Skip to content

Commit 8a6574b

Browse files
authoredFeb 21, 2019
Document privileges for ILM (#10449) (#10779)
1 parent ee2f663 commit 8a6574b

File tree

2 files changed

+44
-11
lines changed

2 files changed

+44
-11
lines changed
 

‎libbeat/docs/security/basic-auth.asciidoc

+29
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ POST _xpack/security/role/{beat_default_index_prefix}_writer
4040
]
4141
}
4242
---------------------------------------------------------------
43+
// CONSOLE
4344
<1> If you use a custom {beatname_uc} index pattern, specify that pattern
4445
instead of the default ++{beat_default_index_prefix}-*++ pattern.
4546
endif::[]
@@ -65,6 +66,34 @@ instead of the default ++{beat_default_index_prefix}-*++ pattern.
6566
endif::[]
6667
--
6768

69+
ifndef::no_ilm[]
70+
. If you plan to use {ref}/getting-started-index-lifecycle-management.html[index
71+
lifecycle management], create a role that has the following privileges. These
72+
privileges are required to load index lifecycle policies and create and manage
73+
rollover indices:
74+
+
75+
* *Cluster:* `manage_ilm`
76+
* *Index:* `write`, `create_index`, `manage`, and `manage_ilm` on the
77+
{beatname_uc} indices
78+
+
79+
--
80+
["source","sh",subs="attributes"]
81+
---------------------------------------------------------------
82+
POST _xpack/security/role/{beatname_lc}_ilm
83+
{
84+
"cluster": ["manage_ilm"],
85+
"indices": [
86+
{
87+
"names": [ "{beatname_lc}-*","shrink-{beatname_lc}-*"],
88+
"privileges": ["write","create_index","manage","manage_ilm"]
89+
}
90+
]
91+
}
92+
---------------------------------------------------------------
93+
// CONSOLE
94+
--
95+
endif::no_ilm[]
96+
6897
. Assign the writer role to the user that {beatname_uc} will use to connect to
6998
{es}. Make sure you also assign any roles that are required for specific
7099
features. For the list of features and required roles, see <<feature-roles>>.

‎libbeat/docs/security/securing-beats.asciidoc

+15-11
Original file line numberDiff line numberDiff line change
@@ -44,40 +44,44 @@ password, set it up now.
4444
For more information about {security}, see
4545
{xpack-ref}/xpack-security.html[Securing the {stack}].
4646

47-
[float]
4847
[[feature-roles]]
4948
=== {beatname_uc} features that require authorization
5049

5150
After securing {beatname_uc}, make sure your users have the roles (or associated
52-
privileges) required to use these {beatname_uc} features. You must create the
53-
++{beat_default_index_prefix}_writer++ and
54-
++{beat_default_index_prefix}_reader++ roles (see <<beats-basic-auth>> and
55-
<<beats-user-access>>). The other roles are
56-
{xpack-ref}/built-in-roles.html[built-in].
51+
privileges) required to use these {beatname_uc} features. Note that some of the
52+
roles shown here are {xpack-ref}/built-in-roles.html[built-in], and some
53+
are user-defined.
5754

5855
[options="header"]
5956
|=======
6057
|Feature | Role
61-
|Send data to a secured cluster | ++{beat_default_index_prefix}_writer++
58+
|Send data to a secured cluster | ++{beat_default_index_prefix}_writer++ footnoteref:[noteA,These roles are user-defined.]
6259
ifeval::["{beatname_lc}"=="filebeat"]
63-
|Run Filebeat modules | ++{beat_default_index_prefix}_writer++
60+
|Run Filebeat modules | ++{beat_default_index_prefix}_writer++ footnoteref:[noteA]
6461
endif::[]
65-
|Load index templates | ++{beat_default_index_prefix}_writer++ and `kibana_user`
62+
|Load index templates | ++{beat_default_index_prefix}_writer++ footnoteref:[noteA] and `kibana_user`
6663
ifndef::no_dashboards[]
67-
|Load {beatname_uc} dashboards into {kib} | ++{beat_default_index_prefix}_writer++ and `kibana_user`
64+
|Load {beatname_uc} dashboards into {kib} | ++{beat_default_index_prefix}_writer++ footnoteref:[noteA] and `kibana_user`
6865
endif::[]
6966
ifdef::has_ml_jobs[]
7067
|Load machine learning jobs | `machine_learning_admin`
7168
endif::[]
72-
|Read indices created by {beatname_uc} | ++{beat_default_index_prefix}_reader++
69+
|Read indices created by {beatname_uc} | ++{beat_default_index_prefix}_reader++ footnoteref:[noteA]
7370
ifndef::no_dashboards[]
7471
|View {beatname_uc} dashboards in {kib} | `kibana_user`
7572
endif::[]
7673
ifdef::has_central_config[]
7774
|Store and manage configurations in a central location in {kib} | `beats_admin`
7875
endif::[]
76+
ifndef::no_ilm[]
77+
|Load index lifecycle policies and use index lifecycle management | +{beatname_lc}_ilm+ footnoteref:[noteA]
78+
endif::[]
7979
|=======
8080

81+
To create the user-defined roles shown here, see <<beats-basic-auth>> and
82+
<<beats-user-access>>. You may want to define additional roles to provide more
83+
restrictive access.
84+
8185
include::basic-auth.asciidoc[]
8286

8387
include::user-access.asciidoc[]

0 commit comments

Comments
 (0)