Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove admin:admin default and update instructions for demo setup #5887

Merged
merged 28 commits into from
Feb 1, 2024
Merged
Show file tree
Hide file tree
Changes from 3 commits
Commits
Show all changes
28 commits
Select commit Hold shift + click to select a range
92e9f22
Update some admin:admin references
derek-ho Dec 15, 2023
2c05e39
Update all references except for helm
derek-ho Dec 15, 2023
d4d1551
Update helm
derek-ho Dec 15, 2023
7606020
Reverts changes made to _install-and-configure folder
DarshitChanpura Jan 8, 2024
18c4dbb
Merge branch 'main' into admin
DarshitChanpura Jan 8, 2024
e524958
Merge branch 'main' into admin
DarshitChanpura Jan 9, 2024
eceb3c3
Merge branch 'main' into admin
DarshitChanpura Jan 9, 2024
d8f9203
Merge branch 'main' into admin
DarshitChanpura Jan 11, 2024
9fe6bc8
Merge branch 'main' into admin
DarshitChanpura Jan 11, 2024
cdeb90f
Apply suggestions from code review
derek-ho Jan 12, 2024
ec6c14c
Merge branch 'main' into admin
derek-ho Jan 12, 2024
dedf9bb
Merge branch 'main' into admin
DarshitChanpura Jan 13, 2024
d227507
Merge branch 'main' into admin
DarshitChanpura Jan 16, 2024
0216d9c
Merge branch 'main' into admin
DarshitChanpura Jan 16, 2024
9af6b27
Merge branch 'main' into admin
DarshitChanpura Jan 17, 2024
56497be
Merge branch 'main' into admin
DarshitChanpura Jan 19, 2024
a6b2b9e
Merge branch 'main' into admin
DarshitChanpura Jan 22, 2024
2165d52
Update _about/quickstart.md
Naarcha-AWS Jan 23, 2024
14baf92
Merge branch 'main' into admin
DarshitChanpura Jan 23, 2024
be5762d
Apply suggestions from code review
Naarcha-AWS Jan 23, 2024
e0f1c21
Update quickstart.md
Naarcha-AWS Jan 23, 2024
5902f2e
Merge branch 'main' into admin
DarshitChanpura Jan 25, 2024
5a10f61
Merge branch 'main' into admin
DarshitChanpura Jan 27, 2024
24b46c4
Merge branch 'main' into admin
DarshitChanpura Jan 29, 2024
1acb1c1
Merge branch 'main' into admin
DarshitChanpura Jan 29, 2024
7ed50ca
Merge branch 'main' into admin
DarshitChanpura Jan 30, 2024
cc1b44f
Merge branch 'main' into admin
DarshitChanpura Jan 31, 2024
fcbc313
Merge branch 'main' into admin
DarshitChanpura Feb 1, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions _api-reference/tasks.md
Original file line number Diff line number Diff line change
Expand Up @@ -267,7 +267,7 @@ To associate requests with tasks for better tracking, you can provide a `X-Opaqu
Usage:

```bash
curl -i -H "X-Opaque-Id: 111111" "https://localhost:9200/_tasks" -u 'admin:admin' --insecure
curl -i -H "X-Opaque-Id: 111111" "https://localhost:9200/_tasks" -u 'admin:< Admin password >' --insecure
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You will want to ask @kolchfa-aws etc. about the style guidelines for these placeholders. I am not sure whether leading/trailing spaces should be trimmed or whether underscores should be used instead of spaces in between the terms.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry for the late reply, just saw this. Generally we don't use spaces within angular brackets and separate the words with a hyphen or underscore so <custom-admin-password> looks good to me.

derek-ho marked this conversation as resolved.
Show resolved Hide resolved
```
{% include copy.html %}

