[2019-06-17T11:55:51,599][INFO ][o.e.n.Node ] [InterStat1] initializing ... [2019-06-17T11:55:51,930][INFO ][o.e.e.NodeEnvironment ] [InterStat1] using [1] data paths, mounts [[/ (rootfs)]], net usable_space [17.1gb], net total_space [21.4gb], spins? [unknown], types [rootfs] [2019-06-17T11:55:51,930][INFO ][o.e.e.NodeEnvironment ] [InterStat1] heap size [2.9gb], compressed ordinary object pointers [true] [2019-06-17T11:55:51,958][INFO ][o.e.n.Node ] [InterStat1] node name [InterStat1], node ID [3wsxg1t6QMWywYB1eHcT3Q] [2019-06-17T11:55:51,959][INFO ][o.e.n.Node ] [InterStat1] version[5.6.8], pid[5906], build[688ecce/2018-02-16T16:46:30.010Z], OS[Linux/3.10.0-957.21.2.el7.x86_64/amd64], JVM[Oracle Corporation/OpenJDK 64-Bit Server VM/1.8.0_212/25.212-b04] [2019-06-17T11:55:51,959][INFO ][o.e.n.Node ] [InterStat1] JVM arguments [-Xms3g, -Xmx3g, -XX:+UseConcMarkSweepGC, -XX:CMSInitiatingOccupancyFraction=75, -XX:+UseCMSInitiatingOccupancyOnly, -XX:+DisableExplicitGC, -XX:+AlwaysPreTouch, -Xss1m, -Djava.awt.headless=true, -Dfile.encoding=UTF-8, -Djna.nosys=true, -Djdk.io.permissionsUseCanonicalPath=true, -Dio.netty.noUnsafe=true, -Dio.netty.noKeySetOptimization=true, -Dio.netty.recycler.maxCapacityPerThread=0, -Dlog4j.shutdownHookEnabled=false, -Dlog4j2.disable.jmx=true, -Dlog4j.skipJansi=true, -XX:+HeapDumpOnOutOfMemoryError, -Des.path.home=/usr/share/elasticsearch] [2019-06-17T11:55:56,679][INFO ][c.f.s.SearchGuardPlugin ] Clustername: InterStat [2019-06-17T11:55:56,680][WARN ][c.f.s.SearchGuardPlugin ] ### LICENSE NOTICE Search Guard ### If you use one or more of the following features in production make sure you have a valid Search Guard license (See https://floragunn.com/searchguard-validate-license) * Kibana Multitenancy * LDAP authentication/authorization * Active Directory authentication/authorization * REST Management API * JSON Web Token (JWT) authentication/authorization * Kerberos authentication/authorization * Document- and Fieldlevel Security (DLS/FLS) * Auditlogging In case of any doubt mail to ################################### [2019-06-17T11:55:56,681][WARN ][c.f.s.SearchGuardPlugin ] Consider setting -Djdk.tls.rejectClientInitiatedRenegotiation=true to prevent DoS attacks through client side initiated TLS renegotiation. [2019-06-17T11:55:56,784][INFO ][c.f.s.SearchGuardPlugin ] Node [InterStat1] is a transportClient: false/tribeNode: false/tribeNodeClient: false [2019-06-17T11:55:56,784][INFO ][c.f.s.SearchGuardPlugin ] FLS/DLS module not available [2019-06-17T11:55:56,804][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] java.version: 1.8.0_212 [2019-06-17T11:55:56,804][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] java.vendor: Oracle Corporation [2019-06-17T11:55:56,804][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] java.vm.specification.version: 1.8 [2019-06-17T11:55:56,804][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] java.vm.specification.vendor: Oracle Corporation [2019-06-17T11:55:56,805][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] java.vm.specification.name: Java Virtual Machine Specification [2019-06-17T11:55:56,805][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] java.vm.name: OpenJDK 64-Bit Server VM [2019-06-17T11:55:56,805][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] java.vm.vendor: Oracle Corporation [2019-06-17T11:55:56,805][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] java.specification.version: 1.8 [2019-06-17T11:55:56,805][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] java.specification.vendor: Oracle Corporation [2019-06-17T11:55:56,805][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] java.specification.name: Java Platform API Specification [2019-06-17T11:55:56,806][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] os.name: Linux [2019-06-17T11:55:56,806][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] os.arch: amd64 [2019-06-17T11:55:56,806][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] os.version: 3.10.0-957.21.2.el7.x86_64 [2019-06-17T11:55:57,464][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] JVM supports the following 43 ciphers for https [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] [2019-06-17T11:55:57,475][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] JVM supports the following 43 ciphers for transport [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_DHE_DSS_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDH_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_DSS_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_RSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256, TLS_EMPTY_RENEGOTIATION_INFO_SCSV] [2019-06-17T11:55:57,476][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] Config directory is /etc/elasticsearch/, from there the key- and truststore files are resolved relatively [2019-06-17T11:55:57,476][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Value for searchguard.ssl.transport.keystore_filepath is InterTalk1-keystore.jks [2019-06-17T11:55:57,476][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Resolved InterTalk1-keystore.jks to /etc/elasticsearch/InterTalk1-keystore.jks against /etc/elasticsearch [2019-06-17T11:55:57,477][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Value for searchguard.ssl.transport.truststore_filepath is truststore.jks [2019-06-17T11:55:57,477][DEBUG][c.f.s.s.DefaultSearchGuardKeyStore] Resolved truststore.jks to /etc/elasticsearch/truststore.jks against /etc/elasticsearch [2019-06-17T11:55:57,507][DEBUG][c.f.s.s.u.SSLCertificateHelper] Keystore has 1 entries/aliases [2019-06-17T11:55:57,507][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias 1: is a certificate entry?false/is a key entry?true [2019-06-17T11:55:57,508][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias 1: chain len 2 [2019-06-17T11:55:57,515][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=InterTalk Critical Information Systems, OU=Ops, O=InterTalk Critical Information Systems of type -1 -> false [2019-06-17T11:55:57,516][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=InterTalk Critical Information Systems Root CA, OU=InterTalk Critical Information Systems Root CA, O=InterTalk Critical Information Systems of type 2147483647 -> true [2019-06-17T11:55:57,516][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias 1: single cert CN=InterTalk Critical Information Systems, OU=Ops, O=InterTalk Critical Information Systems of type -1 -> false [2019-06-17T11:55:57,516][INFO ][c.f.s.s.u.SSLCertificateHelper] No alias given, use the first one: 1 [2019-06-17T11:55:57,517][WARN ][c.f.s.s.u.SSLCertificateHelper] Certificate chain for alias 1 contains a root certificate [2019-06-17T11:55:57,517][DEBUG][c.f.s.s.u.SSLCertificateHelper] Keystore has 1 entries/aliases [2019-06-17T11:55:57,517][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias 1: is a certificate entry?false/is a key entry?true [2019-06-17T11:55:57,517][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias 1: chain len 2 [2019-06-17T11:55:57,517][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=InterTalk Critical Information Systems, OU=Ops, O=InterTalk Critical Information Systems of type -1 -> false [2019-06-17T11:55:57,517][DEBUG][c.f.s.s.u.SSLCertificateHelper] cert CN=InterTalk Critical Information Systems Root CA, OU=InterTalk Critical Information Systems Root CA, O=InterTalk Critical Information Systems of type 2147483647 -> true [2019-06-17T11:55:57,518][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias 1: single cert CN=InterTalk Critical Information Systems, OU=Ops, O=InterTalk Critical Information Systems of type -1 -> false [2019-06-17T11:55:57,555][DEBUG][c.f.s.s.u.SSLCertificateHelper] Keystore has 1 entries/aliases [2019-06-17T11:55:57,556][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias root-ca-chain: is a certificate entry?true/is a key entry?false [2019-06-17T11:55:57,556][DEBUG][c.f.s.s.u.SSLCertificateHelper] Alias root-ca-chain: single cert CN=InterTalk Critical Information Systems Root CA, OU=InterTalk Critical Information Systems Root CA, O=InterTalk Critical Information Systems of type 2147483647 -> true [2019-06-17T11:55:57,556][DEBUG][c.f.s.s.u.SSLCertificateHelper] No alias given, will trust all of the certificates in the store [2019-06-17T11:55:57,677][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] sslTransportClientProvider:JDK with ciphers [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256] [2019-06-17T11:55:57,678][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] sslTransportServerProvider:JDK with ciphers [TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_DSS_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, TLS_DHE_DSS_WITH_AES_128_CBC_SHA256, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, TLS_DHE_DSS_WITH_AES_256_GCM_SHA384, TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, TLS_DHE_DSS_WITH_AES_128_GCM_SHA256] [2019-06-17T11:55:57,678][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] sslHTTPProvider:null with ciphers [] [2019-06-17T11:55:57,678][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] sslTransport protocols [TLSv1.2, TLSv1.1] [2019-06-17T11:55:57,678][INFO ][c.f.s.s.DefaultSearchGuardKeyStore] sslHTTP protocols [TLSv1.2, TLSv1.1] [2019-06-17T11:55:57,735][INFO ][o.e.p.PluginsService ] [InterStat1] loaded module [aggs-matrix-stats] [2019-06-17T11:55:57,736][INFO ][o.e.p.PluginsService ] [InterStat1] loaded module [ingest-common] [2019-06-17T11:55:57,736][INFO ][o.e.p.PluginsService ] [InterStat1] loaded module [lang-expression] [2019-06-17T11:55:57,736][INFO ][o.e.p.PluginsService ] [InterStat1] loaded module [lang-groovy] [2019-06-17T11:55:57,736][INFO ][o.e.p.PluginsService ] [InterStat1] loaded module [lang-mustache] [2019-06-17T11:55:57,736][INFO ][o.e.p.PluginsService ] [InterStat1] loaded module [lang-painless] [2019-06-17T11:55:57,736][INFO ][o.e.p.PluginsService ] [InterStat1] loaded module [parent-join] [2019-06-17T11:55:57,736][INFO ][o.e.p.PluginsService ] [InterStat1] loaded module [percolator] [2019-06-17T11:55:57,736][INFO ][o.e.p.PluginsService ] [InterStat1] loaded module [reindex] [2019-06-17T11:55:57,736][INFO ][o.e.p.PluginsService ] [InterStat1] loaded module [transport-netty3] [2019-06-17T11:55:57,736][INFO ][o.e.p.PluginsService ] [InterStat1] loaded module [transport-netty4] [2019-06-17T11:55:57,737][INFO ][o.e.p.PluginsService ] [InterStat1] loaded plugin [search-guard-5] [2019-06-17T11:56:05,333][DEBUG][o.e.a.ActionModule ] Using REST wrapper from plugin com.floragunn.searchguard.SearchGuardPlugin [2019-06-17T11:56:05,482][INFO ][c.f.s.SearchGuardPlugin ] FLS/DLS valve not bound (noop) due to java.lang.ClassNotFoundException: com.floragunn.searchguard.configuration.DlsFlsValveImpl [2019-06-17T11:56:05,483][INFO ][c.f.s.SearchGuardPlugin ] Auditlog not available due to java.lang.ClassNotFoundException: com.floragunn.searchguard.auditlog.impl.AuditLogImpl [2019-06-17T11:56:05,498][DEBUG][c.f.s.SearchGuardPlugin ] Using com.floragunn.searchguard.transport.DefaultInterClusterRequestEvaluator as intercluster request evaluator class [2019-06-17T11:56:05,520][INFO ][c.f.s.SearchGuardPlugin ] Privileges interceptor not bound (noop) due to java.lang.ClassNotFoundException: com.floragunn.searchguard.configuration.PrivilegesInterceptorImpl [2019-06-17T11:56:05,591][DEBUG][c.f.s.c.AdminDNs ] CN=InterTalk Critical Information Systems,OU=Ops,O=InterTalk Critical Information Systems is registered as an admin dn [2019-06-17T11:56:05,626][DEBUG][c.f.s.c.AdminDNs ] Loaded 1 admin DN's [CN=InterTalk Critical Information Systems,OU=Ops,O=InterTalk Critical Information Systems] [2019-06-17T11:56:05,629][DEBUG][c.f.s.c.AdminDNs ] Loaded 0 impersonation DN's {} [2019-06-17T11:56:05,634][DEBUG][c.f.s.c.ConfigurationLoader] Index is: searchguard [2019-06-17T11:56:05,636][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Subscribe on configuration changes by type config with listener com.floragunn.searchguard.http.XFFResolver@29f38091 [2019-06-17T11:56:06,130][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Subscribe on configuration changes by type config with listener com.floragunn.searchguard.auth.BackendRegistry@61874b9d [2019-06-17T11:56:06,663][DEBUG][c.f.s.h.SearchGuardNonSslHttpServerTransport] [InterStat1] using max_chunk_size[8kb], max_header_size[8kb], max_initial_line_length[4kb], max_content_length[100mb], receive_predictor[64kb->64kb], pipelining[true], pipelining_max_events[10000] [2019-06-17T11:56:06,666][INFO ][o.e.d.DiscoveryModule ] [InterStat1] using discovery type [zen] [2019-06-17T11:56:08,938][INFO ][o.e.n.Node ] [InterStat1] initialized [2019-06-17T11:56:08,938][INFO ][o.e.n.Node ] [InterStat1] starting ... [2019-06-17T11:56:09,198][DEBUG][c.f.s.s.t.SearchGuardSSLNettyTransport] [InterStat1] using profile[default], worker_ccount[2], port[9300-9400], bind_host[null], publish_host[null], compress[false], connect_timeout[30s], connections_per_node[2/3/6/1/1], receive_predictor[64kb->64kb] [2019-06-17T11:56:09,216][DEBUG][c.f.s.s.t.SearchGuardSSLNettyTransport] [InterStat1] binding server bootstrap to: [::1, 127.0.0.1] [2019-06-17T11:56:09,488][DEBUG][c.f.s.s.t.SearchGuardSSLNettyTransport] [InterStat1] Bound profile [default] to address {[::1]:9300} [2019-06-17T11:56:09,513][DEBUG][c.f.s.s.t.SearchGuardSSLNettyTransport] [InterStat1] Bound profile [default] to address {127.0.0.1:9300} [2019-06-17T11:56:09,518][INFO ][o.e.t.TransportService ] [InterStat1] publish_address {127.0.0.1:9300}, bound_addresses {[::1]:9300}, {127.0.0.1:9300} [2019-06-17T11:56:09,615][INFO ][c.f.s.c.IndexBaseConfigurationRepository] Check if searchguard index exists ... [2019-06-17T11:56:09,634][DEBUG][o.e.a.a.i.e.i.TransportIndicesExistsAction] [InterStat1] no known master node, scheduling a retry [2019-06-17T11:56:12,936][INFO ][o.e.c.s.ClusterService ] [InterStat1] new_master {InterStat1}{3wsxg1t6QMWywYB1eHcT3Q}{50HzYyF6S5y6zBdwR_g4Kw}{127.0.0.1}{127.0.0.1:9300}{rack=ILS1}, reason: zen-disco-elected-as-master ([0] nodes joined) [2019-06-17T11:56:13,137][DEBUG][c.f.s.h.SearchGuardNonSslHttpServerTransport] [InterStat1] Bound http to address {[::1]:9200} [2019-06-17T11:56:13,160][DEBUG][c.f.s.h.SearchGuardNonSslHttpServerTransport] [InterStat1] Bound http to address {127.0.0.1:9200} [2019-06-17T11:56:13,162][INFO ][c.f.s.h.SearchGuardNonSslHttpServerTransport] [InterStat1] publish_address {127.0.0.1:9200}, bound_addresses {[::1]:9200}, {127.0.0.1:9200} [2019-06-17T11:56:13,162][INFO ][o.e.n.Node ] [InterStat1] started [2019-06-17T11:56:13,869][INFO ][o.e.g.GatewayService ] [InterStat1] recovered [5] indices into cluster_state [2019-06-17T11:56:13,879][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Node started, try to initialize it. Wait for at least yellow cluster state.... [2019-06-17T11:56:15,156][ERROR][c.f.s.a.BackendRegistry ] Not yet initialized (you may need to run sgadmin) [2019-06-17T11:56:15,609][ERROR][c.f.s.a.BackendRegistry ] Not yet initialized (you may need to run sgadmin) [2019-06-17T11:56:16,393][INFO ][o.e.c.r.a.AllocationService] [InterStat1] Cluster health status changed from [RED] to [GREEN] (reason: [shards started [[.kibana][0]] ...]). [2019-06-17T11:56:16,400][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Try to load config ... [2019-06-17T11:56:16,741][DEBUG][c.f.s.c.ConfigurationLoader] Received config for config (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=4 [2019-06-17T11:56:16,764][DEBUG][c.f.s.c.ConfigurationLoader] Received config for roles (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=3 [2019-06-17T11:56:16,765][DEBUG][c.f.s.c.ConfigurationLoader] Received config for rolesmapping (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=2 [2019-06-17T11:56:16,766][DEBUG][c.f.s.c.ConfigurationLoader] Received config for internalusers (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=1 [2019-06-17T11:56:16,767][DEBUG][c.f.s.c.ConfigurationLoader] Received config for actiongroups (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=0 [2019-06-17T11:56:16,775][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Retrieved [rolesmapping, config, internalusers, actiongroups, roles] configs [2019-06-17T11:56:16,791][DEBUG][c.f.s.c.ConfigurationLoader] Received config for config (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=4 [2019-06-17T11:56:16,795][DEBUG][c.f.s.c.ConfigurationLoader] Received config for roles (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=3 [2019-06-17T11:56:16,796][DEBUG][c.f.s.c.ConfigurationLoader] Received config for rolesmapping (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=2 [2019-06-17T11:56:16,797][DEBUG][c.f.s.c.ConfigurationLoader] Received config for internalusers (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=1 [2019-06-17T11:56:16,822][DEBUG][c.f.s.c.ConfigurationLoader] Received config for actiongroups (of [config, roles, rolesmapping, internalusers, actiongroups]) with current latch value=0 [2019-06-17T11:56:16,861][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Notify com.floragunn.searchguard.http.XFFResolver@29f38091 listener about change configuration with type config [2019-06-17T11:56:16,862][DEBUG][c.f.s.c.IndexBaseConfigurationRepository] Notify com.floragunn.searchguard.auth.BackendRegistry@61874b9d listener about change configuration with type config [2019-06-17T11:56:16,865][INFO ][c.f.s.c.IndexBaseConfigurationRepository] Node 'InterStat1' initialized [2019-06-17T11:56:18,507][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:18,627][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? false (cache size: 0) [2019-06-17T11:56:18,676][DEBUG][c.f.s.a.BackendRegistry ] admin not cached, return from internal backend directly [2019-06-17T11:56:19,305][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:19,306][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:19,334][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:19,334][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 127.0.0.1:42126 [2019-06-17T11:56:19,334][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2019-06-17T11:56:19,334][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2019-06-17T11:56:19,337][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:19,337][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:19,337][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:19,338][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/main, skip other roles [2019-06-17T11:56:19,400][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:19,400][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:19,400][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:19,401][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:19,402][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:19,402][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 127.0.0.1:42128 [2019-06-17T11:56:19,402][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2019-06-17T11:56:19,402][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2019-06-17T11:56:19,416][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:19,416][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:19,419][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:19,419][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/nodes/info, skip other roles [2019-06-17T11:56:19,740][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:19,740][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:19,740][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:19,740][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:19,740][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:19,741][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 127.0.0.1:42126 [2019-06-17T11:56:19,741][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2019-06-17T11:56:19,741][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2019-06-17T11:56:19,742][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:19,742][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:19,742][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:19,742][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/nodes/info, skip other roles [2019-06-17T11:56:19,813][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:19,814][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:19,814][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:19,814][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:19,817][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:19,817][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/mget from 127.0.0.1:42128 [2019-06-17T11:56:19,817][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.get.MultiGetRequest$Item [2019-06-17T11:56:19,818][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=48, ignore_unavailable=false, allow_no_indices=false, expand_wildcards_open=false, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=false, forbid_closed_indices=true] [2019-06-17T11:56:19,818][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:19,818][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:19,818][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:19,818][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:19,818][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [config] [2019-06-17T11:56:19,818][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=config]] [2019-06-17T11:56:19,819][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:19,819][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:19,819][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:19,819][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and indices:data/read/mget, skip other roles [2019-06-17T11:56:19,820][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:19,820][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/mget[shard] from 127.0.0.1:42128 [2019-06-17T11:56:19,820][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.get.MultiGetShardRequest [2019-06-17T11:56:19,820][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=48, ignore_unavailable=false, allow_no_indices=false, expand_wildcards_open=false, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=false, forbid_closed_indices=true] [2019-06-17T11:56:19,820][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:19,820][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:19,821][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:19,821][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:19,821][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:19,821][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,821][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:19,822][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:19,826][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:19,826][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:19,826][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:19,827][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against */*: [*] [2019-06-17T11:56:19,827][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:19,827][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:19,827][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:19,827][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access.*', evaluate other roles [2019-06-17T11:56:19,827][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_all_access=>[] [2019-06-17T11:56:19,827][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_kibana_user [2019-06-17T11:56:19,828][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:19,828][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:19,828][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:19,828][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against */*: [indices:data/write/delete*, indices:admin/mappings/get*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:admin/get, indices:data/write/update*, indices:data/write/index*, indices:data/read/field_caps*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:19,828][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:19,828][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:19,828][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:19,828][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.*', evaluate other roles [2019-06-17T11:56:19,829][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2019-06-17T11:56:19,829][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2019-06-17T11:56:19,829][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2019-06-17T11:56:19,829][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against ?kibana/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:data/write/update*, indices:data/write/index*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:19,829][DEBUG][c.f.s.c.PrivilegesEvaluator] no match .kibana* in [] [2019-06-17T11:56:19,829][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested local indextype: [] [2019-06-17T11:56:19,829][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested global indextype: [] [2019-06-17T11:56:19,829][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.?kibana', evaluate other roles [2019-06-17T11:56:19,829][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_kibana_user=>[] [2019-06-17T11:56:19,830][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_own_index [2019-06-17T11:56:19,830][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:19,830][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:19,830][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,830][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:19,830][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve and match admin [2019-06-17T11:56:19,830][DEBUG][c.f.s.c.PrivilegesEvaluator] no permittedAliasesIndex 'admin' found for '[indices:data/read/mget[shard]]' [2019-06-17T11:56:19,831][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get*}' [2019-06-17T11:56:19,831][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=ALL}' [2019-06-17T11:56:19,831][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get}' [2019-06-17T11:56:19,832][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=indices:data/read/search*, *.1=indices:admin/get, *.2=READ}' [2019-06-17T11:56:19,832][DEBUG][c.f.s.c.PrivilegesEvaluator] requestedResolvedIndexTypes '[IndexType [index=.kibana, type=*]]' [2019-06-17T11:56:19,832][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved permitted aliases indices for admin: [admin] [2019-06-17T11:56:19,832][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for admin, will check now types [*] [2019-06-17T11:56:19,832][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against admin/*: [indices:*] [2019-06-17T11:56:19,832][DEBUG][c.f.s.c.PrivilegesEvaluator] no match admin* in [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,832][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,832][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested global indextype: [] [2019-06-17T11:56:19,832][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:19,832][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:19,832][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,832][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:19,833][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:19,833][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:19,833][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:19,833][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:19,833][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:19,833][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:19,833][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:19,833][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.?kibana*', evaluate