[2018-01-30T22:11:19,692][INFO ][o.e.n.Node ] [NODE-1] initializing ... [2018-01-30T22:11:19,834][INFO ][o.e.e.NodeEnvironment ] [NODE-1] using [1] data paths, mounts [[/elasticsearch/data (/dev/sda1)]], net usable_space [53gb], net total_space [62.7gb], types [ext4] [2018-01-30T22:11:19,834][INFO ][o.e.e.NodeEnvironment ] [NODE-1] heap size [1.9gb], compressed ordinary object pointers [true] [2018-01-30T22:11:19,853][INFO ][o.e.n.Node ] [NODE-1] node name [NODE-1], node ID [eObuvPPATKG_KlDlr__J7A] [2018-01-30T22:11:19,853][INFO ][o.e.n.Node ] [NODE-1] version[6.1.1], pid[21], build[bd92e7f/2017-12-17T20:23:25.338Z], OS[Linux/4.9.60-linuxkit-aufs/amd64], JVM[Oracle Corporation/OpenJDK 64-Bit Server VM/1.8.0_151/25.151-b12] [2018-01-30T22:11:19,854][INFO ][o.e.n.Node ] [NODE-1] JVM arguments [-Xms1g, -Xmx1g, -XX:+UseConcMarkSweepGC, -XX:CMSInitiatingOccupancyFraction=75, -XX:+UseCMSInitiatingOccupancyOnly, -XX:+AlwaysPreTouch, -Xss1m, -Djava.awt.headless=true, -Dfile.encoding=UTF-8, -Djna.nosys=true, -XX:-OmitStackTraceInFastThrow, -Dio.netty.noUnsafe=true, -Dio.netty.noKeySetOptimization=true, -Dio.netty.recycler.maxCapacityPerThread=0, -Dlog4j.shutdownHookEnabled=false, -Dlog4j2.disable.jmx=true, -XX:+HeapDumpOnOutOfMemoryError, -Des.network.host=0.0.0.0, -Des.logger.level=INFO, -Xms2g, -Xmx2g, -Des.path.home=/elasticsearch, -Des.path.conf=/elasticsearch/config] [2018-01-30T22:11:21,357][INFO ][c.f.s.SearchGuardPlugin ] ES Config path is /elasticsearch/config [2018-01-30T22:11:21,360][DEBUG][c.f.s.SearchGuardPlugin ] Client side initiated TLS renegotiation forcibly disabled. This can prevent DoS attacks. (jdk.tls.rejectClientInitiatedRenegotiation set to true). [2018-01-30T22:11:21,466][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] Open SSL not available (this is not an error, we simply fallback to built-in JDK SSL) because of java.lang.ClassNotFoundException: io.netty.internal.tcnative.SSL [2018-01-30T22:11:21,801][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] JVM supports the following 82 ciphers for https [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] [2018-01-30T22:11:21,817][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] JVM supports the following 82 ciphers for transport [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA, TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA, TLS_EMPTY_RENEGOTIATION_INFO_SCSV, TLS_DH_anon_WITH_AES_256_GCM_SHA384, TLS_DH_anon_WITH_AES_128_GCM_SHA256, TLS_DH_anon_WITH_AES_256_CBC_SHA256, TLS_ECDH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_256_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA256, TLS_ECDH_anon_WITH_AES_128_CBC_SHA, TLS_DH_anon_WITH_AES_128_CBC_SHA, TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA, SSL_DH_anon_WITH_3DES_EDE_CBC_SHA, SSL_RSA_WITH_DES_CBC_SHA, SSL_DHE_RSA_WITH_DES_CBC_SHA, SSL_DHE_DSS_WITH_DES_CBC_SHA, SSL_DH_anon_WITH_DES_CBC_SHA, SSL_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA, SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA, SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_NULL_SHA256, TLS_ECDHE_ECDSA_WITH_NULL_SHA, TLS_ECDHE_RSA_WITH_NULL_SHA, SSL_RSA_WITH_NULL_SHA, TLS_ECDH_ECDSA_WITH_NULL_SHA, TLS_ECDH_RSA_WITH_NULL_SHA, TLS_ECDH_anon_WITH_NULL_SHA, SSL_RSA_WITH_NULL_MD5, TLS_KRB5_WITH_3DES_EDE_CBC_SHA, TLS_KRB5_WITH_3DES_EDE_CBC_MD5, TLS_KRB5_WITH_DES_CBC_SHA, TLS_KRB5_WITH_DES_CBC_MD5, TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA, TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5] [2018-01-30T22:11:21,818][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] Config directory is /elasticsearch/config/, from there the key- and truststore files are resolved relatively [2018-01-30T22:11:21,820][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Value for searchguard.ssl.transport.keystore_filepath is searchguard/ssl/NODE-1-keystore.jks [2018-01-30T22:11:21,828][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Resolved searchguard/ssl/NODE-1-keystore.jks to /elasticsearch/config/searchguard/ssl/NODE-1-keystore.jks against /elasticsearch/config [2018-01-30T22:11:21,829][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Value for searchguard.ssl.transport.truststore_filepath is searchguard/ssl/truststore.jks [2018-01-30T22:11:21,829][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Resolved searchguard/ssl/truststore.jks to /elasticsearch/config/searchguard/ssl/truststore.jks against /elasticsearch/config [2018-01-30T22:11:21,835][DEBUG][c.f.s.s.u.SSLCertificateHelper] Keystore has 1 entries/aliases [2018-01-30T22:11:21,836][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias node-1: is a certificate entry?false/is a key entry?true [2018-01-30T22:11:21,836][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias node-1: chain len 3 [2018-01-30T22:11:21,860][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=NODE-1, OU=SSL, C=COM of type -1 -> false [2018-01-30T22:11:21,862][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=_RPLC_ORG_NAME Signing CA, OU=_RPLC_ORG_NAME Signing CA, O=_RPLC_ORG_NAME of type 0 -> false [2018-01-30T22:11:21,863][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=_RPLC_ORG_NAME Root CA, OU=_RPLC_ORG_NAME Root CA, O=_RPLC_ORG_NAME of type 2147483647 -> true [2018-01-30T22:11:21,863][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias node-1: single cert CN=NODE-1, OU=SSL, C=COM of type -1 -> false [2018-01-30T22:11:21,864][INFO ][c.f.s.s.u.SSLCertificateHelper] No alias given, use the first one: node-1 [2018-01-30T22:11:21,865][WARN ][c.f.s.s.u.SSLCertificateHelper] Certificate chain for alias node-1 contains a root certificate [2018-01-30T22:11:21,866][DEBUG][c.f.s.s.u.SSLCertificateHelper] Keystore has 1 entries/aliases [2018-01-30T22:11:21,866][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias node-1: is a certificate entry?false/is a key entry?true [2018-01-30T22:11:21,866][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias node-1: chain len 3 [2018-01-30T22:11:21,866][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=NODE-1, OU=SSL, C=COM of type -1 -> false [2018-01-30T22:11:21,867][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=_RPLC_ORG_NAME Signing CA, OU=_RPLC_ORG_NAME Signing CA, O=_RPLC_ORG_NAME of type 0 -> false [2018-01-30T22:11:21,867][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=_RPLC_ORG_NAME Root CA, OU=_RPLC_ORG_NAME Root CA, O=_RPLC_ORG_NAME of type 2147483647 -> true [2018-01-30T22:11:21,867][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias node-1: single cert CN=NODE-1, OU=SSL, C=COM of type -1 -> false [2018-01-30T22:11:21,889][DEBUG][c.f.s.s.u.SSLCertificateHelper] Keystore has 1 entries/aliases [2018-01-30T22:11:21,889][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias root-ca-chain: is a certificate entry?true/is a key entry?false [2018-01-30T22:11:21,890][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias root-ca-chain: single cert CN=_RPLC_ORG_NAME Root CA, OU=_RPLC_ORG_NAME Root CA, O=_RPLC_ORG_NAME of type 2147483647 -> true [2018-01-30T22:11:21,890][DEBUG][c.f.s.s.u.SSLCertificateHelper] No alias given, will trust all of the certificates in the store [2018-01-30T22:11:21,911][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] TLS Transport Client Provider : JDK [2018-01-30T22:11:21,911][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] TLS Transport Server Provider : JDK [2018-01-30T22:11:21,912][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] TLS HTTP Provider : null [2018-01-30T22:11:21,912][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] sslTransportClientProvider:JDK with ciphers [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256] [2018-01-30T22:11:21,913][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] sslTransportServerProvider:JDK with ciphers [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256] [2018-01-30T22:11:21,913][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] sslHTTPProvider:null with ciphers [] [2018-01-30T22:11:21,914][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] Enabled TLS protocols for transport layer : [TLSv1.2, TLSv1.1] [2018-01-30T22:11:21,914][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] Enabled TLS protocols for HTTP layer : [TLSv1.2, TLSv1.1] [2018-01-30T22:11:22,220][INFO ][c.f.s.SearchGuardPlugin ] Clustername: elasticsearch-default [2018-01-30T22:11:22,222][DEBUG][c.f.s.SearchGuardPlugin ] This node [NODE-1] is a transportClient: false/tribeNode: false/tribeNodeClient: false [2018-01-30T22:11:22,304][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=DLSFLS, implementing class=com.floragunn.searchguard.configuration.SearchGuardFlsDlsIndexSearcherWrapper] [2018-01-30T22:11:22,341][WARN ][c.f.s.SearchGuardPlugin ] Directory /elasticsearch/config has insecure file permissions (should be 0700) [2018-01-30T22:11:22,341][WARN ][c.f.s.SearchGuardPlugin ] Directory /elasticsearch/config/searchguard has insecure file permissions (should be 0700) [2018-01-30T22:11:22,342][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/sg_internal_users.yml has insecure file permissions (should be 0600) [2018-01-30T22:11:22,342][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/sg_roles_mapping.yml has insecure file permissions (should be 0600) [2018-01-30T22:11:22,343][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/sg_action_groups.yml has insecure file permissions (should be 0600) [2018-01-30T22:11:22,343][WARN ][c.f.s.SearchGuardPlugin ] Directory /elasticsearch/config/searchguard/ssl has insecure file permissions (should be 0700) [2018-01-30T22:11:22,344][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/NODE-1-signed.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,344][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/kibana-keystore.p12 has insecure file permissions (should be 0600) [2018-01-30T22:11:22,345][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/beats.crtfull.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,347][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/kibana.all.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,351][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/kibana.csr has insecure file permissions (should be 0600) [2018-01-30T22:11:22,351][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/.ts_pwd has insecure file permissions (should be 0600) [2018-01-30T22:11:22,352][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/beats-keystore.p12 has insecure file permissions (should be 0600) [2018-01-30T22:11:22,352][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/elastic.csr has insecure file permissions (should be 0600) [2018-01-30T22:11:22,353][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/NODE-1-keystore.jks has insecure file permissions (should be 0600) [2018-01-30T22:11:22,353][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/elastic.crtfull.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,354][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/elastic.crt.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,354][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/kibana.crtfull.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,355][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/logstash.key.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,355][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/logstash-keystore.p12 has insecure file permissions (should be 0600) [2018-01-30T22:11:22,356][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/kibana.crt.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,356][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/beats-keystore.jks has insecure file permissions (should be 0600) [2018-01-30T22:11:22,356][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/elastic.all.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,357][WARN ][c.f.s.SearchGuardPlugin ] Directory /elasticsearch/config/searchguard/ssl/ca has insecure file permissions (should be 0700) [2018-01-30T22:11:22,357][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca.csr has insecure file permissions (should be 0600) [2018-01-30T22:11:22,358][WARN ][c.f.s.SearchGuardPlugin ] Directory /elasticsearch/config/searchguard/ssl/ca/signing-ca has insecure file permissions (should be 0700) [2018-01-30T22:11:22,358][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/02.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,359][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/private/signing-ca.key has insecure file permissions (should be 0600) [2018-01-30T22:11:22,359][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/04.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,360][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/05.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,360][WARN ][c.f.s.SearchGuardPlugin ] Directory /elasticsearch/config/searchguard/ssl/ca/signing-ca/db has insecure file permissions (should be 0700) [2018-01-30T22:11:22,361][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.crt.srl.old has insecure file permissions (should be 0600) [2018-01-30T22:11:22,362][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.db.attr.old has insecure file permissions (should be 0600) [2018-01-30T22:11:22,363][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.db.old has insecure file permissions (should be 0600) [2018-01-30T22:11:22,364][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.db has insecure file permissions (should be 0600) [2018-01-30T22:11:22,365][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.crt.srl has insecure file permissions (should be 0600) [2018-01-30T22:11:22,365][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.db.attr has insecure file permissions (should be 0600) [2018-01-30T22:11:22,366][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.crl.srl has insecure file permissions (should be 0600) [2018-01-30T22:11:22,367][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/03.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,368][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca/01.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,368][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca.crt has insecure file permissions (should be 0600) [2018-01-30T22:11:22,369][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca.crt has insecure file permissions (should be 0600) [2018-01-30T22:11:22,369][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/chain-ca.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,370][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,370][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca.csr has insecure file permissions (should be 0600) [2018-01-30T22:11:22,370][WARN ][c.f.s.SearchGuardPlugin ] Directory /elasticsearch/config/searchguard/ssl/ca/root-ca has insecure file permissions (should be 0700) [2018-01-30T22:11:22,371][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca/02.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,371][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca/private/root-ca.key has insecure file permissions (should be 0600) [2018-01-30T22:11:22,371][WARN ][c.f.s.SearchGuardPlugin ] Directory /elasticsearch/config/searchguard/ssl/ca/root-ca/db has insecure file permissions (should be 0700) [2018-01-30T22:11:22,372][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.db has insecure file permissions (should be 0600) [2018-01-30T22:11:22,372][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.db.old has insecure file permissions (should be 0600) [2018-01-30T22:11:22,373][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.crt.srl has insecure file permissions (should be 0600) [2018-01-30T22:11:22,373][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.crl.srl has insecure file permissions (should be 0600) [2018-01-30T22:11:22,374][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.db.attr.old has insecure file permissions (should be 0600) [2018-01-30T22:11:22,374][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.crt.srl.old has insecure file permissions (should be 0600) [2018-01-30T22:11:22,375][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.db.attr has insecure file permissions (should be 0600) [2018-01-30T22:11:22,375][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/root-ca/01.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,376][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/ca/signing-ca.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,376][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/elastic-keystore.p12 has insecure file permissions (should be 0600) [2018-01-30T22:11:22,376][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/NODE-1-keystore.p12 has insecure file permissions (should be 0600) [2018-01-30T22:11:22,377][WARN ][c.f.s.SearchGuardPlugin ] Directory /elasticsearch/config/searchguard/ssl/etc has insecure file permissions (should be 0700) [2018-01-30T22:11:22,377][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/etc/signing-ca.conf has insecure file permissions (should be 0600) [2018-01-30T22:11:22,377][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/etc/root-ca.conf has insecure file permissions (should be 0600) [2018-01-30T22:11:22,378][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/logstash.crtfull.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,378][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/logstash.crt.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,379][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/beats.all.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,379][WARN ][c.f.s.SearchGuardPlugin ] Directory /elasticsearch/config/searchguard/ssl/certs has insecure file permissions (should be 0700) [2018-01-30T22:11:22,379][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/truststore.jks has insecure file permissions (should be 0600) [2018-01-30T22:11:22,380][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/beats-signed.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,380][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/kibana.key.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,381][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/elastic-keystore.jks has insecure file permissions (should be 0600) [2018-01-30T22:11:22,381][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/.ca_pwd has insecure file permissions (should be 0600) [2018-01-30T22:11:22,381][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/beats.key.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,382][WARN ][c.f.s.SearchGuardPlugin ] Directory /elasticsearch/config/searchguard/ssl/crl has insecure file permissions (should be 0700) [2018-01-30T22:11:22,382][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/beats.csr has insecure file permissions (should be 0600) [2018-01-30T22:11:22,382][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/logstash-keystore.jks has insecure file permissions (should be 0600) [2018-01-30T22:11:22,383][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/NODE-1.csr has insecure file permissions (should be 0600) [2018-01-30T22:11:22,392][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/logstash.csr has insecure file permissions (should be 0600) [2018-01-30T22:11:22,392][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/elastic-signed.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,393][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/beats.crt.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,393][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/kibana-signed.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,394][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/logstash-signed.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,394][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/logstash.all.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,395][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/kibana-keystore.jks has insecure file permissions (should be 0600) [2018-01-30T22:11:22,395][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/elastic.key.pem has insecure file permissions (should be 0600) [2018-01-30T22:11:22,396][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/ssl/.ks_pwd has insecure file permissions (should be 0600) [2018-01-30T22:11:22,396][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/sg_roles.yml has insecure file permissions (should be 0600) [2018-01-30T22:11:22,397][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/searchguard/sg_config.yml has insecure file permissions (should be 0600) [2018-01-30T22:11:22,397][WARN ][c.f.s.SearchGuardPlugin ] Directory /elasticsearch/config/scripts has insecure file permissions (should be 0700) [2018-01-30T22:11:22,398][WARN ][c.f.s.SearchGuardPlugin ] File /elasticsearch/config/elasticsearch.yml has insecure file permissions (should be 0600) [2018-01-30T22:11:22,449][DEBUG][c.f.s.SearchGuardPlugin ] c256eed1a86665226de688ff3fc455405505779e5c48a27c87c4b4b84370fcc5 :: /elasticsearch/config/log4j2.properties [2018-01-30T22:11:22,454][DEBUG][c.f.s.SearchGuardPlugin ] f1bb52982894ffc8147ab9493d01807275ff92e4f2c616ec9ab0bf9daa3010f8 :: /elasticsearch/config/searchguard/sg_internal_users.yml [2018-01-30T22:11:22,455][DEBUG][c.f.s.SearchGuardPlugin ] 5d83c7e4f32e1d4935085f7bb659307acccc7ef5d485241adfbc38ee01c6346e :: /elasticsearch/config/searchguard/sg_roles_mapping.yml [2018-01-30T22:11:22,456][DEBUG][c.f.s.SearchGuardPlugin ] adecea84e5e1f52b6a7dd01cad14ed4ac2e5222c73ead920c0dc32cd795fd9a5 :: /elasticsearch/config/searchguard/sg_action_groups.yml [2018-01-30T22:11:22,457][DEBUG][c.f.s.SearchGuardPlugin ] dd17adb6db6c17f405623ebaca349943ae87c7b205628c9db6152970ef4145da :: /elasticsearch/config/searchguard/ssl/NODE-1-signed.pem [2018-01-30T22:11:22,458][DEBUG][c.f.s.SearchGuardPlugin ] 4ac46318293a9c992463d43605040a9fcf6f1dcd3d94d6015b8418c691e036ed :: /elasticsearch/config/searchguard/ssl/kibana-keystore.p12 [2018-01-30T22:11:22,458][DEBUG][c.f.s.SearchGuardPlugin ] ce3cf11e15deb257382752f97c89f56d387877240368dc84bf77dc8a3f9c396f :: /elasticsearch/config/searchguard/ssl/beats.crtfull.pem [2018-01-30T22:11:22,459][DEBUG][c.f.s.SearchGuardPlugin ] c6c2b2f9798f2d6e16b670cea262102cdcb8064c82ea2b2ebd45a4d3fbebf080 :: /elasticsearch/config/searchguard/ssl/kibana.all.pem [2018-01-30T22:11:22,460][DEBUG][c.f.s.SearchGuardPlugin ] 298c029adddbe2258dd8579114fe372c4131dae234a5d8895b8a0ea1d32659c2 :: /elasticsearch/config/searchguard/ssl/kibana.csr [2018-01-30T22:11:22,461][DEBUG][c.f.s.SearchGuardPlugin ] 41edf6e61ed42a3c6848b0ae91ddc5662377c09a3ed38fcd9f9e82664294bcfd :: /elasticsearch/config/searchguard/ssl/.ts_pwd [2018-01-30T22:11:22,462][DEBUG][c.f.s.SearchGuardPlugin ] 2942543db556dedd93c5f787d8b7aa9014fddac0c4ca46d432b466181294acb5 :: /elasticsearch/config/searchguard/ssl/beats-keystore.p12 [2018-01-30T22:11:22,463][DEBUG][c.f.s.SearchGuardPlugin ] 4f9ae066adc83123087465d3bdab1b7fd857fa2f9cedf66d150e6d40101368f9 :: /elasticsearch/config/searchguard/ssl/elastic.csr [2018-01-30T22:11:22,467][DEBUG][c.f.s.SearchGuardPlugin ] 8a405169e91874ed4aa447607fcf9bc610cbacdd4d8a57e5aa6851fcba65a966 :: /elasticsearch/config/searchguard/ssl/NODE-1-keystore.jks [2018-01-30T22:11:22,468][DEBUG][c.f.s.SearchGuardPlugin ] 98c47be1a77eb2318c1c533f859c0aae2af69adefa8b3765724e0ed959a9b24c :: /elasticsearch/config/searchguard/ssl/elastic.crtfull.pem [2018-01-30T22:11:22,469][DEBUG][c.f.s.SearchGuardPlugin ] 25a3bfe520e6744836b9878cb274a3579ff181cf9684c2f82fae1d9ae4f3da76 :: /elasticsearch/config/searchguard/ssl/elastic.crt.pem [2018-01-30T22:11:22,471][DEBUG][c.f.s.SearchGuardPlugin ] 973b4c06c93cc95206aab6a20308e81f66e84969bb11179b8c9f5b4bf2344892 :: /elasticsearch/config/searchguard/ssl/kibana.crtfull.pem [2018-01-30T22:11:22,475][DEBUG][c.f.s.SearchGuardPlugin ] a040300e139ac4998c15725ce8a32955f850d8cd70ecb63dd0abd05be1b79f64 :: /elasticsearch/config/searchguard/ssl/logstash.key.pem [2018-01-30T22:11:22,494][DEBUG][c.f.s.SearchGuardPlugin ] 6bcadc558f4bb2c2e429abd4f69d10490680cde20336b9ebe442a18dfbb1228f :: /elasticsearch/config/searchguard/ssl/logstash-keystore.p12 [2018-01-30T22:11:22,495][DEBUG][c.f.s.SearchGuardPlugin ] 8f929e7b008b7755dca425cba291f5c1b141c24e8982af6d1f99c1de0af26e65 :: /elasticsearch/config/searchguard/ssl/kibana.crt.pem [2018-01-30T22:11:22,495][DEBUG][c.f.s.SearchGuardPlugin ] 58c2f0b89661370c31226fe595304228b78addc4d6468f57bbed73fb38cfa58d :: /elasticsearch/config/searchguard/ssl/beats-keystore.jks [2018-01-30T22:11:22,496][DEBUG][c.f.s.SearchGuardPlugin ] 87c2d689fe0b0009eacb8d35d999a70cce0256e21633ff1cd68242bb10356244 :: /elasticsearch/config/searchguard/ssl/elastic.all.pem [2018-01-30T22:11:22,497][DEBUG][c.f.s.SearchGuardPlugin ] 01a5f2657c10b1fe8ea7862068d175e69a21528d4e767cb9e0e6736e76b1c615 :: /elasticsearch/config/searchguard/ssl/ca/root-ca.csr [2018-01-30T22:11:22,498][DEBUG][c.f.s.SearchGuardPlugin ] 0279ffc5f4bc45f31f13a27a71fa6fb1e5ead3c3c7fca23489c6f2ef3c81d265 :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/02.pem [2018-01-30T22:11:22,499][DEBUG][c.f.s.SearchGuardPlugin ] a3928ff2f5b0f9dcaff793771492e02d0092b19895e0a27ba4a17dcb1c37cb12 :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/private/signing-ca.key [2018-01-30T22:11:22,500][DEBUG][c.f.s.SearchGuardPlugin ] 60e37d63c78720543fac555fbbbdf973ad00c21638bb658e445983f1cb43b0dd :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/04.pem [2018-01-30T22:11:22,500][DEBUG][c.f.s.SearchGuardPlugin ] 070759c3a93c9a8d9824b985982eb802f1b077436d88158745a3d4a7a3c2fbfa :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/05.pem [2018-01-30T22:11:22,501][DEBUG][c.f.s.SearchGuardPlugin ] 537f0e9ea9c003d696d836bd008c2331abd787850215f255534f659f35431539 :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.crt.srl.old [2018-01-30T22:11:22,502][DEBUG][c.f.s.SearchGuardPlugin ] 8a5810d71338d736b81a3ee0e91aca117a2480085bc7073dc986bb8b0ca6593f :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.db.attr.old [2018-01-30T22:11:22,503][DEBUG][c.f.s.SearchGuardPlugin ] dbd642b6943f5f04e5f17eefe5ec2be19464f72fe3aa798abdf72194d8112d73 :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.db.old [2018-01-30T22:11:22,503][DEBUG][c.f.s.SearchGuardPlugin ] 5740c2ace7616d0f6250b81e5433a5efb89cc16bf6801de3156fde31bedeb3c2 :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.db [2018-01-30T22:11:22,504][DEBUG][c.f.s.SearchGuardPlugin ] 09249963490d90835afd8926fbb61e62b912b1685883c83e6f5546147331ebdf :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.crt.srl [2018-01-30T22:11:22,505][DEBUG][c.f.s.SearchGuardPlugin ] 8a5810d71338d736b81a3ee0e91aca117a2480085bc7073dc986bb8b0ca6593f :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.db.attr [2018-01-30T22:11:22,507][DEBUG][c.f.s.SearchGuardPlugin ] 43fd56f56bb9bb18bc9c33966325732b2d7e58bfe2504a2c5c164b071c1b8653 :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/db/signing-ca.crl.srl [2018-01-30T22:11:22,508][DEBUG][c.f.s.SearchGuardPlugin ] 423029750cfe7173887b926f0c4c8cfacf5d74863d1b5d38e5dfde7dc102a92e :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/03.pem [2018-01-30T22:11:22,508][DEBUG][c.f.s.SearchGuardPlugin ] dd17adb6db6c17f405623ebaca349943ae87c7b205628c9db6152970ef4145da :: /elasticsearch/config/searchguard/ssl/ca/signing-ca/01.pem [2018-01-30T22:11:22,509][DEBUG][c.f.s.SearchGuardPlugin ] 1caf9c0a054471aac18bd732dd6bb149bde5e6255eac78f7c7e014af908aa8ed :: /elasticsearch/config/searchguard/ssl/ca/root-ca.crt [2018-01-30T22:11:22,510][DEBUG][c.f.s.SearchGuardPlugin ] d5534bb9a8a7d1e36a40cf9fc05adb706ee7b19acf14029881655604c9a59fc0 :: /elasticsearch/config/searchguard/ssl/ca/signing-ca.crt [2018-01-30T22:11:22,511][DEBUG][c.f.s.SearchGuardPlugin ] 06765451124425f160379e86b5b83d130a586cab0ab2c4b5fcdc90881a18d54a :: /elasticsearch/config/searchguard/ssl/ca/chain-ca.pem [2018-01-30T22:11:22,511][DEBUG][c.f.s.SearchGuardPlugin ] 47136644729c8c587d7fb703bc81318d7ee2757f81310253ca7502f6537a2eb2 :: /elasticsearch/config/searchguard/ssl/ca/root-ca.pem [2018-01-30T22:11:22,512][DEBUG][c.f.s.SearchGuardPlugin ] aa55a0b823948f8c561d1036d446552da9d65006888ad20ee07f5a09dc8ea467 :: /elasticsearch/config/searchguard/ssl/ca/signing-ca.csr [2018-01-30T22:11:22,513][DEBUG][c.f.s.SearchGuardPlugin ] d5534bb9a8a7d1e36a40cf9fc05adb706ee7b19acf14029881655604c9a59fc0 :: /elasticsearch/config/searchguard/ssl/ca/root-ca/02.pem [2018-01-30T22:11:22,515][DEBUG][c.f.s.SearchGuardPlugin ] 812b6b4a79dffffc2a4313ad021843b8fc43e6052ca67165a442b966b1dc8c45 :: /elasticsearch/config/searchguard/ssl/ca/root-ca/private/root-ca.key [2018-01-30T22:11:22,516][DEBUG][c.f.s.SearchGuardPlugin ] b9b54f65fecc963c3371454c2eba6702ce2b0e15862c7d645acbd4b4ab022c2c :: /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.db [2018-01-30T22:11:22,534][DEBUG][c.f.s.SearchGuardPlugin ] bac0c2968e2971c864c4bc43098e1523eb9a004e52986fdf4108c301f980250d :: /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.db.old [2018-01-30T22:11:22,535][DEBUG][c.f.s.SearchGuardPlugin ] 054d741d85411184272d84e51168f5ac6b4669d2002cce0de4ee9a143be4ea59 :: /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.crt.srl [2018-01-30T22:11:22,536][DEBUG][c.f.s.SearchGuardPlugin ] 43fd56f56bb9bb18bc9c33966325732b2d7e58bfe2504a2c5c164b071c1b8653 :: /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.crl.srl [2018-01-30T22:11:22,537][DEBUG][c.f.s.SearchGuardPlugin ] 8a5810d71338d736b81a3ee0e91aca117a2480085bc7073dc986bb8b0ca6593f :: /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.db.attr.old [2018-01-30T22:11:22,538][DEBUG][c.f.s.SearchGuardPlugin ] d2e084143fcb04ffc0e548123e1f62fc19c5d73906b36e7771a085079cbf4d3c :: /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.crt.srl.old [2018-01-30T22:11:22,539][DEBUG][c.f.s.SearchGuardPlugin ] 8a5810d71338d736b81a3ee0e91aca117a2480085bc7073dc986bb8b0ca6593f :: /elasticsearch/config/searchguard/ssl/ca/root-ca/db/root-ca.db.attr [2018-01-30T22:11:22,540][DEBUG][c.f.s.SearchGuardPlugin ] 1caf9c0a054471aac18bd732dd6bb149bde5e6255eac78f7c7e014af908aa8ed :: /elasticsearch/config/searchguard/ssl/ca/root-ca/01.pem [2018-01-30T22:11:22,541][DEBUG][c.f.s.SearchGuardPlugin ] ea6d6dd104eeab47caca0c7010fa1ab12a2fb83005a714774b81e8f017c72a8d :: /elasticsearch/config/searchguard/ssl/ca/signing-ca.pem [2018-01-30T22:11:22,542][DEBUG][c.f.s.SearchGuardPlugin ] a1810865df611b55c85b21e09ad27d914349eec8032d644f69be620629e0d083 :: /elasticsearch/config/searchguard/ssl/elastic-keystore.p12 [2018-01-30T22:11:22,543][DEBUG][c.f.s.SearchGuardPlugin ] f9f1d434e3bda50bfe47f033ea602a7df8240670d2472c3f6521f8f1bacfc278 :: /elasticsearch/config/searchguard/ssl/NODE-1-keystore.p12 [2018-01-30T22:11:22,544][DEBUG][c.f.s.SearchGuardPlugin ] acadb784635d4a6feb1c691dc001e7530b9cc651d607194772d509d4fca441d7 :: /elasticsearch/config/searchguard/ssl/etc/signing-ca.conf [2018-01-30T22:11:22,545][DEBUG][c.f.s.SearchGuardPlugin ] f5a6f44155b1f86dc0c00b6e6df19a9852fd1d21555c73f61f59314afc1458ca :: /elasticsearch/config/searchguard/ssl/etc/root-ca.conf [2018-01-30T22:11:22,565][DEBUG][c.f.s.SearchGuardPlugin ] abd7c411a54d3f82cfe55b61184582700ce19f5d91a81bb96d9a551abe814c6d :: /elasticsearch/config/searchguard/ssl/logstash.crtfull.pem [2018-01-30T22:11:22,566][DEBUG][c.f.s.SearchGuardPlugin ] 3617be912bed443eef528cac2e02d3526805e677bd69c5d359ad7f5d90e09c74 :: /elasticsearch/config/searchguard/ssl/logstash.crt.pem [2018-01-30T22:11:22,567][DEBUG][c.f.s.SearchGuardPlugin ] f0a4c04f3ecddf04f1611514775f85946b6ebaa376b3c9a29f68b71a85a13dab :: /elasticsearch/config/searchguard/ssl/beats.all.pem [2018-01-30T22:11:22,568][DEBUG][c.f.s.SearchGuardPlugin ] 2bfa689a395f158a6b1d161b19d18c53455e207f1ba599a46388878ee27f293e :: /elasticsearch/config/searchguard/ssl/truststore.jks [2018-01-30T22:11:22,569][DEBUG][c.f.s.SearchGuardPlugin ] 070759c3a93c9a8d9824b985982eb802f1b077436d88158745a3d4a7a3c2fbfa :: /elasticsearch/config/searchguard/ssl/beats-signed.pem [2018-01-30T22:11:22,570][DEBUG][c.f.s.SearchGuardPlugin ] b39b664cf92a3eb7d400914061f0a37caac7cdd2022ba2fcf56cce87fc00586c :: /elasticsearch/config/searchguard/ssl/kibana.key.pem [2018-01-30T22:11:22,571][DEBUG][c.f.s.SearchGuardPlugin ] 8d78e253add3d77c7d6a7525c4417c991dde5c6aaf34077d28ed407e545f22a1 :: /elasticsearch/config/searchguard/ssl/elastic-keystore.jks [2018-01-30T22:11:22,571][DEBUG][c.f.s.SearchGuardPlugin ] 41edf6e61ed42a3c6848b0ae91ddc5662377c09a3ed38fcd9f9e82664294bcfd :: /elasticsearch/config/searchguard/ssl/.ca_pwd [2018-01-30T22:11:22,572][DEBUG][c.f.s.SearchGuardPlugin ] c42dfa6e8f72222c6985057c3d881aa857a9ce3a34c6d5e41e7a4af7748f2990 :: /elasticsearch/config/searchguard/ssl/beats.key.pem [2018-01-30T22:11:22,573][DEBUG][c.f.s.SearchGuardPlugin ] c8cd4c1e73d791d5416121c30bdd453fe88bf9f9d9e067023bff8ce7fdc62729 :: /elasticsearch/config/searchguard/ssl/beats.csr [2018-01-30T22:11:22,574][DEBUG][c.f.s.SearchGuardPlugin ] d26fdfec1a561b34b0ef88a95cd69e3a4f479479d953398e257faf7ce380a4e0 :: /elasticsearch/config/searchguard/ssl/logstash-keystore.jks [2018-01-30T22:11:22,575][DEBUG][c.f.s.SearchGuardPlugin ] 6cd188bd5e9c794ce29368506e27a9f96b4e59be408f1b56d94a3573db57b568 :: /elasticsearch/config/searchguard/ssl/NODE-1.csr [2018-01-30T22:11:22,575][DEBUG][c.f.s.SearchGuardPlugin ] 85609dcd74b72413f2596ff772603a6d52820a939dff9ef89ab5769d651e6ecf :: /elasticsearch/config/searchguard/ssl/logstash.csr [2018-01-30T22:11:22,576][DEBUG][c.f.s.SearchGuardPlugin ] 0279ffc5f4bc45f31f13a27a71fa6fb1e5ead3c3c7fca23489c6f2ef3c81d265 :: /elasticsearch/config/searchguard/ssl/elastic-signed.pem [2018-01-30T22:11:22,577][DEBUG][c.f.s.SearchGuardPlugin ] 2d0ae84ee77d19bccedbce6e659074f7aa4f6e3fb14f5ba52111e1a3f0a81545 :: /elasticsearch/config/searchguard/ssl/beats.crt.pem [2018-01-30T22:11:22,578][DEBUG][c.f.s.SearchGuardPlugin ] 423029750cfe7173887b926f0c4c8cfacf5d74863d1b5d38e5dfde7dc102a92e :: /elasticsearch/config/searchguard/ssl/kibana-signed.pem [2018-01-30T22:11:22,578][DEBUG][c.f.s.SearchGuardPlugin ] 60e37d63c78720543fac555fbbbdf973ad00c21638bb658e445983f1cb43b0dd :: /elasticsearch/config/searchguard/ssl/logstash-signed.pem [2018-01-30T22:11:22,579][DEBUG][c.f.s.SearchGuardPlugin ] 416688799a07bd20fe794e4b15796beca5e0bda061807d8f6f74c71eb98a55a6 :: /elasticsearch/config/searchguard/ssl/logstash.all.pem [2018-01-30T22:11:22,580][DEBUG][c.f.s.SearchGuardPlugin ] 2fd9b3bf564e48d3eef968bd5ea7947e50a4396e54abf8eac48721cc02aa5e87 :: /elasticsearch/config/searchguard/ssl/kibana-keystore.jks [2018-01-30T22:11:22,581][DEBUG][c.f.s.SearchGuardPlugin ] 725000915364873ddce30733b1c491012b548d493772b0b05239e7227e24a57f :: /elasticsearch/config/searchguard/ssl/elastic.key.pem [2018-01-30T22:11:22,582][DEBUG][c.f.s.SearchGuardPlugin ] 41edf6e61ed42a3c6848b0ae91ddc5662377c09a3ed38fcd9f9e82664294bcfd :: /elasticsearch/config/searchguard/ssl/.ks_pwd [2018-01-30T22:11:22,582][DEBUG][c.f.s.SearchGuardPlugin ] 31e0b544b5725c14fcdcd30fc982a8dbb43689f7d287400721b1f210e9d11666 :: /elasticsearch/config/searchguard/sg_roles.yml [2018-01-30T22:11:22,584][DEBUG][c.f.s.SearchGuardPlugin ] 364ad0608eb8779819041d18d7a887a4845889b1053a9b631273e775df0a8cf3 :: /elasticsearch/config/searchguard/sg_config.yml [2018-01-30T22:11:22,584][DEBUG][c.f.s.SearchGuardPlugin ] 1dd7ce9ff2509c918fd7e007a65ffb35605f13473052de3d4288dd2d6d2a42c9 :: /elasticsearch/config/elasticsearch.yml [2018-01-30T22:11:22,585][DEBUG][c.f.s.SearchGuardPlugin ] b6a68cc0d0ac6f98d9c82e5f235694b62d9d4651ef3a7ed7c4bf7a8bc6e4dfa9 :: /elasticsearch/config/jvm.options [2018-01-30T22:11:22,592][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [aggs-matrix-stats] [2018-01-30T22:11:22,613][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [analysis-common] [2018-01-30T22:11:22,614][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [ingest-common] [2018-01-30T22:11:22,614][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [lang-expression] [2018-01-30T22:11:22,614][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [lang-mustache] [2018-01-30T22:11:22,614][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [lang-painless] [2018-01-30T22:11:22,614][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [mapper-extras] [2018-01-30T22:11:22,614][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [parent-join] [2018-01-30T22:11:22,614][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [percolator] [2018-01-30T22:11:22,614][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [reindex] [2018-01-30T22:11:22,614][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [repository-url] [2018-01-30T22:11:22,614][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [transport-netty4] [2018-01-30T22:11:22,614][INFO ][o.e.p.PluginsService ] [NODE-1] loaded module [tribe] [2018-01-30T22:11:22,615][INFO ][o.e.p.PluginsService ] [NODE-1] loaded plugin [search-guard-6] [2018-01-30T22:11:25,727][INFO ][c.f.s.a.i.AuditLogImpl ] Configured categories on rest layer to ignore: [AUTHENTICATED, GRANTED_PRIVILEGES] [2018-01-30T22:11:25,729][INFO ][c.f.s.a.i.AuditLogImpl ] Configured categories on transport layer to ignore: [AUTHENTICATED, GRANTED_PRIVILEGES] [2018-01-30T22:11:25,730][INFO ][c.f.s.a.i.AuditLogImpl ] Configured Users to ignore: [kibanaserver] [2018-01-30T22:11:25,731][INFO ][c.f.s.a.i.AuditLogImpl ] Configured Requests to ignore: [] [2018-01-30T22:11:25,731][DEBUG][c.f.s.a.i.AuditLogImpl ] Create new executor with threadPoolSize: 10 and maxQueueLen: 100000 [2018-01-30T22:11:25,732][INFO ][c.f.s.a.i.AuditLogImpl ] Audit Log available but disabled [2018-01-30T22:11:25,733][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=AUDITLOG, implementing class=com.floragunn.searchguard.auditlog.impl.AuditLogImpl] [2018-01-30T22:11:25,736][DEBUG][c.f.s.SearchGuardPlugin ] Using com.floragunn.searchguard.transport.DefaultInterClusterRequestEvaluator as intercluster request evaluator class [2018-01-30T22:11:25,821][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=MULTITENANCY, implementing class=com.floragunn.searchguard.configuration.PrivilegesInterceptorImpl] [2018-01-30T22:11:25,828][DEBUG][c.f.s.c.AdminDNs ] CN=elastic ,OU=devops, C=COM is registered as an admin dn [2018-01-30T22:11:25,831][DEBUG][c.f.s.c.AdminDNs ] Loaded 1 admin DN's [CN=elastic ,OU=devops, C=COM] [2018-01-30T22:11:25,833][DEBUG][c.f.s.c.AdminDNs ] Loaded 0 impersonation DN's {} [2018-01-30T22:11:25,834][DEBUG][c.f.s.c.AdminDNs ] Loaded 0 impersonation users for REST {} [2018-01-30T22:11:25,841][DEBUG][c.f.s.c.ConfigurationLoader] Index is: searchguard [2018-01-30T22:11:25,843][DEBUG][c.f.s.c.LegacyConfigurationLoader] Index is: searchguard [2018-01-30T22:11:25,846][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Subscribe on configuration changes by type config with listener com.floragunn.searchguard.http.XFFResolver@373052b5 [2018-01-30T22:11:25,853][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Subscribe on configuration changes by type config with listener com.floragunn.searchguard.auth.BackendRegistry@58fd1214 [2018-01-30T22:11:26,035][DEBUG][o.e.a.ActionModule ] Using REST wrapper from plugin com.floragunn.searchguard.SearchGuardPlugin [2018-01-30T22:11:26,249][DEBUG][c.f.s.h.SearchGuardNonSslHttpServerTransport] [NODE-1] using max_chunk_size[8kb], max_header_size[8kb], max_initial_line_length[4kb], max_content_length[100mb], receive_predictor[64kb->64kb], pipelining[true], pipelining_max_events[10000] [2018-01-30T22:11:26,255][INFO ][o.e.d.DiscoveryModule ] [NODE-1] using discovery type [zen] [2018-01-30T22:11:27,337][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-01-30T22:11:27,339][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-01-30T22:11:27,340][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-01-30T22:11:27,342][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-01-30T22:11:27,345][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-01-30T22:11:27,347][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-01-30T22:11:27,349][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-01-30T22:11:27,351][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-01-30T22:11:27,353][DEBUG][c.f.s.d.r.a.RestApiPrivilegesEvaluator] Globally disabled endpoints: {} [2018-01-30T22:11:27,354][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=REST_MANAGEMENT_API, implementing class=com.floragunn.searchguard.dlic.rest.api.SearchGuardRestApiActions] [2018-01-30T22:11:27,355][DEBUG][c.f.s.SearchGuardPlugin ] Added 9 management rest handler(s) [2018-01-30T22:11:27,355][INFO ][c.f.s.SearchGuardPlugin ] 4 Search Guard modules loaded so far: [Module [type=DLSFLS, implementing class=com.floragunn.searchguard.configuration.SearchGuardFlsDlsIndexSearcherWrapper], Module [type=AUDITLOG, implementing class=com.floragunn.searchguard.auditlog.impl.AuditLogImpl], Module [type=MULTITENANCY, implementing class=com.floragunn.searchguard.configuration.PrivilegesInterceptorImpl], Module [type=REST_MANAGEMENT_API, implementing class=com.floragunn.searchguard.dlic.rest.api.SearchGuardRestApiActions]] [2018-01-30T22:11:27,356][INFO ][o.e.n.Node ] [NODE-1] initialized [2018-01-30T22:11:27,357][INFO ][o.e.n.Node ] [NODE-1] starting ... [2018-01-30T22:11:27,437][DEBUG][c.f.s.s.t.SearchGuardSSLNettyTransport] [NODE-1] using profile[default], worker_count[8], port[9300-9400], bind_host[[0.0.0.0]], publish_host[[]], compress[false], connect_timeout[30s], connections_per_node[2/3/6/1/1], receive_predictor[64kb->64kb] [2018-01-30T22:11:27,445][DEBUG][c.f.s.s.t.SearchGuardSSLNettyTransport] [NODE-1] binding server bootstrap to: [0.0.0.0] [2018-01-30T22:11:27,608][DEBUG][c.f.s.s.t.SearchGuardSSLNettyTransport] [NODE-1] Bound profile [default] to address {0.0.0.0:9300} [2018-01-30T22:11:27,616][INFO ][o.e.t.TransportService ] [NODE-1] publish_address {172.19.0.3:9300}, bound_addresses {0.0.0.0:9300} [2018-01-30T22:11:27,638][INFO ][o.e.b.BootstrapChecks ] [NODE-1] bound or publishing to a non-loopback or non-link-local address, enforcing bootstrap checks [2018-01-30T22:11:27,662][INFO ][c.f.s.c.IndexBaseConfigurationRepository] Check if searchguard index exists ... [2018-01-30T22:11:27,676][DEBUG][o.e.a.a.i.e.i.TransportIndicesExistsAction] [NODE-1] no known master node, scheduling a retry [2018-01-30T22:11:30,782][INFO ][o.e.c.s.MasterService ] [NODE-1] zen-disco-elected-as-master ([0] nodes joined), reason: new_master {NODE-1}{eObuvPPATKG_KlDlr__J7A}{lqikvfUOQRiJvr1Zj9km_A}{172.19.0.3}{172.19.0.3:9300} [2018-01-30T22:11:30,798][INFO ][o.e.c.s.ClusterApplierService] [NODE-1] new_master {NODE-1}{eObuvPPATKG_KlDlr__J7A}{lqikvfUOQRiJvr1Zj9km_A}{172.19.0.3}{172.19.0.3:9300}, reason: apply cluster state (from master [master {NODE-1}{eObuvPPATKG_KlDlr__J7A}{lqikvfUOQRiJvr1Zj9km_A}{172.19.0.3}{172.19.0.3:9300} committed version [1] source [zen-disco-elected-as-master ([0] nodes joined)]]) [2018-01-30T22:11:30,804][DEBUG][c.f.s.c.ClusterInfoHolder] Cluster Info Holder now initialized for 'nodes' [2018-01-30T22:11:30,939][DEBUG][c.f.s.h.SearchGuardNonSslHttpServerTransport] [NODE-1] Bound http to address {0.0.0.0:9200} [2018-01-30T22:11:30,939][INFO ][c.f.s.h.SearchGuardNonSslHttpServerTransport] [NODE-1] publish_address {172.19.0.3:9200}, bound_addresses {0.0.0.0:9200} [2018-01-30T22:11:30,940][INFO ][o.e.n.Node ] [NODE-1] started [2018-01-30T22:11:30,992][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index searchguard [2018-01-30T22:11:31,124][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index bmore911 [2018-01-30T22:11:31,179][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index .kibana [2018-01-30T22:11:31,421][INFO ][o.e.g.GatewayService ] [NODE-1] recovered [3] indices into cluster_state [2018-01-30T22:11:31,421][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Node started, try to initialize it. Wait for at least yellow cluster state.... [2018-01-30T22:11:31,465][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index bmore911 [2018-01-30T22:11:32,277][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index .kibana [2018-01-30T22:11:32,321][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index searchguard [2018-01-30T22:11:32,569][INFO ][o.e.c.r.a.AllocationService] [NODE-1] Cluster health status changed from [RED] to [YELLOW] (reason: [shards started [[.kibana][0], [searchguard][0]] ...]). [2018-01-30T22:11:32,594][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Try to load config ... [2018-01-30T22:11:32,594][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] sg index exists and was created with ES 6 (new layout) [2018-01-30T22:11:32,672][DEBUG][c.f.s.c.ConfigurationLoader] Received config for config (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=4 [2018-01-30T22:11:32,673][DEBUG][c.f.s.c.ConfigurationLoader] Received config for roles (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=3 [2018-01-30T22:11:32,674][DEBUG][c.f.s.c.ConfigurationLoader] Received config for rolesmapping (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=2 [2018-01-30T22:11:32,675][DEBUG][c.f.s.c.ConfigurationLoader] Received config for internalusers (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=1 [2018-01-30T22:11:32,676][DEBUG][c.f.s.c.ConfigurationLoader] Received config for actiongroups (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=0 [2018-01-30T22:11:32,690][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Notify com.floragunn.searchguard.http.XFFResolver@373052b5 listener about change configuration with type config [2018-01-30T22:11:32,695][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Notify com.floragunn.searchguard.auth.BackendRegistry@58fd1214 listener about change configuration with type config [2018-01-30T22:11:32,704][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=INTERNAL_USERS_AUTHENTICATION_BACKEND, implementing class=com.floragunn.searchguard.auth.internal.InternalAuthenticationBackend] [2018-01-30T22:11:32,705][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=HTTP_BASIC_AUTHENTICATOR, implementing class=com.floragunn.searchguard.http.HTTPBasicAuthenticator] [2018-01-30T22:11:32,720][INFO ][c.f.s.c.IndexBaseConfigurationRepository] Search Guard License Info: SearchGuardLicense [uid=00000000-0000-0000-0000-000000000000, type=TRIAL, issueDate=2018-01-28, expiryDate=2018-03-31, issuedTo=The world, issuer=floragunn GmbH, startDate=2018-01-28, majorVersion=6, clusterName=*, allowedNodeCount=2147483647, msgs=[], expiresInDays=59, isExpired=false, valid=true, action=, prodUsage=Yes, one cluster with all commercial features and unlimited nodes per cluster., clusterService=org.elasticsearch.cluster.service.ClusterService@47372db3, getMsgs()=[], getExpiresInDays()=59, isExpired()=false, isValid()=true, getAction()=, getProdUsage()=Yes, one cluster with all commercial features and unlimited nodes per cluster.] [2018-01-30T22:11:32,720][INFO ][c.f.s.c.IndexBaseConfigurationRepository] Search Guard License Type: TRIAL, valid [2018-01-30T22:11:32,721][INFO ][c.f.s.c.IndexBaseConfigurationRepository] Node 'NODE-1' initialized [2018-01-30T22:11:32,952][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:33,038][DEBUG][c.f.s.a.BackendRegistry ] elastic not cached, return from internal backend directly [2018-01-30T22:11:33,411][DEBUG][c.f.s.a.BackendRegistry ] Can not authenticate elastic due to com.google.common.util.concurrent.UncheckedExecutionException: ElasticsearchSecurityException[password does not match] com.google.common.util.concurrent.UncheckedExecutionException: ElasticsearchSecurityException[password does not match] at com.google.common.cache.LocalCache$Segment.get(LocalCache.java:2218) ~[guava-23.0.jar:?] at com.google.common.cache.LocalCache.get(LocalCache.java:4147) ~[guava-23.0.jar:?] at com.google.common.cache.LocalCache$LocalManualCache.get(LocalCache.java:5053) ~[guava-23.0.jar:?] at com.floragunn.searchguard.auth.BackendRegistry.authcz(BackendRegistry.java:549) [search-guard-6-6.1.1-20.1.jar:6.1.1-20.1] at com.floragunn.searchguard.auth.BackendRegistry.authenticate(BackendRegistry.java:416) [search-guard-6-6.1.1-20.1.jar:6.1.1-20.1] at com.floragunn.searchguard.filter.SearchGuardRestFilter.checkAndAuthenticateRequest(SearchGuardRestFilter.java:122) [search-guard-6-6.1.1-20.1.jar:6.1.1-20.1] at com.floragunn.searchguard.filter.SearchGuardRestFilter.access$000(SearchGuardRestFilter.java:47) [search-guard-6-6.1.1-20.1.jar:6.1.1-20.1] at com.floragunn.searchguard.filter.SearchGuardRestFilter$1.handleRequest(SearchGuardRestFilter.java:74) [search-guard-6-6.1.1-20.1.jar:6.1.1-20.1] at org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:240) [elasticsearch-6.1.1.jar:6.1.1] at org.elasticsearch.rest.RestController.tryAllHandlers(RestController.java:336) [elasticsearch-6.1.1.jar:6.1.1] at org.elasticsearch.rest.RestController.dispatchRequest(RestController.java:174) [elasticsearch-6.1.1.jar:6.1.1] at org.elasticsearch.http.netty4.Netty4HttpServerTransport.dispatchRequest(Netty4HttpServerTransport.java:497) [transport-netty4-client-6.1.1.jar:6.1.1] at org.elasticsearch.http.netty4.Netty4HttpRequestHandler.channelRead0(Netty4HttpRequestHandler.java:80) [transport-netty4-client-6.1.1.jar:6.1.1] at io.netty.channel.SimpleChannelInboundHandler.channelRead(SimpleChannelInboundHandler.java:105) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at org.elasticsearch.http.netty4.pipelining.HttpPipeliningHandler.channelRead(HttpPipeliningHandler.java:68) [transport-netty4-client-6.1.1.jar:6.1.1] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at org.elasticsearch.http.netty4.cors.Netty4CorsHandler.channelRead(Netty4CorsHandler.java:76) [transport-netty4-client-6.1.1.jar:6.1.1] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:102) [netty-codec-4.1.13.Final.jar:4.1.13.Final] at io.netty.handler.codec.MessageToMessageCodec.channelRead(MessageToMessageCodec.java:111) [netty-codec-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:102) [netty-codec-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:102) [netty-codec-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.handler.codec.ByteToMessageDecoder.fireChannelRead(ByteToMessageDecoder.java:310) [netty-codec-4.1.13.Final.jar:4.1.13.Final] at io.netty.handler.codec.ByteToMessageDecoder.channelRead(ByteToMessageDecoder.java:284) [netty-codec-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.ChannelInboundHandlerAdapter.channelRead(ChannelInboundHandlerAdapter.java:86) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:340) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1334) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:362) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:348) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:926) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.nio.AbstractNioByteChannel$NioByteUnsafe.read(AbstractNioByteChannel.java:134) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:644) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeysPlain(NioEventLoop.java:544) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:498) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:458) [netty-transport-4.1.13.Final.jar:4.1.13.Final] at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:858) [netty-common-4.1.13.Final.jar:4.1.13.Final] at java.lang.Thread.run(Thread.java:748) [?:1.8.0_151] Caused by: org.elasticsearch.ElasticsearchSecurityException: password does not match at com.floragunn.searchguard.auth.internal.InternalAuthenticationBackend.authenticate(InternalAuthenticationBackend.java:124) ~[?:?] at com.floragunn.searchguard.auth.BackendRegistry$6.call(BackendRegistry.java:555) ~[?:?] at com.floragunn.searchguard.auth.BackendRegistry$6.call(BackendRegistry.java:549) ~[?:?] at com.google.common.cache.LocalCache$LocalManualCache$1.load(LocalCache.java:5058) ~[?:?] at com.google.common.cache.LocalCache$LoadingValueReference.loadFuture(LocalCache.java:3708) ~[?:?] at com.google.common.cache.LocalCache$Segment.loadSync(LocalCache.java:2416) ~[?:?] at com.google.common.cache.LocalCache$Segment.lockedGetOrLoad(LocalCache.java:2299) ~[?:?] at com.google.common.cache.LocalCache$Segment.get(LocalCache.java:2212) ~[?:?] ... 57 more [2018-01-30T22:11:33,423][DEBUG][c.f.s.a.BackendRegistry ] Cannot authenticate user elastic (or add roles) with authdomain internal/1, try next [2018-01-30T22:11:33,426][DEBUG][c.f.s.a.BackendRegistry ] User still not authenticated after checking 1 auth domains [2018-01-30T22:11:33,427][DEBUG][c.f.s.a.BackendRegistry ] Rerequest with class com.floragunn.searchguard.http.HTTPBasicAuthenticator [2018-01-30T22:11:33,437][DEBUG][c.f.s.a.BackendRegistry ] Rerequest class com.floragunn.searchguard.http.HTTPBasicAuthenticator failed [2018-01-30T22:11:33,438][WARN ][c.f.s.a.BackendRegistry ] Authentication finally failed for elastic [2018-01-30T22:11:33,709][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:33,711][DEBUG][c.f.s.a.BackendRegistry ] kibana not cached, return from internal backend directly [2018-01-30T22:11:34,008][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:34,009][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:34,014][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:34,014][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59886 [2018-01-30T22:11:34,015][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:11:34,016][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:34,017][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:34,019][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:34,019][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:34,037][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:34,038][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:34,038][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:11:45,045][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:45,065][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:45,065][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:45,065][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:45,065][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:11:45,065][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:11:45,065][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:45,066][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:45,066][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:45,066][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:45,067][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:45,071][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:45,071][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:11:45,104][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:45,104][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:45,104][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:45,108][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:45,108][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:11:45,108][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:11:45,108][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:45,109][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:45,110][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:45,110][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:45,110][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:45,110][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:45,112][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:11:45,309][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:45,309][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:45,310][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:45,310][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:45,310][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:11:45,310][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:11:45,310][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:45,310][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:45,311][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:45,311][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:45,311][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:45,311][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:45,311][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:11:45,376][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:45,377][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:45,377][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:45,380][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:45,381][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:11:45,381][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:11:45,382][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:11:45,383][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:11:45,383][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:11:45,384][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:11:45,385][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:11:45,385][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:11:45,393][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:11:45,395][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:11:45,399][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:11:45,400][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:11:45,404][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:45,406][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:45,406][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:45,407][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:45,440][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:11:45,459][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:11:45,460][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:11:45,460][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:11:45,461][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:11:45,461][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:11:45,462][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:11:45,462][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:11:47,997][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:47,999][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:47,999][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:48,000][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:48,000][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:11:48,000][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:11:48,000][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:48,001][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:48,001][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:48,002][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:48,002][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:48,002][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:48,003][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:11:48,012][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:48,013][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:48,014][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:48,014][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:48,015][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:11:48,015][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:11:48,015][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:48,019][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:48,024][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:48,025][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:48,025][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:48,026][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:48,026][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:11:48,039][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:48,039][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:48,040][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:48,040][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:48,040][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:11:48,041][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:11:48,041][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:48,042][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:48,042][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:48,043][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:48,043][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:48,044][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:48,044][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:11:48,063][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:48,065][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:48,065][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:48,066][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:48,066][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:11:48,067][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:11:48,067][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:11:48,067][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:11:48,068][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:11:48,068][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:11:48,076][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:11:48,077][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:11:48,077][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:11:48,078][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:11:48,078][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:11:48,078][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:11:48,079][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:48,079][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:48,079][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:48,080][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:48,080][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:11:48,081][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:11:48,081][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:11:48,081][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:11:48,082][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:11:48,082][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:11:48,082][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:11:48,083][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:11:50,594][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:50,595][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:50,595][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:50,595][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:50,595][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:11:50,596][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:11:50,596][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:50,597][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:50,597][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:50,598][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:50,598][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:50,598][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:50,599][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:11:50,602][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:50,603][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:50,604][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:50,604][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:50,605][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:11:50,605][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:11:50,606][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:50,606][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:50,607][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:50,607][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:50,608][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:50,608][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:50,609][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:11:50,649][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:50,650][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:50,651][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:50,651][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:50,652][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:11:50,652][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:11:50,652][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:50,653][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:50,653][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:50,653][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:50,654][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:50,654][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:50,654][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:11:50,666][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:50,667][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:50,667][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:50,694][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:50,694][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:11:50,695][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:11:50,695][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:11:50,695][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:11:50,695][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:11:50,695][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:11:50,696][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:11:50,696][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:11:50,696][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:11:50,696][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:11:50,696][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:11:50,696][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:11:50,697][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:50,697][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:50,698][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:50,698][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:50,698][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:11:50,699][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:11:50,699][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:11:50,699][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:11:50,699][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:11:50,699][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:11:50,699][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:11:50,700][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:11:50,803][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] sg index exists and was created with ES 6 (new layout) [2018-01-30T22:11:50,811][DEBUG][c.f.s.c.ConfigurationLoader] Received config for config (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=4 [2018-01-30T22:11:50,813][DEBUG][c.f.s.c.ConfigurationLoader] Received config for roles (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=3 [2018-01-30T22:11:50,814][DEBUG][c.f.s.c.ConfigurationLoader] Received config for rolesmapping (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=2 [2018-01-30T22:11:50,815][DEBUG][c.f.s.c.ConfigurationLoader] Received config for internalusers (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=1 [2018-01-30T22:11:50,815][DEBUG][c.f.s.c.ConfigurationLoader] Received config for actiongroups (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=0 [2018-01-30T22:11:50,816][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Notify com.floragunn.searchguard.http.XFFResolver@373052b5 listener about change configuration with type config [2018-01-30T22:11:50,816][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Notify com.floragunn.searchguard.auth.BackendRegistry@58fd1214 listener about change configuration with type config [2018-01-30T22:11:50,821][DEBUG][c.f.s.a.BackendRegistry ] Clear user cache for kibana due to EXPLICIT [2018-01-30T22:11:50,823][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=INTERNAL_USERS_AUTHENTICATION_BACKEND, implementing class=com.floragunn.searchguard.auth.internal.InternalAuthenticationBackend] [2018-01-30T22:11:50,824][DEBUG][c.f.s.s.ReflectionHelper ] Loaded module Module [type=HTTP_BASIC_AUTHENTICATOR, implementing class=com.floragunn.searchguard.http.HTTPBasicAuthenticator] [2018-01-30T22:11:50,828][INFO ][c.f.s.c.IndexBaseConfigurationRepository] Search Guard License Info: SearchGuardLicense [uid=00000000-0000-0000-0000-000000000000, type=TRIAL, issueDate=2018-01-28, expiryDate=2018-03-31, issuedTo=The world, issuer=floragunn GmbH, startDate=2018-01-28, majorVersion=6, clusterName=*, allowedNodeCount=2147483647, msgs=[], expiresInDays=59, isExpired=false, valid=true, action=, prodUsage=Yes, one cluster with all commercial features and unlimited nodes per cluster., clusterService=org.elasticsearch.cluster.service.ClusterService@47372db3, getMsgs()=[], getExpiresInDays()=59, isExpired()=false, isValid()=true, getAction()=, getProdUsage()=Yes, one cluster with all commercial features and unlimited nodes per cluster.] [2018-01-30T22:11:50,828][INFO ][c.f.s.c.IndexBaseConfigurationRepository] Search Guard License Type: TRIAL, valid [2018-01-30T22:11:53,091][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:53,093][DEBUG][c.f.s.a.BackendRegistry ] logstash not cached, return from internal backend directly [2018-01-30T22:11:53,208][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:53,208][DEBUG][c.f.s.a.BackendRegistry ] kibana not cached, return from internal backend directly [2018-01-30T22:11:53,364][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=logstash, roles=[logstash_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:53,364][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:53,364][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=logstash, roles=[logstash_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:53,365][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.6:39274 [2018-01-30T22:11:53,365][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:11:53,365][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:53,365][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for logstash: [logstash_user] [2018-01-30T22:11:53,366][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:53,366][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:53,366][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: logstash_user [2018-01-30T22:11:53,366][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[indices:admin/template/put, cluster:monitor*, indices:admin/template/get, indices:data/write*] [2018-01-30T22:11:53,366][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'logstash_user' and cluster:monitor/main, skip other roles [2018-01-30T22:11:53,434][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:53,435][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=logstash, roles=[logstash_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:53,435][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:53,436][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=logstash, roles=[logstash_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:53,436][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.6:39274 [2018-01-30T22:11:53,436][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:11:53,436][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:53,437][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for logstash: [logstash_user] [2018-01-30T22:11:53,437][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:53,437][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:53,437][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: logstash_user [2018-01-30T22:11:53,438][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[indices:admin/template/put, cluster:monitor*, indices:admin/template/get, indices:data/write*] [2018-01-30T22:11:53,438][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'logstash_user' and cluster:monitor/main, skip other roles [2018-01-30T22:11:53,537][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:53,537][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:53,541][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:53,542][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:11:53,542][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:11:53,542][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:53,544][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:53,546][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:53,546][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:53,546][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:53,547][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:53,547][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:11:53,550][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:53,550][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:53,550][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:53,551][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:53,551][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:11:53,551][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:11:53,551][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:53,551][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:53,551][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:53,552][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:53,552][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:53,552][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:53,552][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:11:53,558][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:53,559][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:53,559][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:53,559][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:53,559][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:11:53,559][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:11:53,559][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:53,560][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:53,560][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:53,560][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:53,560][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:53,560][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:53,560][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:11:53,571][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:53,571][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:53,571][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:53,572][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:53,572][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:11:53,572][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:11:53,572][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:11:53,572][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:11:53,572][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:11:53,572][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:11:53,572][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:11:53,572][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:11:53,572][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:11:53,572][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:11:53,572][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:11:53,573][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:11:53,573][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:53,573][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:53,573][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:53,573][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:53,573][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:11:53,573][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:11:53,573][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:11:53,574][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:11:53,574][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:11:53,574][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:11:53,574][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:11:53,574][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:11:53,638][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:53,639][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=logstash, roles=[logstash_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:53,639][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:53,642][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=logstash, roles=[logstash_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:53,642][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/template/get from 172.19.0.6:39274 [2018-01-30T22:11:53,643][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.indices.template.get.GetIndexTemplatesRequest is not an IndicesRequest [2018-01-30T22:11:53,643][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:53,643][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for logstash: [logstash_user] [2018-01-30T22:11:53,644][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:53,644][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:53,644][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: logstash_user [2018-01-30T22:11:53,644][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[indices:admin/template/put, cluster:monitor*, indices:admin/template/get, indices:data/write*] [2018-01-30T22:11:53,645][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'logstash_user' and indices:admin/template/get, skip other roles [2018-01-30T22:11:53,711][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:53,713][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=logstash, roles=[logstash_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:53,713][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:53,719][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=logstash, roles=[logstash_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:53,720][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/template/put from 172.19.0.6:39274 [2018-01-30T22:11:53,720][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [bmore911] from class org.elasticsearch.action.admin.indices.template.put.PutIndexTemplateRequest for action indices:admin/template/put [2018-01-30T22:11:53,725][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=14, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=true, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:11:53,725][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [bmore911] [2018-01-30T22:11:53,725][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:11:53,725][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:11:53,725][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [bmore911] to [bmore911] [2018-01-30T22:11:53,725][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [bmore911] [2018-01-30T22:11:53,725][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:11:53,725][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [bmore911] [2018-01-30T22:11:53,725][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:11:53,725][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=bmore911, type=*]] [2018-01-30T22:11:53,726][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for logstash: [logstash_user] [2018-01-30T22:11:53,728][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:53,728][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:53,728][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: logstash_user [2018-01-30T22:11:53,728][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[indices:admin/template/put, cluster:monitor*, indices:admin/template/get, indices:data/write*] [2018-01-30T22:11:53,728][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'logstash_user' and indices:admin/template/put, skip other roles [2018-01-30T22:11:53,742][DEBUG][c.f.s.SearchGuardPlugin ] FLS/DLS enabled for index jNtEmbPLQqiCWiY92xtCBQ [2018-01-30T22:11:56,083][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:56,084][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:56,084][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:56,085][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:56,085][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:11:56,085][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:11:56,086][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:56,086][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:56,087][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:56,087][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:56,087][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:56,088][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:56,088][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:11:56,092][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:56,093][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:56,093][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:56,093][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:56,093][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:11:56,094][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:11:56,094][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:56,094][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:56,095][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:56,095][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:56,095][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:56,095][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:56,095][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:11:56,103][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:56,103][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:56,103][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:56,104][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:56,104][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:11:56,104][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:11:56,104][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:56,104][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:56,104][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:56,104][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:56,104][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:56,104][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:56,104][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:11:56,109][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:56,110][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:56,110][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:56,110][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:56,110][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:11:56,111][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:11:56,111][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:11:56,111][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:11:56,111][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:11:56,112][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:11:56,112][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:11:56,112][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:11:56,112][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