This is an automated email from the ASF dual-hosted git repository. houston pushed a commit to branch release-0.8 in repository https://gitbox.apache.org/repos/asf/solr-operator.git
commit 7e224b61f84a5a63a3f35589d22fcb27ea778f4d Author: Dan Niles <[email protected]> AuthorDate: Wed Mar 27 01:56:20 2024 +0530 Update default security.json in solr-cloud-crd.md to include permission for /admin/info/system path (#680) --- docs/solr-cloud/solr-cloud-crd.md | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/docs/solr-cloud/solr-cloud-crd.md b/docs/solr-cloud/solr-cloud-crd.md index 8c8874e..c1053cd 100644 --- a/docs/solr-cloud/solr-cloud-crd.md +++ b/docs/solr-cloud/solr-cloud-crd.md @@ -1000,6 +1000,12 @@ Take a moment to review these authorization rules so that you're aware of the ro "name": "k8s-probe-0", "role": null, "collection": null, + "path": "/admin/info/system" + }, + { + "name": "k8s-probe-1", + "role": null, + "collection": null, "path": "/admin/info/health" }, { @@ -1057,7 +1063,7 @@ A few aspects of the default `security.json` configuration warrant a closer look "name": "k8s-probe-0", "role": null, "collection": null, - "path": "/admin/info/health" + "path": "/admin/info/system" } ``` In this case, the `"role":null` indicates this endpoint allows anonymous access by unknown users. @@ -1153,6 +1159,7 @@ _Note: be sure to use a stronger password for real deployments_ Users need to ensure their `security.json` contains the user supplied in the `basicAuthSecret` has read access to the following endpoints: ``` +/admin/info/system /admin/info/health /admin/collections /admin/metrics
