Bol*_*n95 12 elasticsearch aws-elasticsearch
我遇到了最奇怪的权限问题_msearch。
当使用相同的查询运行简单的 _search 时,一切都运行得很好。
POST /job/_search
{"query":{"bool":{"must":[{"bool":{"must":{"bool":{"should":[{"multi_match":{"query":"s","fields":["title"],"type":"best_fields","operator":"or","fuzziness":2}},{"multi_match":{"query":"s","fields":["title"],"type":"phrase","operator":"or"}},{"multi_match":{"query":"s","fields":["title"],"type":"phrase_prefix","operator":"or"}}],"minimum_should_match":"1"}}}}]}},"size":10,"_source":{"includes":["*"],"excludes":[]}}
Run Code Online (Sandbox Code Playgroud)
运行它时,_msearch我收到权限错误
POST /job/_msearch
{}
{"query":{"bool":{"must":[{"bool":{"must":{"bool":{"should":[{"multi_match":{"query":"s","fields":["title"],"type":"best_fields","operator":"or","fuzziness":2}},{"multi_match":{"query":"s","fields":["title"],"type":"phrase","operator":"or"}},{"multi_match":{"query":"s","fields":["title"],"type":"phrase_prefix","operator":"or"}}],"minimum_should_match":"1"}}}}]}},"size":10,"_source":{"includes":["*"],"excludes":[]}}
Run Code Online (Sandbox Code Playgroud)
{
"error": {
"root_cause": [
{
"type": "security_exception",
"reason": "no permissions for [indices:data/read/msearch] and User [name=public_api, backend_roles=[], requestedTenant=null]"
}
],
"type": "security_exception",
"reason": "no permissions for [indices:data/read/msearch] and User [name=public_api, backend_roles=[], requestedTenant=null]"
},
"status": 403
}
Run Code Online (Sandbox Code Playgroud)
以下是我在 Kibana 中的权限:
我正在 AWS ElasticSearch Service 中运行 OpenDistro。
Pra*_*ran 14
我已经使用以下步骤解决了上述权限问题
Kibana使用admin或用户登录higher previledges单击security选项
单击roles选项,然后根据您的要求为您的用户选择所需的角色。就我而言,用户需要所有访问权限,因此选择了all_access角色
单击Mapped users然后单击Manage mapping选项。
在该Users部分中键入/粘贴IAM-arn/internal-user,然后按 Enter
最后点击地图
就这样,用户将被映射到角色和相应的权限,此后您将不会遇到问题中提到的权限问题
| 归档时间: |
|
| 查看次数: |
21613 次 |
| 最近记录: |