Hi @Anthony ,
I am getting an error message, looks like I cannot upload yml files. I will share the contents of each file here.
---
_meta:
type: "actiongroups"
config_version: 2
cluster-base-permissions:
reserved: false
hidden: false
allowed_actions:
- "cluster_monitor"
- "cluster_composite_ops"
- "cluster:admin/opendistro/alerting/*"
- "cluster:admin/opensearch/notifications/*"
static: false
cluster_admin_notifications_readonly:
reserved: false
hidden: false
allowed_actions:
- "cluster:admin/opensearch/notifications/channels/get"
- "cluster:admin/opensearch/notifications/configs/get"
- "cluster:admin/opensearch/notifications/features"
- "cluster:admin/opensearch/notifications/feature/send"
- "cluster:admin/opensearch/notifications/test_notification"
static: false
---
_meta:
type: "allowlist"
config_version: 2
config:
enabled: false
requests:
/_cluster/settings:
- "GET"
/_cat/nodes:
- "GET"
---
_meta:
type: "audit"
config_version: 2
config:
enabled: true
audit:
enable_rest: true
disabled_rest_categories:
- "AUTHENTICATED"
- "GRANTED_PRIVILEGES"
enable_transport: true
disabled_transport_categories:
- "AUTHENTICATED"
- "GRANTED_PRIVILEGES"
ignore_users:
- "kibanaserver"
ignore_requests: []
resolve_bulk_requests: false
log_request_body: true
resolve_indices: true
exclude_sensitive_headers: true
compliance:
enabled: true
internal_config: true
external_config: false
read_metadata_only: true
read_watched_fields: {}
read_ignore_users:
- "kibanaserver"
write_metadata_only: true
write_log_diffs: false
write_watched_indices: []
write_ignore_users:
- "kibanaserver"
---
_meta:
type: "config"
config_version: 2
config:
dynamic:
http:
anonymous_auth_enabled: false
authc:
internal_auth:
description: "Authenticate via internal users database"
http_enabled: true
transport_enabled: true
order: 0
http_authenticator:
type: "basic"
challenge: true
authentication_backend:
type: "intern"
inwin_ldap_auth:
description: "Domain1 Active Directory authentication"
http_enabled: true
transport_enabled: true
order: 1
http_authenticator:
type: "basic"
challenge: false
authentication_backend:
type: "ldap"
config:
enable_ssl: true
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: true
pemtrustedcas_filepath: "certs/ldap-ca-bundle.pem"
hosts:
- "inwinlb.mydomain.com:636"
follow_referrals: false
bind_dn: "svc-elm-lob-ldap@inwin.ad.mydomain.com"
password: "youknowthis"
userbase: "DC=inwin,DC=ad,DC=mydomain,DC=com"
usersearch: "(sAMAccountName={0})"
username_attribute: "sAMAccountName"
connect_timeout: 5000
response_timeout: 5000
skip_users:
- "admin"
- "kibanaserver"
- "kibanaro"
- "logstash"
- "readall"
- "snapshotrestore"
si_ldap_auth:
description: "si Active Directory authentication"
http_enabled: true
transport_enabled: true
order: 2
http_authenticator:
type: "basic"
challenge: false
authentication_backend:
type: "ldap"
config:
enable_ssl: true
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: true
pemtrustedcas_filepath: "certs/ldap-ca-bundle.pem"
hosts:
- "silb.mydomain.com:636"
follow_referrals: false
bind_dn: "svc-elm-lob-ldap@si.ent.domain.com"
password: "4GGC2J42V24TSs42L72n22J3paa2F"
userbase: "DC=si,DC=ent,DC=domain,DC=com"
usersearch: "(sAMAccountName={0})"
username_attribute: "sAMAccountName"
connect_timeout: 5000
response_timeout: 5000
skip_users:
- "admin"
- "kibanaserver"
- "kibanaro"
- "logstash"
- "readall"
- "snapshotrestore"
ade_ldap_auth:
description: "ade Active Directory authentication"
http_enabled: true
transport_enabled: true
order: 3
http_authenticator:
type: "basic"
challenge: false
authentication_backend:
type: "ldap"
