mirror of
https://github.com/elastic/kibana.git
synced 2025-04-23 17:28:26 -04:00
# Backport This will backport the following commits from `main` to `8.9`: - [[DOCS] Clarify API key authorization for alerting (#161717)](https://github.com/elastic/kibana/pull/161717) <!--- Backport version: 8.9.7 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) <!--BACKPORT [{"author":{"name":"Lisa Cawley","email":"lcawley@elastic.co"},"sourceCommit":{"committedDate":"2023-07-17T16:41:23Z","message":"[DOCS] Clarify API key authorization for alerting (#161717)","sha":"3a0c90d934c15f8cbe955eb91c7c0d587cb4a7b3","branchLabelMapping":{"^v8.10.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["Feature:Alerting","release_note:skip","Team:ResponseOps","docs","v8.9.0","v8.10.0","v8.8.3"],"number":161717,"url":"https://github.com/elastic/kibana/pull/161717","mergeCommit":{"message":"[DOCS] Clarify API key authorization for alerting (#161717)","sha":"3a0c90d934c15f8cbe955eb91c7c0d587cb4a7b3"}},"sourceBranch":"main","suggestedTargetBranches":["8.9","8.8"],"targetPullRequestStates":[{"branch":"8.9","label":"v8.9.0","labelRegex":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"main","label":"v8.10.0","labelRegex":"^v8.10.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/161717","number":161717,"mergeCommit":{"message":"[DOCS] Clarify API key authorization for alerting (#161717)","sha":"3a0c90d934c15f8cbe955eb91c7c0d587cb4a7b3"}},{"branch":"8.8","label":"v8.8.3","labelRegex":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}] BACKPORT--> Co-authored-by: Lisa Cawley <lcawley@elastic.co>
This commit is contained in:
parent
6440519230
commit
06b2b4284f
9 changed files with 62 additions and 92 deletions
|
@ -53,7 +53,7 @@ Any modifications made to this file will be overwritten.
|
|||
<a class="up" href="#__Methods">Up</a>
|
||||
<pre class="post"><code class="huge"><span class="http-method">post</span> /s/{spaceId}/api/alerting/rule</code></pre></div>
|
||||
<div class="method-summary">Creates a rule with a randomly generated rule identifier. (<span class="nickname">createRule</span>)</div>
|
||||
<div class="method-notes">You must have <code>all</code> privileges for the appropriate Kibana features, depending on the <code>consumer</code> and <code>rule_type_id</code> of the rule you're creating. For example, you must have privileges for the <strong>Management > Stack rules</strong> feature, <strong>Analytics > Discover</strong> and <strong>Machine Learning</strong> features, <strong>Observability</strong> features, or <strong>Security</strong> features. If the rule has actions, you must also have <code>read</code> privileges for the <strong>Management > Actions and Connectors</strong> feature. NOTE: This API supports only token-based authentication. When you create a rule, it identifies which roles you have at that point in time. Thereafter, when the rule performs queries, it uses those security privileges. If a user with different privileges updates the rule, its behavior might change.</div>
|
||||
<div class="method-notes">To create a rule, you must have <code>all</code> privileges for the appropriate Kibana features, depending on the <code>consumer</code> and <code>rule_type_id</code> of the rule you're creating. For example, you must have privileges for the <strong>Management > Stack rules</strong> feature, <strong>Analytics > Discover</strong> and <strong>Machine Learning</strong> features, <strong>Observability</strong> features, or <strong>Security</strong> features. If the rule has actions, you must also have <code>read</code> privileges for the <strong>Management > Actions and Connectors</strong> feature. This API supports both key- and token-based authentication. To use key-based authentication, create an API key in Kibana and use it in the header of the API call. To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically. In both cases, the API key is subsequently used for authorization when the rule runs.</div>
|
||||
|
||||
<h3 class="field-label">Path parameters</h3>
|
||||
<div class="field-items">
|
||||
|
@ -289,7 +289,7 @@ Any modifications made to this file will be overwritten.
