Hi, I have attached the requested files.
You can find my answer to your questions below.
Thanks
That has to be some kind of misconfiguration since this is a pretty standard use case. So please attach the complete set of configuration files which lead to the exception you posted below:
Just to make sure:
- Which user/role are you using as the internal kibana server user?
user : kibana ; user role : sg_kibana_server
- Which user are you using to log in?
sg_all_access role ( charlotte.dupont user in the sg_internal_users.yml)
- On the multi tenancy page in Kibana, do you see any error messaged?
I cannot access kibana with the default sg_kibana_server configuration. i have attached a screenshot (kibana_log_in.jpeg file) that shows what happens after logging in on kibana
With the modified sg_kibana_server role, i can access and have no error except the index pattern duplication bug
- Is there any error or warning in the kibana log/console when you start it?
With the default sg_kibana_server role, there is no error in the kibana logs. There is one in the elasticsearch logs :
elasticsearch_1 | [2018-02-20T14:44:37,990][INFO ][c.f.s.c.PrivilegesEvaluator] No permissions for {sg_public=[IndexType [index=.kibana-6.1, type=]], sg_kibana=[IndexType [index=.kibana-6.1, type=]], sg_kibana_server=[IndexType [index=.kibana-6.1, type=]]}
elasticsearch_1 | [2018-02-20T14:44:40,548][INFO ][c.f.s.c.PrivilegesEvaluator] No index-level perm match for User [name=kibana, roles=[kibana_server], requestedTenant=null] [IndexType [index=.kibana-6.1, type=]] [Action [[indices:admin/mappings/get]]] [RolesChecked [sg_kibana, sg_kibana_server, sg_public]]
** With the modified sg_kibana_server role, there is no error in kibana or elasticsearch logs.**
sg_config.yml (646 Bytes)
sg_internal_users.yml (709 Bytes)
sg_roles.yml (2.94 KB)
sg_roles_mapping.yml (875 Bytes)
elasticsearch.yml (1.21 KB)
kibana.yml (4.76 KB)
sg_action_groups.yml (2.34 KB)
···
On Tuesday, February 20, 2018 at 3:33:57 PM UTC+1, Jochen Kressin wrote: