[6.7] [DOCS] Fixes broken links (#51634) (#51928)

This commit is contained in:
Lisa Cawley 2019-11-29 18:19:41 -08:00 committed by GitHub
parent 3bcb349fff
commit f2b075c710
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
19 changed files with 25 additions and 25 deletions

View file

@ -28,7 +28,7 @@ The following parameters can be specified in the body of a PUT request to add or
that begin with `_` are reserved for system usage.
`elasticsearch`:: (object) Optional {es} cluster and index privileges, valid keys are
`cluster`, `indices` and `run_as`. For more information, see {xpack-ref}/defining-roles.html[Defining Roles].
`cluster`, `indices` and `run_as`. For more information, see {ref}/defining-roles.html[Defining roles].
`kibana`:: (object) An object that specifies the <<kibana-privileges>>. Valid keys are `global` and `space`. Privileges defined in the `global` key will apply to all spaces within Kibana, and will take precedent over any privileges defined in the `space` key. For example, specifying `global: ["all"]` will grant full access to all spaces within Kibana, even if the role indicates that a specific space should only have `read` privileges.

View file

@ -1,7 +1,7 @@
[[development-security-rbac]]
=== Role-based access control
Role-based access control (RBAC) in {kib} relies upon the {xpack-ref}/security-privileges.html#application-privileges[application privileges] that Elasticsearch exposes. This allows {kib} to define the privileges that {kib} wishes to grant to users, assign them to the relevant users using roles, and then authorize the user to perform a specific action. This is handled within a secured instance of the `SavedObjectsClient` and available transparently to consumers when using `request.getSavedObjectsClient()` or `savedObjects.getScopedSavedObjectsClient()`.
Role-based access control (RBAC) in {kib} relies upon the {ref}/security-privileges.html#application-privileges[application privileges] that Elasticsearch exposes. This allows {kib} to define the privileges that {kib} wishes to grant to users, assign them to the relevant users using roles, and then authorize the user to perform a specific action. This is handled within a secured instance of the `SavedObjectsClient` and available transparently to consumers when using `request.getSavedObjectsClient()` or `savedObjects.getScopedSavedObjectsClient()`.
[[development-rbac-privileges]]
==== {kib} Privileges

View file

@ -65,7 +65,7 @@ and whether it's _tokenized_, or broken up into separate words.
NOTE: If security is enabled, you must have the `all` Kibana privilege to run this tutorial.
You must also have the `create`, `manage` `read`, `write,` and `delete`
index privileges. See {xpack-ref}/security-privileges.html[Security Privileges]
index privileges. See {ref}/security-privileges.html[Security privileges]
for more information.
In Kibana *Dev Tools > Console*, set up a mapping for the Shakespeare data set:

View file

@ -26,6 +26,6 @@ In this tutorial, youll learn to:
* Inspect the data behind the scenes
NOTE: If security is enabled, you must have `read`, `write`, and `manage` privileges
on the `kibana_sample_data_*` indices. See {xpack-ref}/security-privileges.html[Security Privileges]
on the `kibana_sample_data_*` indices. See {ref}/security-privileges.html[Security privileges]
for more information.

View file

@ -19,7 +19,7 @@ To grant read-only access to your custom {kib} instance,
you must assign the read <<kibana-privileges, Kibana privilege>>.
These privileges are available under *Management > Security > Roles*.
For more information on roles and privileges, see {xpack-ref}/authorization.html[User Authorization].
For more information on roles and privileges, see {ref}/authorization.html[User authorization].
[role="screenshot"]
image:management/dashboard_only_mode/images/custom_dashboard_mode_role.png["Custom dashboard mode role with read permissions on a custom kibana index"]

View file

@ -7,7 +7,7 @@ what users see when they log in to {kib}. The `kibana_dashboard_only_user` role
preconfigured with read-only permissions to {kib}.
IMPORTANT: You must also assign roles that grant the user appropriate access to the data indices.
For information on roles and privileges, see {xpack-ref}/authorization.html[User Authorization].
For information on roles and privileges, see {ref}/authorization.html[User authorization].
Users assigned this role are only able to see the Dashboard app in the navigation
pane. When users open a dashboard, they will have a limited visual experience.