config:
enable_ssl: true
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: true
pemtrustedcas_filepath: "certs/ldap-ca-bundle.pem"
hosts:
- "adesmlb.mydomain.com:636"
follow_referrals: false
bind_dn: "svc-elm-lob-ldap@ade.mydomain.com"
password: "6Fn6AV66d66x66wk6h6XbF5g6u"
userbase: "DC=ade,DC=mydomain,DC=com"
usersearch: "(sAMAccountName={0})"
username_attribute: "sAMAccountName"
connect_timeout: 5000
response_timeout: 5000
skip_users:
- "admin"
- "kibanaserver"
- "kibanaro"
- "logstash"
- "readall"
- "snapshotrestore"
authz:
inwin_ldap_authz:
description: "inwin LDAP group authorization"
http_enabled: true
transport_enabled: true
authorization_backend:
type: "ldap"
config:
enable_ssl: true
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: true
pemtrustedcas_filepath: "certs/ldap-ca-bundle.pem"
hosts:
- "inwinlb.mydomain.com:636"
follow_referrals: false
bind_dn: "svc-elm-lob-ldap@inwin.ad.mydomain.com"
password: "youknowthis"
userbase: "DC=inwin,DC=ad,DC=mydomain,DC=com"
usersearch: "(sAMAccountName={0})"
rolebase: "OU=Groups,DC=inwin,DC=ad,DC=mydomain,DC=com"
rolesearch: "(member={0})"
userroleattribute: null
userrolename: null
rolename: "cn"
resolve_nested_roles: false
connect_timeout: 5000
response_timeout: 5000
skip_users:
- "admin"
- "kibanaserver"
- "kibanaro"
- "logstash"
- "readall"
- "snapshotrestore"
si_ldap_authz:
description: "si LDAP group authorization"
http_enabled: true
transport_enabled: true
authorization_backend:
type: "ldap"
config:
enable_ssl: true
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: true
pemtrustedcas_filepath: "certs/ldap-ca-bundle.pem"
hosts:
- "silb.mydomain.com:636"
follow_referrals: false
bind_dn: "svc-elm-lob-ldap@si.ent.domain.com"
password: "4GGC2J42V24TSs42L72n22J3paa2F"
userbase: "DC=si,DC=ent,DC=domain,DC=com"
usersearch: "(sAMAccountName={0})"
rolebase: "OU=Groups,DC=si,DC=ent,DC=domain,DC=com"
rolesearch: "(member={0})"
userroleattribute: null
userrolename: null
rolename: "cn"
resolve_nested_roles: false
connect_timeout: 5000
response_timeout: 5000
skip_users:
- "admin"
- "kibanaserver"
- "kibanaro"
- "logstash"
- "readall"
- "snapshotrestore"
ade_ldap_authz:
description: "ade LDAP group authorization"
http_enabled: true
transport_enabled: true
authorization_backend:
type: "ldap"
config:
enable_ssl: true
enable_start_tls: false
enable_ssl_client_auth: false
verify_hostnames: true
pemtrustedcas_filepath: "certs/ldap-ca-bundle.pem"
hosts:
- "adesmlb.mydomain.com:636"
follow_referrals: false
bind_dn: "svc-elm-lob-ldap@ade.mydomain.com"
password: "6Fn6AV66d66x66wk6h6XbF5g6u"
userbase: "DC=ade,DC=mydomain,DC=com"
usersearch: "(sAMAccountName={0})"
rolebase: "OU=Groups,DC=ade,DC=mydomain,DC=com"
rolesearch: "(member={0})"
userroleattribute: null
userrolename: null
rolename: "cn"
resolve_nested_roles: false
connect_timeout: 5000
response_timeout: 5000
skip_users:
- "admin"
- "kibanaserver"
- "kibanaro"
- "logstash"
- "readall"
- "snapshotrestore"
---
logstash:
hash: "$2a$12$u1ShR4l4uBS3Uv59Pa2y5.1uQuZBrZtmNfqB3iM/.jL0XoV9sghS2"
reserved: false
hidden: false
backend_roles:
- "logstash"
attributes: {}
description: "Demo logstash user, using external role mapping"
opendistro_security_roles: []
static: false
snapshotrestore:
hash: "$2y$12$DpwmetHKwgYnorbgdvORCenv4NAK8cPUg8AI6pxLCuWf/ALc0.v7W"
reserved: false
hidden: false
backend_roles:
- "snapshotrestore"
attributes: {}
description: "Demo snapshotrestore user, using external role mapping"
opendistro_security_roles: []
static: false
jeev_local:
hash: "$2y$12$rZysJvncGj.IzENUQ6vlwenyQ9idjoYAstmLUzo1B.joEt7mN4vd."
