NOTE: You are looking at documentation for an older release. For the latest information, see the current release documentation.
Grant users access to Auditbeat indices
editGrant users access to Auditbeat indices
editTo enable users to access the indices Auditbeat creates, grant them read
and view_index_metadata
privileges on the Auditbeat indices. If they’re
using Kibana, they also need the kibana_user
role.
-
Create a reader role that has the
read
andview_index_metadata
privileges on the Auditbeat indices.You can create roles from the Management > Roles UI in Kibana or through the
role
API. For example, the following request creates a role namedauditbeat_reader
: -
Assign your users the reader role so they can access the Auditbeat indices. For Kibana users who need to visualize the data, also assign the
kibana_user
role:-
If you’re using the
native
realm, you can assign roles with the Management > Users UI in Kibana or through theuser
API. For example, the following request grantsauditbeat_user
theauditbeat_reader
andkibana_user
roles:POST /_xpack/security/user/auditbeat_user { "password" : "YOUR_PASSWORD", "roles" : [ "auditbeat_reader","kibana_user"], "full_name" : "Auditbeat User" }
-
If you’re using the LDAP, Active Directory, or PKI realms, you assign the roles in the
role_mapping.yml
configuration file. For example, the following snippet grantsAuditbeat User
theauditbeat_reader
andkibana_user
roles:auditbeat_reader: - "cn=Auditbeat User,dc=example,dc=com" kibana_user: - "cn=Auditbeat User,dc=example,dc=com"
For more information, see Using Role Mapping Files.
-