Skip to content

Commit 8463c8f

Browse files
authored
Correct plugin capitalization (opensearch-project#3838)
* Correct plugin capitalization Signed-off-by: Fanit Kolchina <[email protected]> * Revert cluster-stats because the name is in response Signed-off-by: Fanit Kolchina <[email protected]> * Revert cluster-stats once more Signed-off-by: Fanit Kolchina <[email protected]> --------- Signed-off-by: Fanit Kolchina <[email protected]>
1 parent 9e5b044 commit 8463c8f

File tree

80 files changed

+222
-222
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+222
-222
lines changed

_api-reference/analyze-apis/perform-text-analysis.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ nav_order: 2
1010

1111
The perform text analysis API analyzes a text string and returns the resulting tokens.
1212

13-
If you use the security plugin, you must have the `manage index` privilege. If you simply want to analyze text, you must have the `manager cluster` privilege.
13+
If you use the Security plugin, you must have the `manage index` privilege. If you simply want to analyze text, you must have the `manager cluster` privilege.
1414
{: .note}
1515

1616
## Path and HTTP methods

_api-reference/cat/index.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -81,5 +81,5 @@ GET _cat/<operation_name>?h=<header_name_1>,<header_name_2>&v
8181

8282
Typically, for any operation you can find out what headers are available using the `help` parameter, and then use the `h` parameter to limit the output to only the headers that you care about.
8383

84-
If you use the security plugin, make sure you have the appropriate permissions.
84+
If you use the Security plugin, make sure you have the appropriate permissions.
8585
{: .note }

_api-reference/index-apis/clear-index-cache.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ nav_order: 320
1010
The clear cache API operation clears the caches of one or more indexes. For data streams, the API clears the caches of the stream’s backing indexes.
1111

1212

13-
If you use the security plugin, you must have the `manage index` privileges.
13+
If you use the Security plugin, you must have the `manage index` privileges.
1414
{: .note}
1515

1616
### Path parameters

_api-reference/index-apis/index.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,5 +11,5 @@ redirect_from:
1111

1212
The index API operations let you interact with indices in your cluster. Using these operations, you can create, delete, close, and complete other index-related operations.
1313

14-
If you use the security plugin, make sure you have the appropriate permissions.
14+
If you use the Security plugin, make sure you have the appropriate permissions.
1515
{: .note }

_api-reference/nodes-apis/nodes-hot-threads.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -122,4 +122,4 @@ Then information about threads of the selected type is provided.
122122

123123
## Required permissions
124124

125-
If you use the security plugin, make sure you set the following permissions: `cluster:monitor/nodes/hot_threads`.
125+
If you use the Security plugin, make sure you set the following permissions: `cluster:monitor/nodes/hot_threads`.

_api-reference/nodes-apis/nodes-info.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -164,4 +164,4 @@ aggregations | Information about the available aggregation types.
164164

165165
## Required permissions
166166

167-
If you use the security plugin, make sure you have the appropriate permissions: `cluster:monitor/nodes/info`.
167+
If you use the Security plugin, make sure you have the appropriate permissions: `cluster:monitor/nodes/info`.

_api-reference/nodes-apis/nodes-reload-secure.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -65,4 +65,4 @@ The following is an example response:
6565

6666
## Required permissions
6767

68-
If you use the security plugin, make sure you set the following permissions: `cluster:manage/nodes`.
68+
If you use the Security plugin, make sure you set the following permissions: `cluster:manage/nodes`.

_api-reference/nodes-apis/nodes-stats.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -978,4 +978,4 @@ enforced | Boolean | If true, the shard indexing pressure runs in enforced mode
978978

979979
## Required permissions
980980

981-
If you use the security plugin, make sure you have the appropriate permissions: `cluster:monitor/nodes/stats`.
981+
If you use the Security plugin, make sure you have the appropriate permissions: `cluster:monitor/nodes/stats`.

_api-reference/nodes-apis/nodes-usage.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -92,4 +92,4 @@ The following is an example response:
9292

9393
## Required permissions
9494

95-
If you use the security plugin, make sure you set the following permissions: `cluster:manage/nodes` or `cluster:monitor/nodes`.
95+
If you use the Security plugin, make sure you set the following permissions: `cluster:manage/nodes` or `cluster:monitor/nodes`.

