Applications UI central config user
Stack
Central configuration users need to be able to view, create, update, and delete APM agent configurations.
Create a new role, named something like
central-config-manager, and assign the following privileges:Type Privilege Purpose Index readonapm-agent-configurationRead-only access to apm-agent-configurationdataIndex view_index_metadataonapm-agent-configurationRead-only access to apm-agent-configurationindex metadataIndex readonlogs-apm*Read-only access to logs-apm*dataIndex view_index_metadataonlogs-apm*Read-only access to logs-apm*index metadataIndex readonmetrics-apm*Read-only access to metrics-apm*dataIndex view_index_metadataonmetrics-apm*Read-only access to metrics-apm*index metadataIndex readontraces-apm*Read-only access to traces-apm*dataIndex view_index_metadataontraces-apm*Read-only access to traces-apm*index metadataType Privilege Purpose Index readonapm-*Read-only access to apm-*dataIndex view_index_metadataonapm-*Read-only access to apm-*index metadataTipUsing the deprecated APM Server binaries? Add the privileges under the Classic APM indices tab above.
Assign the
central-config-managerrole created in the previous step, and the following Kibana feature privileges to anyone who needs to manage central configurations:Type Privilege Purpose Kibana Allon the APM and User Experience featureAllow full use of the Applications and User Experience UIs
In some instances, you may wish to create a user that can only read central configurations, but not create, update, or delete them.
Create a new role, named something like
central-config-reader, and assign the following privileges:Type Privilege Purpose Index readonapm-agent-configurationRead-only access to apm-agent-configurationdataIndex view_index_metadataonapm-agent-configurationRead-only access to apm-agent-configurationindex metadataIndex readonlogs-apm*Read-only access to logs-apm*dataIndex view_index_metadataonlogs-apm*Read-only access to logs-apm*index metadataIndex readonmetrics-apm*Read-only access to metrics-apm*dataIndex view_index_metadataonmetrics-apm*Read-only access to metrics-apm*index metadataIndex readontraces-apm*Read-only access to traces-apm*dataIndex view_index_metadataontraces-apm*Read-only access to traces-apm*index metadataType Privilege Purpose Index readonapm-*Read-only access to apm-*dataIndex view_index_metadataonapm-*Read-only access to apm-*index metadataTipUsing the deprecated APM Server binaries? Add the privileges under the Classic APM indices tab above.
Assign the
central-config-readerrole created in the previous step, and the following Kibana feature privileges to anyone who needs to read central configurations:Type Privilege Purpose Kibana readon the APM and User Experience featureAllow read access to the Applications and User Experience UIs
See Create an API user.