opensearch-docs-cn/_security-plugin/configuration/system-indices.md

26 lines
1.5 KiB
Markdown
Raw Normal View History

2021-05-28 13:48:19 -04:00
---
layout: default
2021-08-17 15:46:50 -04:00
title: System indices
2021-05-28 13:48:19 -04:00
parent: Configuration
nav_order: 15
---
# System indices
2021-06-18 11:57:53 -04:00
By default, OpenSearch has a protected system index, `.opendistro_security`, which you create using [securityadmin.sh]({{site.url}}{{site.baseurl}}/security-plugin/configuration/security-admin/). Even if your user account has read permissions for all indices, you can't directly access the data in this system index.
2021-05-28 13:48:19 -04:00
2021-06-18 11:57:53 -04:00
You can add additional system indices in in `opensearch.yml`. In addition to automatically creating `.opendistro_security`, the demo configuration adds several indices for the various OpenSearch plugins that integrate with the security plugin:
2021-05-28 13:48:19 -04:00
```yml
2021-06-08 18:35:12 -04:00
plugins.security.system_indices.enabled: true
plugins.security.system_indices.indices: [".opendistro-alerting-config", ".opendistro-alerting-alert*", ".opendistro-anomaly-results*", ".opendistro-anomaly-detector*", ".opendistro-anomaly-checkpoints", ".opendistro-anomaly-detection-state", ".opendistro-reports-*", ".opendistro-notifications-*", ".opendistro-notebooks", ".opendistro-asynchronous-search-response*"]
2021-05-28 13:48:19 -04:00
```
2021-06-10 15:26:41 -04:00
To access these indices, you must authenticate with an [admin certificate]({{site.url}}{{site.baseurl}}/security-plugin/configuration/tls#configure-admin-certificates):
2021-05-28 13:48:19 -04:00
```bash
2021-06-18 11:57:53 -04:00
curl -k --cert ./kirk.pem --key ./kirk-key.pem -XGET 'https://localhost:9200/.opendistro_security/_search'
2021-05-28 13:48:19 -04:00
```
2021-06-08 18:35:12 -04:00
The alternative is to remove indices from the `plugins.security.system_indices.indices` list on each node and restart OpenSearch.