Expand Down Expand Up @@ -326,6 +326,6 @@ content-length: 768
This operation supports the same parameters as the `tasks` operation. The following example shows how you can associate `X-Opaque-Id` with specific tasks:

```bash
curl -i -H "X-Opaque-Id: 123456" "https://localhost:9200/_tasks?nodes=opensearch-node1" -u 'admin:admin' --insecure
curl -i -H "X-Opaque-Id: 123456" "https://localhost:9200/_tasks?nodes=opensearch-node1" -u 'admin:< Admin password >' --insecure
derek-ho marked this conversation as resolved.
Show resolved Hide resolved
```
{% include copy.html %}
2 changes: 1 addition & 1 deletion _benchmark/quickstart.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ After installation, you can verify OpenSearch is running by going to `localhost:
Use the following command to verify OpenSearch is running with SSL certificate checks disabled:

```bash
curl -k -u admin:admin https://localhost:9200 # the "-k" option skips SSL certificate checks
curl -k -u admin:< Admin password > https://localhost:9200 # the "-k" option skips SSL certificate checks
derek-ho marked this conversation as resolved.
Show resolved Hide resolved

{
"name" : "147ddae31bf8.opensearch.org",
Expand Down
4 changes: 2 additions & 2 deletions _clients/javascript/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ To connect to the default OpenSearch host, create a client object with the addre
var host = "localhost";
var protocol = "https";
var port = 9200;
var auth = "admin:admin"; // For testing only. Don't store credentials in code.
var auth = "admin:< Admin password >"; // For testing only. Don't store credentials in code.
derek-ho marked this conversation as resolved.
Show resolved Hide resolved
var ca_certs_path = "/full/path/to/root-ca.pem";

// Optional client certificates if you don't want to use HTTP basic authentication.
Expand Down Expand Up @@ -303,7 +303,7 @@ The following sample program creates a client, adds an index with non-default se
var host = "localhost";
var protocol = "https";
var port = 9200;
var auth = "admin:admin"; // For testing only. Don't store credentials in code.
var auth = "admin:< Admin password >"; // For testing only. Don't store credentials in code.
derek-ho marked this conversation as resolved.
Show resolved Hide resolved
var ca_certs_path = "/full/path/to/root-ca.pem";

// Optional client certificates if you don't want to use HTTP basic authentication.
Expand Down
2 changes: 1 addition & 1 deletion _install-and-configure/install-dashboards/helm.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ Before you get started, you must first use [Helm to install OpenSearch]({{site.u
Make sure that you can send requests to your OpenSearch pod:

```json
$ curl -XGET https://localhost:9200 -u 'admin:admin' --insecure
$ curl -XGET https://localhost:9200 -u 'admin:< Admin password >' --insecure
{
"name" : "opensearch-cluster-master-1",
"cluster_name" : "opensearch-cluster",
Expand Down
8 changes: 4 additions & 4 deletions _install-and-configure/install-opensearch/debian.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,10 +40,10 @@ This guide assumes that you are comfortable working from the Linux command line
1. From the CLI, install using `dpkg`.
```bash
# x64
sudo dpkg -i opensearch-{{site.opensearch_version}}-linux-x64.deb
sudo env OPENSEARCH_INITIAL_ADMIN_PASSWORD=< Admin password > dpkg -i opensearch-{{site.opensearch_version}}-linux-x64.deb
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we should add a comment about why this password is required.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This applies to all updated distributions


# arm64
sudo dpkg -i opensearch-{{site.opensearch_version}}-linux-arm64.deb
sudo env OPENSEARCH_INITIAL_ADMIN_PASSWORD=< Admin password> dpkg -i opensearch-{{site.opensearch_version}}-linux-arm64.deb
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing trailing space inside ">".