|
|||
<a class="up" href="#__Methods">Up</a>
|
||||
<pre class="post"><code class="huge"><span class="http-method">post</span> /s/{spaceId}/api/alerting/rule/{ruleId}</code></pre></div>
|
||||
<div class="method-summary">Creates a rule with a specific rule identifier. (<span class="nickname">createRuleId</span>)</div>
|
||||
<div class="method-notes">You must have <code>all</code> privileges for the appropriate Kibana features, depending on the <code>consumer</code> and <code>rule_type_id</code> of the rule you're creating. For example, you must have privileges for the <strong>Management > Stack rules</strong> feature, <strong>Analytics > Discover</strong> and <strong>Machine Learning</strong> features, <strong>Observability</strong> features, or <strong>Security</strong> features. If the rule has actions, you must also have <code>read</code> privileges for the <strong>Management > Actions and Connectors</strong> feature. NOTE: This API supports only token-based authentication. When you create a rule, it identifies which roles you have at that point in time. Thereafter, when the rule performs queries, it uses those security privileges. If a user with different privileges updates the rule, its behavior might change.</div>
|
||||
<div class="method-notes">To create a rule, you must have <code>all</code> privileges for the appropriate Kibana features, depending on the <code>consumer</code> and <code>rule_type_id</code> of the rule you're creating. For example, you must have privileges for the <strong>Management > Stack rules</strong> feature, <strong>Analytics > Discover</strong> and <strong>Machine Learning</strong> features, <strong>Observability</strong> features, or <strong>Security</strong> features. If the rule has actions, you must also have <code>read</code> privileges for the <strong>Management > Actions and Connectors</strong> feature. This API supports both key- and token-based authentication. To use key-based authentication, create an API key in Kibana and use it in the header of the API call. To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically. In both cases, the API key is subsequently used for authorization when the rule runs.</div>
|
||||
|
||||
<h3 class="field-label">Path parameters</h3>
|
||||
<div class="field-items">
|
||||
|
@ -527,7 +527,7 @@ Any modifications made to this file will be overwritten.
|
|||
<a class="up" href="#__Methods">Up</a>
|
||||
<pre class="delete"><code class="huge"><span class="http-method">delete</span> /s/{spaceId}/api/alerting/rule/{ruleId}</code></pre></div>
|
||||
<div class="method-summary">Deletes a rule. (<span class="nickname">deleteRule</span>)</div>
|
||||
<div class="method-notes">You must have <code>all</code> privileges for the appropriate Kibana features, depending on the <code>consumer</code> and <code>rule_type_id</code> of the rule you're deleting. For example, the <strong>Management</strong> > <strong>Stack Rules</strong> feature, <strong>Analytics</strong> > <strong>Discover</strong> or <strong>Machine Learning</strong> features, <strong>Observability</strong>, or <strong>Security</strong> features. WARNING: After you delete a rule, you cannot recover it.</div>
|
||||
<div class="method-notes">To delete a rule, you must have <code>all</code> privileges for the appropriate Kibana features, depending on the <code>consumer</code> and <code>rule_type_id</code> of the rule you're deleting. For example, the <strong>Management</strong> > <strong>Stack Rules</strong> feature, <strong>Analytics</strong> > <strong>Discover</strong> or <strong>Machine Learning</strong> features, <strong>Observability</strong>, or <strong>Security</strong> features. WARNING: After you delete a rule, you cannot recover it. If the API key that is used by the rule was created automatically, it is deleted.</div>
|
||||
|
||||
<h3 class="field-label">Path parameters</h3>
|
||||
<div class="field-items">
|
||||
|
@ -629,7 +629,7 @@ Any modifications made to this file will be overwritten.
