You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1. Query the OpenSearch REST API to verify that the service is running. You should use `-k` (also written as `--insecure`) to disable host name checking because the default security configuration uses demo certificates. Use `-u` to pass the default username and password (`admin:admin`).
55
+
1. Query the OpenSearch REST API to verify that the service is running. You should use `-k` (also written as `--insecure`) to disable hostname checking because the default security configuration uses demo certificates. Use `-u` to pass the default username and password (`admin:<custom-admin-password>`).
1. Explore OpenSearch Dashboards by opening `http://localhost:5601/`in a web browser on the same host that is running your OpenSearch cluster. The default username is `admin` and the default password is `admin`.
79
+
1. Explore OpenSearch Dashboards by opening `http://localhost:5601/`in a web browser on the same host that is running your OpenSearch cluster. The default username is `admin` and the default password is setin your `docker-compose.yml` file in the `OPENSEARCH_INITIAL_ADMIN_PASSWORD=<custom-admin-password>` setting.
80
80
81
81
## Create an index and field mappings using sample data
82
82
@@ -100,18 +100,18 @@ Create an index and define field mappings using a dataset provided by the OpenSe
100
100
```
101
101
1. Define the field mappings with the mapping file.
Queries submitted to the OpenSearch REST API will generally return a flat JSON by default. For a human readable response body, use the query parameter `pretty=true`. For more information about `pretty` and other useful query parameters, see [Common REST parameters]({{site.url}}{{site.baseurl}}/opensearch/common-parameters/).
114
-
1. Access OpenSearch Dashboards by opening `http://localhost:5601/`in a web browser on the same host that is running your OpenSearch cluster. The default username is `admin` and the default password is `admin`.
114
+
1. Access OpenSearch Dashboards by opening `http://localhost:5601/`in a web browser on the same host that is running your OpenSearch cluster. The default username is `admin` and the password is setin your `docker-compose.yml` file in the `OPENSEARCH_INITIAL_ADMIN_PASSWORD=<custom-admin-password>` setting.
115
115
1. On the top menu bar, go to **Management > Dev Tools**.
116
116
1. In the left pane of the console, enter the following:
117
117
```json
@@ -162,4 +162,4 @@ OpenSearch will fail to start if your host's `vm.max_map_count` is too low. Revi
This operation supports the same parameters as the `tasks` operation. The following example shows how you can associate `X-Opaque-Id` with specific tasks:
In a new terminal window, run the following command to see one of the raw documents in the OpenSearch cluster:
77
77
78
78
```bash
79
-
curl -X GET -u 'admin:admin' -k 'https://localhost:9200/otel-v1-apm-span-000001/_search?pretty&size=1'
79
+
curl -X GET -u 'admin:<custom-admin-password>' -k 'https://localhost:9200/otel-v1-apm-span-000001/_search?pretty&size=1'
80
80
```
81
81
82
82
Navigate to `http://localhost:5601` in a web browser and choose **Trace Analytics**. You can see the results of your single click in the Jaeger HotROD web interface: the number of traces per API and HTTP method, latency trends, a color-coded map of the service architecture, and a list of trace IDs that you can use to drill down on individual operations.
@@ -154,7 +156,7 @@ docker inspect --format='{% raw %}{{range .NetworkSettings.Networks}}{{.IPAddres
154
156
On the coordinating cluster, add the remote cluster name and the IP address (with port 9300) for each "seed node." In this case, you only have one seed node:
Both clusters must have the user, but only the remote cluster needs the role and mapping; in this case, the coordinating cluster handles authentication (i.e. "Does this request include valid user credentials?"), and the remote cluster handles authorization (i.e. "Can this user access this data?").
To impersonate another user, submit a request to the system with the HTTP header `opendistro_security_impersonate_as` set to the name of the user to be impersonated. A good test is to make a GET request to the `_plugins/_security/authinfo` URI:
0 commit comments