You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: _api-reference/analyze-apis/perform-text-analysis.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ nav_order: 2
10
10
11
11
The perform text analysis API analyzes a text string and returns the resulting tokens.
12
12
13
-
If you use the security plugin, you must have the `manage index` privilege. If you simply want to analyze text, you must have the `manager cluster` privilege.
13
+
If you use the Security plugin, you must have the `manage index` privilege. If you simply want to analyze text, you must have the `manager cluster` privilege.
Copy file name to clipboardexpand all lines: _api-reference/cat/index.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -81,5 +81,5 @@ GET _cat/<operation_name>?h=<header_name_1>,<header_name_2>&v
81
81
82
82
Typically, for any operation you can find out what headers are available using the `help` parameter, and then use the `h` parameter to limit the output to only the headers that you care about.
83
83
84
-
If you use the security plugin, make sure you have the appropriate permissions.
84
+
If you use the Security plugin, make sure you have the appropriate permissions.
Copy file name to clipboardexpand all lines: _api-reference/index-apis/index.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -11,5 +11,5 @@ redirect_from:
11
11
12
12
The index API operations let you interact with indices in your cluster. Using these operations, you can create, delete, close, and complete other index-related operations.
13
13
14
-
If you use the security plugin, make sure you have the appropriate permissions.
14
+
If you use the Security plugin, make sure you have the appropriate permissions.
Copy file name to clipboardexpand all lines: _api-reference/snapshots/verify-snapshot-repository.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ Verifies that a snapshot repository is functional. Verifies the repository on ea
12
12
13
13
If verification is successful, the verify snapshot repository API returns a list of nodes connected to the snapshot repository. If verification failed, the API returns an error.
14
14
15
-
If you use the security plugin, you must have the `manage cluster` privilege.
15
+
If you use the Security plugin, you must have the `manage cluster` privilege.
Copy file name to clipboardexpand all lines: _clients/java-rest-high-level.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ You can now start your OpenSearch cluster. The OpenSearch 1.x high-level REST cl
27
27
28
28
## Security
29
29
30
-
Before using the REST client in your Java application, you must configure the application's truststore to connect to the security plugin. If you are using self-signed certificates or demo configurations, you can use the following command to create a custom truststore and add in root authority certificates.
30
+
Before using the REST client in your Java application, you must configure the application's truststore to connect to the Security plugin. If you are using self-signed certificates or demo configurations, you can use the following command to create a custom truststore and add in root authority certificates.
31
31
32
32
If you're using certificates from a trusted Certificate Authority (CA), you don't need to configure the truststore.
Copy file name to clipboardexpand all lines: _clients/java.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -67,7 +67,7 @@ You can now start your OpenSearch cluster.
67
67
68
68
## Security
69
69
70
-
Before using the REST client in your Java application, you must configure the application's truststore to connect to the security plugin. If you are using self-signed certificates or demo configurations, you can use the following command to create a custom truststore and add in root authority certificates.
70
+
Before using the REST client in your Java application, you must configure the application's truststore to connect to the Security plugin. If you are using self-signed certificates or demo configurations, you can use the following command to create a custom truststore and add in root authority certificates.
71
71
72
72
If you're using certificates from a trusted Certificate Authority (CA), you don't need to configure the truststore.
Copy file name to clipboardexpand all lines: _dashboards/branding.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -147,7 +147,7 @@ You can continue using the top header bar in the default view for custom navigat
147
147
148
148
## Sample configuration
149
149
150
-
The following configuration enables the security plugin and SSL within OpenSearch Dashboards and uses custom branding elements to replace the OpenSearch logo and application title.
150
+
The following configuration enables the Security plugin and SSL within OpenSearch Dashboards and uses custom branding elements to replace the OpenSearch logo and application title.
Copy file name to clipboardexpand all lines: _dashboards/discover/multi-data-sources.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ A data source connection specifies the parameters needed to connect to a data so
34
34
35
35
To create a new data source connection:
36
36
37
-
1. Open Dashboards. If you’re not running the security plugin, go to [`http://localhost:5601`](http://localhost:5601/). If you’re running the security plugin, go to [`https://localhost:5601`](https://localhost:5601/) and log in with the username `admin` and password `admin`.
37
+
1. Open Dashboards. If you’re not running the Security plugin, go to [`http://localhost:5601`](http://localhost:5601/). If you’re running the Security plugin, go to [`https://localhost:5601`](https://localhost:5601/) and log in with the username `admin` and password `admin`.