:11:56,113][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:11:56,113][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:11:56,113][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:11:56,114][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:56,114][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:56,114][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:56,115][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:56,115][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:11:56,116][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:11:56,116][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:11:56,116][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:11:56,116][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:11:56,117][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:11:56,117][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:11:56,117][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:11:58,625][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:58,626][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:58,626][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:58,626][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:58,626][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:11:58,626][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:11:58,627][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:58,627][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:58,628][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:58,628][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:58,628][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:58,628][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:58,629][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:11:58,632][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:58,633][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:58,633][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:58,634][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:58,634][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:11:58,634][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:11:58,635][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:58,636][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:58,637][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:58,637][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:58,638][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:58,638][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:58,638][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:11:58,647][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:58,647][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:58,647][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:58,648][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:58,648][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:11:58,648][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:11:58,648][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:11:58,648][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:58,648][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:58,648][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:58,648][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:58,649][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:11:58,649][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:11:58,656][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:11:58,656][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:11:58,656][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:11:58,657][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:11:58,658][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:11:58,658][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:11:58,658][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:11:58,658][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:11:58,658][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:11:58,658][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:11:58,658][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:11:58,659][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:11:58,659][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:11:58,659][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:11:58,659][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:01,173][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:01,174][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:01,174][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:01,175][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:01,175][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:01,175][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:01,175][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:01,176][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:01,176][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:01,176][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:01,177][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:01,177][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:01,177][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:01,183][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:01,183][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:01,183][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:01,184][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:01,184][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:01,184][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:01,184][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:01,185][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:01,185][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:01,185][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:01,185][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:01,186][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:01,186][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:01,195][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:01,196][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:01,196][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:01,196][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:01,196][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:01,196][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:01,196][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:01,197][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:01,197][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:01,197][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:01,198][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:01,198][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:01,198][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:01,209][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:01,210][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:01,210][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:01,210][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:01,210][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:01,211][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:01,211][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:01,211][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:01,211][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:01,212][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:01,212][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:01,212][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:01,212][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:01,213][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:01,213][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:01,213][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:01,214][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:01,214][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:01,214][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:01,214][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:01,215][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:01,215][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:01,216][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:01,216][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:01,216][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:01,216][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:01,217][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:01,217][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:03,726][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:03,726][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:03,726][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:03,727][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:03,727][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:03,727][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:03,727][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:03,728][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:03,728][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:03,729][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:03,729][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:03,729][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:03,730][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:03,733][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:03,733][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:03,733][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:03,734][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:03,734][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:03,734][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:03,735][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:03,735][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:03,736][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:03,736][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:03,736][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:03,736][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:03,737][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:03,743][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:03,743][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:03,744][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:03,744][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:03,745][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:03,745][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:03,745][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:03,746][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:03,746][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:03,746][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:03,747][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:03,747][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:03,748][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:03,754][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:03,755][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:03,755][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:03,756][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:03,756][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:03,757][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:03,757][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:03,757][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:03,758][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:03,759][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:03,759][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:03,760][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:03,760][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:03,760][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:03,761][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:03,761][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:03,762][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:03,763][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:03,763][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:03,764][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:03,764][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:03,765][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:03,765][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:03,765][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:03,766][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:03,766][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:03,766][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:03,767][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:06,273][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:06,274][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:06,275][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:06,275][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:06,276][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:06,276][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:06,276][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:06,277][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:06,277][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:06,277][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:06,278][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:06,278][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:06,278][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:06,285][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:06,286][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:06,288][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:06,288][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:06,288][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:06,288][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:06,289][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:06,289][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:06,289][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:06,289][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:06,289][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:06,290][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:06,290][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:06,300][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:06,300][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:06,300][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:06,301][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:06,301][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:06,301][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:06,301][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:06,302][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:06,302][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:06,302][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:06,302][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:06,302][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:06,303][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:06,310][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:06,311][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:06,311][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:06,312][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:06,312][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:06,312][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:06,312][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:06,313][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:06,313][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:06,313][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:06,313][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:06,314][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:06,314][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:06,314][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:06,314][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:06,314][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:06,315][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:06,315][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:06,315][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:06,315][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:06,316][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:06,316][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:06,317][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:06,317][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:06,317][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:06,317][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:06,317][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:06,317][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:08,823][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:08,824][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:08,824][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:08,824][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:08,824][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:08,824][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:08,824][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:08,824][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:08,825][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:08,825][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:08,826][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:08,826][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:08,827][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:08,832][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:08,832][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:08,832][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:08,833][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:08,833][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:08,833][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:08,834][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:08,834][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:08,835][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:08,835][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:08,835][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:08,835][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:08,835][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:08,840][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:08,841][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:08,841][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:08,841][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:08,841][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:08,841][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:08,842][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:08,842][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:08,842][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:08,842][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:08,842][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:08,842][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:08,843][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:08,848][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:08,849][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:08,849][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:08,849][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:08,850][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:08,850][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:08,850][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:08,850][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:08,850][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:08,851][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:08,851][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:08,851][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:08,851][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:08,851][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:08,851][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:08,852][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:08,853][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:08,853][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:08,853][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:08,853][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:08,854][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:08,854][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:08,854][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:08,854][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:08,854][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:08,855][