Link Search Menu Expand Document

Security roles

If you use the security plugin alongside alerting, you might want to limit certain users to certain permissions. For example, you might want some users to only be able to view and acknowledge alerts, while others can create monitors and destinations. This page contains some sample roles for common use cases.

Mix and match these roles to give users the permissions they need to use the alerting feature.

View and acknowledge alerts

  1. In Kibana, choose Security, Roles.
  2. Create a new security role named alerting_alerts.
  3. In the Index Permissions tab, choose Add index permissions.
  4. Specify the .opendistro-alerting-alerts index pattern.
  5. Add the crud action group and Save role definition.
  6. Choose Role Mappings.
  7. Map the alerting_alerts role to the desired users or backend roles.

Create, update, and delete monitors and destinations

  1. In Kibana, choose Security, Roles.
  2. Create a new security role named alerting_monitors.
  3. In the Index Permissions tab, choose Add index permissions.
  4. Specify the .opendistro-alerting-config index pattern.
  5. Add the crud action group and Save role definition.
  6. Choose Role Mappings.
  7. Map the alerting_monitors role to the desired users or backend roles.

Read-only

  1. In Kibana, choose Security, Roles.
  2. Create a new security role named alerting_read_only.
  3. In the Index Permissions tab, choose Add index permissions.
  4. Specify the .opendistro-alerting-alerts index pattern.
  5. Choose Add index pattern to add a second index pattern.
  6. Specify the .opendistro-alerting-config index pattern.
  7. Choose the read action group and Save role definition.
  8. Choose Role Mappings.
  9. Map the alerting_read_only role to the desired users or backend roles.