|
|||
<a class="up" href="#__Methods">Up</a>
|
||||
<pre class="post"><code class="huge"><span class="http-method">post</span> /s/{spaceId}/api/alerting/rule/{ruleId}/_enable</code></pre></div>
|
||||
<div class="method-summary">Enables a rule. (<span class="nickname">enableRule</span>)</div>
|
||||
<div class="method-notes">This API supports token-based authentication only. You must have <code>all</code> privileges for the appropriate Kibana features, depending on the <code>consumer</code> and <code>rule_type_id</code> of the rule. For example, the <strong>Management > Stack Rules</strong> feature, <strong>Analytics > Discover</strong> and <strong>Machine Learning</strong> features, <strong>Observability</strong>, and <strong>Security</strong> features.</div>
|
||||
<div class="method-notes">To enable a rule, you must have <code>all</code> privileges for the appropriate Kibana features, depending on the <code>consumer</code> and <code>rule_type_id</code> of the rule. For example, the <strong>Management > Stack Rules</strong> feature, <strong>Analytics > Discover</strong> and <strong>Machine Learning</strong> features, <strong>Observability</strong>, and <strong>Security</strong> features. This API supports both key- and token-based authentication. To use key-based authentication, create an API key in Kibana and use it in the header of the API call. To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically. In both cases, the API key is subsequently used for authorization when the rule runs.</div>
|
||||
|
||||
<h3 class="field-label">Path parameters</h3>
|
||||
<div class="field-items">
|
||||
|
@ -2594,7 +2594,7 @@ Any modifications made to this file will be overwritten.
|
|||
<a class="up" href="#__Methods">Up</a>
|
||||
<pre class="put"><code class="huge"><span class="http-method">put</span> /s/{spaceId}/api/alerting/rule/{ruleId}</code></pre></div>
|
||||
<div class="method-summary">Updates the attributes for a rule. (<span class="nickname">updateRule</span>)</div>
|
||||
<div class="method-notes">You must have <code>all</code> privileges for the appropriate Kibana features, depending on the <code>consumer</code> and <code>rule_type_id</code> of the rule you're updating. For example, you must have privileges for the <strong>Management > Stack rules</strong> feature, <strong>Analytics > Discover</strong> and <strong>Machine Learning</strong> features, <strong>Observability</strong> features, or <strong>Security</strong> features. If the rule has actions, you must also have <code>read</code> privileges for the <strong>Management > Actions and Connectors</strong> feature. NOTE: This API supports only token-based authentication. When you update a rule, it identifies which roles you have at that point in time. Thereafter, when the rule performs queries, it uses those security privileges. If you have different privileges than the user that created or most recently updated the rule, you might change its behavior. Though some properties are optional, when you update the rule the existing property values are overwritten with default values. Therefore, it is recommended to explicitly set all property values.</div>
|
||||
<div class="method-notes">To update a rule, you must have <code>all</code> privileges for the appropriate Kibana features, depending on the <code>consumer</code> and <code>rule_type_id</code> of the rule you're updating. For example, you must have privileges for the <strong>Management > Stack rules</strong> feature, <strong>Analytics > Discover</strong> and <strong>Machine Learning</strong> features, <strong>Observability</strong> features, or <strong>Security</strong> features. If the rule has actions, you must also have <code>read</code> privileges for the <strong>Management > Actions and Connectors</strong> feature. This API supports both key- and token-based authentication. To use key-based authentication, create an API key in Kibana and use it in the header of the API call. To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically. In both cases, the API key is subsequently used for authorization when the rule runs. NOTE: If the API key has different privileges than the key that created or most recently updated the rule, the rule behavior might change. Though some properties are optional, when you update the rule the existing property values are overwritten with default values. Therefore, it is recommended to explicitly set all property values.</div>
|
||||
|
||||
<h3 class="field-label">Path parameters</h3>
|
||||
<div class="field-items">
|
||||
|
|
|
@ -30,17 +30,6 @@ you must also have `read` privileges for the *Management* >
|
|||
*{connectors-feature}* feature. For more details, refer to
|
||||
<<kibana-feature-privileges>>.