_api-reference/snapshots/get-snapshot-status.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Returns details about a snapshot’s state during and after snapshot creation.
1111

1212
To learn about snapshot creation, see [Create snapshot]({{site.url}}{{site.baseurl}}/api-reference/snapshots/create-snapshot).
1313

14-
If you use the security plugin, you must have the `monitor_snapshot`, `create_snapshot`, or `manage cluster` privileges.
14+
If you use the Security plugin, you must have the `monitor_snapshot`, `create_snapshot`, or `manage cluster` privileges.
1515
{: .note}
1616

1717
### Path parameters

_api-reference/snapshots/verify-snapshot-repository.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Verifies that a snapshot repository is functional. Verifies the repository on ea
1212

1313
If verification is successful, the verify snapshot repository API returns a list of nodes connected to the snapshot repository. If verification failed, the API returns an error.
1414

15-
If you use the security plugin, you must have the `manage cluster` privilege.
15+
If you use the Security plugin, you must have the `manage cluster` privilege.
1616
{: .note}
1717

1818
### Path parameters

_clients/java-rest-high-level.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ You can now start your OpenSearch cluster. The OpenSearch 1.x high-level REST cl
2727

2828
## Security
2929

30-
Before using the REST client in your Java application, you must configure the application's truststore to connect to the security plugin. If you are using self-signed certificates or demo configurations, you can use the following command to create a custom truststore and add in root authority certificates.
30+
Before using the REST client in your Java application, you must configure the application's truststore to connect to the Security plugin. If you are using self-signed certificates or demo configurations, you can use the following command to create a custom truststore and add in root authority certificates.
3131

3232
If you're using certificates from a trusted Certificate Authority (CA), you don't need to configure the truststore.
3333

_clients/java.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ You can now start your OpenSearch cluster.
6767

6868
## Security
6969

70-
Before using the REST client in your Java application, you must configure the application's truststore to connect to the security plugin. If you are using self-signed certificates or demo configurations, you can use the following command to create a custom truststore and add in root authority certificates.
70+
Before using the REST client in your Java application, you must configure the application's truststore to connect to the Security plugin. If you are using self-signed certificates or demo configurations, you can use the following command to create a custom truststore and add in root authority certificates.
7171

7272
If you're using certificates from a trusted Certificate Authority (CA), you don't need to configure the truststore.
7373

_dashboards/branding.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ You can continue using the top header bar in the default view for custom navigat
147147

148148
## Sample configuration
149149

150-
The following configuration enables the security plugin and SSL within OpenSearch Dashboards and uses custom branding elements to replace the OpenSearch logo and application title.
150+
The following configuration enables the Security plugin and SSL within OpenSearch Dashboards and uses custom branding elements to replace the OpenSearch logo and application title.
151151

