-
Notifications
You must be signed in to change notification settings - Fork 325
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Configure OpenSearch in docker-compose deployment
- Loading branch information
Showing
10 changed files
with
146 additions
and
11 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
3 changes: 3 additions & 0 deletions
3
deploy/dockerephemeral/docker/opensearch-security-action_groups.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
_meta: | ||
type: "actiongroups" | ||
config_version: 2 |
6 changes: 6 additions & 0 deletions
6
deploy/dockerephemeral/docker/opensearch-security-allowlist.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
_meta: | ||
type: "allowlist" | ||
config_version: 2 | ||
|
||
config: | ||
enabled: false |
17 changes: 17 additions & 0 deletions
17
deploy/dockerephemeral/docker/opensearch-security-config.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
_meta: | ||
type: "config" | ||
config_version: 2 | ||
|
||
config: | ||
dynamic: | ||
authc: | ||
basic_internal_auth_domain: | ||
description: "Authenticate using HTTP basic against the internal users database" | ||
http_enabled: true | ||
transport_enabled: true | ||
order: 1 | ||
http_authenticator: | ||
type: basic | ||
challenge: true | ||
authentication_backend: | ||
type: internal |
10 changes: 10 additions & 0 deletions
10
deploy/dockerephemeral/docker/opensearch-security-internal_users.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
_meta: | ||
type: "internalusers" | ||
config_version: 2 | ||
|
||
elastic: | ||
hash: "$2y$12$GRc68jkEX1m4uQpTVbwURu79xHxZ7vsbyEctOAADQwPjlhYS4LJVa" | ||
reserved: true | ||
description: "Wire User" | ||
backend_roles: | ||
- index_manager |
3 changes: 3 additions & 0 deletions
3
deploy/dockerephemeral/docker/opensearch-security-nodes_dn.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
_meta: | ||
type: "nodesdn" | ||
config_version: 2 |
16 changes: 16 additions & 0 deletions
16
deploy/dockerephemeral/docker/opensearch-security-roles.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
_meta: | ||
type: "roles" | ||
config_version: 2 | ||
|
||
wire-backend-role: | ||
reserved: true | ||
hidden: false | ||
cluster_permissions: | ||
- "indices:admin/template/get" | ||
index_permissions: | ||
- index_patterns: | ||
- '*' | ||
allowed_actions: | ||
- "indices:admin/create" | ||
- "indices:admin/get" | ||
- "indices:admin/template/get" |
9 changes: 9 additions & 0 deletions
9
deploy/dockerephemeral/docker/opensearch-security-roles_mapping.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
_meta: | ||
type: "rolesmapping" | ||
config_version: 2 | ||
|
||
all_access: | ||
reserved: false | ||
backend_roles: | ||
- index_manager | ||
description: "Map index_manager to full_access" |
3 changes: 3 additions & 0 deletions
3
deploy/dockerephemeral/docker/opensearch-security-tenants.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
_meta: | ||
type: "tenants" | ||
config_version: 2 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
cluster.name: opensearch-cluster | ||
|
||
# Bind to all interfaces because we don't know what IP address Docker will assign to us. | ||
network.host: 0.0.0.0 | ||
|
||
# Setting network.host to a non-loopback address enables the annoying bootstrap checks. "Single-node" mode disables them again. | ||
# Implicitly done if ".singleNode" is set to "true". | ||
discovery.type: single-node | ||
|
||
action.auto_create_index: true | ||
|
||
path.data: /bitnami/opensearch | ||
|
||
# Start OpenSearch Security Demo Configuration | ||
# WARNING: revise all the lines below before you go into production | ||
plugins: | ||
security: | ||
# nodes_dn: | ||
# - '/CN=opensearch-cluster-master.*/' | ||
ssl: | ||
transport: | ||
pemcert_filepath: certs/tls.crt | ||
pemkey_filepath: certs/tls.key | ||
pemtrustedcas_filepath: certs/ca.crt | ||
enforce_hostname_verification: false | ||
http: | ||
enabled: true | ||
pemcert_filepath: certs/tls.crt | ||
pemkey_filepath: certs/tls.key | ||
pemtrustedcas_filepath: certs/ca.crt | ||
allow_unsafe_democertificates: true | ||
allow_default_init_securityindex: true | ||
# authcz: | ||
# admin_dn: | ||
# - CN=kirk,OU=client,O=client,L=test,C=de | ||
audit.type: internal_opensearch | ||
enable_snapshot_restore_privilege: true | ||
check_snapshot_restore_write_privileges: true | ||
restapi: | ||
roles_enabled: ["all_access", "security_rest_api_access"] | ||
system_indices: | ||
enabled: true | ||
indices: | ||
[ | ||
".opendistro-alerting-config", | ||
".opendistro-alerting-alert*", | ||
".opendistro-anomaly-results*", | ||
".opendistro-anomaly-detector*", | ||
".opendistro-anomaly-checkpoints", | ||
".opendistro-anomaly-detection-state", | ||
".opendistro-reports-*", | ||
".opendistro-notifications-*", | ||
".opendistro-notebooks", | ||
".opendistro-asynchronous-search-response*", | ||
] |