Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/en/stack/monitoring/production.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@ following request creates a `remote_monitor` user that has the

[source, sh]
---------------------------------------------------------------
POST /_xpack/security/user/remote_monitor
POST /_security/user/remote_monitor
{
"password" : "changeme",
"roles" : [ "remote_monitoring_agent"],
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -137,7 +137,7 @@ Once the password has been changed, you can enable the user via the following AP

[source,js]
---------------------------------------------------------------------
PUT _xpack/security/user/logstash_system/_enable
PUT _security/user/logstash_system/_enable
---------------------------------------------------------------------
// CONSOLE

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ belong to the `click` category within all the `events-*` indices:

[source,js]
--------------------------------------------------
POST /_xpack/security/role/click_role
POST /_security/role/click_role
{
"indices": [
{
Expand All @@ -40,7 +40,7 @@ For example, the following role grants read access only to the documents whose

[source,js]
--------------------------------------------------
POST /_xpack/security/role/dept_role
POST /_security/role/dept_role
{
"indices" : [
{
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ The following role definition grants read access only to the `category`,

[source,js]
--------------------------------------------------
POST /_xpack/security/role/test_role1
POST /_security/role/test_role1
{
"indices": [
{
Expand All @@ -42,7 +42,7 @@ example grants read access to all fields that start with an `event_` prefix:

[source,js]
--------------------------------------------------
POST /_xpack/security/role/test_role2
POST /_security/role/test_role2
{
"indices" : [
{
Expand Down Expand Up @@ -77,7 +77,7 @@ field:

[source,js]
--------------------------------------------------
POST /_xpack/security/role/test_role3
POST /_security/role/test_role3
{
"indices" : [
{
Expand All @@ -97,7 +97,7 @@ only read access to the `customer` data:

[source,js]
--------------------------------------------------
POST /_xpack/security/role/test_role4
POST /_security/role/test_role4
{
"indices" : [
{
Expand All @@ -116,7 +116,7 @@ You can deny permission to access fields with the following syntax:

[source,js]
--------------------------------------------------
POST /_xpack/security/role/test_role5
POST /_security/role/test_role5
{
"indices" : [
{
Expand Down Expand Up @@ -145,7 +145,7 @@ For example:

[source,js]
--------------------------------------------------
POST /_xpack/security/role/test_role6
POST /_security/role/test_role6
{
"indices" : [
{
Expand Down Expand Up @@ -173,7 +173,7 @@ permissions. For example, if these two roles are merged:

[source,js]
--------------------------------------------------
POST /_xpack/security/role/test_role7
POST /_security/role/test_role7
{
"indices" : [
{
Expand All @@ -187,7 +187,7 @@ POST /_xpack/security/role/test_role7
]
}

POST /_xpack/security/role/test_role8
POST /_security/role/test_role8
{
"indices" : [
{
Expand Down
10 changes: 5 additions & 5 deletions docs/en/stack/security/troubleshooting.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -699,7 +699,7 @@ Cannot connect to elasticsearch node.
java.net.SocketException: Unexpected end of file from server
...
ERROR: Failed to connect to elasticsearch at
http://127.0.0.1:9200/_xpack/security/_authenticate?pretty.
http://127.0.0.1:9200/_security/_authenticate?pretty.
Is the URL correct and elasticsearch running?
------------------------------------------
--
Expand All @@ -711,7 +711,7 @@ the following errors:
[source, shell]
------------------------------------------
SSL connection to
https://127.0.0.1:9200/_xpack/security/_authenticate?pretty
https://127.0.0.1:9200/_security/_authenticate?pretty
failed: sun.security.validator.ValidatorException:
PKIX path building failed:
sun.security.provider.certpath.SunCertPathBuilderException:
Expand All @@ -720,7 +720,7 @@ Please check the elasticsearch SSL settings under
xpack.security.http.ssl.
...
ERROR: Failed to establish SSL connection to elasticsearch at
https://127.0.0.1:9200/_xpack/security/_authenticate?pretty.
https://127.0.0.1:9200/_security/_authenticate?pretty.
------------------------------------------
--

Expand All @@ -731,15 +731,15 @@ following errors:
[source, shell]
------------------------------------------
SSL connection to
https://idp.localhost.test:9200/_xpack/security/_authenticate?pretty
https://idp.localhost.test:9200/_security/_authenticate?pretty
failed: java.security.cert.CertificateException:
No subject alternative DNS name matching
elasticsearch.example.com found.
Please check the elasticsearch SSL settings under
xpack.security.http.ssl.
...
ERROR: Failed to establish SSL connection to elasticsearch at
https://elasticsearch.example.com:9200/_xpack/security/_authenticate?pretty.
https://elasticsearch.example.com:9200/_security/_authenticate?pretty.
------------------------------------------
--

Expand Down