|
||||
|
||||
=== {api-description-title}
|
||||
|
||||
[WARNING]
|
||||
====
|
||||
* This API supports only
|
||||
<<token-api-authentication,token-based authentication>>.
|
||||
* When you create a rule, it identifies which roles you have at that point in time.
|
||||
Thereafter, when the rule performs queries, it uses those security privileges.
|
||||
If a user with different privileges updates the rule, its behavior might change.
|
||||
====
|
||||
|
||||
[[create-rule-api-path-params]]
|
||||
=== {api-path-parms-title}
|
||||
|
||||
|
|
|
@ -29,21 +29,6 @@ features, *{observability}*, or *Security* features. If the rule has
|
|||
*{connectors-feature}* feature. For more details, refer to
|
||||
<<kibana-feature-privileges>>.
|
||||
|
||||
=== {api-description-title}
|
||||
|
||||
[WARNING]
|
||||
====
|
||||
* This API supports only
|
||||
<<token-api-authentication,token-based authentication>>.
|
||||
* When you update a rule, it identifies which roles you have at that point in time.
|
||||
Thereafter, when the rule performs queries, it uses those security privileges.
|
||||
If you have different privileges than the user that created or most recently
|
||||
updated the rule, you might change its behavior.
|
||||
* Though some properties are optional, when you update the rule the existing
|
||||
property values are overwritten with default values. Therefore, it is
|
||||
recommended to explicitly set all property values.
|
||||
====
|
||||
|
||||
[[update-rule-api-path-params]]
|
||||
=== {api-path-parms-title}
|
||||
|
||||
|
|
|
@ -4,6 +4,11 @@
|
|||
<titleabbrev>Set up</titleabbrev>
|
||||
++++
|
||||
|
||||
:frontmatter-description: Prerequisites and production considerations for using {kib} {alert-features}.
|
||||
:frontmatter-tags-products: [alerting]
|
||||
:frontmatter-tags-content-type: [other]
|
||||
:frontmatter-tags-user-goals: [configure]
|
||||
|
||||
{kib} {alert-features} are automatically enabled, but might require some additional
|
||||
configuration.
|
||||
|
||||
|
@ -77,27 +82,26 @@ A rule or connector created in one space will not be visible in another.
|
|||
Rules are authorized using an API key.
|
||||
Its credentials are used to run all background tasks associated with the rule, including condition checks like {es} queries and triggered actions.
|
||||
|
||||
You can create API keys and use them in the header of your API calls as described in <<api-keys>>.
|
||||
If you create or edit a rule in {kib}, an API key is created that captures a snapshot of your privileges at the time of the edit. The following actions regenerate the API key in {kib}:
|
||||
If you create or edit a rule in {kib}, an API key is created that captures a snapshot of your privileges at the time of the edit.
|
||||
The following actions regenerate the API key in {kib}:
|
||||
|
||||
* Creating a rule
|
||||
* Updating a rule
|
||||
|
||||
When you disable a rule, it retains the associated API key which is reused when
|
||||
the rule is enabled. If the API key is missing when you enable the rule (for
|
||||
example, in the case of imported rules), it generates a new key that has your
|
||||
security privileges.
|
||||
When you disable a rule, it retains the associated API key which is reused when the rule is enabled.
|
||||
If the API key is missing when you enable the rule (for example, in the case of imported rules), it generates a new key that has your security privileges.
|
||||
|
||||
You can update an API key manually in
|
||||
**{stack-manage-app} > {rules-ui}** or in the rule details page by selecting
|
||||
**Update API key** in the actions menu.
|
||||
You can update an API key manually in **{stack-manage-app} > {rules-ui}** or in the rule details page by selecting **Update API key** in the actions menu.
|
||||
|
||||
If you manage your rules by using {kib} APIs, they support support both key- and token-based authentication as described in <<api-authentication>>.