152152
```yml
153153
server.host: "0"

_dashboards/discover/multi-data-sources.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ A data source connection specifies the parameters needed to connect to a data so
3434

3535
To create a new data source connection:
3636

37-
1. Open Dashboards. If you’re not running the security plugin, go to [`http://localhost:5601`](http://localhost:5601/). If you’re running the security plugin, go to [`https://localhost:5601`](https://localhost:5601/) and log in with the username `admin` and password `admin`.
37+
1. Open Dashboards. If you’re not running the Security plugin, go to [`http://localhost:5601`](http://localhost:5601/). If you’re running the Security plugin, go to [`https://localhost:5601`](https://localhost:5601/) and log in with the username `admin` and password `admin`.
3838

3939
1. Under **Management** in the OpenSearch Dashboards main menu, choose **Stack Management**, **Data Sources `Experimental`**, **Data Sources**, and then choose **Create data source connection**, as shown in the following image.
4040

_dashboards/reporting.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ nav_order: 70
77

88
# Creating reports with the Dashboards interface
99

10-
You can use OpenSearch Dashboards to create PNG, PDF, and CSV reports. To create reports, you must have the correct permissions. For a summary of the predefined roles and the permissions they grant, see the [security plugin]({{site.url}}{{site.baseurl}}/security/access-control/users-roles#predefined-roles).
10+
You can use OpenSearch Dashboards to create PNG, PDF, and CSV reports. To create reports, you must have the correct permissions. For a summary of the predefined roles and the permissions they grant, see the [Security plugin]({{site.url}}{{site.baseurl}}/security/access-control/users-roles#predefined-roles).
1111

1212
CSV reports have a non-configurable 10,000 row limit. They have no explicit size limit (for example, MB), but extremely large documents could cause report generation to fail with an out of memory error from the V8 JavaScript engine.
1313
{: .tip }

_dashboards/visualize/visbuilder.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,8 @@ vis_builder.enabled: false
3737
Follow these steps to create a new visualization using VisBuilder in your environment:
3838

3939
1. Open Dashboards:
40-
- If you're not running the security plugin, go to http://localhost:5601.
41-
- If you're running the security plugin, go to https://localhost:5601 and log in with your username and password (default is admin/admin).
40+
- If you're not running the Security plugin, go to http://localhost:5601.
41+
- If you're running the Security plugin, go to https://localhost:5601 and log in with your username and password (default is admin/admin).
4242

4343
2. Confirm that the **Enable experimental visualizations** option is turned on.
4444
- From the top menu, select **Management** **>** **Stack Management** **>** **Advanced Settings**.

_data-prepper/pipelines/configuration/sinks/opensearch.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ The following table describes options you can configure for the `opensearch` sin
5353
Option | Required | Type | Description
5454
:--- | :--- | :--- | :---
5555
hosts | Yes | List | List of OpenSearch hosts to write to (for example, `["https://localhost:9200", "https://remote-cluster:9200"]`).
56-
cert | No | String | Path to the security certificate (for example, `"config/root-ca.pem"`) if the cluster uses the OpenSearch security plugin.
56+
cert | No | String | Path to the security certificate (for example, `"config/root-ca.pem"`) if the cluster uses the OpenSearch Security plugin.
5757
username | No | String | Username for HTTP basic authentication.
5858
password | No | String | Password for HTTP basic authentication.
5959
aws_sigv4 | No | Boolean | Default value is false. Whether to use AWS Identity and Access Management (IAM) signing to connect to an Amazon OpenSearch Service domain. For your access key, secret key, and optional session token, Data Prepper uses the default credential chain (environment variables, Java system properties, `~/.aws/credential`, etc.).

_im-plugin/data-streams.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -268,4 +268,4 @@ You can use wildcards to delete more than one data stream.
268268

269269
We recommend deleting data from a data stream using an ISM policy.
270270

271-
You can also use [asynchronous search]({{site.url}}{{site.baseurl}}/search-plugins/async/index/), [SQL]({{site.url}}{{site.baseurl}}/search-plugins/sql/index/), and [PPL]({{site.url}}{{site.baseurl}}/search-plugins/sql/ppl/index/) to query your data stream directly. You can also use the security plugin to define granular permissions for the data stream name.
271+
You can also use [asynchronous search]({{site.url}}{{site.baseurl}}/search-plugins/async/index/), [SQL]({{site.url}}{{site.baseurl}}/search-plugins/sql/index/), and [PPL]({{site.url}}{{site.baseurl}}/search-plugins/sql/ppl/index/) to query your data stream directly. You can also use the Security plugin to define granular permissions for the data stream name.

_im-plugin/security.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ has_children: false
77

88
# Index management security
99

10-
Using the security plugin with index management lets you limit non-admin users to certain actions. For example, you might want to set up your security such that a group of users can only read ISM policies, while others can create, delete, or change policies.
10+
Using the Security plugin with index management lets you limit non-admin users to certain actions. For example, you might want to set up your security such that a group of users can only read ISM policies, while others can create, delete, or change policies.
1111

1212
All index management data are protected as system indices, and only a super admin or an admin with a Transport Layer Security (TLS) certificate can access system indices. For more information, see [System indices]({{site.url}}{{site.baseurl}}/security/configuration/system-indices).
1313

1414
## Basic permissions
1515

16-
The security plugin comes with one role that offers full access to index management: `index_management_full_access`. For a description of the role's permissions, see [Predefined roles]({{site.url}}{{site.baseurl}}/security/access-control/users-roles#predefined-roles).
16+
The Security plugin comes with one role that offers full access to index management: `index_management_full_access`. For a description of the role's permissions, see [Predefined roles]({{site.url}}{{site.baseurl}}/security/access-control/users-roles#predefined-roles).
1717

1818
With security enabled, users not only need the correct index management permissions, but they also need permissions to execute actions to involved indices. For example, if a user wants to use the REST API to attach a policy that executes a rollup job to an index named `system-logs`, they would need the permissions to attach a policy and execute a rollup job, as well as access to `system-logs`.
1919

_install-and-configure/configuration.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ action.auto_create_index: true
8686
compatibility.override_main_response_version: true
8787
```
8888
89-
The demo configuration includes a number of settings for the security plugin that you should modify before using OpenSearch for a production workload. To learn more, see [Security]({{site.url}}{{site.baseurl}}/security/).
89+
The demo configuration includes a number of settings for the Security plugin that you should modify before using OpenSearch for a production workload. To learn more, see [Security]({{site.url}}{{site.baseurl}}/security/).
9090
9191
### (Optional) CORS header configuration
9292
If you are working on a client application running against an OpenSearch cluster on a different domain, you can configure headers in `opensearch.yml` to allow for developing a local application on the same machine. Use [Cross Origin Resource Sharing](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) so your application can make calls to the OpenSearch API running locally. Add the following lines in your `custom-opensearch.yml` file (note that the "-" must be the first character in each line).