other roles [2019-06-17T11:56:19,833][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_own_index=>[] [2019-06-17T11:56:19,833][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_public [2019-06-17T11:56:19,855][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:19,855][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:19,855][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,855][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:19,855][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:19,855][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:19,855][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,855][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:19,855][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:19,855][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:19,855][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:19,856][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:19,856][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:19,856][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:19,856][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:19,856][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.?kibana*', evaluate other roles [2019-06-17T11:56:19,856][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_public=>[] [2019-06-17T11:56:19,911][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:19,911][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:19,912][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:19,912][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:19,913][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:19,913][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/health from 127.0.0.1:42126 [2019-06-17T11:56:19,913][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.cluster.health.ClusterHealthRequest [2019-06-17T11:56:19,942][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=7, ignore_unavailable=true, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=false] [2019-06-17T11:56:19,942][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:19,942][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:19,942][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:19,942][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:19,942][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:19,943][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,943][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:19,944][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:19,944][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:19,944][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/health, skip other roles [2019-06-17T11:56:19,975][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:19,975][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:19,976][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:19,976][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:19,990][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:19,991][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/get from 127.0.0.1:42128 [2019-06-17T11:56:19,991][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.get.GetIndexRequest [2019-06-17T11:56:19,991][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=false] [2019-06-17T11:56:19,991][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:19,991][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:19,991][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:19,991][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:19,991][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:19,991][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,992][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:19,992][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:19,993][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:19,993][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:19,993][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:19,993][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against */*: [*] [2019-06-17T11:56:19,993][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:19,993][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:19,993][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:19,993][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access.*', evaluate other roles [2019-06-17T11:56:19,993][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_all_access=>[] [2019-06-17T11:56:19,993][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_kibana_user [2019-06-17T11:56:19,994][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:19,994][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:19,994][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:19,994][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against */*: [indices:data/write/delete*, indices:admin/mappings/get*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:admin/get, indices:data/write/update*, indices:data/write/index*, indices:data/read/field_caps*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:19,994][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:19,994][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:19,994][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:19,994][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.*', evaluate other roles [2019-06-17T11:56:19,994][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2019-06-17T11:56:19,994][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2019-06-17T11:56:19,994][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2019-06-17T11:56:19,995][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against ?kibana/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:data/write/update*, indices:data/write/index*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:19,995][DEBUG][c.f.s.c.PrivilegesEvaluator] no match .kibana* in [] [2019-06-17T11:56:19,995][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested local indextype: [] [2019-06-17T11:56:19,995][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested global indextype: [] [2019-06-17T11:56:19,995][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.?kibana', evaluate other roles [2019-06-17T11:56:19,995][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_kibana_user=>[] [2019-06-17T11:56:19,995][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_own_index [2019-06-17T11:56:19,995][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:19,995][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:19,996][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,996][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:19,996][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve and match admin [2019-06-17T11:56:19,996][DEBUG][c.f.s.c.PrivilegesEvaluator] no permittedAliasesIndex 'admin' found for '[indices:admin/get]' [2019-06-17T11:56:19,996][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get*}' [2019-06-17T11:56:19,996][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=ALL}' [2019-06-17T11:56:19,996][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get}' [2019-06-17T11:56:19,997][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=indices:data/read/search*, *.1=indices:admin/get, *.2=READ}' [2019-06-17T11:56:19,997][DEBUG][c.f.s.c.PrivilegesEvaluator] requestedResolvedIndexTypes '[IndexType [index=.kibana, type=*]]' [2019-06-17T11:56:19,997][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved permitted aliases indices for admin: [admin] [2019-06-17T11:56:19,997][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for admin, will check now types [*] [2019-06-17T11:56:19,997][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against admin/*: [indices:*] [2019-06-17T11:56:19,997][DEBUG][c.f.s.c.PrivilegesEvaluator] no match admin* in [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,997][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,997][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested global indextype: [] [2019-06-17T11:56:19,997][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:19,997][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:19,997][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,997][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:19,998][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:19,998][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:19,998][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:19,998][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:19,998][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:19,998][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:19,998][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:19,998][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.?kibana*', evaluate other roles [2019-06-17T11:56:19,998][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_own_index=>[] [2019-06-17T11:56:19,998][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_public [2019-06-17T11:56:19,999][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:19,999][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:19,999][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:19,999][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:19,999][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:19,999][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:19,999][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:20,031][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:20,031][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:20,031][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:20,032][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:20,032][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:20,032][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:20,032][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:20,032][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:20,032][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.?kibana*', evaluate other roles [2019-06-17T11:56:20,032][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_public=>[] [2019-06-17T11:56:20,044][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:20,044][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:20,045][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:20,045][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:20,095][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:20,095][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/search from 127.0.0.1:42126 [2019-06-17T11:56:20,095][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.search.SearchRequest [2019-06-17T11:56:20,096][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=38, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=true] [2019-06-17T11:56:20,096][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:20,097][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:20,097][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:20,097][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:20,097][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:20,097][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:20,098][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:20,098][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:20,098][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:20,098][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:20,098][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:20,098][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against */*: [*] [2019-06-17T11:56:20,098][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:20,098][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:20,099][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:20,099][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access.*', evaluate other roles [2019-06-17T11:56:20,099][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_all_access=>[] [2019-06-17T11:56:20,099][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_kibana_user [2019-06-17T11:56:20,099][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:20,099][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:20,099][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:20,099][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against */*: [indices:data/write/delete*, indices:admin/mappings/get*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:admin/get, indices:data/write/update*, indices:data/write/index*, indices:data/read/field_caps*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.