Versions (relevant - OpenSearch/Dashboard/Server OS/Browser):
Opensearch 2.5.0
Describe the issue:
Open search appears to be running but I do see a Read Error in the logs. Should I jhust ignore these?
Configuration:
egrep -v “^\s*(#|$)” /etc/opensearch/opensearch.yml
action.auto_create_index: true
path.data: /var/lib/opensearch
path.logs: /var/log/opensearch
network.host: 127.0.0.1
http.port: 9200
plugins.security.ssl.transport.pemcert_filepath: esnode.pem
plugins.security.ssl.transport.pemkey_filepath: esnode-key.pem
plugins.security.ssl.transport.pemtrustedcas_filepath: root-ca.pem
plugins.security.ssl.transport.enforce_hostname_verification: false
plugins.security.ssl.http.enabled: true
plugins.security.ssl.http.pemcert_filepath: esnode.pem
plugins.security.ssl.http.pemkey_filepath: esnode-key.pem
plugins.security.ssl.http.pemtrustedcas_filepath: root-ca.pem
plugins.security.allow_unsafe_democertificates: true
plugins.security.allow_default_init_securityindex: true
plugins.security.authcz.admin_dn:
- CN=kirk,OU=client,O=client,L=test, C=de
plugins.security.audit.type: internal_opensearch
plugins.security.enable_snapshot_restore_privilege: true
plugins.security.check_snapshot_restore_write_privileges: true
plugins.security.restapi.roles_enabled: [“all_access”, “security_rest_api_access”]
plugins.security.system_indices.enabled: true
plugins.security.system_indices.indices: [“.plugins-ml-model”, “.plugins-ml-task”, “.opendistro-alerting-config”, “.opendistro-alerting-alert*”, “.opendistro-anomaly-results*”, “.opendistro-anomaly-detector*”, “.opendistro-anomaly-checkpoints”, “.opendistro-anomaly-detection-state”, “.opendistro-reports-", ".opensearch-notifications-”, “.opensearch-notebooks”, “.opensearch-observability”, “.opendistro-asynchronous-search-response*”, “.replication-metadata-store”]
node.max_local_storage_nodes: 3
Relevant Logs or Screenshots:
[2023-05-03T11:11:44,242][INFO ][o.o.a.c.HashRing ] [node-1.local] Rebuild AD hash ring for realtime AD with cooldown, nodeChangeEvents size 0
[2023-05-03T11:11:44,242][INFO ][o.o.a.c.HashRing ] [node-1.local] Build AD version hash ring successfully
[2023-05-03T11:11:44,242][INFO ][o.o.a.c.ADDataMigrator ] [node-1.local] Start migrating AD data
[2023-05-03T11:11:44,243][INFO ][o.o.a.c.ADDataMigrator ] [node-1.local] AD job index doesn't exist, no need to migrate
[2023-05-03T11:11:44,243][INFO ][o.o.a.c.ADClusterEventListener] [node-1.local] Init AD version hash ring successfully
[2023-05-03T11:11:44,258][INFO ][o.o.g.GatewayService ] [node-1.local] recovered [3] indices into cluster_state
[2023-05-03T11:11:44,260][INFO ][o.o.s.c.ConfigurationRepository] [node-1.local] Index .opendistro_security already exists
[2023-05-03T11:11:44,260][INFO ][o.o.s.c.ConfigurationRepository] [node-1.local] Node started, try to initialize it. Wait for at least yellow cluster state....
[2023-05-03T11:11:44,315][INFO ][o.o.p.PluginsService ] [node-1.local] PluginService:onIndexModule index:[.opendistro_security/7SvVcS8NTCqRAauRUaQQTQ]
[2023-05-03T11:11:44,394][INFO ][o.o.p.PluginsService ] [node-1.local] PluginService:onIndexModule index:[security-auditlog-2023.05.02/rVZaeOpbRiqd4u_v7TlQOw]
[2023-05-03T11:11:44,404][INFO ][o.o.p.PluginsService ] [node-1.local] PluginService:onIndexModule index:[security-auditlog-2023.05.03/DzQHYR-ERxO3ExNnwymR9A]
[2023-05-03T11:11:44,438][INFO ][o.o.a.u.d.DestinationMigrationCoordinator] [node-1.local] Detected cluster change event for destination migration
[2023-05-03T11:11:44,499][INFO ][o.o.c.r.a.AllocationService] [node-1.local] Cluster health status changed from [RED] to [YELLOW] (reason: [shards started [[security-auditlog-2023.05.02][0], [.opendistro_security][0], [security-auditlog-2023.05.03][0]]]).
[2023-05-03T11:11:44,514][INFO ][o.o.a.u.d.DestinationMigrationCoordinator] [node-1.local] Detected cluster change event for destination migration
[2023-05-03T11:11:44,517][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Will update 'config' with /etc/opensearch/opensearch-security/config.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,545][ERROR][o.o.p.o.OSGlobals ] [node-1.local] Error in static initialization of OSGlobals with exception: java.security.AccessControlException: access denied ("java.io.FilePermission" "/proc/self/task" "read")
java.security.AccessControlException: access denied ("java.io.FilePermission" "/proc/self/task" "read")
at java.security.AccessControlContext.checkPermission(AccessControlContext.java:485) ~[?:?]
at java.security.AccessController.checkPermission(AccessController.java:1068) ~[?:?]
at java.lang.SecurityManager.checkPermission(SecurityManager.java:416) ~[?:?]
at java.lang.SecurityManager.checkRead(SecurityManager.java:756) ~[?:?]
at java.io.File.normalizedList(File.java:1171) ~[?:?]
at java.io.File.listFiles(File.java:1269) ~[?:?]
at org.opensearch.performanceanalyzer.os.OSGlobals.enumTids(OSGlobals.java:75) ~[performanceanalyzer-rca-2.5.0.0.jar:?]
at org.opensearch.performanceanalyzer.os.OSGlobals.<clinit>(OSGlobals.java:34) [performanceanalyzer-rca-2.5.0.0.jar:?]
at org.opensearch.performanceanalyzer.metrics_generator.linux.LinuxOSMetricsGenerator.getPid(LinuxOSMetricsGenerator.java:43) [performanceanalyzer-rca-2.5.0.0.jar:?]
at org.opensearch.performanceanalyzer.jvm.ThreadList.<clinit>(ThreadList.java:42) [performanceanalyzer-rca-2.5.0.0.jar:?]
at org.opensearch.performanceanalyzer.metrics.ThreadIDUtil.getNativeThreadId(ThreadIDUtil.java:22) [performanceanalyzer-rca-2.5.0.0.jar:?]
at org.opensearch.performanceanalyzer.metrics.ThreadIDUtil.getNativeCurrentThreadId(ThreadIDUtil.java:18) [performanceanalyzer-rca-2.5.0.0.jar:?]
at org.opensearch.performanceanalyzer.transport.PerformanceAnalyzerTransportChannel.set(PerformanceAnalyzerTransportChannel.java:46) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
at org.opensearch.performanceanalyzer.transport.PerformanceAnalyzerTransportRequestHandler.getShardBulkChannel(PerformanceAnalyzerTransportRequestHandler.java:84) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
at org.opensearch.performanceanalyzer.transport.PerformanceAnalyzerTransportRequestHandler.getChannel(PerformanceAnalyzerTransportRequestHandler.java:53) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
at org.opensearch.performanceanalyzer.transport.PerformanceAnalyzerTransportRequestHandler.messageReceived(PerformanceAnalyzerTransportRequestHandler.java:43) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
at org.opensearch.transport.RequestHandlerRegistry.processMessageReceived(RequestHandlerRegistry.java:106) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.transport.TransportService.sendLocalRequest(TransportService.java:990) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.transport.TransportService$3.sendRequest(TransportService.java:152) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.transport.TransportService.sendRequestInternal(TransportService.java:928) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.security.transport.SecurityInterceptor.sendRequestDecorate(SecurityInterceptor.java:206) [opensearch-security-2.5.0.0.jar:2.5.0.0]
at org.opensearch.security.OpenSearchSecurityPlugin$7$2.sendRequest(OpenSearchSecurityPlugin.java:673) [opensearch-security-2.5.0.0.jar:2.5.0.0]
at org.opensearch.transport.TransportService.sendRequest(TransportService.java:815) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.transport.TransportService.sendRequest(TransportService.java:758) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.replication.TransportReplicationAction$ReroutePhase.performAction(TransportReplicationAction.java:1063) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.replication.TransportReplicationAction$ReroutePhase.performLocalAction(TransportReplicationAction.java:1004) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.replication.TransportReplicationAction$ReroutePhase.doRun(TransportReplicationAction.java:985) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:52) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.replication.TransportReplicationAction.runReroutePhase(TransportReplicationAction.java:252) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.replication.TransportReplicationAction.doExecute(TransportReplicationAction.java:247) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.replication.TransportReplicationAction.doExecute(TransportReplicationAction.java:110) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:218) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.indexmanagement.rollup.actionfilter.FieldCapsFilter.apply(FieldCapsFilter.kt:118) [opensearch-index-management-2.5.0.0.jar:2.5.0.0]
at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.security.filter.SecurityFilter.apply0(SecurityFilter.java:232) [opensearch-security-2.5.0.0.jar:2.5.0.0]
at org.opensearch.security.filter.SecurityFilter.apply(SecurityFilter.java:149) [opensearch-security-2.5.0.0.jar:2.5.0.0]
at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.performanceanalyzer.action.PerformanceAnalyzerActionFilter.apply(PerformanceAnalyzerActionFilter.java:78) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.TransportAction.execute(TransportAction.java:188) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.TransportAction.execute(TransportAction.java:107) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.bulk.TransportBulkAction$BulkOperation.doRun(TransportBulkAction.java:632) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.common.util.concurrent.AbstractRunnable.run(AbstractRunnable.java:52) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.bulk.TransportBulkAction.executeBulk(TransportBulkAction.java:774) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.bulk.TransportBulkAction.doInternalExecute(TransportBulkAction.java:309) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.bulk.TransportBulkAction.doExecute(TransportBulkAction.java:220) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.bulk.TransportBulkAction.doExecute(TransportBulkAction.java:118) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:218) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.indexmanagement.rollup.actionfilter.FieldCapsFilter.apply(FieldCapsFilter.kt:118) [opensearch-index-management-2.5.0.0.jar:2.5.0.0]
at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.security.filter.SecurityFilter.apply0(SecurityFilter.java:232) [opensearch-security-2.5.0.0.jar:2.5.0.0]
at org.opensearch.security.filter.SecurityFilter.apply(SecurityFilter.java:149) [opensearch-security-2.5.0.0.jar:2.5.0.0]
at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.performanceanalyzer.action.PerformanceAnalyzerActionFilter.apply(PerformanceAnalyzerActionFilter.java:57) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.TransportAction.execute(TransportAction.java:188) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.bulk.TransportSingleItemBulkWriteAction.doExecute(TransportSingleItemBulkWriteAction.java:73) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.bulk.TransportSingleItemBulkWriteAction.doExecute(TransportSingleItemBulkWriteAction.java:53) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:218) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.indexmanagement.rollup.actionfilter.FieldCapsFilter.apply(FieldCapsFilter.kt:118) [opensearch-index-management-2.5.0.0.jar:2.5.0.0]
at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.security.filter.SecurityFilter.apply0(SecurityFilter.java:232) [opensearch-security-2.5.0.0.jar:2.5.0.0]
at org.opensearch.security.filter.SecurityFilter.apply(SecurityFilter.java:149) [opensearch-security-2.5.0.0.jar:2.5.0.0]
at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.performanceanalyzer.action.PerformanceAnalyzerActionFilter.apply(PerformanceAnalyzerActionFilter.java:78) [opensearch-performance-analyzer-2.5.0.0.jar:2.5.0.0]
at org.opensearch.action.support.TransportAction$RequestFilterChain.proceed(TransportAction.java:216) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.TransportAction.execute(TransportAction.java:188) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.action.support.TransportAction.execute(TransportAction.java:107) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.client.node.NodeClient.executeLocally(NodeClient.java:110) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.client.node.NodeClient.doExecute(NodeClient.java:97) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.client.support.AbstractClient.execute(AbstractClient.java:461) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.client.support.AbstractClient.execute(AbstractClient.java:448) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.client.support.AbstractClient.index(AbstractClient.java:472) [opensearch-2.5.0.jar:2.5.0]
at org.opensearch.security.support.ConfigHelper.uploadFile(ConfigHelper.java:80) [opensearch-security-2.5.0.0.jar:2.5.0.0]
at org.opensearch.security.support.ConfigHelper.uploadFile(ConfigHelper.java:62) [opensearch-security-2.5.0.0.jar:2.5.0.0]
at org.opensearch.security.configuration.ConfigurationRepository$1.run(ConfigurationRepository.java:133) [opensearch-security-2.5.0.0.jar:2.5.0.0]
at java.lang.Thread.run(Thread.java:833) [?:?]