38
38
39
39
1. Under **Management** in the OpenSearch Dashboards main menu, choose **Stack Management**, **Data Sources `Experimental`**, **Data Sources**, and then choose **Create data source connection**, as shown in the following image.
Copy file name to clipboardexpand all lines: _dashboards/reporting.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ nav_order: 70
7
7
8
8
# Creating reports with the Dashboards interface
9
9
10
-
You can use OpenSearch Dashboards to create PNG, PDF, and CSV reports. To create reports, you must have the correct permissions. For a summary of the predefined roles and the permissions they grant, see the [security plugin]({{site.url}}{{site.baseurl}}/security/access-control/users-roles#predefined-roles).
10
+
You can use OpenSearch Dashboards to create PNG, PDF, and CSV reports. To create reports, you must have the correct permissions. For a summary of the predefined roles and the permissions they grant, see the [Security plugin]({{site.url}}{{site.baseurl}}/security/access-control/users-roles#predefined-roles).
11
11
12
12
CSV reports have a non-configurable 10,000 row limit. They have no explicit size limit (for example, MB), but extremely large documents could cause report generation to fail with an out of memory error from the V8 JavaScript engine.
Copy file name to clipboardexpand all lines: _data-prepper/pipelines/configuration/sinks/opensearch.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ The following table describes options you can configure for the `opensearch` sin
53
53
Option | Required | Type | Description
54
54
:--- | :--- | :--- | :---
55
55
hosts | Yes | List | List of OpenSearch hosts to write to (for example, `["https://localhost:9200", "https://remote-cluster:9200"]`).
56
-
cert | No | String | Path to the security certificate (for example, `"config/root-ca.pem"`) if the cluster uses the OpenSearch security plugin.
56
+
cert | No | String | Path to the security certificate (for example, `"config/root-ca.pem"`) if the cluster uses the OpenSearch Security plugin.
57
57
username | No | String | Username for HTTP basic authentication.
58
58
password | No | String | Password for HTTP basic authentication.
59
59
aws_sigv4 | No | Boolean | Default value is false. Whether to use AWS Identity and Access Management (IAM) signing to connect to an Amazon OpenSearch Service domain. For your access key, secret key, and optional session token, Data Prepper uses the default credential chain (environment variables, Java system properties, `~/.aws/credential`, etc.).
Copy file name to clipboardexpand all lines: _im-plugin/data-streams.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -268,4 +268,4 @@ You can use wildcards to delete more than one data stream.
268
268
269
269
We recommend deleting data from a data stream using an ISM policy.
270
270
271
-
You can also use [asynchronous search]({{site.url}}{{site.baseurl}}/search-plugins/async/index/), [SQL]({{site.url}}{{site.baseurl}}/search-plugins/sql/index/), and [PPL]({{site.url}}{{site.baseurl}}/search-plugins/sql/ppl/index/) to query your data stream directly. You can also use the security plugin to define granular permissions for the data stream name.
271
+
You can also use [asynchronous search]({{site.url}}{{site.baseurl}}/search-plugins/async/index/), [SQL]({{site.url}}{{site.baseurl}}/search-plugins/sql/index/), and [PPL]({{site.url}}{{site.baseurl}}/search-plugins/sql/ppl/index/) to query your data stream directly. You can also use the Security plugin to define granular permissions for the data stream name.
Copy file name to clipboardexpand all lines: _im-plugin/security.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -7,13 +7,13 @@ has_children: false
7
7
8
8
# Index management security
9
9
10
-
Using the security plugin with index management lets you limit non-admin users to certain actions. For example, you might want to set up your security such that a group of users can only read ISM policies, while others can create, delete, or change policies.
10
+
Using the Security plugin with index management lets you limit non-admin users to certain actions. For example, you might want to set up your security such that a group of users can only read ISM policies, while others can create, delete, or change policies.
11
11
12
12
All index management data are protected as system indices, and only a super admin or an admin with a Transport Layer Security (TLS) certificate can access system indices. For more information, see [System indices]({{site.url}}{{site.baseurl}}/security/configuration/system-indices).
13
13
14
14
## Basic permissions
15
15
16
-
The security plugin comes with one role that offers full access to index management: `index_management_full_access`. For a description of the role's permissions, see [Predefined roles]({{site.url}}{{site.baseurl}}/security/access-control/users-roles#predefined-roles).
16
+
The Security plugin comes with one role that offers full access to index management: `index_management_full_access`. For a description of the role's permissions, see [Predefined roles]({{site.url}}{{site.baseurl}}/security/access-control/users-roles#predefined-roles).