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:08,855][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:08,855][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:11,363][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:11,364][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:11,374][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:11,374][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:11,374][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:11,374][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:11,374][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:11,375][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:11,375][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:11,375][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:11,375][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:11,375][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:11,375][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:11,379][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:11,380][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:11,380][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:11,380][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:11,380][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:11,380][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:11,380][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:11,381][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:11,381][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:11,381][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:11,381][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:11,381][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:11,381][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:11,389][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:11,389][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:11,389][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:11,392][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:11,392][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:11,392][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:11,392][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:11,392][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:11,392][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:11,392][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:11,392][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:11,392][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:11,392][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:11,407][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:11,407][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:11,407][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:11,407][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:11,407][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:11,407][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:11,408][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:11,409][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:11,409][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:11,409][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:11,409][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:11,409][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:11,409][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:13,915][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:13,916][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:13,916][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:13,916][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:13,917][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:13,917][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:13,918][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:13,918][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:13,918][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:13,918][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:13,919][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:13,919][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:13,919][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:13,922][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:13,922][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:13,922][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:13,923][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:13,923][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:13,923][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:13,923][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:13,924][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:13,924][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:13,924][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:13,924][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:13,925][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:13,925][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:13,930][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:13,930][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:13,931][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:13,931][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:13,931][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:13,931][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:13,931][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:13,932][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:13,932][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:13,932][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:13,932][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:13,932][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:13,932][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:13,937][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:13,938][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:13,938][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:13,938][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:13,938][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:13,939][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:13,939][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:13,939][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:13,939][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:13,939][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:13,940][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:13,940][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:13,940][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:13,940][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:13,940][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:13,940][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:13,940][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:13,940][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:13,940][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:13,940][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:13,941][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:13,941][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:13,941][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:13,942][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:13,942][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:13,942][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:13,942][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:13,942][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:16,460][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:16,461][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:16,461][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:16,462][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:16,462][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:16,463][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:16,463][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:16,464][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:16,464][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:16,464][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:16,464][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:16,465][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:16,465][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:16,469][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:16,470][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:16,470][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:16,471][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:16,471][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:16,472][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:16,472][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:16,472][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:16,473][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:16,473][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:16,473][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:16,474][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:16,474][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:16,479][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:16,480][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:16,480][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:16,481][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:16,481][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:16,481][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:16,481][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:16,481][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:16,481][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:16,482][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:16,482][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:16,482][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:16,482][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:16,488][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:16,488][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:16,488][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:16,489][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:16,489][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:16,489][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:16,489][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:16,489][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:16,489][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:16,489][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:16,490][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:16,490][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:16,490][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:16,490][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:16,490][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:16,490][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:16,490][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:16,490][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:16,490][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:16,491][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:16,491][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:16,491][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:16,491][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:16,491][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:16,491][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:16,491][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:16,491][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:16,492][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:18,997][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:18,998][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:18,998][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:18,999][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:18,999][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:18,999][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:18,999][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:18,999][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:18,999][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:19,000][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:19,000][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:19,000][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:19,000][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:19,003][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:19,003][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:19,003][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:19,004][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:19,004][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:19,004][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:19,005][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:19,005][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:19,005][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:19,005][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:19,005][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:19,005][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:19,005][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:19,010][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:19,011][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:19,011][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:19,012][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:19,012][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:19,012][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:19,012][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:19,012][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:19,013][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:19,013][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:19,013][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:19,014][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:19,014][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:19,032][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:19,033][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:19,033][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:19,034][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:19,034][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:19,034][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:19,034][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:19,034][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:19,034][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:19,034][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:19,034][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:19,034][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:19,034][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:19,035][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:19,035][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:19,035][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:19,035][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:19,035][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:19,036][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:19,036][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:19,036][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:19,036][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:19,036][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:19,036][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:19,037][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:19,037][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:19,037][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:19,037][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:19,054][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:19,055][DEBUG][c.f.s.a.BackendRegistry ] elastic not cached, return from internal backend directly [2018-01-30T22:12:19,325][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=elastic, roles=[admin], requestedTenant=null]' is authenticated [2018-01-30T22:12:19,325][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:19,327][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=elastic, roles=[admin], requestedTenant=null] on NODE-1 [2018-01-30T22:12:19,327][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/get from 172.19.0.1:59942 [2018-01-30T22:12:19,327][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.get.GetRequest for action indices:data/read/get [2018-01-30T22:12:19,327][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=48, ignore_unavailable=false, allow_no_indices=false, expand_wildcards_open=false, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=false, forbid_closed_indices=true, ignore_aliases=false] [2018-01-30T22:12:19,327][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:19,327][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 requestTypes [doc] [2018-01-30T22:12:19,327][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:19,328][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:19,328][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:19,328][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [doc] [2018-01-30T22:12:19,328][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:19,328][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [doc] [2018-01-30T22:12:19,328][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=doc]] [2018-01-30T22:12:19,328][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for elastic: [admin] [2018-01-30T22:12:19,329][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:19,329][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:19,329][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: admin [2018-01-30T22:12:19,329][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2018-01-30T22:12:19,329][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2018-01-30T22:12:19,329][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2018-01-30T22:12:19,329][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/get] against */*: [*] [2018-01-30T22:12:19,330][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:19,330][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested indextype: [] [2018-01-30T22:12:19,330][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'admin.*', evaluate other roles [2018-01-30T22:12:19,330][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers admin=>[] [2018-01-30T22:12:20,719][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:20,719][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=elastic, roles=[admin], requestedTenant=null]' is authenticated [2018-01-30T22:12:20,719][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:20,748][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=elastic, roles=[admin], requestedTenant=null] on NODE-1 [2018-01-30T22:12:20,748][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/search from 172.19.0.1:59942 [2018-01-30T22:12:20,749][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.search.SearchRequest for action indices:data/read/search [2018-01-30T22:12:20,750][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=38, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=true, ignore_aliases=false] [2018-01-30T22:12:20,750][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:20,751][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:20,752][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:20,753][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:20,753][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:20,753][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:20,753][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:20,753][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:20,753][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:20,754][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for elastic: [admin] [2018-01-30T22:12:20,754][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:20,754][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:20,754][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: admin [2018-01-30T22:12:20,754][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2018-01-30T22:12:20,754][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2018-01-30T22:12:20,755][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2018-01-30T22:12:20,755][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against */*: [*] [2018-01-30T22:12:20,755][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:20,755][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested indextype: [] [2018-01-30T22:12:20,755][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'admin.