```

1. After the installation succeeds, enable OpenSearch as a service.
Expand Down Expand Up @@ -175,7 +175,7 @@ An OpenSearch node in its default configuration (with demo certificates and user
1. Send requests to the server to verify that OpenSearch is running. Note the use of the `--insecure` flag, which is required because the TLS certificates are self-signed.
- Send a request to port 9200:
```bash
curl -X GET https://localhost:9200 -u 'admin:admin' --insecure
curl -X GET https://localhost:9200 -u 'admin:< Admin password >' --insecure
```
{% include copy.html %}

Expand All @@ -201,7 +201,7 @@ An OpenSearch node in its default configuration (with demo certificates and user
```
- Query the plugins endpoint:
```bash
curl -X GET https://localhost:9200/_cat/plugins?v -u 'admin:admin' --insecure
curl -X GET https://localhost:9200/_cat/plugins?v -u 'admin:< Admin password >' --insecure
```
{% include copy.html %}

Expand Down
12 changes: 7 additions & 5 deletions _install-and-configure/install-opensearch/docker.md
Original file line number Diff line number Diff line change
Expand Up @@ -85,14 +85,14 @@ To download a specific version of OpenSearch or OpenSearch Dashboards other than

Before continuing, you should verify that Docker is working correctly by deploying OpenSearch in a single container.

1. Run the following command:
1. Run the following command and pass in your own custom admin password:
```bash
# This command maps ports 9200 and 9600, sets the discovery type to "single-node" and requests the newest image of OpenSearch
docker run -d -p 9200:9200 -p 9600:9600 -e "discovery.type=single-node" opensearchproject/opensearch:latest
# This command maps ports 9200 and 9600, sets the discovery type to "single-node", sets the initial admin password according to user input and requests the newest image of OpenSearch
docker run -d -p 9200:9200 -p 9600:9600 -e "discovery.type=single-node" -e "OPENSEARCH_INITIAL_ADMIN_PASSWORD=< Admin password >" opensearchproject/opensearch:latest
```
1. Send a request to port 9200. The default username and password are `admin`.
1. Send a request to port 9200. The default username is `admin` and the password is what you set for `OPENSEARCH_INITIAL_ADMIN_PASSWORD`.
```bash
curl https://localhost:9200 -ku 'admin:admin'
curl https://localhost:9200 -ku 'admin:< Admin password >'
```
{% include copy.html %}

Expand Down Expand Up @@ -166,6 +166,7 @@ services:
- cluster.initial_cluster_manager_nodes=opensearch-node1,opensearch-node2 # Nodes eligible to serve as cluster manager
- bootstrap.memory_lock=true # Disable JVM heap memory swapping
- "OPENSEARCH_JAVA_OPTS=-Xms512m -Xmx512m" # Set min and max JVM heap sizes to at least 50% of system RAM
- "OPENSEARCH_INITIAL_ADMIN_PASSWORD=< Admin password >" # Set the password of the admin user for the demo configuration
ulimits:
memlock:
soft: -1 # Set memlock to unlimited (no soft or hard limit)
Expand All @@ -190,6 +191,7 @@ services:
- cluster.initial_cluster_manager_nodes=opensearch-node1,opensearch-node2
- bootstrap.memory_lock=true
- "OPENSEARCH_JAVA_OPTS=-Xms512m -Xmx512m"
- "OPENSEARCH_INITIAL_ADMIN_PASSWORD=< Admin password >"
ulimits:
memlock:
soft: -1
Expand Down
8 changes: 7 additions & 1 deletion _install-and-configure/install-opensearch/helm.md
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,13 @@ You can also build the `opensearch-1.0.0.tgz` file manually:
{% include copy.html %}

The output shows you the specifications instantiated from the install.
To customize the deployment, pass in the values that you want to override with a custom YAML file:
To customize the deployment, pass in the values that you want to override with a custom YAML file.
Specifically, for the demo configuration to work, you need to pass in an initial admin password:

```yml
- name: OPENSEARCH_INITIAL_ADMIN_PASSWORD
# value: < Admin password >
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this meant to be commented out?

```

```bash
helm install --values=customvalues.yaml opensearch-1.0.0.tgz
Expand Down
12 changes: 6 additions & 6 deletions _install-and-configure/install-opensearch/rpm.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,16 +46,16 @@ This guide assumes that you are comfortable working from the Linux command line
1. From the CLI, you can install the package with `rpm` or `yum`.
```bash
# Install the x64 package using yum.
sudo yum install opensearch-{{site.opensearch_version}}-linux-x64.rpm
sudo env OPENSEARCH_INITIAL_ADMIN_PASSWORD=< Admin password > yum install opensearch-{{site.opensearch_version}}-linux-x64.rpm

# Install the x64 package using rpm.
sudo rpm -ivh opensearch-{{site.opensearch_version}}-linux-x64.rpm
sudo env OPENSEARCH_INITIAL_ADMIN_PASSWORD=< Admin password > rpm -ivh opensearch-{{site.opensearch_version}}-linux-x64.rpm

# Install the arm64 package using yum.
sudo yum install opensearch-{{site.opensearch_version}}-linux-x64.rpm
sudo env OPENSEARCH_INITIAL_ADMIN_PASSWORD=< Admin password > yum install opensearch-{{site.opensearch_version}}-linux-x64.rpm

# Install the arm64 package using rpm.
sudo rpm -ivh opensearch-{{site.opensearch_version}}-linux-x64.rpm
sudo env OPENSEARCH_INITIAL_ADMIN_PASSWORD=< Admin password > rpm -ivh opensearch-{{site.opensearch_version}}-linux-x64.rpm
```
1. After the installation succeeds, enable OpenSearch as a service.
```bash
Expand Down Expand Up @@ -147,7 +147,7 @@ An OpenSearch node in its default configuration (with demo certificates and user
1. Send requests to the server to verify that OpenSearch is running. Note the use of the `--insecure` flag, which is required because the TLS certificates are self-signed.
- Send a request to port 9200:
```bash
curl -X GET https://localhost:9200 -u 'admin:admin' --insecure
curl -X GET https://localhost:9200 -u 'admin:< Admin password >' --insecure
```
{% include copy.html %}

Expand All @@ -173,7 +173,7 @@ An OpenSearch node in its default configuration (with demo certificates and user
```
- Query the plugins endpoint:
```bash
curl -X GET https://localhost:9200/_cat/plugins?v -u 'admin:admin' --insecure
curl -X GET https://localhost:9200/_cat/plugins?v -u 'admin:< Admin password >' --insecure
```
{% include copy.html %}

Expand Down
10 changes: 8 additions & 2 deletions _install-and-configure/install-opensearch/tar.md
Original file line number Diff line number Diff line change
Expand Up @@ -94,6 +94,12 @@ An OpenSearch node configured by the demo security script is not suitable for a
```
{% include copy.html %}

1. Set an initial admin password variable through the `OPENSEARCH_INITIAL_ADMIN_PASSWORD` environment variable.
```bash
export OPENSEARCH_INITIAL_ADMIN_PASSWORD=< Admin password >
```
{% include copy.html %}

1. Run the OpenSearch startup script with the security demo configuration.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this step should be numbered as 2

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All of them are 1

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is correct, I believe the numbers are handled on the website side.

```bash
./opensearch-tar-install.sh
Expand All @@ -103,7 +109,7 @@ An OpenSearch node configured by the demo security script is not suitable for a
1. Open another terminal session and send requests to the server to verify that OpenSearch is running. Note the use of the `--insecure` flag, which is required because the TLS certificates are self-signed.
- Send a request to port 9200:
```bash
curl -X GET https://localhost:9200 -u 'admin:admin' --insecure
curl -X GET https://localhost:9200 -u 'admin:< Admin password >' --insecure
```
{% include copy.html %}

Expand All @@ -129,7 +135,7 @@ An OpenSearch node configured by the demo security script is not suitable for a
```
- Query the plugins endpoint:
```bash
curl -X GET https://localhost:9200/_cat/plugins?v -u 'admin:admin' --insecure
curl -X GET https://localhost:9200/_cat/plugins?v -u 'admin:< Admin password >' --insecure
```
{% include copy.html %}

Expand Down
10 changes: 8 additions & 2 deletions _install-and-configure/install-opensearch/windows.md
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,12 @@ An OpenSearch node in its default configuration (with demo certificates and user
```
{% include copy.html %}

1. Set the initial admin password via the `OPENSEARCH_INITIAL_ADMIN_PASSWORD` environment variable.
```bat
set OPENSEARCH_INITIAL_ADMIN_PASSWORD=< Admin password >
```
{% include copy.html %}

1. Run the batch script.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this step should be numbered as 2

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All of them are numbered as 1

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Markdown automatically will number these in sequence. So if you put "1. 1. 1.", the output will be "1. 2. 3"

```bat
.\opensearch-windows-install.bat
Expand All @@ -74,7 +80,7 @@ An OpenSearch node in its default configuration (with demo certificates and user
1. Open a new command prompt and send requests to the server to verify that OpenSearch is running. Note the use of the `--insecure` flag, which is required because the TLS certificates are self-signed.
- Send a request to port 9200:
```bat
curl.exe -X GET https://localhost:9200 -u "admin:admin" --insecure
curl.exe -X GET https://localhost:9200 -u "admin:< Admin password >" --insecure
```
{% include copy.html %}

Expand All @@ -100,7 +106,7 @@ An OpenSearch node in its default configuration (with demo certificates and user
```
- Query the plugins endpoint:
```bat
curl.exe -X GET https://localhost:9200/_cat/plugins?v -u "admin:admin" --insecure
curl.exe -X GET https://localhost:9200/_cat/plugins?v -u "admin:< Admin password >" --insecure
```
{% include copy.html %}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -125,7 +125,7 @@
1. Press `Ctrl+C` to stop following container logs and return to the command prompt.
1. Use cURL to query the OpenSearch REST API. In the following command, `os-node-01` is queried by sending the request to host port `9201`, which is mapped to port `9200` on the container:
```bash
curl -s "https://localhost:9201" -ku admin:admin
curl -s "https://localhost:9201" -ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand Down Expand Up @@ -177,7 +177,7 @@
curl -H "Content-Type: application/x-ndjson" \
-X PUT "https://localhost:9201/ecommerce?pretty" \
--data-binary "@ecommerce-field_mappings.json" \
-ku admin:admin
-ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand All @@ -193,7 +193,7 @@
curl -H "Content-Type: application/x-ndjson" \
-X PUT "https://localhost:9201/ecommerce/_bulk?pretty" \
--data-binary "@ecommerce.json" \
-ku admin:admin
-ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label">Example response (truncated)</p>
Expand Down Expand Up @@ -226,7 +226,7 @@
curl -H 'Content-Type: application/json' \
-X GET "https://localhost:9201/ecommerce/_search?pretty=true&filter_path=hits.total" \
-d'{"query":{"match":{"customer_first_name":"Sonya"}}}' \
-ku admin:admin
-ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label" id="query-validation">Example response</p>
Expand Down Expand Up @@ -271,7 +271,7 @@
curl -H 'Content-Type: application/json' \
-X PUT "https://localhost:9201/_snapshot/snapshot-repo?pretty" \
-d '{"type":"fs","settings":{"location":"/usr/share/opensearch/snapshots"}}' \
-ku admin:admin
-ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand All @@ -284,7 +284,7 @@
```bash
curl -H 'Content-Type: application/json' \
-X POST "https://localhost:9201/_snapshot/snapshot-repo/_verify?timeout=0s&master_timeout=50s&pretty" \
-ku admin:admin
-ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand Down Expand Up @@ -315,7 +315,7 @@
```bash
curl -H 'Content-Type: application/json' \
-X PUT "https://localhost:9201/_snapshot/snapshot-repo/cluster-snapshot-v137?wait_for_completion=true&pretty" \
-ku admin:admin
-ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand Down Expand Up @@ -448,7 +448,7 @@
curl -H 'Content-type: application/json' \
-X PUT "https://localhost:9201/_cluster/settings?pretty" \
-d'{"persistent":{"cluster.routing.allocation.enable":"primaries"}}' \
-ku admin:admin
-ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand All @@ -469,7 +469,7 @@
```
1. Perform a flush operation on the cluster to commit transaction log entries to the Lucene index:
```bash
curl -X POST "https://localhost:9201/_flush?pretty" -ku admin:admin
curl -X POST "https://localhost:9201/_flush?pretty" -ku admin:< Admin password >

Check failure on line 472 in _install-and-configure/upgrade-opensearch/appendix/rolling-upgrade-lab.md

View workflow job for this annotation

GitHub Actions / style-job

[vale] reported by reviewdog 🐶 [OpenSearch.SpacingPunctuation] There should be no space before and one space after the punctuation mark in 'flush?pretty'. Raw Output: {"message": "[OpenSearch.SpacingPunctuation] There should be no space before and one space after the punctuation mark in 'flush?pretty'.", "location": {"path": "_install-and-configure/upgrade-opensearch/appendix/rolling-upgrade-lab.md", "range": {"start": {"line": 472, "column": 42}}}, "severity": "ERROR"}
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand Down Expand Up @@ -514,7 +514,7 @@
1. **Optional**: Query the cluster to determine which node is acting as the cluster manager. You can run this command at any time during the process to see when a new cluster manager is elected:
```bash
curl -s "https://localhost:9201/_cat/nodes?v&h=name,version,node.role,master" \
-ku admin:admin | column -t
-ku admin:< Admin password > | column -t
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand All @@ -528,7 +528,7 @@
1. **Optional**: Query the cluster to see how shard allocation changes as nodes are removed and replaced. You can run this command at any time during the process to see how shard statuses change:
```bash
curl -s "https://localhost:9201/_cat/shards" \
-ku admin:admin
-ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand Down Expand Up @@ -644,7 +644,7 @@
1. Confirm that your cluster is running the new version:
```bash
curl -s "https://localhost:9201/_cat/nodes?v&h=name,version,node.role,master" \
-ku admin:admin | column -t
-ku admin:< Admin password > | column -t
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand Down Expand Up @@ -700,7 +700,7 @@
curl -H 'Content-type: application/json' \
-X PUT "https://localhost:9201/_cluster/settings?pretty" \
-d'{"persistent":{"cluster.routing.allocation.enable":"all"}}' \
-ku admin:admin
-ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand Down Expand Up @@ -735,7 +735,7 @@
1. Verify the current running version of your OpenSearch nodes:
```bash
curl -s "https://localhost:9201/_cat/nodes?v&h=name,version,node.role,master" \
-ku admin:admin | column -t
-ku admin:< Admin password > | column -t
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand Down Expand Up @@ -781,7 +781,7 @@

1. Query the [Cluster health]({{site.url}}{{site.baseurl}}/api-reference/cluster-api/cluster-health/) API endpoint to see information about the health of your cluster. You should see a status of `green`, which indicates that all primary and replica shards are allocated:
```bash
curl -s "https://localhost:9201/_cluster/health?pretty" -ku admin:admin
curl -s "https://localhost:9201/_cluster/health?pretty" -ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand All @@ -808,7 +808,7 @@
```
1. Query the [CAT shards]({{site.url}}{{site.baseurl}}/api-reference/cat/cat-shards/) API endpoint to see how shards are allocated after the cluster is upgrade:
```bash
curl -s "https://localhost:9201/_cat/shards" -ku admin:admin
curl -s "https://localhost:9201/_cat/shards" -ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand Down Expand Up @@ -860,7 +860,7 @@
curl -H 'Content-Type: application/json' \
-X GET "https://localhost:9201/ecommerce/_search?pretty=true&filter_path=hits.total" \
-d'{"query":{"match":{"customer_first_name":"Sonya"}}}' \
-ku admin:admin
-ku admin:< Admin password >
```
{% include copy.html %}
<p class="codeblock-label">Example response</p>
Expand Down
Loading