocalRequest(TransportService.java:990) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.transport.TransportService$3.sendRequest(TransportService.java:152) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.transport.TransportService.sendRequestInternal(TransportService.java:928) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.security.transport.SecurityInterceptor.sendRequestDecorate(SecurityInterceptor.java:206) [opensearch-security-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.security.OpenSearchSecurityPlugin$7$2.sendRequest(OpenSearchSecurityPlugin.java:673) [opensearch-security-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.transport.TransportService.sendRequest(TransportService.java:815) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.transport.TransportService.sendRequest(TransportService.java:758) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.replication.TransportReplicationAction$ReroutePhase.performAction(TransportReplicationAction.java:1063) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.replication.TransportReplicationAction$ReroutePhase.performLocalAction(TransportReplicationAction.java:1004) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.replication.TransportReplicationAction$ReroutePhase.doRun(TransportReplicationAction.java:985) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:52) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.replication.TransportReplicationAction.runReroutePhase(TransportReplicationAction.java:252) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.replication.TransportReplicationAction.doExecute(TransportReplicationAction.java:247) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.replication.TransportReplicationAction.doExecute(TransportReplicationAction.java:110) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:218) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.indexmanagement.rollup.actionfilter.FieldCapsFilter.apply(FieldCapsFilter.kt:118) [opensearch-index-management-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.security.filter.SecurityFilter.apply0(SecurityFilter.java:232) [opensearch-security-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.security.filter.SecurityFilter.apply(SecurityFilter.java:149) [opensearch-security-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.performanceanalyzer.action.PerformanceAnalyzerActionFilter.apply(PerformanceAnalyzerActionFilter.java:78) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.TransportAction.execute(TransportAction.java:188) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.TransportAction.execute(TransportAction.java:107) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.bulk.TransportBulkAction$BulkOperation.doRun(TransportBulkAction.java:632) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:52) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.bulk.TransportBulkAction.executeBulk(TransportBulkAction.java:774) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.bulk.TransportBulkAction.doInternalExecute(TransportBulkAction.java:309) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.bulk.TransportBulkAction.doExecute(TransportBulkAction.java:220) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.bulk.TransportBulkAction.doExecute(TransportBulkAction.java:118) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:218) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.indexmanagement.rollup.actionfilter.FieldCapsFilter.apply(FieldCapsFilter.kt:118) [opensearch-index-management-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.security.filter.SecurityFilter.apply0(SecurityFilter.java:232) [opensearch-security-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.security.filter.SecurityFilter.apply(SecurityFilter.java:149) [opensearch-security-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.performanceanalyzer.action.PerformanceAnalyzerActionFilter.apply(PerformanceAnalyzerActionFilter.java:57) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.TransportAction.execute(TransportAction.java:188) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.bulk.TransportSingleItemBulkWriteAction.doExecute(TransportSingleItemBulkWriteAction.java:73) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.bulk.TransportSingleItemBulkWriteAction.doExecute(TransportSingleItemBulkWriteAction.java:53) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:218) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.indexmanagement.rollup.actionfilter.FieldCapsFilter.apply(FieldCapsFilter.kt:118) [opensearch-index-management-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.security.filter.SecurityFilter.apply0(SecurityFilter.java:232) [opensearch-security-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.security.filter.SecurityFilter.apply(SecurityFilter.java:149) [opensearch-security-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.performanceanalyzer.action.PerformanceAnalyzerActionFilter.apply(PerformanceAnalyzerActionFilter.java:78) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.TransportAction.execute(TransportAction.java:188) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.action.support.TransportAction.execute(TransportAction.java:107) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.client.node.NodeClient.executeLocally(NodeClient.java:110) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.client.node.NodeClient.doExecute(NodeClient.java:97) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.client.support.AbstractClient.execute(AbstractClient.java:461) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.client.support.AbstractClient.execute(AbstractClient.java:448) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.client.support.AbstractClient.index(AbstractClient.java:472) [opensearch-2.5.0.jar:2.5.0]
	at org.opensearch.security.support.ConfigHelper.uploadFile(ConfigHelper.java:80) [opensearch-security-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.security.support.ConfigHelper.uploadFile(ConfigHelper.java:62) [opensearch-security-2.5.0.0.jar:2.5.0.0]
	at org.opensearch.security.configuration.ConfigurationRepository$1.run(ConfigurationRepository.java:133) [opensearch-security-2.5.0.0.jar:2.5.0.0]
	at java.lang.Thread.run(Thread.java:833) [?:?]