*', evaluate other roles [2018-01-30T22:12:20,755][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers admin=>[] [2018-01-30T22:12:20,817][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:20,818][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=elastic, roles=[admin], requestedTenant=null]' is authenticated [2018-01-30T22:12:20,819][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:21,545][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:21,546][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:21,546][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:21,547][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:21,547][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:21,547][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:21,547][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:21,547][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:21,548][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:21,548][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:21,548][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:21,548][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:21,549][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:21,557][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:21,558][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:21,558][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:21,558][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:21,558][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:21,558][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:21,558][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:21,559][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:21,559][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:21,559][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:21,560][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:21,560][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:21,560][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:21,567][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:21,567][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:21,567][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:21,568][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:21,568][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:21,568][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:21,568][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:21,569][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:21,569][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:21,569][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:21,570][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:21,570][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:21,570][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:21,576][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:21,577][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:21,577][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:21,578][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:21,578][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:21,578][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:21,578][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:21,579][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:21,579][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:21,579][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:21,579][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:21,579][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:21,579][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:21,579][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:21,580][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:21,580][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:21,580][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:21,581][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:21,581][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:21,581][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:21,582][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:21,582][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:21,582][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:21,582][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:21,583][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:21,583][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:21,583][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:21,583][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:24,098][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:24,099][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:24,099][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:24,100][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:24,100][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:24,100][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:24,100][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:24,101][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:24,101][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:24,101][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:24,101][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:24,102][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:24,102][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:24,105][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:24,105][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:24,105][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:24,106][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:24,106][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:24,106][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:24,106][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:24,106][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:24,107][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:24,107][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:24,107][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:24,107][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:24,107][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:24,113][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:24,114][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:24,114][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:24,114][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:24,114][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:24,114][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:24,114][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:24,115][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:24,115][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:24,115][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:24,116][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:24,116][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:24,116][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:24,125][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:24,125][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:24,125][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:24,125][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:24,125][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:24,126][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:24,126][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:24,126][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:24,126][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:24,127][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:24,127][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:24,127][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:24,127][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:24,127][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:24,127][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:24,128][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:24,128][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:24,128][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:24,128][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:24,128][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:24,129][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:24,129][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:24,129][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:24,129][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:24,129][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:24,129][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:24,129][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:24,130][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:26,636][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:26,637][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:26,637][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:26,637][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:26,638][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:26,638][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:26,638][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:26,638][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:26,638][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:26,638][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:26,638][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:26,639][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:26,639][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:26,642][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:26,642][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:26,642][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:26,642][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:26,643][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:26,643][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:26,643][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:26,643][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:26,644][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:26,644][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:26,644][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:26,644][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:26,644][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:26,650][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:26,650][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:26,650][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:26,651][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:26,651][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:26,651][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:26,651][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:26,651][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:26,652][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:26,652][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:26,652][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:26,652][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:26,652][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:26,658][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:26,659][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:26,659][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:26,659][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:26,659][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:26,660][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:26,660][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:26,660][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:26,660][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:26,660][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:26,661][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:26,661][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:26,661][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:26,661][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:26,661][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:26,661][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:26,661][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:26,662][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:26,662][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:26,662][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:26,662][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:26,662][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:26,662][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:26,662][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:26,663][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:26,663][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:26,663][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:26,663][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:29,171][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:29,172][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:29,172][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:29,173][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:29,174][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:29,174][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:29,174][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:29,174][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:29,175][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:29,175][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:29,175][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:29,176][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:29,176][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:29,224][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:29,224][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:29,224][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:29,225][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:29,225][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:29,225][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:29,225][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:29,225][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:29,225][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:29,225][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:29,225][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:29,226][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:29,226][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:29,231][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:29,232][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:29,232][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:29,232][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:29,232][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:29,232][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:29,233][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:29,233][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:29,233][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:29,233][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:29,233][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:29,233][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:29,234][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:29,239][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:29,240][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:29,240][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:29,242][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:29,242][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:29,242][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:29,242][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:29,242][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:29,242][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:29,243][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:29,243][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:29,243][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:29,243][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:29,243][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:29,246][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:29,246][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:29,246][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:29,247][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:29,247][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:29,247][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:29,248][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:29,248][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:29,248][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:29,249][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:29,249][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:29,249][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:29,250][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:29,250][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:31,758][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:31,758][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:31,758][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:31,759][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:31,759][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:31,759][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:31,759][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:31,759][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:31,760][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:31,760][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:31,760][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:31,760][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:31,760][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:31,762][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:31,763][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:31,763][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:31,763][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:31,763][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:31,763][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:31,763][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:31,763][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:31,764][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:31,764][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:31,764][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:31,764][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:31,764][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:31,769][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:31,769][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:31,769][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:31,769][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:31,769][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:31,769][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:31,769][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:31,769][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:31,769][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:31,769][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:31,770][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:31,770][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:31,770][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:31,773][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:31,774][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:31,774][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:31,774][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:31,775][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:31,775][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:31,775][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:31,775][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:31,775][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:31,775][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:31,775][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:31,775][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:31,775][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:31,775][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:31,775][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:34,280][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:34,280][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:34,280][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:34,281][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:34,281][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:34,281][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:34,281][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:34,281][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:34,281][