View file

@ -12,7 +12,7 @@ To access this feature, go to *Management > {es} > Index Management*.
If security is enabled,
you must have the `monitor` cluster privilege and the `view_index_metadata`
and `manage` index privileges to view the data. See
{xpack-ref}/security-privileges.html[Security Privileges] for more
{ref}/security-privileges.html[Security privileges] for more
information.
*Index Management* uses badges to make users aware when an index is {ref}/frozen-indices.html[frozen],

View file

@ -22,7 +22,7 @@ see {ref}/ml-job-resource.html#ml-analysisconfig[Analysis configuration objects]
If you choose a value that is larger than one day or is significantly different
than the estimated value, you receive an informational message. For more
information about choosing an appropriate bucket span, see
{xpack-ref}/ml-buckets.html[Buckets].
{stack-ov}/ml-buckets.html[Buckets].
[[cardinality]]
==== Cardinality
@ -40,7 +40,7 @@ job uses more memory resources. In particular, if the cardinality of the
Likewise if you are performing population analysis and the cardinality of the
`over_field_name` is below 10, you are advised that this might not be a suitable
field to use. For more information, see
{xpack-ref}/ml-configuring-pop.html[Performing Population Analysis].
{stack-ov}/ml-configuring-pop.html[Performing population analysis].
[[detectors]]
==== Detectors

View file

@ -23,7 +23,7 @@ highlighted in yellow or red.
TIP: Conditions that require your attention are listed at the top of the
Clusters page. You can also set up watches to alert you when the status
of your cluster changes. To learn how, see
{xpack-ref}/watch-cluster-status.html[Watch Your Cluster Health].
{ref}/watch-cluster-status.html[Watch your cluster health].
The panel at the top shows the current cluster statistics, the charts show the
search and indexing performance over time, and the table at the bottom shows

View file

@ -18,7 +18,7 @@ Basic authentication requires a username and password to successfully log in to
The session cookies that are issued by the basic authentication provider are stateless. Therefore, logging out of Kibana when using the basic authentication provider clears the session cookies from the browser but does not invalidate the session cookie for reuse.
For more information about basic authentication and built-in users, see {xpack-ref}/setting-up-authentication.html[Setting Up User Authentication].
For more information about basic authentication and built-in users, see {ref}/setting-up-authentication.html[User authentication].
[[token-authentication]]
==== Token Authentication
@ -46,7 +46,7 @@ xpack.security.authProviders: [token, basic]
[[saml]]
==== SAML Single Sign-On
SAML authentication allows users to log in to {kib} with an external Identity Provider, such as Okta or Auth0. Make sure that SAML is enabled and configured in {es} before setting it up in {kib}. See {xpack-ref}/saml-guide.html[Configuring SAML Single-Sign-On on the Elastic Stack].
SAML authentication allows users to log in to {kib} with an external Identity Provider, such as Okta or Auth0. Make sure that SAML is enabled and configured in {es} before setting it up in {kib}. See {ref}/saml-guide.html[Configuring SAML single sign-on on the Elastic Stack].
Set the configuration values in `kibana.yml` as follows:

View file

@ -8,7 +8,7 @@ user actions in {kib}.
To use {reporting} with {security} enabled, you need to
<<using-kibana-with-security,set up {kib} to work with {security}>>.
If you are automatically generating reports with
{xpack-ref}/xpack-alerting.html[{watcher}], you also need to configure {watcher}
{ref}/xpack-alerting.html[{watcher}], you also need to configure {watcher}
to trust the {kib} server's certificate. For more information, see
<<securing-reporting>>.
@ -34,7 +34,7 @@ POST /_xpack/security/user/reporter
* If you are using an LDAP or Active Directory realm, you can either assign
roles on a per user basis, or assign roles to groups of users. By default, role
mappings are configured in
{xpack-ref}/mapping-roles.html[`config/shield/role_mapping.yml`].
{ref}/mapping-roles.html[`config/shield/role_mapping.yml`].
For example, the following snippet assigns the user named Bill Murray the
`kibana_user` and `reporting_user` roles:
+
@ -54,7 +54,7 @@ In a production environment, you should restrict access to
the {reporting} endpoints to authorized users. This requires that you:
. Enable {security} on your {es} cluster. For more information,
see {xpack-ref}/security-getting-started.html[Getting Started with Security].
see {ref}/security-getting-started.html[Getting started with security].
. Configure an SSL certificate for Kibana. For more information, see
<<using-kibana-with-security>>.
. Configure {watcher} to trust the Kibana server's certificate by adding it to
@ -82,4 +82,4 @@ includes a watch that submits requests as the built-in `elastic` user:
<<automating-report-generation>>.
For more information about configuring watches, see
{xpack-ref}/how-watcher-works.html[How Watcher Works].
{ref}/how-watcher-works.html[How {watcher} works].

