Reporting operates by creating and updating documents in Elasticsearch in response to user actions in Kibana.
To use Reporting with X-Pack security enabled, you need to set up Kibana to work with X-Pack security. If you are automatically generating reports with Watcher, you also need to configure Watcher to trust the Kibana server’s certificate. For more information, see Securing Reporting.
To enable users to generate reports, assign them the built in reporting_user
and kibana_user roles:
If you’re using the
nativerealm, you can assign roles through Management / Users UI in Kibana or with theuserAPI. For example, the following request creates areporteruser that has thereporting_userandkibana_userroles:POST /_xpack/security/user/reporter { "password" : "changeme", "roles" : ["kibana_user", "reporting_user"], "full_name" : "Reporting User" }If you are using an LDAP or Active Directory realm, you can either assign roles on a per user basis, or assign roles to groups of users. By default, role mappings are configured in
config/shield/role_mapping.yml. For example, the following snippet assigns the user named Bill Murray thekibana_userandreporting_userroles:kibana_user: - "cn=Bill Murray,dc=example,dc=com" reporting_user: - "cn=Bill Murray,dc=example,dc=com"