*', evaluate other roles [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against ?kibana/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:data/write/update*, indices:data/write/index*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] no match .kibana* in [] [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested local indextype: [] [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested global indextype: [] [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.?kibana', evaluate other roles [2019-06-17T11:56:20,100][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_kibana_user=>[] [2019-06-17T11:56:20,101][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_own_index [2019-06-17T11:56:20,101][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:20,101][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:20,101][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:20,101][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:20,101][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve and match admin [2019-06-17T11:56:20,101][DEBUG][c.f.s.c.PrivilegesEvaluator] no permittedAliasesIndex 'admin' found for '[indices:data/read/search]' [2019-06-17T11:56:20,102][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get*}' [2019-06-17T11:56:20,102][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=ALL}' [2019-06-17T11:56:20,102][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get}' [2019-06-17T11:56:20,102][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=indices:data/read/search*, *.1=indices:admin/get, *.2=READ}' [2019-06-17T11:56:20,102][DEBUG][c.f.s.c.PrivilegesEvaluator] requestedResolvedIndexTypes '[IndexType [index=.kibana, type=*]]' [2019-06-17T11:56:20,102][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved permitted aliases indices for admin: [admin] [2019-06-17T11:56:20,102][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for admin, will check now types [*] [2019-06-17T11:56:20,103][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against admin/*: [indices:*] [2019-06-17T11:56:20,103][DEBUG][c.f.s.c.PrivilegesEvaluator] no match admin* in [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:20,103][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:20,103][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested global indextype: [] [2019-06-17T11:56:20,103][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:20,103][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:20,103][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:20,103][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:20,126][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:20,126][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:20,126][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:20,126][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:20,126][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:20,127][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:20,127][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:20,127][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.?kibana*', evaluate other roles [2019-06-17T11:56:20,127][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_own_index=>[] [2019-06-17T11:56:20,127][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_public [2019-06-17T11:56:20,127][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:20,127][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:20,127][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:20,127][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:20,127][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:20,128][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:20,128][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:20,128][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:20,128][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:20,128][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:20,128][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:20,128][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:20,128][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:20,128][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:20,128][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:20,128][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.?kibana*', evaluate other roles [2019-06-17T11:56:20,128][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_public=>[] [2019-06-17T11:56:20,691][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:20,691][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:20,691][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:20,691][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:20,691][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:20,692][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 127.0.0.1:42130 [2019-06-17T11:56:20,692][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2019-06-17T11:56:20,692][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2019-06-17T11:56:20,692][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:20,692][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:20,692][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:20,693][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/main, skip other roles [2019-06-17T11:56:20,696][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:20,696][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:20,696][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:20,696][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:20,699][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:20,699][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/state from 127.0.0.1:42132 [2019-06-17T11:56:20,699][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [] from class org.elasticsearch.action.admin.cluster.state.ClusterStateRequest [2019-06-17T11:56:20,699][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=7, ignore_unavailable=true, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=false] [2019-06-17T11:56:20,699][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 raw indices [] [2019-06-17T11:56:20,700][DEBUG][c.f.s.c.PrivilegesEvaluator] No indices found in request, assume _all [2019-06-17T11:56:20,700][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [searchguard, watcher, .kibana, watcher_alarms, mos-2019.06.14] [2019-06-17T11:56:20,700][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:20,700][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=watcher, type=*], IndexType [index=mos-2019.06.14, type=*], IndexType [index=searchguard, type=*], IndexType [index=.kibana, type=*], IndexType [index=watcher_alarms, type=*]] [2019-06-17T11:56:20,701][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:20,701][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:20,701][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:20,701][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/state, skip other roles [2019-06-17T11:56:23,365][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:23,366][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:23,366][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:23,366][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:23,366][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:23,367][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 127.0.0.1:42128 [2019-06-17T11:56:23,367][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2019-06-17T11:56:23,367][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2019-06-17T11:56:23,368][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:23,368][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:23,368][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:23,368][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/main, skip other roles [2019-06-17T11:56:23,373][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:23,373][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:23,373][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:23,373][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:23,374][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:23,374][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 127.0.0.1:42126 [2019-06-17T11:56:23,374][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2019-06-17T11:56:23,374][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2019-06-17T11:56:23,375][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:23,375][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:23,375][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:23,375][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/nodes/info, skip other roles [2019-06-17T11:56:23,400][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:23,401][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:23,401][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:23,401][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:23,401][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:23,401][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 127.0.0.1:42128 [2019-06-17T11:56:23,401][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2019-06-17T11:56:23,401][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2019-06-17T11:56:23,402][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:23,402][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:23,402][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:23,402][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/nodes/info, skip other roles [2019-06-17T11:56:23,420][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:23,420][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:23,420][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:23,420][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:23,421][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:23,421][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/mget from 127.0.0.1:42126 [2019-06-17T11:56:23,421][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.get.MultiGetRequest$Item [2019-06-17T11:56:23,421][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=48, ignore_unavailable=false, allow_no_indices=false, expand_wildcards_open=false, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=false, forbid_closed_indices=true] [2019-06-17T11:56:23,421][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:23,421][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:23,421][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:23,421][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:23,421][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [config] [2019-06-17T11:56:23,421][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=config]] [2019-06-17T11:56:23,422][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:23,422][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:23,422][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:23,422][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and indices:data/read/mget, skip other roles [2019-06-17T11:56:23,423][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:23,423][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/mget[shard] from 127.0.0.1:42126 [2019-06-17T11:56:23,423][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.get.MultiGetShardRequest [2019-06-17T11:56:23,423][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=48, ignore_unavailable=false, allow_no_indices=false, expand_wildcards_open=false, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=false, forbid_closed_indices=true] [2019-06-17T11:56:23,423][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:23,423][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:23,423][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:23,423][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:23,423][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:23,423][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,424][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:23,424][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:23,424][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:23,424][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:23,424][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:23,424][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against */*: [*] [2019-06-17T11:56:23,424][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:23,424][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:23,424][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:23,424][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access.*', evaluate other roles [2019-06-17T11:56:23,424][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_all_access=>[] [2019-06-17T11:56:23,424][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_kibana_user [2019-06-17T11:56:23,425][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:23,425][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:23,425][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:23,425][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against */*: [indices:data/write/delete*, indices:admin/mappings/get*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:admin/get, indices:data/write/update*, indices:data/write/index*, indices:data/read/field_caps*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:23,425][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:23,425][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:23,425][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:23,425][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.