View file

@ -106,7 +106,7 @@ TIP: You can define as many different roles for your {kib} users as you need.
For example, create roles that have `read` and `view_index_metadata` privileges
on specific index patterns. For more information, see
{xpack-ref}/authorization.html[Configuring Role-based Access Control].
{ref}/authorization.html[User authorization].
--

View file

@ -25,7 +25,7 @@ from Logstash, you configure
in `logstash.yml`.
For more information, see
{xpack-ref}/xpack-monitoring.html[Monitoring the Elastic Stack].
{ref}/monitor-elasticsearch-cluster.html[Monitor the cluster].
[float]
[[monitoring-general-settings]]

View file

@ -9,7 +9,7 @@ https://github.com/elastic/kibana-docker/tree/{branch}[GitHub].
These images are free to use under the Elastic license. They contain open source
and free commercial features and access to paid commercial features.
{xpack-ref}/license-management.html[Start a 30-day trial] to try out all of the
{stack-ov}/license-management.html[Start a 30-day trial] to try out all of the
paid commercial features. See the
https://www.elastic.co/subscriptions[Subscriptions] page for information about
Elastic license levels.

View file

@ -48,8 +48,8 @@ downloaded from the Elastic Docker Registry.
<<docker,Running Kibana on Docker>>
IMPORTANT: If your Elasticsearch installation is protected by
{xpack-ref}/xpack-security.html[{security}] see
{kibana-ref}/using-kibana-with-security.html[Configuring Security in Kibana] for
{ref}/elasticsearch-security.html[{security}] see
{kibana-ref}/using-kibana-with-security.html[Configuring security in Kibana] for
additional setup instructions.

View file

@ -7,7 +7,7 @@ Kibana on any Debian-based system such as Debian and Ubuntu.
This package is free to use under the Elastic license. It contains open source
and free commercial features and access to paid commercial features.
{xpack-ref}/license-management.html[Start a 30-day trial] to try out all of the
{stack-ov}/license-management.html[Start a 30-day trial] to try out all of the
paid commercial features. See the
https://www.elastic.co/subscriptions[Subscriptions] page for information about
Elastic license levels.

View file

@ -11,7 +11,7 @@ such as SLES 11 and CentOS 5. Please see <<targz>> instead.
This package is free to use under the Elastic license. It contains open source
and free commercial features and access to paid commercial features.
{xpack-ref}/license-management.html[Start a 30-day trial] to try out all of the
{stack-ov}/license-management.html[Start a 30-day trial] to try out all of the
paid commercial features. See the
https://www.elastic.co/subscriptions[Subscriptions] page for information about
Elastic license levels.

View file

@ -6,7 +6,7 @@ are the easiest formats to use when trying out Kibana.
These packages are free to use under the Elastic license. They contain open
source and free commercial features and access to paid commercial features.
{xpack-ref}/license-management.html[Start a 30-day trial] to try out all of the
{stack-ov}/license-management.html[Start a 30-day trial] to try out all of the
paid commercial features. See the
https://www.elastic.co/subscriptions[Subscriptions] page for information about
Elastic license levels.

View file

@ -5,7 +5,7 @@ Kibana can be installed on Windows using the `.zip` package.
This package is free to use under the Elastic license. It contains open source
and free commercial features and access to paid commercial features.
{xpack-ref}/license-management.html[Start a 30-day trial] to try out all of the
{stack-ov}/license-management.html[Start a 30-day trial] to try out all of the
paid commercial features. See the
https://www.elastic.co/subscriptions[Subscriptions] page for information about
Elastic license levels.