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:34,281][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:34,281][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:34,282][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:34,282][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:34,329][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:34,329][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:34,329][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:34,330][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:34,330][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:34,330][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:34,330][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:34,330][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:34,330][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:34,330][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:34,331][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:34,331][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:34,331][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:34,334][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:34,335][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:34,335][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:34,335][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:34,335][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:34,335][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:34,335][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:34,335][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:34,336][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:34,336][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:34,336][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:34,336][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:34,336][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:34,340][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:34,340][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:34,340][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:34,341][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:34,341][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:34,341][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:34,341][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:34,341][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:34,341][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:34,341][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:34,343][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:34,343][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:34,343][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:34,343][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:34,343][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:34,343][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:34,343][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:34,343][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:34,343][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:34,343][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:34,343][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:34,343][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:34,344][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:34,344][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:34,344][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:34,344][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:34,344][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:34,344][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:36,850][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:36,850][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:36,850][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:36,851][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:36,851][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:36,851][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:36,851][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:36,851][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:36,851][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:36,851][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:36,851][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:36,851][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:36,851][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:36,853][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:36,853][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:36,853][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:36,854][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:36,854][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:36,854][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:36,854][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:36,854][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:36,854][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:36,854][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:36,854][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:36,854][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:36,854][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:36,858][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:36,859][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:36,859][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:36,859][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:36,859][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:36,859][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:36,859][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:36,859][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:36,859][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:36,859][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:36,859][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:36,859][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:36,859][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:36,866][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:36,866][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:36,866][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:36,866][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:36,866][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:36,866][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:36,867][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:36,867][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:36,867][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:36,867][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:36,867][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:36,867][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:36,867][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:36,867][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:36,867][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:36,867][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:36,867][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:36,868][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:36,868][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:36,868][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:36,868][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:36,868][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:36,868][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:36,868][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:36,869][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:36,869][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:36,869][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:36,869][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:39,388][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:39,388][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:39,388][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:39,388][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:39,388][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:39,389][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:39,389][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:39,389][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:39,389][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:39,389][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:39,389][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:39,389][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:39,389][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:39,440][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:39,440][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:39,441][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:39,441][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:39,441][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:39,441][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:39,441][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:39,441][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:39,441][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:39,441][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:39,442][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:39,442][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:39,442][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:39,451][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:39,452][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:39,452][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:39,452][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:39,452][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:39,452][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:39,452][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:39,452][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:39,453][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:39,453][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:39,453][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:39,453][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:39,453][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:39,459][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:39,460][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:39,460][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:39,460][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:39,460][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:39,460][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:39,460][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:39,460][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:39,460][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:39,460][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:39,460][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:39,460][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:39,461][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:39,461][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:39,461][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:39,461][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:39,461][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:39,461][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:39,461][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:39,461][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:39,461][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:39,461][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:39,461][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:39,462][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:39,462][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:39,462][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:39,462][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:39,462][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:41,973][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:41,974][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:41,974][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:41,974][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:41,974][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:41,974][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:41,974][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:41,975][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:41,975][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:41,975][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:41,975][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:41,975][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:41,975][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:41,980][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:41,980][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:41,980][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:41,980][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:41,980][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:41,980][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:41,980][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:41,981][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:41,981][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:41,981][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:41,981][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:41,981][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:41,981][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:41,985][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:41,985][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:41,985][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:41,985][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:41,985][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:41,985][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:41,985][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:41,986][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:41,986][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:41,986][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:41,986][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:41,986][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:41,986][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:41,991][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:41,991][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:41,991][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:41,992][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:41,993][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:41,993][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:41,993][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:41,993][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:41,993][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:41,993][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:41,993][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:41,993][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:41,993][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:41,993][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:41,993][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[] [2018-01-30T22:12:44,504][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:44,504][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:44,504][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:44,504][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:44,504][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 172.19.0.5:59892 [2018-01-30T22:12:44,505][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2018-01-30T22:12:44,505][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:44,505][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:44,505][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:44,505][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:44,505][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:44,505][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:44,505][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/main, skip other roles [2018-01-30T22:12:44,555][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:44,556][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:44,556][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:44,556][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:44,556][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:44,556][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:44,556][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:44,557][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:44,557][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:44,557][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:44,557][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:44,557][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:44,557][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:44,563][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:44,564][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:44,564][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:44,565][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:44,565][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 172.19.0.5:59892 [2018-01-30T22:12:44,566][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2018-01-30T22:12:44,566][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2018-01-30T22:12:44,566][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:44,566][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:44,566][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:44,567][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:44,567][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[cluster:monitor*, indices:data/write*, indices:data/read*] [2018-01-30T22:12:44,567][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user' and cluster:monitor/nodes/info, skip other roles [2018-01-30T22:12:44,571][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from basic http authenticator [2018-01-30T22:12:44,572][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=kibana, roles=[kibana_user], requestedTenant=null]' is authenticated [2018-01-30T22:12:44,572][DEBUG][c.f.s.a.BackendRegistry ] sgtenant 'null' [2018-01-30T22:12:44,572][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=kibana, roles=[kibana_user], requestedTenant=null] on NODE-1 [2018-01-30T22:12:44,572][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/mappings/get from 172.19.0.5:59892 [2018-01-30T22:12:44,573][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.mapping.get.GetMappingsRequest for action indices:admin/mappings/get [2018-01-30T22:12:44,573][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_aliases_to_multiple_indices=true, forbid_closed_indices=false, ignore_aliases=false] [2018-01-30T22:12:44,573][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2018-01-30T22:12:44,573][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 requestTypes [] [2018-01-30T22:12:44,573][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2018-01-30T22:12:44,574][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2018-01-30T22:12:44,574][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2018-01-30T22:12:44,574][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2018-01-30T22:12:44,574][DEBUG][c.f.s.c.PrivilegesEvaluator] final indices: [.kibana] [2018-01-30T22:12:44,574][DEBUG][c.f.s.c.PrivilegesEvaluator] final types: [_all] [2018-01-30T22:12:44,574][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2018-01-30T22:12:44,574][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for kibana: [kibana_user] [2018-01-30T22:12:44,574][DEBUG][c.f.s.c.PrivilegesInterceptorImpl] raw requestedTenant: 'null' [2018-01-30T22:12:44,575][DEBUG][c.f.s.c.PrivilegesEvaluator] Result from privileges interceptor: null [2018-01-30T22:12:44,575][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: kibana_user [2018-01-30T22:12:44,575][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2018-01-30T22:12:44,575][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2018-01-30T22:12:44,575][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2018-01-30T22:12:44,575][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/mappings/get] against ?kibana/*: [indices:*, indices:data/read*] [2018-01-30T22:12:44,575][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2018-01-30T22:12:44,575][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested indextype: [] [2018-01-30T22:12:44,576][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'kibana_user.?kibana', evaluate other roles [2018-01-30T22:12:44,576][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers kibana_user=>[]