*', evaluate other roles [2019-06-17T11:56:23,425][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2019-06-17T11:56:23,425][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2019-06-17T11:56:23,425][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2019-06-17T11:56:23,426][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against ?kibana/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:data/write/update*, indices:data/write/index*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:23,426][DEBUG][c.f.s.c.PrivilegesEvaluator] no match .kibana* in [] [2019-06-17T11:56:23,426][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested local indextype: [] [2019-06-17T11:56:23,426][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested global indextype: [] [2019-06-17T11:56:23,426][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.?kibana', evaluate other roles [2019-06-17T11:56:23,426][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_kibana_user=>[] [2019-06-17T11:56:23,426][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_own_index [2019-06-17T11:56:23,426][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:23,426][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:23,426][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,426][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:23,427][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve and match admin [2019-06-17T11:56:23,427][DEBUG][c.f.s.c.PrivilegesEvaluator] no permittedAliasesIndex 'admin' found for '[indices:data/read/mget[shard]]' [2019-06-17T11:56:23,427][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get*}' [2019-06-17T11:56:23,427][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=ALL}' [2019-06-17T11:56:23,427][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get}' [2019-06-17T11:56:23,427][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=indices:data/read/search*, *.1=indices:admin/get, *.2=READ}' [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] requestedResolvedIndexTypes '[IndexType [index=.kibana, type=*]]' [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved permitted aliases indices for admin: [admin] [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for admin, will check now types [*] [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against admin/*: [indices:*] [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] no match admin* in [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested global indextype: [] [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:23,428][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:23,429][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:23,429][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:23,429][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.?kibana*', evaluate other roles [2019-06-17T11:56:23,429][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_own_index=>[] [2019-06-17T11:56:23,429][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_public [2019-06-17T11:56:23,429][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:23,429][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:23,440][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,440][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:23,440][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:23,440][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:23,440][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,440][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:23,440][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:23,440][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:23,440][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:23,441][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:23,441][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:23,441][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:23,441][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:23,441][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.?kibana*', evaluate other roles [2019-06-17T11:56:23,441][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_public=>[] [2019-06-17T11:56:23,454][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:23,454][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:23,454][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:23,454][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:23,455][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:23,455][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/health from 127.0.0.1:42128 [2019-06-17T11:56:23,455][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.cluster.health.ClusterHealthRequest [2019-06-17T11:56:23,455][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=7, ignore_unavailable=true, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=false] [2019-06-17T11:56:23,455][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:23,455][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:23,455][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:23,455][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:23,455][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:23,455][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,456][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:23,456][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:23,456][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:23,456][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/health, skip other roles [2019-06-17T11:56:23,459][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:23,459][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:23,459][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:23,459][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:23,459][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:23,459][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/get from 127.0.0.1:42126 [2019-06-17T11:56:23,459][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.get.GetIndexRequest [2019-06-17T11:56:23,459][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=false] [2019-06-17T11:56:23,460][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:23,460][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:23,460][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:23,460][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:23,460][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:23,460][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,460][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:23,460][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:23,460][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:23,460][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against */*: [*] [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access.*', evaluate other roles [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_all_access=>[] [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_kibana_user [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against */*: [indices:data/write/delete*, indices:admin/mappings/get*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:admin/get, indices:data/write/update*, indices:data/write/index*, indices:data/read/field_caps*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:23,461][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.*', evaluate other roles [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against ?kibana/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:data/write/update*, indices:data/write/index*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] no match .kibana* in [] [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested local indextype: [] [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested global indextype: [] [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.?kibana', evaluate other roles [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_kibana_user=>[] [2019-06-17T11:56:23,462][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_own_index [2019-06-17T11:56:23,463][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:23,463][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:23,463][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,463][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:23,463][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve and match admin [2019-06-17T11:56:23,463][DEBUG][c.f.s.c.PrivilegesEvaluator] no permittedAliasesIndex 'admin' found for '[indices:admin/get]' [2019-06-17T11:56:23,463][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get*}' [2019-06-17T11:56:23,463][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=ALL}' [2019-06-17T11:56:23,463][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get}' [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=indices:data/read/search*, *.1=indices:admin/get, *.2=READ}' [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] requestedResolvedIndexTypes '[IndexType [index=.kibana, type=*]]' [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved permitted aliases indices for admin: [admin] [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for admin, will check now types [*] [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against admin/*: [indices:*] [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] no match admin* in [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested global indextype: [] [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:23,464][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.?kibana*', evaluate other roles [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_own_index=>[] [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_public [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:23,465][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:23,466][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:23,466][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:23,466][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:23,466][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:23,466][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:23,466][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.?kibana*', evaluate other roles [2019-06-17T11:56:23,466][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_public=>[] [2019-06-17T11:56:23,470][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:23,471][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:23,471][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:23,471][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:23,471][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:23,471][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/search from 127.0.0.1:42128 [2019-06-17T11:56:23,471][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.search.SearchRequest [2019-06-17T11:56:23,471][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=38, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=true] [2019-06-17T11:56:23,472][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:23,472][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:23,472][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:23,472][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:23,472][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:23,472][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,472][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:23,472][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:23,472][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:23,473][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:23,473][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:23,473][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against */*: [*] [2019-06-17T11:56:23,473][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:23,473][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:23,473][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:23,473][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access.*', evaluate other roles [2019-06-17T11:56:23,473][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_all_access=>[] [2019-06-17T11:56:23,473][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_kibana_user [2019-06-17T11:56:23,473][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:23,473][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:23,473][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against */*: [indices:data/write/delete*, indices:admin/mappings/get*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:admin/get, indices:data/write/update*, indices:data/write/index*, indices:data/read/field_caps*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.