Hi:
I have ES 5.6.1 (down-graded from 5.6.3 so RoR would work). I’ve been able to configure it with the examples
from the github site and it’s working great. However, I have ran into perhaps a bug. When I log in with my admin user (in yaml file below) and try to create a new index pattern, I get the below error when trying to read the field data for the timestamp:
[2017-10-27T19:29:22,542][INFO ][o.e.p.r.a.ACL ] FORBIDDEN by default req={ ID:1459479432-478702143#424, TYP:FieldCapabilitiesRequest, CGR:N/A, USR:[no basic auth header], BRS:false, ACT:indices:data/read/field_caps, OA:10.0.0.158, IDX:logstash-, MET:POST, PTH:/logstash-/_field_caps?fields=*&ignore_unavailable=true&allow_no_indices=false, CNT:<N/A>, HDR:Connection,Content-Length,Host, HIS:[::KIBANA-SRV::->[auth_key->false]], [::LOGSTASH::->[auth_key->false]], [::RO log access::->[groups->false]], [::RW log access::->[groups->false]] }
The result is that the dropdown box to select the timestamp field is blank. This means that I can’t load new indexes into Kibana. I did notice that “indices:data/read/field_caps” is not listed as an action rule. Is this a bug or (hopefully) a misconfiguration error on my part?
Settings follow:
readonlyrest:
access_control_rules:
- name: "::LOGSTASH::"
# auth_key is good for testing, but replace it with `auth_key_sha1`!
auth_key: logstash:logstash
actions: [ "cluster:monitor/main","indices:admin/types/exists","indices:data/read/*","indices:data/write/*","indices:admin/template/*","indices:admin/create" ]
indices: [ "*" ]
# We trust Kibana's server side process, full access granted via HTTP authentication
- name: "::KIBANA-SRV::"
# auth_key is good for testing, but replace it with `auth_key_sha256`!
auth_key: kibana:kibana
type: allow
verbosity: error # don't log successful request
- name: "::RO log access::"
kibana_access: rw
groups: [ "ro-users" ]
indices: [ ".kibana", "*" ]
- name: "::RW log access::"
kibana_access: rw
type: allow
groups: [ "rw-users" ]
indices: [ ".kibana", "*", "logstash-*" ]
users:
- username: logs
auth_key: logs:logs
groups: [ "ro-users" ]
- username: admin
auth_key: admin:s3cr3t
groups: [ "rw-users" ]