- Kibana Guide: other versions:
- What is Kibana?
- What’s new in 8.3
- Kibana concepts
- Quick start
- Set up
- Install Kibana
- Configure Kibana
- Alerting and action settings
- APM settings
- Banners settings
- Enterprise Search settings
- Fleet settings
- i18n settings
- Logging settings
- Logs settings
- Metrics settings
- Monitoring settings
- Reporting settings
- Search sessions settings
- Secure settings
- Security settings
- Spaces settings
- Task Manager settings
- Telemetry settings
- URL drilldown settings
- Start and stop Kibana
- Access Kibana
- Securing access to Kibana
- Add data
- Upgrade Kibana
- Configure security
- Configure reporting
- Configure logging
- Configure monitoring
- Command line tools
- Production considerations
- Discover
- Dashboard and visualizations
- Canvas
- Maps
- Build a map to compare metrics by country or region
- Track, visualize, and alert on assets in real time
- Map custom regions with reverse geocoding
- Heat map layer
- Tile layer
- Vector layer
- Plot big data
- Search geographic data
- Configure map settings
- Connect to Elastic Maps Service
- Import geospatial data
- Troubleshoot
- Reporting and sharing
- Machine learning
- Graph
- Alerting
- Observability
- APM
- Security
- Dev Tools
- Fleet
- Osquery
- Stack Monitoring
- Stack Management
- REST API
- Get features API
- Kibana spaces APIs
- Kibana role management APIs
- User session management APIs
- Saved objects APIs
- Data views API
- Index patterns APIs
- Alerting APIs
- Action and connector APIs
- Cases APIs
- Import and export dashboard APIs
- Logstash configuration management APIs
- Machine learning APIs
- Short URLs APIs
- Get Task Manager health
- Upgrade assistant APIs
- Kibana plugins
- Troubleshooting
- Accessibility
- Release notes
- Developer guide
APM app central config user
editAPM app central config user
editCentral configuration manager
editCentral configuration users need to be able to view, create, update, and delete Agent configurations.
-
Create a new role, named something like
central-config-manager
, and assign the following privileges:Type Privilege Purpose Index
read
onapm-agent-configuration
Read-only access to
apm-agent-configuration
dataIndex
view_index_metadata
onapm-agent-configuration
Read-only access to
apm-agent-configuration
index metadataIndex
read
onlogs-apm*
Read-only access to
logs-apm*
dataIndex
view_index_metadata
onlogs-apm*
Read-only access to
logs-apm*
index metadataIndex
read
onmetrics-apm*
Read-only access to
metrics-apm*
dataIndex
view_index_metadata
onmetrics-apm*
Read-only access to
metrics-apm*
index metadataIndex
read
ontraces-apm*
Read-only access to
traces-apm*
dataIndex
view_index_metadata
ontraces-apm*
Read-only access to
traces-apm*
index metadataType Privilege Purpose Index
read
onapm-*
Read-only access to
apm-*
dataIndex
view_index_metadata
onapm-*
Read-only access to
apm-*
index metadataUsing the deprecated APM Server binaries? Add the privileges under the Classic APM indices tab above.
-
Assign the
central-config-manager
role created in the previous step, and the following Kibana feature privileges to anyone who needs to manage central configurations:Type Privilege Purpose Kibana
All
on the APM and User Experience featureAllow full use of the APM and User Experience apps
Central configuration reader
editIn some instances, you may wish to create a user that can only read central configurations, but not create, update, or delete them.
-
Create a new role, named something like
central-config-reader
, and assign the following privileges:Type Privilege Purpose Index
read
onapm-agent-configuration
Read-only access to
apm-agent-configuration
dataIndex
view_index_metadata
onapm-agent-configuration
Read-only access to
apm-agent-configuration
index metadataIndex
read
onlogs-apm*
Read-only access to
logs-apm*
dataIndex
view_index_metadata
onlogs-apm*
Read-only access to
logs-apm*
index metadataIndex
read
onmetrics-apm*
Read-only access to
metrics-apm*
dataIndex
view_index_metadata
onmetrics-apm*
Read-only access to
metrics-apm*
index metadataIndex
read
ontraces-apm*
Read-only access to
traces-apm*
dataIndex
view_index_metadata
ontraces-apm*
Read-only access to
traces-apm*
index metadataType Privilege Purpose Index
read
onapm-*
Read-only access to
apm-*
dataIndex
view_index_metadata
onapm-*
Read-only access to
apm-*
index metadataUsing the deprecated APM Server binaries? Add the privileges under the Classic APM indices tab above.
-
Assign the
central-config-reader
role created in the previous step, and the following Kibana feature privileges to anyone who needs to read central configurations:Type Privilege Purpose Kibana
read
on the APM and User Experience featureAllow read access to the APM and User Experience apps
Central configuration API
editSee Create an API user.