*', evaluate other roles [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against ?kibana/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:data/write/update*, indices:data/write/index*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] no match .kibana* in [] [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested local indextype: [] [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested global indextype: [] [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.?kibana', evaluate other roles [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_kibana_user=>[] [2019-06-17T11:56:23,474][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_own_index [2019-06-17T11:56:23,475][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:23,475][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:23,475][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,475][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:23,475][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve and match admin [2019-06-17T11:56:23,475][DEBUG][c.f.s.c.PrivilegesEvaluator] no permittedAliasesIndex 'admin' found for '[indices:data/read/search]' [2019-06-17T11:56:23,475][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get*}' [2019-06-17T11:56:23,475][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=ALL}' [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get}' [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=indices:data/read/search*, *.1=indices:admin/get, *.2=READ}' [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] requestedResolvedIndexTypes '[IndexType [index=.kibana, type=*]]' [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved permitted aliases indices for admin: [admin] [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for admin, will check now types [*] [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against admin/*: [indices:*] [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] no match admin* in [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested global indextype: [] [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:23,476][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.?kibana*', evaluate other roles [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_own_index=>[] [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_public [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:23,477][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:23,478][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:23,478][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:23,478][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:23,478][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:23,478][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:23,478][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:23,478][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:23,478][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:23,478][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.?kibana*', evaluate other roles [2019-06-17T11:56:23,478][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_public=>[] [2019-06-17T11:56:23,504][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:23,504][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:23,504][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:23,504][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:23,505][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:23,505][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/state from 127.0.0.1:42130 [2019-06-17T11:56:23,505][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [] from class org.elasticsearch.action.admin.cluster.state.ClusterStateRequest [2019-06-17T11:56:23,505][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=7, ignore_unavailable=true, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=false] [2019-06-17T11:56:23,505][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 raw indices [] [2019-06-17T11:56:23,505][DEBUG][c.f.s.c.PrivilegesEvaluator] No indices found in request, assume _all [2019-06-17T11:56:23,505][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [searchguard, watcher, .kibana, watcher_alarms, mos-2019.06.14] [2019-06-17T11:56:23,505][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:23,505][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=watcher, type=*], IndexType [index=mos-2019.06.14, type=*], IndexType [index=searchguard, type=*], IndexType [index=.kibana, type=*], IndexType [index=watcher_alarms, type=*]] [2019-06-17T11:56:23,506][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:23,506][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:23,506][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:23,506][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/state, skip other roles [2019-06-17T11:56:25,838][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:25,839][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:25,840][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:25,840][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:25,867][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:25,867][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/search from 127.0.0.1:42132 [2019-06-17T11:56:25,867][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [watcher] from class org.elasticsearch.action.search.SearchRequest [2019-06-17T11:56:25,867][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=38, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=true] [2019-06-17T11:56:25,867][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [watcher] [2019-06-17T11:56:25,868][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:25,868][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [watcher] to [watcher] [2019-06-17T11:56:25,868][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [watcher] [2019-06-17T11:56:25,868][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [sentinl-watcher] [2019-06-17T11:56:25,868][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=watcher, type=sentinl-watcher]] [2019-06-17T11:56:25,869][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:25,869][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:25,870][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:25,870][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [watcher] [2019-06-17T11:56:25,870][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:25,870][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against */*: [*] [2019-06-17T11:56:25,870][DEBUG][c.f.s.c.PrivilegesEvaluator] removed watcher* [2019-06-17T11:56:25,870][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:25,870][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:25,870][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access.*', evaluate other roles [2019-06-17T11:56:25,871][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_all_access=>[] [2019-06-17T11:56:25,871][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_kibana_user [2019-06-17T11:56:25,871][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:25,871][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [watcher] [2019-06-17T11:56:25,871][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against */*: [indices:data/write/delete*, indices:admin/mappings/get*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:admin/get, indices:data/write/update*, indices:data/write/index*, indices:data/read/field_caps*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] removed watcher* [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.*', evaluate other roles [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for ?kibana [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested local indextype: [] [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested global indextype: [] [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.?kibana', evaluate other roles [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_kibana_user=>[] [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_own_index [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:25,872][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for watcher*: [watcher] [2019-06-17T11:56:25,873][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for watcher*, will check now types [*] [2019-06-17T11:56:25,873][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against watcher*/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/update*, indices:admin/mappings/fields/get*, indices:data/read*, indices:data/write/bulk*, indices:data/write/index*, indices:data/read/search, indices:data/write*, indices:monitor/*, indices:admin/create, indices:admin/get*] [2019-06-17T11:56:25,873][DEBUG][c.f.s.c.PrivilegesEvaluator] removed watcher* [2019-06-17T11:56:25,873][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [] [2019-06-17T11:56:25,873][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:25,873][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.watcher*', evaluate other roles [2019-06-17T11:56:25,873][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve and match admin [2019-06-17T11:56:25,873][DEBUG][c.f.s.c.PrivilegesEvaluator] no permittedAliasesIndex 'admin' found for '[indices:data/read/search]' [2019-06-17T11:56:25,873][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get*}' [2019-06-17T11:56:25,873][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=ALL}' [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get}' [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=indices:data/read/search*, *.1=indices:admin/get, *.2=READ}' [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] requestedResolvedIndexTypes '[IndexType [index=watcher, type=sentinl-watcher]]' [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved permitted aliases indices for admin: [admin] [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for admin, will check now types [*] [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against admin/*: [indices:*] [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] no match admin* in [] [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested local indextype: [] [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested global indextype: [] [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.admin', evaluate other roles [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [] [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:25,874][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.mos*', evaluate other roles [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for ?kibana* [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.?kibana*', evaluate other roles [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_own_index=>[] [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_public [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for watcher*: [watcher] [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for watcher*, will check now types [*] [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against watcher*/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/update*, indices:admin/mappings/fields/get*, indices:data/read*, indices:data/write/bulk*, indices:data/write/index*, indices:data/read/search, indices:data/write*, indices:monitor/*, indices:admin/create, indices:admin/get*] [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] removed watcher* [2019-06-17T11:56:25,875][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [] [2019-06-17T11:56:25,876][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:25,876][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.watcher*', evaluate other roles [2019-06-17T11:56:25,876][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:25,876][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:25,876][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [] [2019-06-17T11:56:25,876][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:25,876][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.mos*', evaluate other roles [2019-06-17T11:56:25,876][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:25,876][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for ?kibana* [2019-06-17T11:56:25,985][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:25,985][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:25,985][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.?kibana*', evaluate other roles [2019-06-17T11:56:25,985][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_public=>[] [2019-06-17T11:56:26,051][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:26,052][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:26,052][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:26,052][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:26,052][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:26,052][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/main from 127.0.0.1:42126 [2019-06-17T11:56:26,052][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.main.MainRequest is not an IndicesRequest [2019-06-17T11:56:26,052][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2019-06-17T11:56:26,053][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:26,053][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:26,053][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:26,053][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/main, skip other roles [2019-06-17T11:56:26,056][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:26,056][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:26,057][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:26,057][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:26,057][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:26,057][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 127.0.0.1:42128 [2019-06-17T11:56:26,057][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2019-06-17T11:56:26,057][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2019-06-17T11:56:26,057][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:26,058][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:26,058][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:26,058][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/nodes/info, skip other roles [2019-06-17T11:56:26,066][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:26,066][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:26,066][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:26,066][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:26,066][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:26,066][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/nodes/info from 127.0.0.1:42126 [2019-06-17T11:56:26,066][DEBUG][c.f.s.c.PrivilegesEvaluator] class org.elasticsearch.action.admin.cluster.node.info.NodesInfoRequest is not an IndicesRequest [2019-06-17T11:56:26,066][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=_all, type=*]] [2019-06-17T11:56:26,067][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:26,067][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:26,067][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:26,067][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/nodes/info, skip other roles [2019-06-17T11:56:26,090][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:26,090][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:26,090][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:26,090][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:26,090][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:26,090][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/mget from 127.0.0.1:42128 [2019-06-17T11:56:26,091][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.get.MultiGetRequest$Item [2019-06-17T11:56:26,091][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=48, ignore_unavailable=false, allow_no_indices=false, expand_wildcards_open=false, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=false, forbid_closed_indices=true] [2019-06-17T11:56:26,091][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:26,091][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:26,091][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:26,091][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:26,091][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [config] [2019-06-17T11:56:26,091][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=config]] [2019-06-17T11:56:26,091][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:26,091][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:26,092][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:26,092][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and indices:data/read/mget, skip other roles [2019-06-17T11:56:26,092][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:26,092][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/mget[shard] from 127.0.0.1:42128 [2019-06-17T11:56:26,092][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.get.MultiGetShardRequest [2019-06-17T11:56:26,092][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=48, ignore_unavailable=false, allow_no_indices=false, expand_wildcards_open=false, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=false, forbid_closed_indices=true] [2019-06-17T11:56:26,092][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:26,092][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:26,092][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:26,092][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:26,092][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:26,092][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against */*: [*] [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access.