setup.asciidoc 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107
  1. [role="xpack"]
  2. [[transform-setup]]
  3. = Set up {transforms}
  4. ++++
  5. <titleabbrev>Setup</titleabbrev>
  6. ++++
  7. [discrete]
  8. [[requirements-overview]]
  9. == Requirements overview
  10. To use {transforms}, you must have:
  11. * at least one <<transform-node,{transform} node>>,
  12. * management features visible in the {kib} space, and
  13. * security privileges that:
  14. +
  15. --
  16. * grant use of {transforms}, and
  17. * grant access to source and destination indices
  18. --
  19. [discrete]
  20. [[transform-privileges]]
  21. == Security privileges
  22. Assigning security privileges affects how users access {transforms}. Consider
  23. the two main categories:
  24. * *<<transform-es-security-privileges>>*: uses an {es} client, cURL, or {kib}
  25. **{dev-tools-app}** to access {transforms} via {es} APIs. This scenario requires
  26. {es} security privileges.
  27. * *<<transform-kib-security-privileges>>*: uses {transforms} in {kib}. This
  28. scenario requires {kib} feature privileges _and_ {es} security privileges.
  29. [discrete]
  30. [[transform-es-security-privileges]]
  31. === {es} API user
  32. To _manage_ {transforms}, you must meet all of the following requirements:
  33. * `transform_admin` built-in role or `manage_transform` cluster privileges,
  34. * `read` and `view_index_metadata` index privileges on source indices, and
  35. * `create_index`, `index`, `manage`, and `read` index privileges on destination
  36. indices. If a `retention_policy` is configured, `delete` index privilege is
  37. also required on the destination index.
  38. To view only the configuration and status of {transforms}, you must have:
  39. * `transform_user` built-in role or `monitor_transform` cluster privileges
  40. For more information about {es} roles and privileges, refer to
  41. <<built-in-roles>> and <<security-privileges>>.
  42. [discrete]
  43. [[transform-kib-security-privileges]]
  44. === {kib} user
  45. Within a {kib} space, for full access to {transforms}, you must meet all of the
  46. following requirements:
  47. * Management features visible in the {kib} space, including
  48. `Data View Management` and `Stack Monitoring`,
  49. * `monitoring_user` built-in role,
  50. * `transform_admin` built-in role or `manage_transform` cluster privileges,
  51. * `kibana_admin` built-in role or a custom role with `read` or `all` {kib}
  52. privileges for the `Data View Management` feature (dependent on whether data
  53. views already exist for your destination indices),
  54. * data views for your source indices,
  55. * `read` and `view_index_metadata` index privileges on source indices, and
  56. * `create_index`, `index`, `manage`, and `read` index privileges on destination
  57. indices. Additionally, when using a `retention_policy`, `delete` index privilege is required
  58. on destination indices.
  59. * `read_pipeline` cluster privileges, if the {transform} uses an ingest pipeline
  60. Within a {kib} space, for read-only access to {transforms}, you must meet all of
  61. the following requirements:
  62. * Management features visible in the {kib} space, including `Stack Monitoring`,
  63. * `monitoring_user` built-in role,
  64. * `transform_user` built-in role or `monitor_transform` cluster privileges,
  65. * `kibana_admin` built-in role or a custom role with `read` {kib} privileges
  66. for at least one feature in the space,
  67. * data views for your source and destination indices, and
  68. * `read`, and `view_index_metadata` index privileges on source indices and
  69. destination indices
  70. For more information and {kib} security features, see
  71. {kibana-ref}/kibana-role-management.html[{kib} role management] and
  72. {kibana-ref}/kibana-privileges.html[{kib} privileges].
  73. [discrete]
  74. [[transform-kib-spaces]]
  75. == {kib} spaces
  76. {kibana-ref}/xpack-spaces.html[Spaces] enable you to organize your source and
  77. destination indices and other saved objects in {kib} and to see only the objects
  78. that belong to your space. However, a {transform} is a long running task which
  79. is managed on cluster level and therefore not limited in scope to certain
  80. spaces. Space awareness can be implemented for a {data-source} under
  81. **Stack Management > Kibana** which allows privileges to the {transform}
  82. destination index.
  83. To successfully create {transforms} in {kib}, you must be logged into a space
  84. where the source indices are visible and the `Data View Management` and
  85. `Stack Monitoring` features are visible.