setup.asciidoc 3.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102
  1. [role="xpack"]
  2. [[transform-setup]]
  3. = Set up {transforms}
  4. ++++
  5. <titleabbrev>Setup</titleabbrev>
  6. ++++
  7. [discrete]
  8. [[requirements-overview]]
  9. == Requirements overview
  10. To use {transforms}, you must have:
  11. * at least one <<transform-node,{transform} node>>,
  12. * management features visible in the {kib} space, and
  13. * security privileges that:
  14. +
  15. --
  16. * grant use of {transforms}, and
  17. * grant access to source and destination indices
  18. --
  19. [discrete]
  20. [[transform-privileges]]
  21. == Security privileges
  22. Assigning security privileges affects how users access {transforms}. Consider
  23. the two main categories:
  24. * *<<transform-es-security-privileges>>*: uses an {es} client, cURL, or {kib}
  25. **{dev-tools-app}** to access {transforms} via {es} APIs. This scenario requires
  26. {es} security privileges.
  27. * *<<transform-kib-security-privileges>>*: uses {transforms} in {kib}. This
  28. scenario requires {kib} feature privileges _and_ {es} security privileges.
  29. [discrete]
  30. [[transform-es-security-privileges]]
  31. === {es} API user
  32. To _manage_ {transforms}, you must meet all of the following requirements:
  33. * `transform_admin` built-in role or `manage_transform` cluster privileges,
  34. * `read` and `view_index_metadata` index privileges on source indices, and
  35. * `create_index`, `index`, `manage`, and `read` index privileges on destination
  36. indices
  37. To view only the configuration and status of {transforms}, you must have:
  38. * `transform_user` built-in role or `monitor_transform` cluster privileges
  39. For more information about {es} roles and privileges, refer to
  40. <<built-in-roles>> and <<security-privileges>>.
  41. [discrete]
  42. [[transform-kib-security-privileges]]
  43. === {kib} user
  44. Within a {kib} space, for full access to {transforms}, you must meet all of the
  45. following requirements:
  46. * Management features visible in the {kib} space, including
  47. `Data View Management` and `Stack Monitoring`,
  48. * `monitoring_user` built-in role,
  49. * `transform_admin` built-in role or `manage_transform` cluster privileges,
  50. * `kibana_admin` built-in role or a custom role with `read` or `all` {kib}
  51. privileges for the `Data View Management` feature (dependent on whether data
  52. views already exist for your destination indices),
  53. * data views for your source indices,
  54. * `read` and `view_index_metadata` index privileges on source indices, and
  55. * `create_index`, `index`, `manage`, and `read` index privileges on destination
  56. indices
  57. * `read_pipeline` cluster privileges, if the {transform} uses an ingest pipeline
  58. Within a {kib} space, for read-only access to {transforms}, you must meet all of
  59. the following requirements:
  60. * Management features visible in the {kib} space, including `Stack Monitoring`,
  61. * `monitoring_user` built-in role,
  62. * `transform_user` built-in role or `monitor_transform` cluster privileges,
  63. * `kibana_admin` built-in role or a custom role with `read` {kib} privileges
  64. for at least one feature in the space,
  65. * data views for your source and destination indices, and
  66. * `read`, and `view_index_metadata` index privileges on source indices and
  67. destination indices
  68. For more information and {kib} security features, see
  69. {kibana-ref}/kibana-role-management.html[{kib} role management] and
  70. {kibana-ref}/kibana-privileges.html[{kib} privileges].
  71. [discrete]
  72. [[transform-kib-spaces]]
  73. == {kib} spaces
  74. {kibana-ref}/xpack-spaces.html[Spaces] enable you to organize your source and
  75. destination indices and other saved objects in {kib} and to see only the objects
  76. that belong to your space. However, this limited scope does not apply to
  77. {transforms}; they are visible in all spaces.
  78. To successfully create {transforms} in {kib}, you must be logged into a space
  79. where the source indices are visible and the `Data View Management` and
  80. `Stack Monitoring` features are visible.