reserved: false
hidden: false
backend_roles: []
attributes: {}
opendistro_security_roles: []
static: false
_meta:
type: "internalusers"
config_version: 2
admin:
hash: "$2y$12$Oo0VxcpJHu7WYX4Sv/cqS.caFPe7.jE5gUht.DVOKanGW3mj3YtuW"
reserved: true
hidden: false
backend_roles:
- "admin"
attributes: {}
description: "Demo admin user"
opendistro_security_roles: []
static: false
kibanaserver:
hash: "$2a$12$4AcgAt3xwOWadA5s5blL6ev39OXDNhmOesEoo33eZtrq2N0YrU3H."
reserved: true
hidden: false
backend_roles: []
attributes: {}
description: "Demo OpenSearch Dashboards user"
opendistro_security_roles: []
static: false
kibanaro:
hash: "$2a$12$JJSXNfTowz7Uu5ttXfeYpeYE0arACvcwlPBStB1F.MI7f0U9Z4DGC"
reserved: false
hidden: false
backend_roles:
- "kibanauser"
- "readall"
attributes:
attribute1: "value1"
attribute2: "value2"
attribute3: "value3"
description: "Demo OpenSearch Dashboards read only user, using external role mapping"
opendistro_security_roles: []
static: false
readall:
hash: "$2a$12$ae4ycwzwvLtZxwZ82RmiEunBbIPiAmGZduBAjKN0TXdwQFtCwARz2"
reserved: false
hidden: false
backend_roles:
- "readall"
attributes: {}
description: "Demo readall user, using external role mapping"
opendistro_security_roles: []
static: false
anomalyadmin:
hash: "$2y$12$TRwAAJgnNo67w3rVUz4FIeLx9Dy/llB79zf9I15CKJ9vkM4ZzAd3."
reserved: false
hidden: false
backend_roles: []
attributes: {}
description: "Demo anomaly admin user, using internal role"
opendistro_security_roles:
- "anomaly_full_access"
static: false
---
_meta:
type: "nodesdn"
config_version: 2
jeev_custom_role:
reserved: false
hidden: false
cluster_permissions:
- "cluster_monitor"
- "cluster_composite_ops"
- "cluster:admin/opendistro/alerting/*"
- "cluster_admin_notifications_readonly"
index_permissions:
- index_patterns:
- "logs-apigee*"
- ".kibana"
- ".kibana-6"
- ".kibana_*"
dls: ""
fls: []
masked_fields: []
allowed_actions:
- "read"
- "indices:admin/mappings/get"
- "indices_monitor"
- "indices:admin/aliases/get"
- "indices:data/read/field_caps*"
tenant_permissions:
- tenant_patterns:
- "jeev"
allowed_actions:
- "kibana_all_write"
static: false
jeev:
reserved: false
hidden: false
description: "Tenant for JEEV"
static: false