27 lines
1.3 KiB
Markdown
27 lines
1.3 KiB
Markdown
|
---
|
||
|
layout: default
|
||
|
title: System Indices
|
||
|
parent: Configuration
|
||
|
grand_parent: Security
|
||
|
nav_order: 15
|
||
|
---
|
||
|
|
||
|
# System indices
|
||
|
|
||
|
By default, OpenSearch has a protected system index, `.opensearch_security`, which you create using [securityadmin.sh](../security-admin/). Even if your user account has read permissions for all indices, you can't directly access the data in this system index.
|
||
|
|
||
|
You can add additional system indices in in `opensearch.yml`. In addition to automatically creating `.opensearch_security`, the demo configuration adds several indices for the various OpenSearch plugins that integrate with the security plugin:
|
||
|
|
||
|
```yml
|
||
|
opensearch_security.system_indices.enabled: true
|
||
|
opensearch_security.system_indices.indices: [".opensearch-alerting-config", ".opensearch-alerting-alert*", ".opensearch-anomaly-results*", ".opensearch-anomaly-detector*", ".opensearch-anomaly-checkpoints", ".opensearch-anomaly-detection-state"]
|
||
|
```
|
||
|
|
||
|
To access these indices, you must authenticate with an [admin certificate](../tls/#configure-admin-certificates):
|
||
|
|
||
|
```bash
|
||
|
curl -k --cert ./kirk.pem --key ./kirk-key.pem -XGET 'https://localhost:9200/.opensearch_security/_search'
|
||
|
```
|
||
|
|
||
|
The alternative is to remove indices from the `opensearch_security.system_indices.indices` list on each node and restart OpenSearch.
|