|
||||
To use key-based authentication, create API keys and use them in the header of your API calls as described in <<api-keys>>.
|
||||
To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically.
|
||||
In both cases, the API key is subsequently associated with the rule and used when it runs.
|
||||
|
||||
[IMPORTANT]
|
||||
==============================================
|
||||
If a rule requires certain privileges, such as index privileges, to run and a
|
||||
user without those privileges updates the rule, the rule will no longer
|
||||
function. Conversely, if a user with greater or administrator privileges
|
||||
modifies the rule, it will begin running with increased privileges.
|
||||
If a rule requires certain privileges, such as index privileges, to run and a user without those privileges updates the rule, the rule will no longer function.
|
||||
Conversely, if a user with greater or administrator privileges modifies the rule, it will begin running with increased privileges.
|
||||
The same behavior occurs when you change the API key in the header of your API calls.
|
||||
==============================================
|
||||
|
||||
|
|
|
@ -29,7 +29,7 @@
|
|||
"post": {
|
||||
"summary": "Creates a rule with a randomly generated rule identifier.",
|
||||
"operationId": "createRule",
|
||||
"description": "You must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're creating. For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features. If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature. NOTE: This API supports only token-based authentication. When you create a rule, it identifies which roles you have at that point in time. Thereafter, when the rule performs queries, it uses those security privileges. If a user with different privileges updates the rule, its behavior might change.\n",
|
||||
"description": "To create a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're creating. For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features. If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature. This API supports both key- and token-based authentication. To use key-based authentication, create an API key in Kibana and use it in the header of the API call. To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically. In both cases, the API key is subsequently used for authorization when the rule runs.\n",
|
||||
"tags": [
|
||||
"alerting"
|
||||
],
|
||||
|
@ -167,7 +167,7 @@
|
|||
"delete": {
|
||||
"summary": "Deletes a rule.",
|
||||
"operationId": "deleteRule",
|
||||
"description": "You must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're deleting. For example, the **Management** > **Stack Rules** feature, **Analytics** > **Discover** or **Machine Learning** features, **Observability**, or **Security** features. WARNING: After you delete a rule, you cannot recover it.\n",
|
||||
"description": "To delete a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're deleting. For example, the **Management** > **Stack Rules** feature, **Analytics** > **Discover** or **Machine Learning** features, **Observability**, or **Security** features. WARNING: After you delete a rule, you cannot recover it. If the API key that is used by the rule was created automatically, it is deleted.\n",
|
||||
"tags": [
|
||||
"alerting"
|
||||
],
|
||||
|
@ -216,7 +216,7 @@
|
|||
"post": {
|
||||
"summary": "Creates a rule with a specific rule identifier.",
|
||||
"operationId": "createRuleId",
|
||||
"description": "You must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're creating. For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features. If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature. NOTE: This API supports only token-based authentication. When you create a rule, it identifies which roles you have at that point in time. Thereafter, when the rule performs queries, it uses those security privileges. If a user with different privileges updates the rule, its behavior might change.\n",
|
||||
"description": "To create a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're creating. For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features. If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature. This API supports both key- and token-based authentication. To use key-based authentication, create an API key in Kibana and use it in the header of the API call. To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically. In both cases, the API key is subsequently used for authorization when the rule runs.\n",
|
||||
"tags": [
|
||||
"alerting"
|
||||
],
|
||||
|
@ -299,7 +299,7 @@
|
|||
"put": {
|
||||
"summary": "Updates the attributes for a rule.",
|
||||
"operationId": "updateRule",
|
||||
"description": "You must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're updating. For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features. If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature. NOTE: This API supports only token-based authentication. When you update a rule, it identifies which roles you have at that point in time. Thereafter, when the rule performs queries, it uses those security privileges. If you have different privileges than the user that created or most recently updated the rule, you might change its behavior. Though some properties are optional, when you update the rule the existing property values are overwritten with default values. Therefore, it is recommended to explicitly set all property values.\n",