*', evaluate other roles [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_all_access=>[] [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_kibana_user [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:26,093][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against */*: [indices:data/write/delete*, indices:admin/mappings/get*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:admin/get, indices:data/write/update*, indices:data/write/index*, indices:data/read/field_caps*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.*', evaluate other roles [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against ?kibana/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:data/write/update*, indices:data/write/index*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] no match .kibana* in [] [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested local indextype: [] [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested global indextype: [] [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.?kibana', evaluate other roles [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_kibana_user=>[] [2019-06-17T11:56:26,094][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_own_index [2019-06-17T11:56:26,095][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:26,095][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:26,095][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,095][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:26,095][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve and match admin [2019-06-17T11:56:26,095][DEBUG][c.f.s.c.PrivilegesEvaluator] no permittedAliasesIndex 'admin' found for '[indices:data/read/mget[shard]]' [2019-06-17T11:56:26,095][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get*}' [2019-06-17T11:56:26,095][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=ALL}' [2019-06-17T11:56:26,095][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get}' [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=indices:data/read/search*, *.1=indices:admin/get, *.2=READ}' [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] requestedResolvedIndexTypes '[IndexType [index=.kibana, type=*]]' [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved permitted aliases indices for admin: [admin] [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for admin, will check now types [*] [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against admin/*: [indices:*] [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] no match admin* in [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested global indextype: [] [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,096][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.?kibana*', evaluate other roles [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_own_index=>[] [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_public [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/mget[shard]] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:26,097][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:26,098][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.?kibana*', evaluate other roles [2019-06-17T11:56:26,098][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_public=>[] [2019-06-17T11:56:26,103][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:26,103][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:26,103][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:26,103][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:26,103][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:26,103][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/search from 127.0.0.1:42130 [2019-06-17T11:56:26,103][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [watcher] from class org.elasticsearch.action.search.SearchRequest [2019-06-17T11:56:26,104][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=38, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=true] [2019-06-17T11:56:26,104][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [watcher] [2019-06-17T11:56:26,104][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:26,104][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [watcher] to [watcher] [2019-06-17T11:56:26,104][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [watcher] [2019-06-17T11:56:26,104][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [sentinl-watcher] [2019-06-17T11:56:26,104][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=watcher, type=sentinl-watcher]] [2019-06-17T11:56:26,104][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:26,104][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [watcher] [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against */*: [*] [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] removed watcher* [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access.*', evaluate other roles [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_all_access=>[] [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_kibana_user [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [watcher] [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against */*: [indices:data/write/delete*, indices:admin/mappings/get*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:admin/get, indices:data/write/update*, indices:data/write/index*, indices:data/read/field_caps*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] removed watcher* [2019-06-17T11:56:26,105][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.*', evaluate other roles [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for ?kibana [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested local indextype: [] [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested global indextype: [] [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.?kibana', evaluate other roles [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_kibana_user=>[] [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_own_index [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for watcher*: [watcher] [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for watcher*, will check now types [*] [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against watcher*/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/update*, indices:admin/mappings/fields/get*, indices:data/read*, indices:data/write/bulk*, indices:data/write/index*, indices:data/read/search, indices:data/write*, indices:monitor/*, indices:admin/create, indices:admin/get*] [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] removed watcher* [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [] [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:26,106][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.watcher*', evaluate other roles [2019-06-17T11:56:26,107][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve and match admin [2019-06-17T11:56:26,107][DEBUG][c.f.s.c.PrivilegesEvaluator] no permittedAliasesIndex 'admin' found for '[indices:data/read/search]' [2019-06-17T11:56:26,107][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get*}' [2019-06-17T11:56:26,107][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=ALL}' [2019-06-17T11:56:26,107][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get}' [2019-06-17T11:56:26,107][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=indices:data/read/search*, *.1=indices:admin/get, *.2=READ}' [2019-06-17T11:56:26,107][DEBUG][c.f.s.c.PrivilegesEvaluator] requestedResolvedIndexTypes '[IndexType [index=watcher, type=sentinl-watcher]]' [2019-06-17T11:56:26,107][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved permitted aliases indices for admin: [admin] [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for admin, will check now types [*] [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against admin/*: [indices:*] [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] no match admin* in [] [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested local indextype: [] [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested global indextype: [] [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.admin', evaluate other roles [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [] [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.mos*', evaluate other roles [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for ?kibana* [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.?kibana*', evaluate other roles [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_own_index=>[] [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_public [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:26,108][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for watcher*: [watcher] [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for watcher*, will check now types [*] [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against watcher*/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/update*, indices:admin/mappings/fields/get*, indices:data/read*, indices:data/write/bulk*, indices:data/write/index*, indices:data/read/search, indices:data/write*, indices:monitor/*, indices:admin/create, indices:admin/get*] [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] removed watcher* [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [] [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.watcher*', evaluate other roles [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [] [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.mos*', evaluate other roles [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for ?kibana* [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.?kibana*', evaluate other roles [2019-06-17T11:56:26,109][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_public=>[] [2019-06-17T11:56:26,140][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:26,140][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:26,140][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:26,140][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:26,141][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:26,141][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/health from 127.0.0.1:42126 [2019-06-17T11:56:26,141][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.cluster.health.ClusterHealthRequest [2019-06-17T11:56:26,141][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=7, ignore_unavailable=true, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=false] [2019-06-17T11:56:26,141][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:26,141][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:26,141][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:26,141][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:26,141][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:26,141][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,141][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:26,142][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:26,142][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:26,142][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/health, skip other roles [2019-06-17T11:56:26,145][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:26,145][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:26,145][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:26,145][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:26,145][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:26,146][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:admin/get from 127.0.0.1:42128 [2019-06-17T11:56:26,146][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.admin.indices.get.GetIndexRequest [2019-06-17T11:56:26,146][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=6, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=false] [2019-06-17T11:56:26,146][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:26,146][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:26,146][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:26,146][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:26,146][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:26,146][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,146][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:26,146][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:26,146][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against */*: [*] [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access.