Transport run as granted t roles= action= indices= request= – How to solve this Elasticsearch error

Opster Team

Aug-23, Version: 6.8-6.8

Briefly, this error occurs when there’s an issue with the role-based access control in Elasticsearch. It seems like a user or role is trying to perform an action on indices that it doesn’t have the necessary permissions for. To resolve this, you can check the roles and permissions assigned to the user. Ensure that the user has the necessary permissions to perform the action. If not, you can either assign the necessary permissions to the user or role, or use a different user or role that has the necessary permissions.

This guide will help you check for common problems that cause the log ” {}[transport] [run_as_granted]t{}; {}; roles=[{}]; action=[{}]; indices=[{}]; request=[{}]{} ” to appear. To understand the issues related to this log, read the explanation below about the following Elasticsearch concepts: plugin.

Log Context

Log “{}[transport] [run_as_granted]t{}; {}; roles=[{}]; action=[{}]; indices=[{}]; request=[{}]{}” classname is DeprecatedLoggingAuditTrail.java.
We extracted the following from Elasticsearch source code for those seeking an in-depth context :

             if (eventFilterPolicyRegistry.ignorePredicate().test(new AuditEventMetaInfo(Optional.of(authentication.getUser());
                    Optional.of(effectiveRealmName(authentication)); Optional.of(authorizationInfo); indices)) == false) {
                final LocalNodeInfo localNodeInfo = this.localNodeInfo;
                final String[] roleNames = (String[]) authorizationInfo.asMap().get(LoggingAuditTrail.PRINCIPAL_ROLES_FIELD_NAME);
                if (indices.isPresent()) {
                    logger.info("{}[transport] [run_as_granted]\t{}; {}; roles=[{}]; action=[{}]; indices=[{}]; request=[{}]{}";
                            localNodeInfo.prefix; originAttributes(threadContext; message; localNodeInfo); runAsSubject(authentication);
                            arrayToCommaDelimitedString(roleNames); action; arrayToCommaDelimitedString(indices.get());
                            message.getClass().getSimpleName(); opaqueId());
                } else {
                    logger.info("{}[transport] [run_as_granted]\t{}; {}; roles=[{}]; action=[{}]; request=[{}]{}"; localNodeInfo.prefix;




 

 [ratemypost]

Opster
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.