How to configure permission to more than one index in roles.yml?

I have successfully configure a role and role_mapping to allod LDAP user with a backend roles EXAMPLE-LDAP-ROLE to access to data from any index matching the pattern “dev1*”

However when I connect through kibana on the Dashboard It shows nothing and the browser console have this error

{“statusCode”:403,“error”:“Forbidden”,“message”:"no permissions for [indices:data/read/search] and User [name=uid=XXX

Here is the configuration in roles_mapping.yml

EXAMPLE-LDAP-ROLE:
reserved: false
hidden: false
users:
backend_roles:

  • "EXAMPLE-LDAP-ROLE
    hosts:
    and_backend_roles:

And here are the configuration in roles.yml

EXAMPLE-LDAP-ROLE:
reserved: false
hidden: false
cluster_permissions:

  • ‘cluster_composite_ops’
    index_permissions:
  • index_patterns:
    • ‘dev1*’
      dls: ‘{ “bool”: { “must”: { “match”: { “filtre”: “dev1” }}}}’
      fls:
      masked_fields:
      allowed_actions:
    • ‘read’
    • ‘kibana_all_read’

I read from this other issue that the roles.yml roles configuration must also provide READ permission to ?kibana*

But I do not know how to fix my above configuration to provide permission to both “dev1*” and “?kibana*” in roles.yml syntax

Any help will be great

@Kamikague
You can list multiple indices using below syntax

testRole1:
  index_permissions:
    - index_patterns:
        - 'log*'
      allowed_actions:
        - 'unlimited'
    - index_patterns:
        - 'accounts'
      allowed_actions:
        - 'unlimited'
1 Like

Thank You @Anthony !