APM app central config user
editAPM app central config user
editCentral configuration manager
editCentral configuration users need to be able to view, create, update, and delete Agent configurations.
-
Create a new role, named something like
central-config-manager, and assign the following privileges:Type Privilege Purpose Index
readonapm-*Read-only access to
apm-*dataIndex
view_index_metadataonapm-*Read-only access to
apm-*index metadataType Privilege Purpose Index
readonapm-agent-configurationRead-only access to
apm-agent-configurationdataIndex
view_index_metadataonapm-agent-configurationRead-only access to
apm-agent-configurationindex metadataIndex
readonlogs-apm*Read-only access to
logs-apm*dataIndex
view_index_metadataonlogs-apm*Read-only access to
logs-apm*index metadataIndex
readonmetrics-apm*Read-only access to
metrics-apm*dataIndex
view_index_metadataonmetrics-apm*Read-only access to
metrics-apm*index metadataIndex
readontraces-apm*Read-only access to
traces-apm*dataIndex
view_index_metadataontraces-apm*Read-only access to
traces-apm*index metadataUsing the APM integration for Elastic Agent? Add the privileges under the Data streams tab.
-
Assign the
central-config-managerrole created in the previous step, and the following Kibana space privileges to anyone who needs to manage central configurations:Type Privilege Purpose Spaces
Allon APM appAllow full use of the APM app
Central configuration reader
editIn some instances, you may wish to create a user that can only read central configurations, but not create, update, or delete them.
-
Create a new role, named something like
central-config-reader, and assign the following privileges:Type Privilege Purpose Index
readonapm-*Read-only access to
apm-*dataIndex
view_index_metadataonapm-*Read-only access to
apm-*index metadataType Privilege Purpose Index
readonapm-agent-configurationRead-only access to
apm-agent-configurationdataIndex
view_index_metadataonapm-agent-configurationRead-only access to
apm-agent-configurationindex metadataIndex
readonlogs-apm*Read-only access to
logs-apm*dataIndex
view_index_metadataonlogs-apm*Read-only access to
logs-apm*index metadataIndex
readonmetrics-apm*Read-only access to
metrics-apm*dataIndex
view_index_metadataonmetrics-apm*Read-only access to
metrics-apm*index metadataIndex
readontraces-apm*Read-only access to
traces-apm*dataIndex
view_index_metadataontraces-apm*Read-only access to
traces-apm*index metadataUsing the APM integration for Elastic Agent? Add the privileges under the Data streams tab.
-
Assign the
central-config-readerrole created in the previous step, and the following Kibana space privileges to anyone who needs to read central configurations:Type Privilege Purpose Spaces
readon the APM appAllow read access to the APM app
Central configuration API
editSee Create an API user.