|
||||
"description": "To update a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're updating. For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features. If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature. This API supports both key- and token-based authentication. To use key-based authentication, create an API key in Kibana and use it in the header of the API call. To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically. In both cases, the API key is subsequently used for authorization when the rule runs. NOTE: If the API key has different privileges than the key that created or most recently updated the rule, the rule behavior might change. Though some properties are optional, when you update the rule the existing property values are overwritten with default values. Therefore, it is recommended to explicitly set all property values.\n",
|
||||
"tags": [
|
||||
"alerting"
|
||||
],
|
||||
|
@ -438,7 +438,7 @@
|
|||
"post": {
|
||||
"summary": "Enables a rule.",
|
||||
"operationId": "enableRule",
|
||||
"description": "This API supports token-based authentication only. You must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule. For example, the **Management > Stack Rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability**, and **Security** features.\n",
|
||||
"description": "To enable a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule. For example, the **Management > Stack Rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability**, and **Security** features. This API supports both key- and token-based authentication. To use key-based authentication, create an API key in Kibana and use it in the header of the API call. To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically. In both cases, the API key is subsequently used for authorization when the rule runs.\n",
|
||||
"tags": [
|
||||
"alerting"
|
||||
],
|
||||
|
|
|
@ -20,7 +20,7 @@ paths:
|
|||
summary: Creates a rule with a randomly generated rule identifier.
|
||||
operationId: createRule
|
||||
description: |
|
||||
You must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're creating. For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features. If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature. NOTE: This API supports only token-based authentication. When you create a rule, it identifies which roles you have at that point in time. Thereafter, when the rule performs queries, it uses those security privileges. If a user with different privileges updates the rule, its behavior might change.
|
||||
To create a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're creating. For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features. If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature. This API supports both key- and token-based authentication. To use key-based authentication, create an API key in Kibana and use it in the header of the API call. To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically. In both cases, the API key is subsequently used for authorization when the rule runs.
|
||||
tags:
|
||||
- alerting
|
||||
parameters:
|
||||
|
@ -100,7 +100,7 @@ paths:
|
|||
summary: Deletes a rule.
|
||||
operationId: deleteRule
|
||||
description: |
|
||||
You must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're deleting. For example, the **Management** > **Stack Rules** feature, **Analytics** > **Discover** or **Machine Learning** features, **Observability**, or **Security** features. WARNING: After you delete a rule, you cannot recover it.
|
||||
To delete a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're deleting. For example, the **Management** > **Stack Rules** feature, **Analytics** > **Discover** or **Machine Learning** features, **Observability**, or **Security** features. WARNING: After you delete a rule, you cannot recover it. If the API key that is used by the rule was created automatically, it is deleted.
|
||||
tags:
|
||||
- alerting
|
||||
parameters:
|
||||
|
@ -128,7 +128,7 @@ paths:
|
|||
summary: Creates a rule with a specific rule identifier.
|
||||
operationId: createRuleId
|
||||
description: |
|
||||
You must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're creating. For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features. If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature. NOTE: This API supports only token-based authentication. When you create a rule, it identifies which roles you have at that point in time. Thereafter, when the rule performs queries, it uses those security privileges. If a user with different privileges updates the rule, its behavior might change.
|
||||
To create a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're creating. For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features. If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature. This API supports both key- and token-based authentication. To use key-based authentication, create an API key in Kibana and use it in the header of the API call. To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically. In both cases, the API key is subsequently used for authorization when the rule runs.
|
||||
tags:
|
||||
- alerting
|
||||
parameters:
|
||||
|
@ -179,7 +179,7 @@ paths:
|
|||
summary: Updates the attributes for a rule.
