To use SOC Prime's Attack Detective for querying your log data in OpenSearch, you need to grant Attack Detective certain permissions in your OpenSearch instance. To do this, first configure an internal user for Attack Detective, then create a role with required permissions, and finally map the configured user to the created role:
Go to the Home page of your OpenSearch instance.
Open the three bars menu in the upper left corner and select Security.
Create an internal user.
Create a role for the configured internal user.
Go to Roles in the Security menu.
Click the Create role button.
Give your role an arbitrary name, for example
role_attack_detective.Provide the following cluster permissions:
cluster_composite_ops_rocluster_monitor
Select the indexes that will be available to Attack Detective. Use
*to select all indexes.Alternatively, you can select specific indexes. In this case, also specify
.kibana*.Set the following index permissions:
readindices:data/read/getindices:data/read/search*manage
Set the following tenant and its permission:
global_tenantwith the Read only access
Click Create.
The details of the created role will open. Map the created role to the previously configured internal user.