[2023-05-03T11:11:44,572][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Index .opendistro_security already contains doc with id config, skipping update.
[2023-05-03T11:11:44,573][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Will update 'roles' with /etc/opensearch/opensearch-security/roles.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,578][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Index .opendistro_security already contains doc with id roles, skipping update.
[2023-05-03T11:11:44,579][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Will update 'rolesmapping' with /etc/opensearch/opensearch-security/roles_mapping.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,584][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Index .opendistro_security already contains doc with id rolesmapping, skipping update.
[2023-05-03T11:11:44,584][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Will update 'internalusers' with /etc/opensearch/opensearch-security/internal_users.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,590][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Index .opendistro_security already contains doc with id internalusers, skipping update.
[2023-05-03T11:11:44,590][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Will update 'actiongroups' with /etc/opensearch/opensearch-security/action_groups.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,593][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Index .opendistro_security already contains doc with id actiongroups, skipping update.
[2023-05-03T11:11:44,593][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Will update 'tenants' with /etc/opensearch/opensearch-security/tenants.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,595][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Index .opendistro_security already contains doc with id tenants, skipping update.
[2023-05-03T11:11:44,596][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Will update 'nodesdn' with /etc/opensearch/opensearch-security/nodes_dn.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=true
[2023-05-03T11:11:44,598][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Index .opendistro_security already contains doc with id nodesdn, skipping update.
[2023-05-03T11:11:44,598][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Will update 'whitelist' with /etc/opensearch/opensearch-security/whitelist.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=true
[2023-05-03T11:11:44,600][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Index .opendistro_security already contains doc with id whitelist, skipping update.
[2023-05-03T11:11:44,600][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Will update 'allowlist' with /etc/opensearch/opensearch-security/allowlist.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=true
[2023-05-03T11:11:44,602][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Index .opendistro_security already contains doc with id allowlist, skipping update.
[2023-05-03T11:11:44,602][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Will update 'audit' with /etc/opensearch/opensearch-security/audit.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,614][INFO ][o.o.s.s.ConfigHelper     ] [node-1.local] Index .opendistro_security already contains doc with id audit, skipping update.
[2023-05-03T11:11:44,699][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing on REST API is enabled.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] [AUTHENTICATED, GRANTED_PRIVILEGES] are excluded from REST API auditing.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing on Transport API is enabled.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] [AUTHENTICATED, GRANTED_PRIVILEGES] are excluded from Transport API auditing.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing of request body is enabled.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Bulk requests resolution is disabled during request auditing.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Index resolution is enabled during request auditing.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Sensitive headers auditing is enabled.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing requests from kibanaserver users is disabled.
[2023-05-03T11:11:44,702][WARN ][o.o.s.a.r.AuditMessageRouter] [node-1.local] No endpoint configured for categories [BAD_HEADERS, FAILED_LOGIN, MISSING_PRIVILEGES, GRANTED_PRIVILEGES, OPENDISTRO_SECURITY_INDEX_ATTEMPT, SSL_EXCEPTION, AUTHENTICATED, INDEX_EVENT, COMPLIANCE_DOC_READ, COMPLIANCE_DOC_WRITE, COMPLIANCE_EXTERNAL_CONFIG, COMPLIANCE_INTERNAL_CONFIG_READ, COMPLIANCE_INTERNAL_CONFIG_WRITE], using default endpoint
[2023-05-03T11:11:44,702][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing of external configuration is disabled.
[2023-05-03T11:11:44,702][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing of internal configuration is enabled.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing only metadata information for read request is enabled.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing will watch {} for read requests.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing read operation requests from kibanaserver users is disabled.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing only metadata information for write request is enabled.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing diffs for write requests is disabled.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing write operation requests from kibanaserver users is disabled.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Auditing will watch <NONE> for write requests.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] .opendistro_security is used as internal security index.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl   ] [node-1.local] Internal index used for posting audit logs is null
[2023-05-03T11:11:44,703][INFO ][o.o.s.c.ConfigurationRepository] [node-1.local] Hot-reloading of audit configuration is enabled
[2023-05-03T11:11:44,704][INFO ][o.o.s.c.ConfigurationRepository] [node-1.local] Node 'node-1.local' initialized

The performance analyzer plugin is enabled and it will access some system files like /proc/self/task to read stats, but seems that the user who runs OpenSearch process doesn’t have the read permission, so maybe you can grant the users read permission to read some system files, or you can disable performance analyzer plugin if you do not use it.