Know How Guide and Hands on Guide for AWS
When you authentication for Kibana, you can
Elasticsearch 6.7 or later
. To use this feature, you must enable fine-grained access control
.{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"AWS": [
"*"
]
},
"Action": [
"es:*"
],
"Resource": "arn:aws-cn:es:cn-north-1:account:domain/domain-name/*"
}
]
}
Sign in Kibana using TheMasterUser
and Try our sample data
for Sample flight data
Security
->Internal User Database
->Create internal user
with name new-user
Security
->Role
->Create role
with name new-flight-role
Index Permissions
specify the kibana_sample_data_fli*
as index patternaction group
as read
Document Level Security Query
with
{
"match": {
"FlightDelay": true
}
}
Exclude fields
with FlightNum
with
Dest`Security
->Role Mappings
new-user
with new-flight-role
new-user
with kibana_user
new-user
GET _search
{
"query": {
"match_all": {}
}
}
Failed with error no permissions for [indices:data/read/search] and User [name=new-user, backend_roles=[], requestedTenant=__user__]
kibana_sample_data_flights
GET kibana_sample_data_flights/_search
{
"query": {
"match_all": {}
}
}
Return the index documents
TheMasterUser
, all queries can Return the index documentsLimitations for internal user database authentication
Users in the internal user database can’t change their own passwords. Master users (or users with equivalent permissions) must change their passwords for them.