|
||||
operationId: updateRule
|
||||
description: |
|
||||
You must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're updating. For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features. If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature. NOTE: This API supports only token-based authentication. When you update a rule, it identifies which roles you have at that point in time. Thereafter, when the rule performs queries, it uses those security privileges. If you have different privileges than the user that created or most recently updated the rule, you might change its behavior. Though some properties are optional, when you update the rule the existing property values are overwritten with default values. Therefore, it is recommended to explicitly set all property values.
|
||||
To update a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're updating. For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features. If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature. This API supports both key- and token-based authentication. To use key-based authentication, create an API key in Kibana and use it in the header of the API call. To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically. In both cases, the API key is subsequently used for authorization when the rule runs. NOTE: If the API key has different privileges than the key that created or most recently updated the rule, the rule behavior might change. Though some properties are optional, when you update the rule the existing property values are overwritten with default values. Therefore, it is recommended to explicitly set all property values.
|
||||
tags:
|
||||
- alerting
|
||||
parameters:
|
||||
|
@ -257,7 +257,7 @@ paths:
|
|||
summary: Enables a rule.
|
||||
operationId: enableRule
|
||||
description: |
|
||||
This API supports token-based authentication only. You must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule. For example, the **Management > Stack Rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability**, and **Security** features.
|
||||
To enable a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule. For example, the **Management > Stack Rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability**, and **Security** features. This API supports both key- and token-based authentication. To use key-based authentication, create an API key in Kibana and use it in the header of the API call. To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically. In both cases, the API key is subsequently used for authorization when the rule runs.
|
||||
tags:
|
||||
- alerting
|
||||
parameters:
|
||||
|
|
|
@ -2,13 +2,13 @@ post:
|
|||
summary: Creates a rule with a randomly generated rule identifier.
|
||||
operationId: createRule
|
||||
description: >
|
||||
You must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're creating.
|
||||
To create a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're creating.
|
||||
For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features.
|
||||
If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature.
|
||||
NOTE: This API supports only token-based authentication.
|
||||
When you create a rule, it identifies which roles you have at that point in time.
|
||||
Thereafter, when the rule performs queries, it uses those security privileges.
|
||||
If a user with different privileges updates the rule, its behavior might change.
|
||||
This API supports both key- and token-based authentication.
|
||||
To use key-based authentication, create an API key in Kibana and use it in the header of the API call.
|
||||
To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically.
|
||||
In both cases, the API key is subsequently used for authorization when the rule runs.
|
||||
tags:
|
||||
- alerting
|
||||
parameters:
|
||||
|
|
|
@ -42,11 +42,10 @@ delete:
|
|||
summary: Deletes a rule.
|
||||
operationId: deleteRule
|
||||
description: >
|
||||
You must have `all` privileges for the appropriate Kibana features, depending
|
||||
on the `consumer` and `rule_type_id` of the rule you're deleting. For example,
|
||||
the **Management** > **Stack Rules** feature, **Analytics** > **Discover** or
|
||||
**Machine Learning** features, **Observability**, or **Security** features.
|
||||
To delete a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're deleting.
|
||||
For example, the **Management** > **Stack Rules** feature, **Analytics** > **Discover** or **Machine Learning** features, **Observability**, or **Security** features.
|
||||
WARNING: After you delete a rule, you cannot recover it.
|
||||
If the API key that is used by the rule was created automatically, it is deleted.
|
||||
tags:
|
||||
- alerting
|
||||
parameters:
|
||||
|
@ -75,17 +74,13 @@ post:
|
|||
summary: Creates a rule with a specific rule identifier.
|
||||
operationId: createRuleId
|
||||
description: >
|
||||
You must have `all` privileges for the appropriate Kibana features,
|
||||
depending on the `consumer` and `rule_type_id` of the rule you're creating.
