Merge pull request #9 from opensearch-project/security-checks
Added some descriptions to Security API
This commit is contained in:
commit
b6bcc4c787
|
@ -431,7 +431,7 @@ PUT _opensearch/_security/api/internalusers/<username>
|
|||
|
||||
### Patch user
|
||||
|
||||
Updates individual attributes of an internal user.
|
||||
Updates individual attributes of an internal user.
|
||||
|
||||
#### Request
|
||||
|
||||
|
@ -755,6 +755,8 @@ GET _opensearch/_security/api/rolesmapping
|
|||
|
||||
### Delete role mapping
|
||||
|
||||
Deletes the specified role mapping.
|
||||
|
||||
#### Request
|
||||
|
||||
```
|
||||
|
@ -912,6 +914,8 @@ GET _opensearch/_security/api/tenants/
|
|||
|
||||
### Delete tenant
|
||||
|
||||
Deletes the specified tenant.
|
||||
|
||||
#### Request
|
||||
|
||||
```
|
||||
|
|
|
@ -97,9 +97,9 @@ opensearch_security.audit.log_request_body: false
|
|||
|
||||
## Log index names
|
||||
|
||||
By default, the security plugin logs all indices affected by a request. Because index names can be an aliases and contain wildcards/date patterns, the security plugin logs the index name that the user submitted *and* the actual index name to which it resolves.
|
||||
By default, the security plugin logs all indices affected by a request. Because index names can be aliases and contain wildcards/date patterns, the security plugin logs the index name that the user submitted *and* the actual index name to which it resolves.
|
||||
|
||||
For example, if you use an alias or a wildcard, the the audit event might look like:
|
||||
For example, if you use an alias or a wildcard, the audit event might look like:
|
||||
|
||||
```json
|
||||
audit_trace_indices: [
|
||||
|
|
Loading…
Reference in New Issue