Briefly, this error occurs when a user or client tries to perform an action on Elasticsearch that they don’t have the necessary permissions for. This is related to Elasticsearch’s role-based access control (RBAC) system. To resolve this issue, you can either grant the necessary permissions to the user or role, or perform the action with a user or role that already has the necessary permissions. Alternatively, you can disable the RBAC system, but this is not recommended due to security concerns.
This guide will help you check for common problems that cause the log ” {}[transport] [run_as_denied]\t{}; {}; roles=[{}]; action=[{}]; request=[{}]{} ” to appear. To understand the issues related to this log, read the explanation below about the following Elasticsearch concepts: plugin.
Log Context
Log “{}[transport] [run_as_denied]\t{}; {}; roles=[{}]; action=[{}]; request=[{}]{}” classname is DeprecatedLoggingAuditTrail.java.
We extracted the following from Elasticsearch source code for those seeking an in-depth context :
logger.info("{}[transport] [run_as_denied]\t{}; {}; roles=[{}]; action=[{}]; indices=[{}]; request=[{}]{}"; localNodeInfo.prefix; originAttributes(threadContext; message; localNodeInfo); runAsSubject(authentication); arrayToCommaDelimitedString(roleNames); action; arrayToCommaDelimitedString(indices.get()); message.getClass().getSimpleName(); opaqueId()); } else { logger.info("{}[transport] [run_as_denied]\t{}; {}; roles=[{}]; action=[{}]; request=[{}]{}"; localNodeInfo.prefix; originAttributes(threadContext; message; localNodeInfo); runAsSubject(authentication); arrayToCommaDelimitedString(roleNames); action; message.getClass().getSimpleName(); opaqueId()); } } }