@@ -21,12 +21,12 @@ Privileges to list and view details on existing repositories and snapshots.
21
21
22
22
`manage`::
23
23
Builds on `monitor` and adds cluster operations that change values in the cluster.
24
- This includes snapshotting, updating settings, and rerouting. It also includes
25
- obtaining snapshot and restore status. This privilege does not include the
24
+ This includes snapshotting, updating settings, and rerouting. It also includes
25
+ obtaining snapshot and restore status. This privilege does not include the
26
26
ability to manage security.
27
27
28
28
`manage_api_key`::
29
- All security-related operations on {es} API keys including
29
+ All security-related operations on {es} API keys including
30
30
<<security-api-create-api-key,creating new API keys>>,
31
31
<<security-api-get-api-key,retrieving information about API keys>>, and
32
32
<<security-api-invalidate-api-key,invalidating API keys>>.
@@ -45,10 +45,10 @@ owned by other users.
45
45
--
46
46
47
47
`manage_ccr`::
48
- All {ccr} operations related to managing follower indices and auto-follow
49
- patterns. It also includes the authority to grant the privileges necessary to
50
- manage follower indices and auto-follow patterns. This privilege is necessary
51
- only on clusters that contain follower indices.
48
+ All {ccr} operations related to managing follower indices and auto-follow
49
+ patterns. It also includes the authority to grant the privileges necessary to
50
+ manage follower indices and auto-follow patterns. This privilege is necessary
51
+ only on clusters that contain follower indices.
52
52
53
53
`manage_transform`::
54
54
All operations related to managing {transforms}.
@@ -83,7 +83,7 @@ to initiate and manage OpenID Connect authentication on behalf of other users.
83
83
84
84
`manage_own_api_key`::
85
85
All security-related operations on {es} API keys that are owned by the current
86
- authenticated user. The operations include
86
+ authenticated user. The operations include
87
87
<<security-api-create-api-key,creating new API keys>>,
88
88
<<security-api-get-api-key,retrieving information about API keys>>, and
89
89
<<security-api-invalidate-api-key,invalidating API keys>>.
@@ -119,7 +119,7 @@ security roles of the user who created or updated them.
119
119
--
120
120
121
121
`monitor`::
122
- All cluster read-only operations, like cluster health and state, hot threads,
122
+ All cluster read-only operations, like cluster health and state, hot threads,
123
123
node info, node and cluster stats, and pending cluster tasks.
124
124
125
125
`monitor_transform`::
@@ -131,16 +131,16 @@ model snapshots, or results.
131
131
132
132
`monitor_rollup`::
133
133
All read-only rollup operations, such as viewing the list of historical and
134
- currently running rollup jobs and their capabilities.
134
+ currently running rollup jobs and their capabilities.
135
135
136
136
`monitor_watcher`::
137
137
All read-only watcher operations, such as getting a watch and watcher stats.
138
138
139
139
`read_ccr`::
140
- All read-only {ccr} operations, such as getting information about indices and
141
- metadata for leader indices in the cluster. It also includes the authority to
142
- check whether users have the appropriate privileges to follow leader indices.
143
- This privilege is necessary only on clusters that contain leader indices.
140
+ All read-only {ccr} operations, such as getting information about indices and
141
+ metadata for leader indices in the cluster. It also includes the authority to
142
+ check whether users have the appropriate privileges to follow leader indices.
143
+ This privilege is necessary only on clusters that contain leader indices.
144
144
145
145
`read_ilm`::
146
146
All read-only {Ilm} operations, such as getting policies and checking the
@@ -204,15 +204,19 @@ Privilege to delete an index.
204
204
Privilege to index and update documents. Also grants access to the update
205
205
mapping action.
206
206
207
+ `maintenance`::
208
+ Permits refresh, flush, synced flush and force merge index administration operations.
209
+ No privilege to read or write index data or otherwise manage the index.
210
+
207
211
`manage`::
208
212
All `monitor` privileges plus index administration (aliases, analyze, cache clear,
209
213
close, delete, exists, flush, mapping, open, force merge, refresh, settings,
210
214
search shards, templates, validate).
211
215
212
216
`manage_follow_index`::
213
217
All actions that are required to manage the lifecycle of a follower index, which
214
- includes creating a follower index, closing it, and converting it to a regular
215
- index. This privilege is necessary only on clusters that contain follower indices.
218
+ includes creating a follower index, closing it, and converting it to a regular
219
+ index. This privilege is necessary only on clusters that contain follower indices.
216
220
217
221
`manage_ilm`::
218
222
All {Ilm} operations relating to managing the execution of policies of an index
@@ -225,7 +229,7 @@ includes <<ccr-post-forget-follower,forgetting a follower>>. This
225
229
privilege is necessary only on clusters that contain leader indices.
226
230
227
231
`monitor`::
228
- All actions that are required for monitoring (recovery, segments info, index
232
+ All actions that are required for monitoring (recovery, segments info, index
229
233
stats and status).
230
234
231
235
`read`::
@@ -258,14 +262,14 @@ sequence.) For more information, see
258
262
[[application-privileges]]
259
263
==== Application privileges
260
264
261
- Application privileges are managed within {es} and can be retrieved with the
262
- <<security-api-has-privileges,has privileges API>> and the
263
- <<security-api-get-privileges,get application privileges API>>. They do
264
- not, however, grant access to any actions or resources within {es}. Their
265
- purpose is to enable applications to represent and store their own privilege
266
- models within {es} roles.
267
-
268
- To create application privileges, use the
269
- <<security-api-put-privileges,add application privileges API>>. You can
270
- then associate these application privileges with roles, as described in
271
- <<defining-roles>>.
265
+ Application privileges are managed within {es} and can be retrieved with the
266
+ <<security-api-has-privileges,has privileges API>> and the
267
+ <<security-api-get-privileges,get application privileges API>>. They do
268
+ not, however, grant access to any actions or resources within {es}. Their
269
+ purpose is to enable applications to represent and store their own privilege
270
+ models within {es} roles.
271
+
272
+ To create application privileges, use the
273
+ <<security-api-put-privileges,add application privileges API>>. You can
274
+ then associate these application privileges with roles, as described in
275
+ <<defining-roles>>.
0 commit comments