17
17
18
18
With security enabled, users not only need the correct index management permissions, but they also need permissions to execute actions to involved indices. For example, if a user wants to use the REST API to attach a policy that executes a rollup job to an index named `system-logs`, they would need the permissions to attach a policy and execute a rollup job, as well as access to `system-logs`.
The demo configuration includes a number of settings for the security plugin that you should modify before using OpenSearch for a production workload. To learn more, see [Security]({{site.url}}{{site.baseurl}}/security/).
89
+
The demo configuration includes a number of settings for the Security plugin that you should modify before using OpenSearch for a production workload. To learn more, see [Security]({{site.url}}{{site.baseurl}}/security/).
90
90
91
91
### (Optional) CORS header configuration
92
92
If you are working on a client application running against an OpenSearch cluster on a different domain, you can configure headers in `opensearch.yml` to allow for developing a local application on the same machine. Use [Cross Origin Resource Sharing](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) so your application can make calls to the OpenSearch API running locally. Add the following lines in your `custom-opensearch.yml` file (note that the "-" must be the first character in each line).
Copy file name to clipboardexpand all lines: _install-and-configure/install-opensearch/debian.md
+5-5
Original file line number
Diff line number
Diff line change
@@ -219,7 +219,7 @@ Before modifying any configuration files, it's always a good idea to save a back
219
219
# fail when you try to start the service.
220
220
discovery.type: single-node
221
221
222
-
# If you previously disabled the security plugin in opensearch.yml,
222
+
# If you previously disabled the Security plugin in opensearch.yml,
223
223
# be sure to re-enable it. Otherwise you can skip this setting.
224
224
plugins.security.disabled: false
225
225
```
@@ -239,7 +239,7 @@ Before modifying any configuration files, it's always a good idea to save a back
239
239
240
240
### Configure TLS
241
241
242
-
TLS certificates provide additional security for your cluster by allowing clients to confirm the identity of hosts and encrypt traffic between the client and host. For more information, refer to [Configure TLS Certificates]({{site.url}}{{site.baseurl}}/security-plugin/configuration/tls/) and [Generate Certificates]({{site.url}}{{site.baseurl}}/security-plugin/configuration/generate-certificates/), which are included in the [Security Plugin]({{site.url}}{{site.baseurl}}/security-plugin/index/) documentation. For work performed in a development environment, self-signed certificates are usually adequate. This section will guide you through the basic steps required to generate your own TLS certificates and apply them to your OpenSearch host.
242
+
TLS certificates provide additional security for your cluster by allowing clients to confirm the identity of hosts and encrypt traffic between the client and host. For more information, refer to [Configure TLS Certificates]({{site.url}}{{site.baseurl}}/security-plugin/configuration/tls/) and [Generate Certificates]({{site.url}}{{site.baseurl}}/security-plugin/configuration/generate-certificates/), which are included in the [Security plugin]({{site.url}}{{site.baseurl}}/security-plugin/index/) documentation. For work performed in a development environment, self-signed certificates are usually adequate. This section will guide you through the basic steps required to generate your own TLS certificates and apply them to your OpenSearch host.
243
243
244
244
1. Navigate to the directory where the certificates will be stored.
245
245
```bash
@@ -258,7 +258,7 @@ TLS certificates provide additional security for your cluster by allowing client
258
258
# replace the arguments passed to -subj so they reflect your specific host.
1. Next, create the admin certificate. This certificate is used to gain elevated rights for performing administrative tasks relating to the security plugin.
261
+
1. Next, create the admin certificate. This certificate is used to gain elevated rights for performing administrative tasks relating to the Security plugin.
262
262
```bash
263
263
# Create a private key for the admin certificate.
264
264
sudo openssl genrsa -out admin-key-temp.pem 2048
@@ -337,7 +337,7 @@ TLS certificates provide additional security for your cluster by allowing client
337
337
338
338
Users are defined and authenticated by OpenSearch in a variety of ways. One method that does not require additional backend infrastructure is to manually configure users in`internal_users.yml`. See [YAML files]({{site.url}}{{site.baseurl}}/security-plugin/configuration/yaml/) for more information about configuring users. The following steps explain how to remove all demo users except for the `admin` user and how to replace the `admin` default password using a script.
339
339
340
-
1. Navigate to the security plugins tools directory.
340
+
1. Navigate to the Security plugins tools directory.
341
341
```bash
342
342
cd /usr/share/opensearch/plugins/opensearch-security/tools
0 commit comments