|
||||
For example, you must have privileges for the **Management > Stack rules**
|
||||
feature, **Analytics > Discover** and **Machine Learning** features,
|
||||
**Observability** features, or **Security** features. If the rule has
|
||||
actions, you must also have `read` privileges for the
|
||||
**Management > Actions and Connectors** feature. NOTE: This API supports
|
||||
only token-based authentication. When you create a rule, it identifies which
|
||||
roles you have at that point in time. Thereafter, when the rule performs
|
||||
queries, it uses those security privileges. If a user with different
|
||||
privileges updates the rule, its behavior might change.
|
||||
To create a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're creating.
|
||||
For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features.
|
||||
If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature.
|
||||
This API supports both key- and token-based authentication.
|
||||
To use key-based authentication, create an API key in Kibana and use it in the header of the API call.
|
||||
To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically.
|
||||
In both cases, the API key is subsequently used for authorization when the rule runs.
|
||||
tags:
|
||||
- alerting
|
||||
parameters:
|
||||
|
@ -138,19 +133,15 @@ put:
|
|||
summary: Updates the attributes for a rule.
|
||||
operationId: updateRule
|
||||
description: >
|
||||
You must have `all` privileges for the appropriate Kibana features,
|
||||
depending on the `consumer` and `rule_type_id` of the rule you're updating.
|
||||
For example, you must have privileges for the **Management > Stack rules**
|
||||
feature, **Analytics > Discover** and **Machine Learning** features,
|
||||
**Observability** features, or **Security** features. If the rule has
|
||||
actions, you must also have `read` privileges for the
|
||||
**Management > Actions and Connectors** feature. NOTE: This API supports
|
||||
only token-based authentication. When you update a rule, it identifies which
|
||||
roles you have at that point in time. Thereafter, when the rule performs
|
||||
queries, it uses those security privileges. If you have different privileges
|
||||
than the user that created or most recently updated the rule, you might
|
||||
change its behavior. Though some properties are optional, when you update
|
||||
the rule the existing property values are overwritten with default values.
|
||||
To update a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule you're updating.
|
||||
For example, you must have privileges for the **Management > Stack rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability** features, or **Security** features.
|
||||
If the rule has actions, you must also have `read` privileges for the **Management > Actions and Connectors** feature.
|
||||
This API supports both key- and token-based authentication.
|
||||
To use key-based authentication, create an API key in Kibana and use it in the header of the API call.
|
||||
To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically.
|
||||
In both cases, the API key is subsequently used for authorization when the rule runs.
|
||||
NOTE: If the API key has different privileges than the key that created or most recently updated the rule, the rule behavior might change.
|
||||
Though some properties are optional, when you update the rule the existing property values are overwritten with default values.
|
||||
Therefore, it is recommended to explicitly set all property values.
|
||||
tags:
|
||||
- alerting
|
||||
|
|
|
@ -2,11 +2,12 @@ post:
|
|||
summary: Enables a rule.
|
||||
operationId: enableRule
|
||||
description: >
|
||||
This API supports token-based authentication only.
|
||||
You must have `all` privileges for the appropriate Kibana features,
|
||||
depending on the `consumer` and `rule_type_id` of the rule. For example, the
|
||||
**Management > Stack Rules** feature, **Analytics > Discover** and
|
||||
**Machine Learning** features, **Observability**, and **Security** features.
|
||||
To enable a rule, you must have `all` privileges for the appropriate Kibana features, depending on the `consumer` and `rule_type_id` of the rule.
|
||||
For example, the **Management > Stack Rules** feature, **Analytics > Discover** and **Machine Learning** features, **Observability**, and **Security** features.
|
||||
This API supports both key- and token-based authentication.
|
||||
To use key-based authentication, create an API key in Kibana and use it in the header of the API call.
|
||||
To use token-based authentication, provide a username and password; an API key that matches the current privileges of the user is created automatically.
|
||||
In both cases, the API key is subsequently used for authorization when the rule runs.
|
||||
tags:
|
||||
- alerting
|
||||
parameters:
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue