API issue #884
-
|
Hi,
I tried multiple approaches (editing OpenSearch roles mappings, adding certs to the request), but nothing has worked so far. Thanks! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 4 replies
-
|
From the Either way, I think the issue is here in I'll create an issue from this to add that permission to that service account. In the meantime, you've got a couple of options:
- type: bind
bind:
create_host_path: false
source: ./opensearch-config/config/opensearch-security/roles.yml
target: /usr/share/opensearch/config/opensearch-security/roles.yml
read_only: trueand restart Malcolm. If you're running OpenSearch some other way (external to Malcolm?) or whatever, you'll have to do the equivalent.
I think/hope that upon starting up it'll pick up that new roles file and modify the role that already exists. I'm hopeful this should get you going. |
Beta Was this translation helpful? Give feedback.


From the
capture_servicerole there, I'm assuming theXXXaccount used here is themalcolm_internalaccount used for automation within the platform? Or if not, one created like it.Either way, I think the issue is here in
opensearch-config/config/opensearch-security/roles.yml. When creating the role for this internal account,indices:admin/createwasn't one I included as needed for normal operations, but I can see why for custom scripting it would be useful.I'll create an issue from this to add that permission to that service account. In the meantime, you've got a couple of options:
roles.ymlfile to add the missing permission and bind mount it into your opensearch service volumes