_install-and-configure/install-opensearch/debian.md

+5-5
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ Before modifying any configuration files, it's always a good idea to save a back
219219
# fail when you try to start the service.
220220
discovery.type: single-node
221221
222-
# If you previously disabled the security plugin in opensearch.yml,
222+
# If you previously disabled the Security plugin in opensearch.yml,
223223
# be sure to re-enable it. Otherwise you can skip this setting.
224224
plugins.security.disabled: false
225225
```
@@ -239,7 +239,7 @@ Before modifying any configuration files, it's always a good idea to save a back
239239
240240
### Configure TLS
241241
242-
TLS certificates provide additional security for your cluster by allowing clients to confirm the identity of hosts and encrypt traffic between the client and host. For more information, refer to [Configure TLS Certificates]({{site.url}}{{site.baseurl}}/security-plugin/configuration/tls/) and [Generate Certificates]({{site.url}}{{site.baseurl}}/security-plugin/configuration/generate-certificates/), which are included in the [Security Plugin]({{site.url}}{{site.baseurl}}/security-plugin/index/) documentation. For work performed in a development environment, self-signed certificates are usually adequate. This section will guide you through the basic steps required to generate your own TLS certificates and apply them to your OpenSearch host.
242+
TLS certificates provide additional security for your cluster by allowing clients to confirm the identity of hosts and encrypt traffic between the client and host. For more information, refer to [Configure TLS Certificates]({{site.url}}{{site.baseurl}}/security-plugin/configuration/tls/) and [Generate Certificates]({{site.url}}{{site.baseurl}}/security-plugin/configuration/generate-certificates/), which are included in the [Security plugin]({{site.url}}{{site.baseurl}}/security-plugin/index/) documentation. For work performed in a development environment, self-signed certificates are usually adequate. This section will guide you through the basic steps required to generate your own TLS certificates and apply them to your OpenSearch host.
243243
244244
1. Navigate to the directory where the certificates will be stored.
245245
```bash
@@ -258,7 +258,7 @@ TLS certificates provide additional security for your cluster by allowing client
258258
# replace the arguments passed to -subj so they reflect your specific host.
259259
sudo openssl req -new -x509 -sha256 -key root-ca-key.pem -subj "/C=CA/ST=ONTARIO/L=TORONTO/O=ORG/OU=UNIT/CN=ROOT" -out root-ca.pem -days 730
260260
```
261-
1. Next, create the admin certificate. This certificate is used to gain elevated rights for performing administrative tasks relating to the security plugin.
261+
1. Next, create the admin certificate. This certificate is used to gain elevated rights for performing administrative tasks relating to the Security plugin.
262262
```bash
263263
# Create a private key for the admin certificate.
264264
sudo openssl genrsa -out admin-key-temp.pem 2048
@@ -337,7 +337,7 @@ TLS certificates provide additional security for your cluster by allowing client
337337
338338
Users are defined and authenticated by OpenSearch in a variety of ways. One method that does not require additional backend infrastructure is to manually configure users in `internal_users.yml`. See [YAML files]({{site.url}}{{site.baseurl}}/security-plugin/configuration/yaml/) for more information about configuring users. The following steps explain how to remove all demo users except for the `admin` user and how to replace the `admin` default password using a script.
339339
340-
1. Navigate to the security plugins tools directory.
340+
1. Navigate to the Security plugins tools directory.
341341
```bash
342342
cd /usr/share/opensearch/plugins/opensearch-security/tools
343343
```
@@ -462,4 +462,4 @@ sudo apt-get upgrade opensearch=<version>
462462
- [OpenSearch configuration]({{site.url}}{{site.baseurl}}/install-and-configure/configuration/)
463463
- [Install and configure OpenSearch Dashboards]({{site.url}}{{site.baseurl}}/install-and-configure/install-dashboards/index/)
464464
- [OpenSearch plugin installation]({{site.url}}{{site.baseurl}}/opensearch/install/plugins/)
465-
- [About the security plugin]({{site.url}}{{site.baseurl}}/security-plugin/index/)
465+
- [About the Security plugin]({{site.url}}{{site.baseurl}}/security-plugin/index/)

0 commit comments

Comments
 (0)