Security setup for Siren Alert
-
Create a role called
sirenalertwith the following actions in thesg_roles.ymlfile:sirenalert: cluster: - 'indices:data/write/bulk' - 'indices:admin/template/*' - 'indices:monitor/stats' - 'cluster:monitor/main' - 'cluster:monitor/health' - 'cluster:monitor/stats' - SIREN_CLUSTER indices: '*': '*': - SIREN_READONLY - SEARCH - 'indices:monitor/stats' 'watcher_alarms*': '*': - SIREN_READWRITE - CREATE_INDEX '/(watcher|watcher_alarms)/': '*': - SIREN_READWRITE - CREATE_INDEX -
Add the below permissions to the
sirenserverrole:sirenserver: cluster: - 'cluster:monitor/nodes/info' - 'cluster:monitor/health' - 'cluster:monitor/main' - 'cluster:monitor/state' - 'cluster:monitor/nodes/stats' - SIREN_CLUSTER - CLUSTER_COMPOSITE_OPS indices: '*': '*': - indices:admin/get - CLUSTER_COMPOSITE_OPS_RO - indices:monitor/stats '?siren': '*': - ALL '?sirenaccess': '*': - ALL -
Update the
investigate.ymlfile to include the following values under theinvestigate_access_controlsection:investigate_access_control: sirenalert: elasticsearch: username: sirenalert password: password -
Create a user called
sirenalertand map that user to thesirenalertrole by following the instructions under the Access Control: ACL section in Search Guard Classic integration and Siren Investigate access control .