- Kibana Guide: other versions:
- Introduction
- Set Up Kibana
- Getting Started
- Discover
- Visualize
- Dashboard
- Timelion
- Canvas
- Graphing connections in your data
- Machine learning
- Maps
- Infrastructure
- Logs
- APM
- Uptime
- Dev Tools
- Monitoring
- Management
- Reporting from Kibana
- REST API
- Kibana Plugins
- Limitations
- Release Highlights
- Breaking changes
- Release notes
- Kibana 6.8.23
- Kibana 6.8.22
- Kibana 6.8.21
- Kibana 6.8.20
- Kibana 6.8.19
- Kibana 6.8.18
- Kibana 6.8.17
- Kibana 6.8.16
- Kibana 6.8.15
- Kibana 6.8.14
- Kibana 6.8.13
- Kibana 6.8.12
- Kibana 6.8.11
- Kibana 6.8.10
- Kibana 6.8.9
- Kibana 6.8.8
- Kibana 6.8.7
- Kibana 6.8.6
- Kibana 6.8.5
- Kibana 6.8.4
- Kibana 6.8.3
- Kibana 6.8.2
- Kibana 6.8.1
- Kibana 6.8.0
- Kibana 6.7.2
- Kibana 6.7.1
- Kibana 6.7.0
- Kibana 6.6.2
- Kibana 6.6.1
- Kibana 6.6.0
- Kibana 6.5.4
- Kibana 6.5.3
- Kibana 6.5.2
- Kibana 6.5.1
- Kibana 6.5.0
- Kibana 6.4.3
- Kibana 6.4.2
- Kibana 6.4.1
- Kibana 6.4.0
- Kibana 6.3.2
- Kibana 6.3.1
- Kibana 6.3.0
- Kibana 6.2.4
- Kibana 6.2.3
- Kibana 6.2.2
- Kibana 6.2.1
- Kibana 6.2.0
- Kibana 6.1.4
- Kibana 6.1.3
- Kibana 6.1.2
- Kibana 6.1.1
- Kibana 6.1.0
- Kibana 6.0.1
- Kibana 6.0.0
- Kibana 6.0.0-rc2
- Kibana 6.0.0-rc1
- Kibana 6.0.0-beta2
- Kibana 6.0.0-beta1
- Kibana 6.0.0-alpha2
- Kibana 6.0.0-alpha1
- Developer guide
NOTE: You are looking at documentation for an older release. For the latest information, see the current release documentation.
Get Role
editGet Role
editThis API is experimental and may be changed or removed completely in a future release. Although the underlying mechanism of enforcing role-based access control is stable, the APIs for managing the roles are currently experimental.
Retrieves all Kibana roles, or a specific role.
Authorization
editTo use this API, you must have at least the manage_security
cluster privilege.
Get all Kibana roles
editRequest
editTo retrieve all roles, issue a GET request to the /api/security/role endpoint.
GET /api/security/role
Response
editA successful call returns a response code of 200
and a response body containing a JSON
representation of the roles.
[ { "name": "my_kibana_role", "metadata" : { "version" : 1 }, "transient_metadata": { "enabled": true }, "elasticsearch": { "indices": [ ], "cluster": [ ], "run_as": [ ] }, "kibana": [ { "privileges": [ "all" ] } ], }, { "name": "my_admin_role", "metadata" : { "version" : 1 }, "transient_metadata": { "enabled": true }, "elasticsearch": { "cluster" : [ "all" ], "indices" : [ { "names" : [ "index1", "index2" ], "privileges" : [ "all" ], "field_security" : { "grant" : [ "title", "body" ] }, "query" : "{\"match\": {\"title\": \"foo\"}}" } ], }, "kibana": [ ] } ]
Get a specific role
editRequest
editTo retrieve a specific role, issue a GET request to
the /api/security/role/<rolename>
endpoint:
GET /api/security/role/my_kibana_role
Response
editA successful call returns a response code of 200
and a response body containing a JSON
representation of the role.
{ "name": "my_kibana_role", "metadata" : { "version" : 1 }, "transient_metadata": { "enabled": true }, "elasticsearch": { "cluster": [ ], "indices": [ ], "run_as": [ ] }, "kibana": [ { "privileges": [ "all" ] } ], }