*', evaluate other roles [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_all_access=>[] [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_kibana_user [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against */*: [indices:data/write/delete*, indices:admin/mappings/get*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:admin/get, indices:data/write/update*, indices:data/write/index*, indices:data/read/field_caps*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.*', evaluate other roles [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2019-06-17T11:56:26,147][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against ?kibana/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:data/write/update*, indices:data/write/index*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] no match .kibana* in [] [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested local indextype: [] [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested global indextype: [] [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.?kibana', evaluate other roles [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_kibana_user=>[] [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_own_index [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve and match admin [2019-06-17T11:56:26,148][DEBUG][c.f.s.c.PrivilegesEvaluator] no permittedAliasesIndex 'admin' found for '[indices:admin/get]' [2019-06-17T11:56:26,149][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get*}' [2019-06-17T11:56:26,149][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=ALL}' [2019-06-17T11:56:26,149][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get}' [2019-06-17T11:56:26,149][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=indices:data/read/search*, *.1=indices:admin/get, *.2=READ}' [2019-06-17T11:56:26,149][DEBUG][c.f.s.c.PrivilegesEvaluator] requestedResolvedIndexTypes '[IndexType [index=.kibana, type=*]]' [2019-06-17T11:56:26,149][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved permitted aliases indices for admin: [admin] [2019-06-17T11:56:26,149][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for admin, will check now types [*] [2019-06-17T11:56:26,149][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against admin/*: [indices:*] [2019-06-17T11:56:26,149][DEBUG][c.f.s.c.PrivilegesEvaluator] no match admin* in [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,149][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,149][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested global indextype: [] [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.?kibana*', evaluate other roles [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_own_index=>[] [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_public [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,150][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:26,151][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:26,151][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:26,151][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:26,151][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:admin/get] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,151][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:26,151][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:26,151][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:26,151][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.?kibana*', evaluate other roles [2019-06-17T11:56:26,151][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_public=>[] [2019-06-17T11:56:26,324][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:26,324][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:26,324][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:26,324][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:26,325][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:26,325][DEBUG][c.f.s.c.PrivilegesEvaluator] requested indices:data/read/search from 127.0.0.1:42126 [2019-06-17T11:56:26,325][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [.kibana] from class org.elasticsearch.action.search.SearchRequest [2019-06-17T11:56:26,325][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=38, ignore_unavailable=false, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=true] [2019-06-17T11:56:26,325][DEBUG][c.f.s.c.PrivilegesEvaluator] 1 raw indices [.kibana] [2019-06-17T11:56:26,325][DEBUG][c.f.s.c.PrivilegesEvaluator] No date math indices found [2019-06-17T11:56:26,325][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolved [.kibana] to [.kibana] [2019-06-17T11:56:26,325][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [.kibana] [2019-06-17T11:56:26,325][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:26,325][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against */*: [*] [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access.*', evaluate other roles [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_all_access=>[] [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_kibana_user [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for * [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for *: [.kibana] [2019-06-17T11:56:26,326][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for *, will check now types [*] [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against */*: [indices:data/write/delete*, indices:admin/mappings/get*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:admin/get, indices:data/write/update*, indices:data/write/index*, indices:data/read/field_caps*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested local indextype: [] [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] For index * remaining requested global indextype: [] [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.*', evaluate other roles [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana: [.kibana] [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana, will check now types [*] [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against ?kibana/*: [indices:data/write/delete*, indices:admin/*, indices:admin/mapping/put, indices:data/write/bulk*, indices:data/write/update*, indices:data/write/index*, indices:monitor/*, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] no match .kibana* in [] [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested local indextype: [] [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana remaining requested global indextype: [] [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_kibana_user.?kibana', evaluate other roles [2019-06-17T11:56:26,327][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_kibana_user=>[] [2019-06-17T11:56:26,328][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_own_index [2019-06-17T11:56:26,328][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:26,328][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:26,328][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,328][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:26,328][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve and match admin [2019-06-17T11:56:26,328][DEBUG][c.f.s.c.PrivilegesEvaluator] no permittedAliasesIndex 'admin' found for '[indices:data/read/search]' [2019-06-17T11:56:26,328][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get*}' [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=ALL}' [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=READ, *.1=WRITE, *.2=MANAGE, *.3=CREATE_INDEX, *.4=INDEX, *.5=DELETE, *.6=indices:data/read/search, *.7=indices:admin/get}' [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] permittedAliasesIndices '{watcher*=org.elasticsearch.common.settings.Settings@bf496064, admin=org.elasticsearch.common.settings.Settings@5eed, mos*=org.elasticsearch.common.settings.Settings@f77300e0, ?kibana*=org.elasticsearch.common.settings.Settings@5889713d}' -> '{*.0=indices:data/read/search*, *.1=indices:admin/get, *.2=READ}' [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] requestedResolvedIndexTypes '[IndexType [index=.kibana, type=*]]' [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved permitted aliases indices for admin: [admin] [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for admin, will check now types [*] [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against admin/*: [indices:*] [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] no match admin* in [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] For index admin remaining requested global indextype: [] [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:26,329][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_own_index.?kibana*', evaluate other roles [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_own_index=>[] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_public [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for watcher* [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for watcher* [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] For index watcher* remaining requested global indextype: [] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for mos* [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] No wildcard match found for mos* [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested local indextype: [IndexType [index=.kibana, type=*]] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] For index mos* remaining requested global indextype: [] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] Try wildcard match for ?kibana* [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] Wildcard match for ?kibana*: [.kibana] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] matches for ?kibana*, will check now types [*] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] match requested action [indices:data/read/search] against ?kibana*/*: [indices:data/read/search*, indices:admin/get, indices:admin/mappings/fields/get*, indices:data/read*] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] removed .kibana* [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested local indextype: [] [2019-06-17T11:56:26,330][DEBUG][c.f.s.c.PrivilegesEvaluator] For index ?kibana* remaining requested global indextype: [] [2019-06-17T11:56:26,331][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_public.?kibana*', evaluate other roles [2019-06-17T11:56:26,331][DEBUG][c.f.s.c.PrivilegesEvaluator] Added to leftovers sg_public=>[] [2019-06-17T11:56:26,359][DEBUG][c.f.s.a.BackendRegistry ] Try to extract auth creds from http basic [2019-06-17T11:56:26,359][DEBUG][c.f.s.a.BackendRegistry ] User 'admin' is in cache? true (cache size: 1) [2019-06-17T11:56:26,360][DEBUG][c.f.s.a.BackendRegistry ] User 'User [name=admin, roles=[]]' is authenticated [2019-06-17T11:56:26,360][DEBUG][c.f.s.a.BackendRegistry ] sg_tenant 'null' [2019-06-17T11:56:26,360][DEBUG][c.f.s.c.PrivilegesEvaluator] ### evaluate permissions for User [name=admin, roles=[]] on InterStat1 [2019-06-17T11:56:26,360][DEBUG][c.f.s.c.PrivilegesEvaluator] requested cluster:monitor/state from 127.0.0.1:42132 [2019-06-17T11:56:26,360][DEBUG][c.f.s.c.PrivilegesEvaluator] Resolve [] from class org.elasticsearch.action.admin.cluster.state.ClusterStateRequest [2019-06-17T11:56:26,360][DEBUG][c.f.s.c.PrivilegesEvaluator] indicesOptions IndicesOptions[id=7, ignore_unavailable=true, allow_no_indices=true, expand_wildcards_open=true, expand_wildcards_closed=false, allow_alisases_to_multiple_indices=true, forbid_closed_indices=false] [2019-06-17T11:56:26,360][DEBUG][c.f.s.c.PrivilegesEvaluator] 0 raw indices [] [2019-06-17T11:56:26,360][DEBUG][c.f.s.c.PrivilegesEvaluator] No indices found in request, assume _all [2019-06-17T11:56:26,360][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final indices: [searchguard, watcher, .kibana, watcher_alarms, mos-2019.06.14] [2019-06-17T11:56:26,360][DEBUG][c.f.s.c.PrivilegesEvaluator] pre final types: [] [2019-06-17T11:56:26,360][DEBUG][c.f.s.c.PrivilegesEvaluator] requested resolved indextypes: [IndexType [index=watcher, type=*], IndexType [index=mos-2019.06.14, type=*], IndexType [index=searchguard, type=*], IndexType [index=.kibana, type=*], IndexType [index=watcher_alarms, type=*]] [2019-06-17T11:56:26,361][DEBUG][c.f.s.c.PrivilegesEvaluator] mapped roles for admin: [sg_all_access, sg_kibana_user, sg_own_index, sg_public] [2019-06-17T11:56:26,361][DEBUG][c.f.s.c.PrivilegesEvaluator] ---------- evaluate sg_role: sg_all_access [2019-06-17T11:56:26,361][DEBUG][c.f.s.c.PrivilegesEvaluator] resolved cluster actions:[*] [2019-06-17T11:56:26,361][DEBUG][c.f.s.c.PrivilegesEvaluator] found a match for 'sg_all_access' and cluster:monitor/state, skip other roles [2019-06-17T11:56:28,237][INFO ][o.e.n.Node ] [InterStat1] stopping ... [2019-06-17T11:56:28,376][INFO ][o.e.n.Node ] [InterStat1] stopped [2019-06-17T11:56:28,376][INFO ][o.e.n.Node ] [InterStat1] closing ... [2019-06-17T11:56:28,492][INFO ][o.e.n.Node ] [InterStat1] closed