kibana/docs/uptime-guide/security.asciidoc
Brandon Morelli 9903d2e772
[docs][uptime] Add Uptime Monitoring Guide (#40566)
* docs: uptime guide first draft

* docs: uptime guide updates

* docs: clean up duplication

* docs: nits

* temporarily remove link from kib to uptime

* reviewer feedback

* change from getting started to install
2019-07-12 09:02:58 -07:00

72 lines
1.7 KiB
Plaintext

[[uptime-security]]
== Elasticsearch Security
If you use Elasticsearch security, you'll need to enable certain privileges for users
that would like to access the Uptime app. Below is an example of creating
a user and support role to implement those privileges.
[float]
=== Create a role
You'll need a role that lets you access the Heartbeat indices, which by default are `heartbeat-*`.
You can create this with the following request:
["source","sh",subs="attributes,callouts"]
---------------------------------------------------------------
PUT /_security/role/uptime
{ "indices" : [
{
"names" : [
"heartbeat-*"
],
"privileges" : [
"read",
"view_index_metadata"
],
"field_security" : {
"grant" : [
"*"
]
},
"allow_restricted_indices" : false
}
],
"applications" : [
{
"application" : "kibana-.kibana",
"privileges" : [
"all"
],
"resources" : [
"*"
]
}
],
"transient_metadata" : {
"enabled" : true
}
}
---------------------------------------------------------------
// CONSOLE
[float]
=== Assign the role to a user
Next, you'll need to create a user with both the `kibana_user`, and `uptime` roles.
You can do this with the following request:
["source","sh",subs="attributes,callouts"]
---------------------------------------------------------------
PUT /_security/user/jacknich
{
"password" : "j@rV1s",
"roles" : [ "uptime", "kibana_user" ],
"full_name" : "Jack Nicholson",
"email" : "jacknich@example.com",
"metadata" : {
"intelligence" : 7
}
}
---------------------------------------------------------------
// CONSOLE