[2023-05-03T11:11:44,572][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Index .opendistro_security already contains doc with id config, skipping update.
[2023-05-03T11:11:44,573][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Will update 'roles' with /etc/opensearch/opensearch-security/roles.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,578][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Index .opendistro_security already contains doc with id roles, skipping update.
[2023-05-03T11:11:44,579][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Will update 'rolesmapping' with /etc/opensearch/opensearch-security/roles_mapping.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,584][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Index .opendistro_security already contains doc with id rolesmapping, skipping update.
[2023-05-03T11:11:44,584][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Will update 'internalusers' with /etc/opensearch/opensearch-security/internal_users.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,590][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Index .opendistro_security already contains doc with id internalusers, skipping update.
[2023-05-03T11:11:44,590][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Will update 'actiongroups' with /etc/opensearch/opensearch-security/action_groups.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,593][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Index .opendistro_security already contains doc with id actiongroups, skipping update.
[2023-05-03T11:11:44,593][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Will update 'tenants' with /etc/opensearch/opensearch-security/tenants.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,595][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Index .opendistro_security already contains doc with id tenants, skipping update.
[2023-05-03T11:11:44,596][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Will update 'nodesdn' with /etc/opensearch/opensearch-security/nodes_dn.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=true
[2023-05-03T11:11:44,598][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Index .opendistro_security already contains doc with id nodesdn, skipping update.
[2023-05-03T11:11:44,598][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Will update 'whitelist' with /etc/opensearch/opensearch-security/whitelist.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=true
[2023-05-03T11:11:44,600][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Index .opendistro_security already contains doc with id whitelist, skipping update.
[2023-05-03T11:11:44,600][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Will update 'allowlist' with /etc/opensearch/opensearch-security/allowlist.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=true
[2023-05-03T11:11:44,602][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Index .opendistro_security already contains doc with id allowlist, skipping update.
[2023-05-03T11:11:44,602][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Will update 'audit' with /etc/opensearch/opensearch-security/audit.yml and populate it with empty doc if file missing and populateEmptyIfFileMissing=false
[2023-05-03T11:11:44,614][INFO ][o.o.s.s.ConfigHelper ] [node-1.local] Index .opendistro_security already contains doc with id audit, skipping update.
[2023-05-03T11:11:44,699][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing on REST API is enabled.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] [AUTHENTICATED, GRANTED_PRIVILEGES] are excluded from REST API auditing.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing on Transport API is enabled.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] [AUTHENTICATED, GRANTED_PRIVILEGES] are excluded from Transport API auditing.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing of request body is enabled.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Bulk requests resolution is disabled during request auditing.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Index resolution is enabled during request auditing.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Sensitive headers auditing is enabled.
[2023-05-03T11:11:44,700][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing requests from kibanaserver users is disabled.
[2023-05-03T11:11:44,702][WARN ][o.o.s.a.r.AuditMessageRouter] [node-1.local] No endpoint configured for categories [BAD_HEADERS, FAILED_LOGIN, MISSING_PRIVILEGES, GRANTED_PRIVILEGES, OPENDISTRO_SECURITY_INDEX_ATTEMPT, SSL_EXCEPTION, AUTHENTICATED, INDEX_EVENT, COMPLIANCE_DOC_READ, COMPLIANCE_DOC_WRITE, COMPLIANCE_EXTERNAL_CONFIG, COMPLIANCE_INTERNAL_CONFIG_READ, COMPLIANCE_INTERNAL_CONFIG_WRITE], using default endpoint
[2023-05-03T11:11:44,702][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing of external configuration is disabled.
[2023-05-03T11:11:44,702][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing of internal configuration is enabled.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing only metadata information for read request is enabled.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing will watch {} for read requests.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing read operation requests from kibanaserver users is disabled.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing only metadata information for write request is enabled.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing diffs for write requests is disabled.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing write operation requests from kibanaserver users is disabled.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Auditing will watch <NONE> for write requests.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] .opendistro_security is used as internal security index.
[2023-05-03T11:11:44,703][INFO ][o.o.s.a.i.AuditLogImpl ] [node-1.local] Internal index used for posting audit logs is null
[2023-05-03T11:11:44,703][INFO ][o.o.s.c.ConfigurationRepository] [node-1.local] Hot-reloading of audit configuration is enabled
[2023-05-03T11:11:44,704][INFO ][o.o.s.c.ConfigurationRepository] [node-1.local] Node 'node-1.local' initialized